paper_id
stringlengths 9
16
| version
stringclasses 26
values | yymm
stringclasses 311
values | created
timestamp[s] | title
stringlengths 6
335
| secondary_subfield
sequencelengths 1
8
| abstract
stringlengths 25
3.93k
| primary_subfield
stringclasses 124
values | field
stringclasses 20
values | fulltext
stringlengths 0
2.84M
|
---|---|---|---|---|---|---|---|---|---|
1602.07781 | 1 | 1602 | 2016-02-25T03:09:47 | A Markov chain model for the search time for max degree nodes in a graph using a biased random walk | [
"cs.SI",
"cs.DM",
"physics.soc-ph"
] | We consider the problem of estimating the expected time to find a maximum degree node on a graph using a (parameterized) biased random walk. For assortative graphs the positive degree correlation serves as a local gradient for which a bias towards selecting higher degree neighbors will on average reduce the search time. Unfortunately, although the expected absorption time on the graph can be written down using the theory of absorbing Markov chains, computing this time is infeasible for large graphs. With this motivation, we construct an absorbing Markov chain with a state for each degree of the graph, and observe computing the expected absorption time is now computationally feasible. Our paper finds preliminary results along the following lines: i) there are graphs for which the proposed Markov model does and graphs for which the model does not capture the absorbtion time, ii) there are graphs where random sampling outperforms biased random walks, and graphs where biased random walks are superior, and iii) the optimal bias parameter for the random walk is graph dependent, and we study the dependence on the graph assortativity. | cs.SI | cs | A Markov chain model for the search time for max
degree nodes in a graph using a biased random walk
Jonathan Stokes and Steven Weber
Department of Electrical and Computer Engineering
Drexel University, Philadelphia, PA 19104
6
1
0
2
b
e
F
5
2
]
I
S
.
s
c
[
1
v
1
8
7
7
0
.
2
0
6
1
:
v
i
X
r
a
Abstract-We consider the problem of estimating the expected
time to find a maximum degree node on a graph using a
(parameterized) biased random walk. For assortative graphs
the positive degree correlation serves as a local gradient for
which a bias towards selecting higher degree neighbors will
on average reduce the search time. Unfortunately, although the
expected absorption time on the graph can be written down using
the theory of absorbing Markov chains, computing this time is
infeasible for large graphs. With this motivation, we construct
an absorbing Markov chain with a state for each degree of
the graph, and observe computing the expected absorption time
is now computationally feasible. Our paper finds preliminary
results along the following lines: i) there are graphs for which
the proposed Markov model does and graphs for which the model
does not capture the absorbtion time, ii) there are graphs where
random sampling outperforms biased random walks, and graphs
where biased random walks are superior, and iii) the optimal bias
parameter for the random walk is graph dependent, and we study
the dependence on the graph assortativity.
Index Terms-graph search; Markov chain; biased random
walks; greedy search, assortativity.
I. INTRODUCTION
A graph representing Facebook's network of 1.4 billion
users would require 1.4 billion nodes and hundreds of billions
of edges, stretching the capacity of current hardware to hold
the graph in memory. This inability to represent large graphs
makes them difficult to study. One way of sidestepping this
issue is to study a representative subsample of the entire graph.
How one takes this sample often depends on the properties of
the graph being studied. The simplest method of sampling a
graph is to select nodes uniformly at random, however, many
graphs, specifically those representing social networks, exhibit
a power law degree distributions the probability of selecting
a high degree node using this method is small. Intuitively a
better sampling method would use the information gained by
a sample to increase the probability of selecting a max degree
node on subsequent samples. In the context of social networks,
sampling methods for a max degree node that exploit local
information exploit the friendship paradox; on average your
friends have more friends than you do. One goal is to study
the impact that biasing the random choice of the next neighbor
in a random walk towards selecting higher degree neighbors
has on the time to reach a maximum degree node.
This research has been supported by the National Science Foundation under
award #IIS-1250786.
Previous work has developed analytical bounds for the
hitting time of a biased random walk, the time it takes to get
from one node in a graph to another, and the cover time of the
walk, the time it takes a walk to visit every node in a graph.
Ikeda shows that the hitting and cover time of an undirected
graph of n nodes is upper bounded by O(n2) and O(n2log(n))
respectively [1]. Cooper shows all nodes of degree na for
a < 1 in a n node power law graphs with exponent c can be
found in O(n1−a(c−2)+δ) steps [2]. Maiya evaluates several
biased sampling strategies on real world graphs numerically
showing that a walk which always transitions to the max
degree node attached to its current node is a good method
of exploring these graphs [3].
Our approach is different. We first observe that the basic
theory of absorbing finite-state Markov chains (§II) yields
expressions for the mean and variance of the random time to
reach an absorbing state, which in our case is a maximum de-
gree node on the n-node graph. However, computing this mean
and variance requires inverting an n×n matrix, which for large
graphs is prohibitive (§III). Consequently, we consider the case
of assortative graphs where the degrees of the endpoints of
an edge are positively correlated, and recognize that for such
graphs an intelligent strategy for minimizing the search time
to find a maximum degree node is to exploit the local gradient
provided by the assortativity, and to select the next node in
the walk with a bias towards higher degree neighbors. We
construct a random walk on a significantly reduced state space,
with one state for each degree in the graph, and the transition
probability matrix derived from the joint degree distribution
of the graph and the random walk bias parameter (§IV). The
advantage of such a model is that we can analytically compute
the absorption time of the random walk on this reduced state
space quite easily. A second goal is to study how the statistics
of the random absorption time to find maximum degree nodes
on large graphs may be captured using this model.
As shown in §V, we investigate three natural questions,
for which this paper offers only preliminary and numerical
results: i) for which graphs does the above Markov chain state
reduction accurately capture the mean absorbtion time?, ii)
for which graphs does a biased random walk find a maximum
degree node more quickly than does random sampling?, and
iii) how does the optimal bias parameter (β) depend upon the
graph? For our preliminary numerical investigation of these
three questions, we employ Erdos-R´enyi (ER) graphs, rewired
(using a standard rewiring algorithm) to ensure the graph is
connected and has a target assortativity (α ∈ [−1, +1]); the
assortativity plays the role of an independent control parameter
in our investigations. Our preliminary results suggest
the
following answers to the above questions. First, there are
certain (α, β) pairs for which the above model does and does
not work well, in particular α < 0 and β large gives a poor
match. Second, for certain values of α the optimal β∗(α) are
such that the resulting optimal absorbtion time of a biased
random walk is superior to random sampling, but otherwise
not. Third, the optimal β∗(α) appears to have an increasing
trend in α, so that "following the local gradient (choosing a
maximum degree neighbor)" is optimal for highly assortative
graphs, while choosing a neighbor uniformly is superior for
highly disassortative graphs.
II. ABSORPTION TIME FOR MARKOV CHAINS
We will have cause to use the theorem and corollary below
on the mean and variance of the random absorption time TX of
an absorbing finite-state discrete-time Markov chain (DTMC)
X = (X(t), t ∈ N) taking values in a finite state space X
(with X = n). Partition X into absorbing states X (with
X = n) and transient states X (with X = n = n − n), and
so too partition the n×n transition matrix PX into submatrices
(cid:21)
(cid:20) X
X
A O
R Q
X
X
,
PX =
(1)
where A is the n × n submatrix of transition probabilities
between absorbing states, O is the n× n zero matrix, R is the
n × n submatrix of transition probabilities from transient to
absorbing states, and Q is the n × n submatrix of transition
probabilities between transient states.
Definition 1. The fundamental matrix for the DTMC X is the
n × n matrix NX = (In − Q)−1, for In the n × n identity
matrix. The absorption times TX = (TX (x), x ∈ X ) are the
collection of n random absorption times starting from each
possible initial transient state, with TX (x) = min{t ∈ N :
X(t) ∈ XX(0) = x).
Theorem 1. ([4]) The absorption times TX have means µX
and variances σ2
X:
µX = NX 1n, σ2
X = (2NX − In)µX − (µT
X µX )1n,
(2)
where 1n is the n-vector of ones.
Let pX = (pX (x), x ∈ X ) be the initial distribution of X
on the transient states X , i.e., X(0) ∼ pX, and define TX as
the corresponding random absorption time.
Corollary 1. Given the initial distribution pX for X(0) on
X , the resulting absorption time TX has
E[TX ] =
pX (x)µX (x), Var(TX ) =
(cid:88)
(cid:88)
pX (x)σ2
X (x).
x∈ X
x∈ X
(3)
III. BIASED RANDOM WALK ON THE GRAPH
(cid:83)
Denote the undirected graph on which the search takes place
as G = (V,E), with V the set of vertices and E the set of
undirected edges. The order and size of G are V = n and
E = m, respectively. The neighborhood of any node v is
denoted Γ(v) = {u ∈ V : {u, v} ∈ E}, and the degree is
d(v) = Γ(v). The set of degrees found in the graph is D =
v∈V d(v), the number of distinct degrees is δ = D. The
nodes V are partitioned into subsets (Vk, k ∈ D) with Vk =
{v ∈ V : d(v) = k} the set of nodes of degree k, and the
resulting degree distribution is pD = (pD(k), k ∈ D), with
Vk
n . In particular, the max degree found in
entries pD(k) =
the graph is dmax = maxD, and the set of nodes with max
degree is Vmax = Vdmax. An absorbing biased random walk
on G is defined as follows, where the notation is adopted from
the general case presented in §II.
Definition 2. The absorbing discrete-time Markov chain
(DTMC) V = (V (t), t ∈ N) on G with bias parameter β ≥ 0
has states V, partitioned into absorbing states V = Vmax and
transient states V = V\Vmax. The n×n transition probability
matrix PV has entries PV (u, v) = P(V (t+1) = vV (t) = u).
v(cid:48)∈Γ(u) d(v(cid:48))β for v ∈ Γ(u)
For u ∈ V we set PV (u, v) =
and PV (u, v) = 0 else. For u ∈ V: PV (u, u) = 1 and
PV (u, v) = 0 for v (cid:54)= u. The absorption times from each
transient state are TV = (TV (v), v ∈ V), with
initial
TV (v) = min{t ∈ N : V (t) ∈ VV (0) = v}. Note the event
V (t) ∈ V is equivalent to d(V (t)) = dmax.
(cid:80)
d(v)β
This random search for Vmax uses a transition probability
that is biased towards selecting higher degree neighbors of
the current node, as introduced by Cooper [2], with the bias
monotonically increasing in β. For β = 0 the next step is
uniform among all neighbors of u, while as β → ∞ the
next step is uniform among the maximum degree neighbors
of u, i.e., Γmax(u) = argmaxv∈Γ(u) d(v). A key goal of this
paper is to characterize E[TV ] and Var(TV ) as a function of
the initial distribution pV on V and on the bias parameter
β. Although numerical estimates can (and will) be obtained
by simulating the random walk, for large graphs (large n) it
is computationally infeasible to compute E[TV ] and Var(TV )
analytically using Cor. 1, due to the need to compute NV as
the inverse of the (large) n × n matrix In − Q. This difficulty
motivates us to define an approximation of the biased random
walk using a significantly smaller state space, discussed next.
IV. APPROXIMATE BIASED RANDOM WALK
In this section we develop our key approximation giving
a more computationally feasible means to estimate the mean
and standard deviation of TV . Our derivation consists of the
following steps: i) define the joint degree matrix J and the
conditional degree distribution matrix J for G, ii) define the
biased walk degree transition probability distribution p(n) and
average biased walk degree transition matrix ¯P , and iii) define
the approximate biased walk degree transition matrix P .
A. Joint degree and conditional degree distribution matrices
We define the joint degree matrix J and the conditional
degree distribution matrix J for G.
Definition 3. The joint degree matrix J is the δ× δ symmetric
matrix with entries J(k, l) = #{{u, v} ∈ E : {d(u), d(v)} =
{k, l}}, the number of edges in G with endpoints of degrees
k and l, and entries J(k, k) twice the number of edges with
endpoints both of degree k, for (k, l) ∈ D2.
Example 1. The joint degree matrix J for the graph G shown
in Fig. 1 (left) is found by grouping the edges E by the degrees
of the endpoints, as shown in Fig. 1 (right):
J =
1
2
3
4
1
2
3
1
2
1
1 3
4
1
3
2
2
.
endpoint, and (cid:80)
(cid:83)
l(cid:48)∈D J(k, l(cid:48)) = kVk since the sum is the
number of edges with a degree k endpoint.
Row k of J is denoted J(k,·) = ( J(k, l), l ∈ D). The
locations of the non-zero entries of J(k,·) are denoted Dk =
D(v), i.e., l ∈ Dk means there exists some {u, v} ∈ E
v∈Vk
with d(u) = k and d(v) = l.
B. Biased walk degree transition probability distribution
We define the biased walk degree transition probability
distribution p(n) and average biased walk degree transition
matrix ¯P .
Definition 5. The biased random walk degree transition prob-
ability distribution p(n) = (pl(n), l ∈ D) from a node with
l∈D nl ∈ D) is
degree neighborhood n = (nl, l ∈ D) (with(cid:80)
(4)
pl(n) =
(6)
nllβ(cid:80)
l(cid:48)∈D nl(cid:48)l(cid:48)β .
The following is an immediate result of Def. 2.
Proposition 2. The biased random walk V in Def. 2 obeys
the degree transition probability
(7)
P(d(V (t + 1)) = lV (t) = v) = pl(n(v)), l ∈ D(v).
The above proposition states that the biased random walk
V degree transition probability distribution has the property
that the probability of the degree of the next node of the
biased random walk depends upon the current node v only
through n(v). The next definition gives an average transition
probability from nodes of degree k to nodes of degree l under
the biased random walk.
Definition 6. The average biased walk degree transition
matrix ¯PV is the δ × δ matrix with entries
¯PV (k, l) =
1
Vk
pl(n(v)), (k, l) ∈ D2
(8)
(cid:88)
v∈Vk
giving the average probability of transitioning to a node of
degree l over all starting nodes of degree k.
A key point, developed below, is that ¯PV is of size δ × δ
whereas the transition matrix PV is of (potentially) signifi-
cantly larger size n × n.
C. Approximate biased walk degree transition matrix
, n ∈ Nk,
(cid:1) =(cid:0)
P(N = n) =
k(cid:81)
A random δ-vector N = (Nl, l ∈ D) has a multinomial
distribution with parameters (k, p), denoted N ∼ mult(k, p),
if
(cid:19)(cid:89)
where (cid:0)k
N has support Nk = {n ∈ Nδ : (cid:80)
(cid:18)k
(cid:1) is the multinomial coefficient. Here,
the set of all possible δ-vectors from Nδ that sum to k.
l∈D nl = k}, defined as
The approximate biased walk degree transition matrix PW
has entries defined using the expectation of the biased random
walk degree transition probability distribution pl when the
l∈D nl!
pnl
l
n
l∈D
(9)
n
Observe(cid:80)
Fig. 1: Graph G (left) with edges E grouped by the endpoint degrees
(right).
k,l J(k, l) = 2m, and that if an edge from E is
selected uniformly at random then the probability that it should
have endpoints {k, l} is given by J(k, l)/m for k (cid:54)= l, and
J(k, k)/(2m) else. The conditional degree distribution matrix
is obtained by normalizing each row of J into a probability
distribution.
Definition 4. The conditional degree distribution matrix J is
l(cid:48)∈D J(k, l(cid:48)), for
(k, l) ∈ D2.
the δ × δ matrix with J(k, l) = J(k, l)/(cid:80)
of each neighbor of v, i.e., D(v) =(cid:83)
It is important to motivate J for what follows. Towards this
end we define the following. First, the set of degrees D(v) ⊆
D of some v ∈ V is formed by taking the union of the degrees
u∈Γ(v) d(u). The number
of neighbors of some v ∈ V of each different degree D(v),
which we term the degree neighborhood of v, is given by
n(v) = (nl(v), l ∈ D(v)), with entries nl(v) = #{u ∈ Γ(v) :
d(u) = l}.
Proposition 1. The entries J(k, l) of the conditional degree
distribution matrix in Def. 4 are the averages of the fraction
of neighbors of degree l over all degree k nodes:
(cid:88)
Proof: Observe J(k, l) = (cid:80)
J(k, l) =
1
Vk
v∈Vk
nl(v) by partitioning
all edges with a degree k endpoint by the degree of the other
v∈Vk
nl(v)
k
.
(5)
abcdefghhcabgdefABCDEFFEEEEAABBBBCCDDD2143241423243444degree neighborhood n is taken as a random multinomial
vector N with parameters (k, J(k,·)).
Definition 7. The approximate biased walk degree transition
matrix PW is the δ × δ matrix with entries
PW (k, l) = E [pl(N)] , N ∼ mult(k, J(k,·)).
That is:
PW (k, l) =
(cid:88)
(cid:18)k
(cid:19) (cid:89)
n∈Nk
n
l∈Dk
J(k, l)nl
(cid:80)
nllβ
l(cid:48)∈Dk
nl(cid:48)l(cid:48)β .
(10)
(11)
Our model is suitable for those graphs for which ¯PV (k, l) ≈
PW (k, l) for each (k, l) ∈ D2; as will be shown in §V, it is not
difficult to identify graphs for which the model works, and to
find graphs for which it does not. Finally, we define a biased
random walk on D.
Definition 8. The absorbing discrete-time Markov chain
(DTMC) W = (W (t), t ∈ N) on D with bias parameter β ≥ 0
has states D, partitioned into absorbing states D = {dmax}
and transient states D = D \ dmax. The δ × δ transition
probability matrix PW is given in Def. 7. The absorption times
from each initial transient state are TW = (TW (l), l ∈ D),
with TW (l) = min{t ∈ N : W (t) = dmaxW (0) = l}.
Recall that for large graphs (large n) it is not possible
to compute E[TV ] and Var(TV ) for TV in Def. 2 using
Cor. 1 since we cannot obtain the fundamental matrix NV =
(In−Q)−1, on account of the difficulty of inverting the (large)
n × n matrix In − Q. In contrast, for graphs with bounded
δ, it is possible to compute E[TW ] and Var(TW ) for TW
in Def. 8 using Cor. 1 since the corresponding fundamental
matrix NW = (Iδ−1 − Q)−1 is obtained by inverting the
(smaller) (δ − 1) × (δ − 1) matrix Iδ−1 − Q.
Our model's approximation TV ≈ TW lies with the required
approximation ¯PV ≈ PW mentioned above. That is, i) al-
though the biased random walk on the graph has a probability
of transitioning to nodes of each degree l ∈ D(v) from a node
v of degree k that depends upon the exact degree neighborhood
n(v) (i.e., pl(n(v))), ii) we approximate this probability using
the expectation with respect to a random degree neighborhood
N, drawn with parameters k and J(k,·). This distribution
J(k,·) is the average distribution of the number of nodes of
each degree over all degree k nodes (Prop. 1).
V. RESULTS
The experimentation framework for this work is written
using the igraph Python library [5]. We use this framework to
generate instances of a graph family, then for each graph we
measure the random times to find a maximum degree node
by i) a biased random walk (BRW), and ii) random sam-
pling. Unless noted otherwise, the mean E[TV ] and standard
deviation Std[TV ] of the absorption of a BRW on a graph is
calculated from 500 trials for each tested bias coefficient β.
We compare the empirical mean E[TV ] and empirical standard
deviation Std[TV ] measured from the BRW on the graph with
the numerical mean E[TW ] and standard deviation Std[TW ]
of a BRW on the Markov chain of the graph's degree states.
Tab. I describes the Erdos-R´enyi (ER) graphs we used.
Graph
Erdos-R´enyi (ER)
Erdos-R´enyi (ER)
Erdos-R´enyi (ER)
Parameters
p = 0.05
p = 0.0024
p = 0.002569
Size
100
1121
1011
dmax
11
10
11
TABLE I: Parameters of the graphs used in the simulations.
As currently implemented our model has a significant
computational limitation in that the approximate random walk
(W (t)) in Def. 8 requires computing the matrix PW in (11),
and each such entry PW (k, l) requires summing over all
n ∈ Nk. As the size of Nk grows exponentially in k, we
are unable to compute it for graphs with dmax > 15; this is
the motivation behind our selecting (n, p) pairs for the ER
graphs so that dmax is small. Addressing this deficiency is the
subject of our ongoing and future work.
2
A. Erdos-R´enyi (ER) Graphs
graphs with n nodes and each of the (cid:0)n
(cid:1) possible edges is
The Erdos-R´enyi graph [6] G(n, p) is a family of random
added independently with probability p. The resulting graph
has a binomial degree distribution, pD(k) ∼ bin(n − 1, p).
To investigate larger graphs we must ensure the graph is
constructed so as to have a bounded expected maximum
degree, on account of the computational limitation dmax ≤ 15
discussed above. The following proposition gives an upper
bound on the expected maximum of n iid random variables:
Proposition 3. Let (Y1, . . . , Yn) be iid with moment gen-
erating function (MGF) φ(t) = E[etY ] and let Ymax =
max(X1, . . . , Xn). Then E[Ymax] ≤ 1
t log(nφ(t)).
It may be proved by application of Jensen's inequality to
establish etE[Ymax] ≤ nφ(t).
We apply the above rule to the random degrees (D(v), v ∈
[n]) of an ER graph G(n, p), each D(v) ∼ bin(n − 1, p),
which are identically distributed, but not independent; it can be
shown that the slight dependence is inessential and the bound
applies. Recall that the binomial distribution bin(n, λ/n) can
be approximated as a Poisson distribution Po(λ) in the case
when n is large, and that the Poisson MGF is φ(t) = eλ(et−1).
Applying Prop. 3 to this case yields the following upper bound
on the max degree of an ER graph G(n, λ/n)
E[max(D(v), v ∈ [n])] ≤ log(n) − λ
W( log(n)−λ
eλ
(12)
)
where W is the Lambert W function. The value of (12) is that
it allows us to select λ(n) so that the resulting ER graph of
order n has a specified expected max degree upper bound.
However, the ER graph is known to be disconnected with
high probability when p(n) = λ/n (or smaller) for any λ,
and our random walk is only guaranteed to find a maximum
degree node for a connected graph. It is further known that
an ER graph with p(n) = λ(β)/n will have a fraction β
of the n nodes in the giant connected component where
e4 can be wired between the endpoints of the former edges
e1 and e2 without creating self loops or multiple edges such
that the assortativity of the new graph α1 is closer to αt than
α0 we add edges e3 and e4, if not we replace e1 and e2.
This procedure is repeated until the graph's assortativity is
within a suitably small interval around αt. Notice that this
procedure preserves the degree distribution of G0, since the
degree of the end points of e1 and e2 are unchanged. When the
assortativity converges, if the graph is disconnected, then for
each disconnected component a random node is selected in the
graph's giant component and wired to the smaller component,
thereby connecting the graph. The assortativity of the 1011
node graphs compared to their target assortativity is shown in
Fig. 2 (right) for both disconnected (red) and connected (blue)
graphs. From these results we infer that connecting the graphs
in this manner has little effect on their assortativity.
D. Biased Random Walks
We carried out Monte carlo simulations of 500 trials on 10
graphs with binomial degree distributions of 100 and 1011
nodes, while sweeping the bias coefficient β of the walk. We
compared BRWs with two random sampling algorithms: i)
sampling nodes without replacement, denoted 'no-r', and ii)
sampling a node and all of its neighbors without replacement,
denoted 'no-r n'. The rationale for these two forms of sampling
is in the interest in making a fair comparison in the absorbtion
time between the BRW and a random sample. The BRW
algorithm presumes at each step that the search is able to not
only view the degree of the current node but also the degree of
all neighbors of that node. Thus any comparison between the
performance of, say, k steps of the BRW and k nodes sampled
without replacement is unfair to random sampling, since the
latter does not see as many nodes as the former. The second
sampling scheme, where at each step we sample a node and
see its degree as well as the degrees of its neighbors, offers a
more balanced comparison with the performance of the BRW.
For our comparison between the BRW and random sampling
we investigated nine sample values of the target assortativity
αt, namely the nine values {−1.0,−0.75, . . . , 0.75, 1.0}, and
we used both 100 node and 1000 node ER graphs. For each
target αt, and each graph rewired to that αt, we swept the
biased coefficient β over the range [0, 8].
The results for αt ∈ {+0.5,−0.5} are shown in Fig. 3 (for
n = 1000) and Fig. 4 (for n = 100). Several points bear
mention. First, for target assortativity αt = +0.5 (both for
n ≈ 1000 and n ≈ 100) there exist optimized β∗(αt) for
which BRW outperforms random sampling of a node and its
neighbor degrees, and there exist non-optimal values of β for
which random sampling outperforms the non-optimized BRW.
Second, for target assortativity αt = −0.5 we see that the
BRW is inferior to random sampling a node and its neighbor
degrees for all values of β. Third, the case of n ≈ 1000 and
α = +0.5 shows there exists a non-trivial value of β∗ for this
α, meaning the optimal value is not at either endpoint of the β
interval of [0, 8]. This suggests that although BRWs can yield
superior search times compared with sampling neighborhoods,
Fig. 2: Left: average absorbtion time, E[T ] (solid lines), for original
graph (blue, via simulation) and model (green, via (3)), with E[T ]±
Std[T ] (dashed lines). Right: output assortativity α as a function of
input target assortativity αt in the random rewiring algorithm.
λ(β) = − log(1 − β)/β [7]. Hence the trade-off we face in
generating ER graphs is between a large fraction β in the
giant connected component vs. a bounded max degree. For
n = 1090 and λ = 2.8 (i.e., p(n) = λ/n = 0.0024569), the
expected max degree upper bound in (12) is dmax ≤ 11.1041,
and β = 0.924975 obeys − log(1 − β)/β = λ, meaning
the giant connected component will contain approximately
nβ = 1008 nodes.
B. Results for ER Graphs
Fig. 2 (left) shows the expected absorbtion time E[T ] for
an ER graph using both i) the simulated biased random walk
(BRW) on the original graph E[TV ], and ii) the analytically
computed E[TW ] using the reduced state space model, both
swept over a range of bias coefficients β. The plot shows a
significant deviation between the measured quantity and the
model prediction. The failure of the model for this graph may
be accounted for by the fact that the ER graph is known to
have zero assortativity, i.e., the degrees of the two endpoints
of the graph are conditionally independent, and as such the
degree of the current node does not provide any substantial
information about the proximity of that node to higher degree
(and by extension, maximum degree) nodes. In this sense, our
approximation is shown to break down for such graphs, as a
central assumption of our model is the idea that the degree of a
node does contain information about its degree neighborhood
and all nodes of degree k have similar degree neighborhoods.
This led to a set of questions: i) is the accuracy of our
model of a BRW on a graph dependent upon the graph's
assortativity?, ii) are there graphs where BRW finds the max
degree nodes faster than random sampling?, and iii) what is
the optimal bias coefficient β∗ for a graph of assortativity α?
C. Graph Re-wiring Algorithm
Our approach in this paper is to offer some preliminary
numerical answers to these questions, using graph assorta-
tivity, denoted by α ∈ [−1, +1], as the independent control
parameter. To construct graphs with a target assortativity,
αt, we modified Brunet's rewiring algorithm for increasing
or decreasing a graph's assortativity [8]. Given an initial
graph G0 and a target assortativity αt. We calculate G0's
assortativity, α0 and choose two edges at random e1, e2. Then
we remove e1 and e2 from G0. If two new edges e3 and
012345Bias Coefficient: β10-1100101102103104Time to AbsorptionGraph WalkAnalyticalFig. 3: ER graph with ∼ 1000 nodes. Expected time to absorbtion
E[T ] (solid) and E[T ]±Std(T ) (dotted) for i) the BRW (blue) and ii)
random sampling without replacement (observing a) just the degree
of the sampled node (green) and b) degrees of node and its neighbors
(red)) versus β. αt = +0.5 (left) and αt = −0.5 (right).
Fig. 5: The optimal bias coefficient β∗ (points) and the interval
[βmin, βmax] of points for which E[T ] is within 10% of E[T ∗]
(shaded) vs. the target assortativity αt. Left: comparison of n ≈ 100
(gray) and n ≈ 1000 (blue). Right: comparison of β∗ for n = 100
for actual graph (gray) and reduced state space model (blue).
Fig. 4: Same caption as Fig. 3 but for an ER graph with ∼ 100 nodes.
Also shown is mean absorbtion time E[TW ] predicted by the model.
Fig. 6: Mean absorbtion times E[T ∗] vs. αt, where for each αt we
use the optimized value β∗(αt) from Fig. 5. Left: comparison of
n ≈ 100 (blue) and n ≈ 1000 (gray). Right: comparison of E[T ∗]
for actual graph (blue) and reduced state space model (green).
doing so requires a correctly-tuned value of β for the particular
value of α (and in this case also n). The inferiority of the BRW
for disassortative graphs (here, α = −0.5) may be on account
of the fact that BRWs on such graphs are more likely to spend
much of the search time trapped in a local minimum.
E. Optimal Bias Coefficient β
In this subsection we extend αt to include the nine values
mentioned earlier. For each αt we find β∗(αt) and E[T ∗(αt)]
using β∗(αt), and plot both these functions against αt. Be-
cause we observe that the dependence of E[T ] on β can be
somewhat flat near the optimal, meaning there is some degree
of insensitivity to the precise value of β, we actually compute
the interval [βmin(αt), βmax(αt)] containing α∗(αt), where
the interval holds all values of β for which the corresponding
value of E[T ] is within 10% of the optimal value E[T ∗].
The results are shown in Fig. 5 and Fig. 6. Several
points bear mention. First, Fig. 5 shows that
the optimal
bias coefficient β∗ for β ∈ [0, . . . , 8] tends to increase with
increasing assortativity αt of the graph. More sample graphs
for each αt, more points αt ∈ [−1, +1], and a larger search
range for β than the current [0, 8] are required to confirm
this initial observation. Second, Fig. 6 shows that for both
n ≈ 100 and n ≈ 1000 there exists an interval of α over
which optimized BRWs outperform random sampling of node
and neighbor degrees. Again, more extensive simulations are
required. However, these preliminary results suggest BRWs
are inferior to sampling for graphs with negative assortativity.
F. Biased Random Walk Model
Finally, the two right side plots in Fig. 5 and Fig. 6 include
results for both the simulations of BRWs on the graph as
well as analytical computations using the reduced state space
model. In particular, Fig. 5 shows that β∗ for minimizing
E[TV ] and β∗ for minimizing E[TW ] are not exactly equal, but
are comparable, and show the same rough increasing trend as
a function of α. Moreover, Fig. 6 shows E[T ∗
V ] is comparable
to E[T ∗
W ] for certain values of α.
VI. FUTURE WORK
The main contributions are i) a potentially useful model
for analytically computing the expected absorbtion time of a
biased random walk using a reduced state space model, and
ii) preliminary comparison of the absorbtion time between a
BRW and random sampling to find a max degree node. Our
current goal is to find an approximation for E[TW ].
REFERENCES
[1] S. Ikeda and I. Kubo, "Impact of local topological information on random
walks on finite graphs," in Proc. of the 30th Intl. Conf. on Automata,
Languages and Programming, 2003, pp. 1054–1067.
[2] C. Cooper, T. Radzik, and Y. Siantos, "A fast algorithm to find all high-
degree vertices in graphs with a power-law degree sequence," Internet
Mathematics, vol. 10, no. 1-2, pp. 137–161, 2014.
[3] A. Maiya and T. Berger-Wolf, "Benefits of bias: Towards better charac-
terization of network sampling," in Proc. of the 17th ACM SIGKDD Intl.
Conf. on Knowledge Discovery and Data Mining, 2011, pp. 105–113.
[4] J. Kemeny and J. Snell, Finite Markov Chains, 1st ed. Springer, 1983.
[5] G. Csardi and T. Nepusz, "The igraph software package for complex
network research," InterJournal, vol. Complex Systems, p. 1695, 2006.
[6] P. Erdos and A. R´enyi, "On random graphs I," Publicationes Mathemat-
icae (Debrecen), vol. 6, pp. 290–297, 1959.
012345678Bias Coefficient: β10-1100101102103Time to AbsorptionBiased WalkSampling no-rSampling no-r n012345678Bias Coefficient: β101102103104105Time to AbsorptionBiased WalkSampling no-rSampling no-r n012345678Bias Coefficient: β10-1100101102103Time to AbsorptionBiased WalkBiased Walk ModelSampling no-rSampling no-r n012345678Bias Coefficient: β10-210-1100101102103Time to AbsorptionBiased WalkBiased Walk ModelSampling no-rSampling no-r n1.00.50.00.51.0Assortativity: α012345678Optimal Bias Coefficient100 Nodes1000 Nodes1.00.50.00.51.0Assortativity: α012345678Optimal Bias CoefficientBiased WalkBiased Walk Model1.00.50.00.51.0Assortativity: α10-1100101102103104Optimal Time to AbsorptionBiased Walk: 100 NodesBiased Walk: 1000 NodesSampling 100 Nodes no-rSampling 100 Nodes no-r nSampling 1000 Nodes no-rSampling 1000 Nodes no-r n1.00.50.00.51.0Assortativity: α10-1100101102103Optimal Time to AbsorptionBiased Walk 100 nodesBiased Walk Model 100 nodesSampling 100 nodes no-rSampling 100 nodes no-r n[7] S. Janson and T. Luczak, Theory of random graphs.
John Wiley, 2000.
[8] R. Xulvi-Brunet and I. Sokolov, "Changing correlations in networks:
Assortativity and dissortativity," Acta Physica Polonica B, vol. 36, no. 5,
pp. 1431–1455, May 2005.
|
1804.04469 | 1 | 1804 | 2018-04-12T12:34:57 | Generative models for local network community detection | [
"cs.SI",
"stat.ML"
] | Local network community detection aims to find a single community in a large network, while inspecting only a small part of that network around a given seed node. This is much cheaper than finding all communities in a network. Most methods for local community detection are formulated as ad-hoc optimization problems. In this work, we instead start from a generative model for networks with community structure. By assuming that the network is uniform, we can approximate the structure of unobserved parts of the network to obtain a method for local community detection. We apply this local approximation technique to two variants of the stochastic block model. To our knowledge, this results in the first local community detection methods based on probabilistic models. Interestingly, in the limit, one of the proposed approximations corresponds to conductance, a popular metric in this field. Experiments on real and synthetic datasets show comparable or improved results compared to state-of-the-art local community detection algorithms. | cs.SI | cs |
Generative models for local network community detection
Twan van Laarhoven
Institute for Computing and Information Sciences,
Radboud University Nijmegen, The Netherlands
/ Open University, The Netherlands
Local network community detection aims to find a single community in a large network, while
inspecting only a small part of that network around a given seed node. This is much cheaper than
finding all communities in a network. Most methods for local community detection are formulated as
ad-hoc optimization problems. In this work, we instead start from a generative model for networks
with community structure. By assuming that the network is uniform, we can approximate the
structure of unobserved parts of the network to obtain a method for local community detection.
We apply this local approximation technique to two variants of the stochastic block model. To
our knowledge, this results in the first local community detection methods based on probabilistic
models. Interestingly, in the limit, one of the proposed approximations corresponds to conductance,
a popular metric in this field. Experiments on real and synthetic datasets show comparable or
improved results compared to state-of-the-art local community detection algorithms.
I.
INTRODUCTION
Networks are a convenient abstraction in many differ-
ent areas, such as social sciences, biology, and the world
wide web. A common structure in these real-world net-
works is a community, a group of nodes that are tightly
connected and often share other properties, for example,
biological function in a protein interaction network.
Imagine that you are trying to find such a community
If the network is very large, it
of nodes in a network.
becomes too expensive to look at all nodes and edges in
the network. Therefore local methods are needed. Local
community detection aims to find only one community
around a given set of seed nodes, by relying on local
computations involving only nodes relatively close to the
seed [1, 2]; in contrast to global community detection,
where all communities in a network have to be found.
For global community detection, it is possible to treat
the problem of finding all communities in a network as
a probabilistic inference problem. This puts global com-
munity detection on a solid foundation, and makes it
clear what a community is, and how these communities
manifest in the network structure.
But most algorithms for local community detection op-
erate by optimizing an ad-hoc objective function such as
conductance [2–4].
In this paper we will fill this gap, and propose a prob-
abilistic model for local community detection. Our con-
tributions can be summarized as follows:
1. We introduce an approximation technique for using
global models to perform local community detec-
tion.
2. We introduce the first method for local community
detection based on a generative model by using this
approximation.
3. We propose two algorithms for local community de-
tection, based on approximations of the stochastic
block model and of the degree-corrected stochastic
block model.
4. We provide a probabilistic interpretation of conduc-
tance, as limit behavior of the approximate degree-
corrected stochastic block model.
5. We show that the approximate stochastic block
model is a highly competitive algorithm, which out-
performs the state-of-the-art on three of five real
life benchmark datasets.
A. Related work
1. Local community detection
Local network community detection methods have
largely focused on optimizing conductance, which is a
measure of the quality of a graph cut. Empirically, con-
ductance has been shown to be a good quality metric for
communities in real-world networks [3], in the sense that
real-world communities often have a higher conductance
than other sets of nodes.
Because community detection is computationally hard
[5, 6], several different heuristics have been developed. A
common approach is to use spectral partitioning, which
involves finding the dominant eigenvector of a random
walk kernel. Andersen et al. [2] showed that communities
with a good conductance can be computed efficiently in
this way. In their method nodes are added to the commu-
nity in order of decreasing personalized pagerank score,
and the community along this 'sweep' with the highest
conductance is returned. Computing this personalized
pagerank is a global operation, but efficient local approx-
imations are possible, that only involve nodes near the
seed.
Several variants of this sweep method have been pro-
posed. Kloster and Gleich [7] propose an alternative to
the personalized pagerank score, based on the heat kernel
instead of random walks. Yang and Leskovec [3] propose
to find the first local optimum of conductance instead of
a global optimum. Other heuristics involve trying to find
multiple pagerank-like vectors and restarting the method
from different neighborhoods around the seed [4].
However, being based on graph cuts, a good conduc-
tance is often achieved by cutting a network into roughly
equal-sized parts, which is undesirable. To limit the size
of communities, a cut-off on the personalized pagerank
score can be used [2]; also, variations of the sweep meth-
ods have been proposed that stop at earlier local optima
[3].
2. Global community detection
Many different global community detection methods
have been developed for different classes of networks and
different community structures. For a complete overview,
we refer the reader to the surveys by Fortunato [5], Xie
et al. [8].
Here we focus on probabilistic models for global com-
munity detection. The simplest are the stochastic block
models [9, 10], which partition the nodes into communi-
ties, with varying probabilities of edges. These block
models produce networks that are very different than
real networks, in particular, the distribution of degrees
is very different. To more accurately model the node
degrees, Karrer and Newman [11] have proposed the
degree-corrected stochastic block model (DC-SBM). In
this model, they add an extra parameter to each node,
which controls the likelihood of edges to that node, and
hence the node's degree. This extra complexity comes at
the cost of making the model more difficult to fit, and
so degree correction might not be appropriate for all net-
works [12].
An issue with the stochastic block model is that the
number of communities has to be fixed because with more
communities there are more parameters in the model,
which makes it impossible to compare likelihoods. The
Infinite Relational Model [13] solves this problem by as-
suming an infinite number of communities in combination
with a Chinese restaurant prior over community struc-
tures.
The model of Newman and Leicht [14] goes one step
further, and has a parameter for each combination of
node and community, indicating the likelihood of edges
from nodes in that community to a particular other node.
This is similar to models based on non-negative matrix
factorization [15, 16]. These more complex models allow
for nodes to be in more than one community.
Aside from these flat models, also hierarchical models
have been developed for probabilistic network community
detection [17, 18].
With all probabilistic models there is the question of
inference, that is, how to find the parameters or distri-
bution of parameters that accurately model the observed
data. Common approaches are to use maximum likeli-
2
hood [used by e.g. 11, 12], variational Bayes [used by 19],
and Markov chain Monte Carlo sampling [used by e.g.
13].
More recently, there has been work using loopy be-
lief propagation for inference in stochastic block models
[20, 21]. There it has also been noted that these models
exhibit a phase transition: beyond a certain point in pa-
rameter space it is impossible to recover the true commu-
nity structure, even it was drawn from the model itself.
Furthermore, this transition is sharp for large networks.
B. Problem description
Before continuing, we will formalize the problem. The
network of interest is represented as an unweighted undi-
rected graph without self-loops. Let N be the number
of nodes in this graph, and M the number of edges.
The graph can be represented by an adjacency matrix
A, where aij = aji = 1 if there is an edge between
nodes i and j, and aij = 0 otherwise. Furthermore
(cid:80)N
(cid:80)N
j=1 aij = 2M .
i=1
The local community detection problem is now to find
the community cs that contains a given seed node s, while
inspecting only nodes and edges in or near that commu-
nity. We will only concern ourselves with a single seed
node in this paper, but this is not essential.
When working in a probabilistic setting, the goal
becomes to find the most likely community that con-
P(cs A, s). Even computing
tains the seed, argmaxcs
this probability entails a marginalization over all the
other clusters in the graph. So as a first simplifica-
tion we will instead search for the most likely clustering,
P(C A, s), and report the community cs in
argmaxC
this clustering.
We can assume that the seed is chosen independently
from the graph, and also independently from the clus-
tering, so we have that P(C A, s) ∝ P(C)P(A C). To
find the community containing the seed we only need to
maximize this quantity, and then to find the community
cs ∈ C that contains the seed.
II. THE STOCHASTIC BLOCK MODEL
We first model the community structure of all nodes
in the graph using the stochastic block model [11].
In
this global model, each node i is in exactly one commu-
nity, which we denote as ci, so the communities form a
partition of the set of nodes. The edges of the graph are
generated independently based on these communities. In
the standard stochastic block model the probability of an
edge between nodes i and j is P(aij) = πcicj where the π
are parameters.
For simplicity, we only consider two different values for
π, πc,c = λin for edges inside clusters and πcc(cid:48) = λout for
edges between different clusters c (cid:54)= c(cid:48), so
(cid:40)
P(aij) = πcicj =
λin
λout
if ci = cj
if ci (cid:54)= cj.
Since we do not know the value of these parameters λin
and λout, we put a conjugate Beta prior on them,
λin, λout ∼ β(α+, α−).
In this simpler variant of the stochastic block model,
the number of parameters of the model does not depend
on the number of communities. Hence, in contrast to
most other work on stochastic block models, we do not
have to fix the number of communities. Instead, we use
a prior over partitions, which allows for varying number
of communities of varying sizes.
It is well known that community sizes in real life net-
works follow a power law distribution [22]. Hence we
adopt the prior
(γ − 1)c−γ,
(1)
P(C) ∝(cid:88)
c∈C
where C ranges over all possible partitions of the set of N
nodes. Note that the particular choice of prior distribu-
tion is not critical to the rest of this work, and for other
applications other priors might make sense. In particular,
a common alternative choice is the Chinese Restaurant
Process.
A.
Inference
(cid:105)
(cid:105)
,
−
out
In the basic stochastic block model
P(A C) = Eλin,λout
πaij
cicj
(1 − πcicj )1−aij
(cid:104)(cid:89)
i<j
= Eλin,λout
α+
λin
(cid:104)
in =(cid:80)
in (1 − λin)α
aij, α−
−
in λout
in =(cid:80)
α+
out(1 − λout)α
i<j,ci=cj
(1−aij) and
where α+
out are the corresponding sums over ci (cid:54)= cj.
out and α−
α+
This likelihood has the same shape as the beta distri-
bution, so we can calculate the expectation exactly, to
get
i<j,ci=cj
P(A C) =
B(α+ + α+
in, α− + α−
in)B(α+ + α+
B(α+, α−)2
out, α− + α−
out)
.
(2)
Multiplying this by the prior on clusterings (1) gives the
posterior probability P(CA) up to a normalizing con-
stant.
B. Local approximation
The likelihood in equation (2) is still a function of the
entire clustering, so to find the most likely cluster con-
taining the seed we would need to consider clusterings of
3
the entire graph. To obtain a local model we make an
approximation based on the assumption that the graph
is uniform: all clusters of the graph are similar to each
other.
We make this idea concrete by assuming that all clus-
ters in the graph have approximately the same volume,
the same size, and the same fraction of within community
edges. Now, if the community containing the seed has n
nodes, while the graph has N nodes, this means that
there are approximately k = N/n communities that are
all similar to cs. Furthermore, suppose that this commu-
nity has w within community edges, then the parameters
for the stochastic block model can be approximated as
α+
in = kw,
in = kn(n − 1)/2 − α+
α−
in,
out = M − α+
α+
in,
out = N (N − 1)/2 − α+
α−
in − α−
in − α+
out.
With these quantities we can use equation (2) to approx-
imate the likelihood of the network given the community
that contains the seed. And hence also approximate the
posterior probability of a community given the network,
PSBM(cs, C A) = (γ − 1)kn−kγ
B(α+ + α+
in, α− + α−
in)B(α+ + α+
B(α+, α−)2
out, α− + α−
out)
.
(3)
Note that instead of taking k = N/n, we might rea-
son that, if the volume of the community containing the
seed is v and the graph has M edges, that there are ap-
proximately k = 2M/v communities. This is, in general,
a different estimate. For the stochastic block model, it
makes more sense to use k = N/n, because then there is
no dependence on the volume of the community.
III. DEGREE-CORRECTED BLOCK MODEL
The degree distribution of the stochastic block model
is not very realistic, because nodes inside a cluster have
similar degrees. In many real-world networks, there are
hub nodes, which have a much higher than average de-
gree; as well as leaf nodes with a very low degree. To
accurately model these phenomena Karrer and Newman
[11] have proposed the degree-corrected stochastic block
model (DC-SBM). In this model, they assign an extra
parameter di to each node, which controls the likelihood
of edges to that node, and hence the node's degree.
We can then model the edges as being drawn from a
Poisson distribution with mean didjπcicj ,
aij ∼ P (didjπcicj ) for all i < j.
Note that we use a Poisson distribution, which allows for
weighted edges with weight larger than 1, instead of the
Bernoulli distribution, because the mean might be larger
than 1.
We again place conjugate priors on all parameters,
which in this case follow a gamma distribution,
λin, λout ∼ Γ(α, θ)
di ∼ Γ(α, θ) for all i.
A.
Inference
For this degree-corrected model the likelihood of the
network given the clustering depends on parameters d
and λ. It is not possible to integrate over these parame-
ters analytically, and other authors have therefore chosen
to maximize over the parameters instead [11, 12]. Here
we use a variational approximation,
log P(A C) ≥ L(A, C)
= Ed,λ∼Q
(cid:2)log P(A, d, λ C) − log Q(d, λ)(cid:3).
(4)
tion Q(d, λ) = Qλin (λin)Qλout (λout)(cid:81)N
As is standard, we take Q to be the factorized distribu-
i=1 Qdi(di), where
each component has a gamma distribution, Qdi(di) =
Γ(di; αdi, θdi), Qλin (λin) = Γ(λin; αin, θin). This gives us
the following variational lower bound
L(A, C) =
(cid:1)
i<j
(cid:88)
(cid:0)aij log(didjπcicj ) − didjπcicj
− N(cid:88)
DKL(αdi, θdiα, θ)
− DKL(αin, θinα, θ)
i=1
− DKL(αout, θoutα, θ).
(5)
Where DKL(α, θα(cid:48), θ(cid:48)) is the Kullback-Leibler diver-
gence between two gamma distributions. And we have
assumed that aij ∈ {0, 1}, which implies that aij! = 1.
We find that the parameters that maximize L(A, C)
αdi = α − 1 +
aij
(cid:16)
θdi =
θ−1 +
πci,cj αdj θdj
(cid:17)−1
are
and
αin = α − 1 +
θin =
θ−1 +
(cid:16)
i<j,ci=cj
aij
αdiθdiαdj θdj
(cid:17)−1
,
i<j,ci=cj
and similarly for αout and θout. There is a mutual de-
pendence between these variables, so in practice we use
several iterations of the above equations to find a good
approximation of the parameters.
j=1
N(cid:88)
(cid:88)
(cid:88)
(cid:88)
j(cid:54)=i
i∈cs
(cid:88)
N(cid:88)
(cid:88)
i=1
i∈cs
v =
M =
K 2 =
(cid:16)
4
The variational approximation gives a lower bound to
the log-likelihood P(A C). In contrast, maximum like-
lihood would give an upper bound. This upper bound is
similar to L(A, C), but it does not include the Kullback-
Leibler terms. For large networks the first term of
L(A, C) dominates, and so the variational lower bound,
the true likelihood and the maximum likelihood upper
bound will all be close.
B. Local approximation
As before, we will make a local approximation of L,
which depends only on the community that contains the
seed.
It will be convenient to define
αdi = w + n(α − 1),
αdi = 2M + N (α − 1), and
αdi
2.
First of all, we can approximate θdi by changing the
sum over all other nodes j (cid:54)= i to a sum over all nodes j.
Then θdi becomes the same for all nodes in the same com-
munity, and under the assumption that all communities
are the same, θdi = θd is the same for all nodes,
θd =
θ−1 + θdλinv + θdλout( M − v)
(cid:17)−1
.
Furthermore, because αdi does not depend on the clus-
tering, we can make the following approximation L of L,
L(A, C) ≈ L(A, c) = 2M log(θd)+kw(ψ(αin)+log(θin))
+ (M − kw)(ψ(αout) + log(θout))
2αinθin − ( M 2 − kv2)θd
− k(v2 − K 2)θd
2αoutθout
+ N α log θd − M θd/θ
− DKL(αin, θinα, θ) − DKL(αout, θoutα, θ) + κ,
(6)
where κ is a constant that depends only on the network
and on the priors.
The likelihood of the degree-corrected model is based
on the degrees of nodes and the volume of communities.
So in contrast to the previous section, here it makes sense
to estimate the number of communities as k = 2M/v
instead of N/n.
As before, we multiply this approximate likelihood by
the prior, which we approximate as P(C) ≈ (γ−1)kn−kγ,
to obtain the posterior
PDCBM(cs, C A) = e L(A,c)(γ − 1)kn−kγ.
IV. LIMITING BEHAVIOR
The premise of local community detection is to find a
community without considering the entire graph, or even
a significant portion of the graph. This is only possible if
the community is small compared to the graph. We can
take this assumption one step further, and consider what
happens if the graph becomes infinitely large compared
to the cluster.
Therefore we take the limit of the approximate likeli-
hood as N → ∞, assuming that the average degree M/N
remains constant. With the stochastic block model from
Section II B we get that
log PSBM(cs, C A)
N log N
=
w
n
.
lim
N→∞
With the degree-corrected model we obtain
2 log PDCBM(cs, C A)
N log N
=
w
v
− 1,
lim
N→∞
which is exactly equal to the negation of conductance.
In other words, under this model, and in the limit of an
infinitely large graph, the a posteriori most likely cluster
corresponds to the cluster of minimum conductance.
Note that conductance has a global optimum with a
large community that contains all nodes, since in that
case w = v. Even in the non-limiting case, as the net-
work becomes larger, so does the optimal community.
And for very large networks it becomes impossible to re-
cover small communities. This phenomenon is called the
resolution limit [23], and is shared by many network com-
munity detection methods. To avoid the resolution limit,
a parameter must be introduced into the objective func-
tion, for instance by replacing the graph size or graph
volume [24]. In our case, we could take N as a formal
parameter, instead of using the actual number of nodes
in the network (keeping the average degree M/N fixed).
In this way, the search for a community is in effect per-
formed in a subnetwork of a given size.
V. EXPERIMENTS
In this section, we experimentally evaluate the pro-
posed models and approximations. We use the following
experimental protocol:
1. pick a random community from the set of all com-
munities.
2. pick a random seed from this community.
3. run the method(s) with this seed.
4. compare the recovered community to the true one
using the F1 score. For sets of nodes c, d the F1
score amounts to F1(c, d) = 2c∩d/(c+d),which
is 1 if the communities are identical, and 0 if they
5
are disjoint. We exclude the seed from this com-
parison since it always occurs in both communities,
and we would otherwise see a good F1 score for the
trivial community containing only the seed.
A. Methods
We compare three classes of methods.
1. Global generative models
We optimize the likelihood of the global clustering
models with a Louvain method [25]. This yields a par-
tition of the nodes.
In this partition, there is always
a single community that contains the seed. We denote
this method as gSBM (global stochastic block model)
and gDCBM (global degree-corrected block model). We
use uninformative priors for all parameters, β(1, 1) in the
stochastic block model and Γ(1, 1) in the degree-corrected
model. For the power law prior on community sizes we
use γ = 2.
Note that it is somewhat unfair to compare local and
global models. A global method has access to more infor-
mation. The goal of local community detection is not to
outperform global methods, but rather to achieve com-
parable results faster while looking at only a small part
of the network.
2. Local approximations
We have implemented a simple greedy algorithm to
optimize P(C A) for the stochastic and degree-corrected
block models. The algorithm starts from the community
{s} that contains only the seed. Then we consider all
neighboring nodes of the current community in a random
order, and for each node we add it to the community if
doing so would improve the approximate likelihood. This
optimization procedure is then repeated, until none of
the neighboring nodes are added. We further restart this
search 10 times, and pick the community with the highest
approximate likelihood. We denote this method as aSBM
(local approximate stochastic block model) and aDCBM
(local approximate degree-corrected block model).
Each iteration of this greedy optimization procedure
takes time proportional to the volume of the retrieved
community, and the total number of iterations is bounded
by the diameter of the community D, which is very small
in practice. This makes the total runtime O(vD).
We also consider a variant of aDCBM with an explicit
parameter N , as discussed in Section IV. We report re-
sults with N = 1000, and set M to the average node
degree times N (aDCBM1k). The supplementary mate-
rial includes results for different values of N .
3. State-of-the-art methods for local community detection
• PPR. The algorithm by Andersen et al. [2] based
on the Personalized Page Rank graph diffusion.
We use the implementation included with the HK
method.
• HK. The algorithm by Kloster and Gleich [7], using
a Heat Kernel.Code is available at https://www.
cs.purdue.edu/homes/dgleich/codes/hkgrow.
• YL. The algorithm by Yang and Leskovec [3] with
conductance as scoring function. This method uses
a different stopping condition compared to PPR,
selecting a local optimum of conductance, instead
of searching for a more global optimum. This intro-
duces a bias towards finding smaller communities.
• LEMON. The Local Expansion via Minimum One
Instead of con-
Norm algorithm by Li et al. [4].
sidering a single probability vector as in HK or
YL , this method uses the space spanned by several
short random walks. Communities are found by
solving an l1-penalized linear programming prob-
lem. The algorithm includes a number of heuris-
tic post-processing steps. Code is available at
https://github.com/yixuanli/lemon.
B. Artificial datasets
We first look at artificial datasets, by using the
LFR benchmark [26] to generate networks with a
known community structure. We used the parame-
ter settings N=5000 k=10 maxk=50 t1=2 t2=1 minc=20
maxc=100, which means that the graph has 5000 nodes,
and between 20 and 100 communities, each with between
10 and 50 nodes. We vary the mixing parameter (mu),
which determines what fraction of the edges are between
different communities. More mixing makes the problem
harder.
The LFR benchmark is very similar to the degree-
corrected block model. The differences are that node de-
grees follow a power law distribution in the LFR model,
while we used a gamma distribution, and that in the LFR
benchmark the edges are not completely independent be-
cause the degree of each node must match a previously
drawn value. Nevertheless, we expect the DCBM to give
a good fit to these networks.
The results of these experiments are shown in Table II.
Here we see that the global degree-corrected model per-
forms better than the simple stochastic block model.
This is not surprising, since the LFR benchmark has
nodes with varying degrees. These results carry over to
the local approximations, which do perform significantly
worse than the global models on these datasets. Out
of the local methods, the aDCBM and LEMON models
achieve the best results.
6
Table I. Overview of the SNAP datasets used in the experi-
ments.
Dataset
#node
#edge #comm
c
334863
317080
1134890
925872
Amazon
1049866
DBLP
Youtube
2987624
LiveJournal 3997962 34681189
Orkut
3072441 117185083
151037 19.4
13477 53.4
8385 13.5
287512 22.3
6288363 14.2
C. Real-world networks
We use five social and information network datasets
with ground-truth from the SNAP collection [27]. These
datasets are summarized in Table I. We consider all avail-
able ground-truth communities with at least 3 nodes. All
experiments were performed on a random subsample of
1000 communities.
Yang and Leskovec [3] also defined a set of top 5000
communities for each dataset. These are communities
with a high combined score for several community good-
ness metrics, among which is conductance. We therefore
believe that communities in this set are biased to be more
easy to recover by optimizing conductance.
In addition to the SNAP datasets, we also include
the Flickr social network [28]. As well as some classical
datasets with known communities: Zachary's karate club
[29]; Football: A network of American college football
games [30]; Political books: A network of books about
US politics [31]; and Political blogs: Hyperlinks between
weblogs on US politics [32]. These datasets might not be
very well suited for local community detection since they
have very few communities.
We see in Table II that, while on the artificial bench-
mark networks the global model significantly outper-
forms the local approximation, on the real-world net-
works this is not the case. We believe that this is be-
cause the ground-truth communities on these networks
are much smaller, and the considered local methods tend
to find smaller communities.
Additionally, the simple stochastic block model outper-
forms the degree-corrected model on all SNAP datasets
except for the Amazon dataset. We found this surpris-
ing, because all these datasets do have nodes with widely
varying degrees. However, the number of within commu-
nity edges varies much less. For instance a node in the
√
DBLP dataset with degree di will have on the order of
di within community edges, which means that the truth
is in between the aSBM (which assumes O(1) edges) and
aDCBM models (which assumes O(di) edges).
An issue with the local approximation is that nodes
inside communities are not representative of the entire
network. For instance, on the Youtube network the aver-
age node degree is 5.3, while the average degree of nodes
that are inside at least one community is 33.7.
When using an explicit N = 1000, the results on the
SNAP networks improve, again because the ground-truth
communities on these networks tend to be small. For the
three largest datasets, different values of N have a large
influence on the size of the recovered community. This is
likely due to the fact that it is possible to find communi-
ties at all scales in these networks. See the supplementary
material for the results for different values of N .
The results using the top 5000 communities are much
better, which is not surprising, since these top communi-
ties were selected to be easier to find. The trend between
the different methods is similar, with the aSBM and aD-
CBM methods performing best in most cases.
Surprisingly, the local approximations outperform the
global community detection methods on most of the real-
world datasets. The likely reason is that the ground-
truth communities in the SNAP datasets are relatively
small. And because of the greedy optimization strategy,
the local methods tend to find smaller communities. The
global methods, in contrast, find larger communities that
better fit the model, but which likely combine several
ground-truth communities. This means that the local
methods achieve a much better precision at the cost of a
somewhat lower recall, resulting in an overall higher F1
score.
Results on the smaller networks are mixed. All these
datasets, except for football have very large clusters for
their size, which are easier to recover with the HK and
PPR methods. The aDCBM method with N = 1000
is also sometimes better able to find good communities
on these datasets, because those networks have fewer
than 1000 nodes, so increasing N increases the size of
the found community.
We were unable to run LEMON on the large SNAP
datasets due to its memory usage.
VI. DISCUSSION
The local approximations are based on the assumption
that all communities are alike. We needed to make this
assumption to be able to say something about the global
properties of the network given only a single community.
In real-world networks there is often a large variation in
the size of the communities. Our approximation might
work well if the community is close to the average size,
but for very large or very small communities it is not
accurate. Better approximations might be possible by
finding more than one community (but still a small sub-
set of the network), or by modeling the distribution of
community sizes.
When we are interested in local community structure,
it would seem to make sense to consider models that only
7
have this local structure. For instance, models with a
single community that stands apart from a background.
But to fit such a model to an observed graph we would
also need a good model for the background, and so we
should also model the structure in the background. In
other words, we also need to find communities in the rest
of the graph, and the method would not be local. If we
were to instead use a background without further struc-
ture, then the closest fit to the observed network will be
obtained by using the structure of the single community
to explain the largest variances in the entire network, so
the obtained 'community' would cover roughly half of the
nodes. Our approach of assuming that the background is
similar to the community containing the seed is a good
compromise, as illustrated by the experiments.
In this work we maximize over clusters. It would be
interesting and useful to estimate the marginals instead.
That is, the probability that a node i is inside the same
cluster as the seed, conditioned on the graph. While
Variational Bayes gives a decent approximation to the
log-likelihood,
it does not give approximations to the
marginals. Indeed, trying to use a variational bound to
marginalize over all but one of the cluster membership
indicators leads to an objective that is identical to L, ex-
cept for a relatively small entropy term. It remains to be
seen if other inference methods can be used to estimate
the marginals, and thus to in some sense find all possible
communities containing a given seed.
The assumption used to derive the local approxima-
tions is not particular to the stochastic block models that
we have used here, and the same technique can be used
for other global community detection methods that are
based on a partition of the nodes, such as the models of
Kemp et al. [13] or Newman and Leicht [14]. However,
it is often assumed that in practice some nodes can be-
long to more than one community. There exist several
global models that include overlapping communities [see
e.g. 16, 33]. In the derivation we used the fact that if all
communities are identical and each node is in exactly one
community, then there are N/n communities. But when
nodes can be in more than one community, it is no longer
clear how many communities there are. We would need
a reliable estimate of the average number of communities
that cover a node. It therefore remains an open problem
how the local approximation can be applied to models
with overlapping clusters.
ACKNOWLEDGEMENTS
This work has been partially funded by the Nether-
lands Organization for Scientific Research (NWO) within
the EW TOP Compartiment 1 project 612.001.352.
[1] I. M. Kloumann and J. M. Kleinberg, in Proceedings
of the 20th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, KDD '14 (ACM,
Table II. F1 score between recovered communities and ground-truth (excluding the seed node). The best result for each dataset
is indicated in bold, as are the results not significantly worse according to a paired T-test (at significance level 0.01).
Dataset
gSBM gDCBM aSBM aDCBM aDCBM-1k YL LEMON HK PPR
Global methods
Local methods
8
1.000
0.999
1.000
0.998
0.997
0.958
0.990
0.920
0.911
0.756
0.433 0.426
0.613
0.583
0.534
0.466
0.368
0.258
0.911
0.812
0.800
0.659
0.458
0.138
0.330
0.287
0.040
0.041
0.010
0.245
0.220
0.054
0.025
0.007
0.614
0.334
0.085
0.354
0.195
0.395 0.431
0.406 0.349
0.099 0.071
0.072 0.043
0.020
0.014
0.844 0.903
0.647 0.567
0.140
0.195
0.666 0.715
0.334 0.312
LFR (mu=0.1)
LFR (mu=0.2)
LFR (mu=0.3)
LFR (mu=0.4)
LFR (mu=0.5)
LFR (mu=0.6)
Amazon
DBLP
Youtube
LiveJournal
Orkut
0.792
Amazon (top 5000)
DBLP (top 5000)
0.442
Youtube (top 5000)
0.083
LiveJournal (top 5000) 0.507
Orkut (top 5000)
0.233
Karate
Football
Pol.Blogs
Pol.Books
Flickr
0.165
0.101
0.790 0.817
0.192
0.039
0.429
0.274
0.204
0.090
0.379
0.727
0.103
0.295
0.164
0.448
0.682
0.040
0.243
0.050
0.895
0.799
0.726
0.529
0.322
0.093
0.447
0.344
0.084
0.052
0.016
0.895
0.571
0.172
0.672
0.119
0.740
0.769
0.090
0.451
0.066
0.307
0.274
0.168
0.121
0.085
0.069
0.381
0.245
0.082
0.054
0.034
0.780
0.419
0.241
0.521
0.097
0.562
0.784
0.015
0.175
0.012
0.925
0.859
0.587
0.533
0.427
0.279
0.229
0.240
0.075
-
-
0.397
0.339
0.098
-
-
0.683
0.322
0.151
0.605
0.025
0.881 0.352
0.090 0.136
0.039 0.040
0.039 0.040
0.039 0.041
0.037 0.039
0.221 0.119
0.199 0.194
0.031 0.052
0.028 0.035
0.032 0.019
0.709 0.527
0.342 0.329
0.067 0.116
0.569 0.478
0.312 0.260
0.799 0.908
0.452 0.260
0.661 0.535
0.629 0.653
0.054 0.118
New York, NY, USA, 2014) pp. 1366–1375.
[2] R. Andersen, F. Chung, and K. Lang, in Foundations of
Computer Science, 2006. FOCS'06. 47th Annual IEEE
Symposium on (IEEE, 2006) pp. 475–486.
[3] J. Yang and J. Leskovec, in Proceedings of the ACM
SIGKDD Workshop on Mining Data Semantics, MDS '12
(ACM, 2012) pp. 3:1–3:8.
[4] Y. Li, K. He, D. Bindel, and J. E. Hopcroft, in Pro-
ceedings of the 24th International Conference on World
Wide Web (International World Wide Web Conferences
Steering Committee, 2015) pp. 658–668.
[5] S. Fortunato, Physics Reports 486, 75 (2010).
[6] J. Shi and J. Malik (IEEE Computer Society, Washing-
[12] X. Yan, C. Shalizi, J. E. Jensen, F. Krzakala, C. Moore,
L. Zdeborov´a, P. Zhang, and Y. Zhu, Journal of Statis-
tical Mechanics: Theory and Experiment 2014, P05007
(2014).
[13] C. Kemp, J. B. Tenenbaum, T. L. Griffiths, T. Yamada,
and N. Ueda, in Proceedings of the 21st National Con-
ference on Artificial Intelligence - Volume 1 , AAAI'06
(AAAI Press, 2006) pp. 381–388.
[14] M. E. J. Newman and E. A. Leicht, Proceedings of
the National Academy of Sciences 104, 9564 (2007),
http://www.pnas.org/content/104/23/9564.full.pdf.
[15] I. Psorakis, S. Roberts, M. Ebden, and B. Sheldon, Phys-
ical Review E 83, 066114+ (2011).
ton, DC, USA, 2000) pp. 888–905.
[16] B. Ball, B. Karrer, and M. E. J. Newman, Physical Re-
[7] K. Kloster and D. F. Gleich, in Proceedings of the 20th
ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, KDD '14 (ACM, New York,
NY, USA, 2014) pp. 1386–1395.
[8] J. Xie, S. Kelley, and B. K. Szymanski, ACM Comput.
Surv. 45, 43:1 (2013).
view E 84, 036103 (2011).
[17] H. Zhang, C. L. Giles, H. C. Foley, and J. Yen, in Pro-
ceedings of the 22Nd National Conference on Artificial
Intelligence - Volume 1 , AAAI'07 (AAAI Press, 2007)
pp. 663–668.
[18] C. Blundell and Y. W. Teh, in Advances in Neural Infor-
[9] S. L. Paul W. Holland, Kathryn Blackmond Laksey, So-
mation Processing Systems (2013).
cial Networks 5, 109 (1983).
[19] J. M. Hofman and C. H. Wiggins, Phys Rev Lett 100,
[10] K. F. Carolyn J. Anderson, Stanley Wasserman, Social
258701 (2008), 18643711[pmid].
Networks 14, 137 (1992).
[20] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a,
[11] B. Karrer and M. E. J. Newman, Phys. Rev. E 83, 016107
Phys. Rev. E 84, 066106 (2011).
(2011).
9
[21] P. Zhang, C. Moore, and M. E. J. Newman, Phys. Rev.
(2005) pp. 36–43.
E 93, 012303 (2016).
[22] G. Palla, I. Derenyi, I. Farkas, and T. Vicsek, Nature
435, 814 (2005).
[23] S. Fortunato and M. Barth´elemy, Proceedings of the Na-
tional Academy of Sciences of the United States of Amer-
ica 104, 36 (2007).
[24] J. Reichardt and S. Bornholdt, Physical Review Letters
93, 218701 (2004).
[25] V. D. Blondel, J.-L. Guillaume, R. Lambiotte,
and
E. Lefebvre, Journal of Statistical Mechanics: Theory
and Experiment 2008, P10008 (2008), arXiv:0803.0476.
[26] A. Lancichinetti, S. Fortunato, and F. Radicchi, Physical
Review E 78, 046110 (2008).
[27] J. Leskovec and A. Krevl, "SNAP Datasets: Stan-
ford large network dataset collection," http://snap.
stanford.edu/data (2014).
[28] X. Wang, L. Tang, H. Liu, and L. Wang, Knowledge and
(2012), 10.1007/s10115-
Information Systems (KAIS)
012-0555-0.
[29] W. W. Zachary, Journal of Anthropological Research 33,
452 (1977).
[30] M. Girvan and M. E. J. Newman, Proceedings of the
National Academy of Sciences of the United States of
America 99, 7821 (2002).
[31] V. Krebs, "New political patterns," Editorial (2004).
[32] L. Adamic and N. Glance, in LinkKDD '05: Proceed-
ings of the 3rd international workshop on Link discovery
[33] A. McDaid and N. Hurley, in Proceedings of the 2010
International Conference on Advances in Social Networks
Analysis and Mining, ASONAM '10 (IEEE Computer
Society, Washington, DC, USA, 2010) pp. 112–119.
Appendix A: Additional results
The tables and figures below include additional results:
• Table III: Statistics on the additional datasets.
• Table IV: Mean size of the recovered community.
• Table V: Mean precision of the recovered commu-
nity.
• Table VI: Mean recall of the recovered community.
• Table VII: Runtime of the community detection al-
gorithms.
• Fig. 1: F1 score on SNAP datasets as a function of
the N parameter.
• Fig. 2: Mean size of the recovered community as a
function of N parameter.
10
Table III. Overview of the additional datasets.
Dataset
#node
#edge #comm
LFR (mu=0.1)
LFR (mu=0.2)
LFR (mu=0.3)
LFR (mu=0.4)
LFR (mu=0.5)
LFR (mu=0.6)
Amazon
DBLP
Youtube
LiveJournal
Orkut
5000
5000
5000
5000
5000
5000
25111
25124
25125
25127
25118
25127
101
101
101
101
101
101
925872
334863
1049866
317080
1134890
2987624
3997962 34681189
3072441 117185083
151037
13477
8385
287512
6288363
c
49.5
49.5
49.5
49.5
49.5
49.5
19.4
53.4
13.5
22.3
14.2
Amazon (top 5000)
925872
DBLP (top 5000)
1049866
Youtube (top 5000)
2987624
LiveJournal (top 5000) 3997962 34681189
Orkut (top 5000)
3072441 117185083
334863
317080
1134890
Karate
Football
Pol.Blogs
Pol.Books
Flickr
34
115
1490
105
35313
78
613
16715
441
3017530
5000
5000
5000
5000
5000
13.5
22.4
14.6
27.8
215.7
2
12
2
3
17.0
9.6
745.0
35.0
171 4336.1
Figure 1. F1 score as a function of the N parameter with the aDCBM method.
10110210310410500.10.20.30.40.50.6NF1DBLPAmazonYoutubeLiveJournalOrkutTable IV. Mean size of the recovered communities.
Global methods
Local methods
Dataset
gSBM gDCBM aSBM aDCBM aDCBM-1k YL LEMON
HK
PPR
11
LFR (mu=0.1)
LFR (mu=0.2)
LFR (mu=0.3)
LFR (mu=0.4)
LFR (mu=0.5)
LFR (mu=0.6)
Amazon
DBLP
Youtube
LiveJournal
Orkut
Amazon (top 5000)
DBLP (top 5000)
Youtube (top 5000)
LiveJournal (top 5000)
Orkut (top 5000)
Karate
Football
Pol.Blogs
Pol.Books
Flickr
48.9
48.7
46.2
42.9
30.5
16.3
23.9
27.6
1283.5
375.0
2089.9
15.4
24.8
434.0
98.5
973.5
2.8
8.9
100.7
10.7
2796.9
49.0
49.0
49.0
48.9
45.9
20.7
20.5
19.7
18.1
16.1
13.4
10.5
33.6
39.8
38.0
253.2
11.1
11.2
31.1
82.1
1288.8 367.5
24.5
37.7
42.0
158.1
7.6
8.8
30.6
23.7
1272.3 181.5
2.0
9.8
18.0
21.1
4.6
9.5
45.1
12.3
608.5 1054.0
45.7
42.1
40.9
30.8
20.6
13.6
16.3
21.3
78.6
107.6
283.8
10.4
15.6
42.6
48.7
219.9
6.2
10.2
20.3
9.1
222.5
44.2 9.4
39.7 8.4
32.4 5.9
21.9 5.2
14.3 4.8
9.9 4.9
11.5 6.4
20.2 6.0
31.8 9.3
89.5 10.8
163.0 11.1
9.6 7.1
12.3 6.2
26.3 6.9
36.6 13.0
202.6 9.1
15.3 8.8
10.8 8.8
97.9 7.2
25.2 6.7
436.9 12.9
50.2 159.0 1518.9
49.2 2264.6 2155.1
43.4 2410.0 2366.2
42.9 2398.3 2323.2
49.5 2412.0 2294.6
56.8 2412.8 2269.3
88.8 20819.9
41.9
46.2
55.0 24495.0
53.2 147.9 20955.5
- 153.2 3428.7
- 212.0 1634.0
28.3 4828.6
40.0
46.8 9506.8
40.0
55.3 113.9 10867.7
- 100.0
549.8
- 264.8 1607.4
16.7
40.5
17.1
15.0
44.9
56.5
68.2 492.7 1051.1
43.3
53.4
75.4 174.2 1158.1
49.3
Figure 2. Mean community size as a function of the N parameter with the aDCBM method.
101102103104105101102103NnDBLPAmazonYoutubeLiveJournalOrkutTable V. Mean precision of the recovered communities.
Global methods
Local methods
Dataset
gSBM gDCBM aSBM aDCBM aDCBM-1k YL LEMON HK PPR
12
LFR (mu=0.1)
LFR (mu=0.2)
LFR (mu=0.3)
LFR (mu=0.4)
LFR (mu=0.5)
LFR (mu=0.6)
Amazon
DBLP
Youtube
LiveJournal
Orkut
1.000 1.000
1.000 1.000
0.997
0.971
0.988
0.951
0.890 0.915
0.647
0.577
0.256
0.231
0.023
0.028
0.005
0.924
0.992
0.827
0.982
0.826
0.945
0.725
0.898
0.800
0.562
0.644 0.236
0.385
0.376
0.497 0.346
0.082 0.058
0.055 0.033
0.012
0.008
0.977 0.949
0.740 0.548
0.122
0.149
0.696 0.641
0.377 0.299
0.175
0.158
0.035
0.016
0.004
0.546
0.233
0.052
0.275
0.136
0.743
Amazon (top 5000)
DBLP (top 5000)
0.343
Youtube (top 5000)
0.052
LiveJournal (top 5000) 0.405
Orkut (top 5000)
0.173
Karate
Football
Pol.Blogs
Pol.Books
Flickr
0.607
0.427
0.825 0.818
0.751
0.603
0.625
0.610
0.242
0.271
0.958 0.961
0.755
0.686
0.806 0.732
0.641
0.624
0.395 0.098
0.919
0.840
0.792
0.651
0.468
0.225
0.409
0.378
0.066
0.039
0.010
0.959
0.594
0.139
0.623
0.140
0.872
0.768
0.670
0.616
0.271
0.929
0.823
0.669
0.569
0.465
0.387
0.422
0.372
0.086
0.059
0.032
0.928
0.544
0.226
0.592
0.235
0.928
0.870
0.690
0.607
0.446
0.266
0.157
0.167
0.047
-
-
0.317
0.229
0.062
-
-
0.862 0.330
0.069 0.114
0.020 0.020
0.020 0.021
0.020 0.021
0.019 0.020
0.166 0.088
0.161 0.153
0.024 0.037
0.021 0.025
0.020 0.012
0.649 0.469
0.274 0.260
0.045 0.080
0.479 0.400
0.278 0.207
0.732
0.204
0.813 0.909
0.913
0.828
0.371 0.154
0.776 0.795 0.765 0.433
0.699
0.587 0.586
0.201 0.222
0.125
0.596
0.294
13
Table VI. Mean recall of the recovered communities.
Global methods
Local methods
Dataset
gSBM gDCBM aSBM aDCBM aDCBM-1k YL LEMON HK PPR
LFR (mu=0.1)
LFR (mu=0.2)
LFR (mu=0.3)
LFR (mu=0.4)
LFR (mu=0.5)
LFR (mu=0.6)
Amazon
DBLP
Youtube
LiveJournal
Orkut
0.999
0.997
0.957
0.907
0.706
0.362
0.808
0.543
0.445
0.346
0.454
0.967
Amazon (top 5000)
0.811
DBLP (top 5000)
Youtube (top 5000)
0.669
LiveJournal (top 5000) 0.932
Orkut (top 5000)
0.663
Karate
Football
Pol.Blogs
Pol.Books
Flickr
0.101
0.777
0.129
0.196
0.259
1.000
1.000
0.997
0.993
0.914
0.366
0.831
0.593
0.267
0.345
0.445
0.972
0.856
0.605
0.938
0.683
0.060
0.822
0.020
0.364
0.089
0.453
0.425
0.380
0.322
0.248
0.168
0.575
0.421
0.300
0.286
0.225
0.792
0.649
0.421
0.707
0.396
0.241
0.710
0.055
0.198
0.127
0.909
0.811
0.794
0.647
0.438
0.130
0.750
0.495
0.181
0.172
0.204
0.901
0.737
0.483
0.892
0.463
0.317
0.679
0.023
0.171
0.049
0.892
0.792
0.713
0.510
0.297
0.071
0.689
0.416
0.252
0.260
0.257
0.883
0.667
0.420
0.803
0.175
0.721
0.781
0.069
0.417
0.046
0.232
0.218
0.114
0.077
0.052
0.041
0.467
0.223
0.112
0.081
0.056
0.763
0.396
0.364
0.554
0.095
0.446
0.758
0.008
0.112
0.012
0.940
0.865
0.561
0.503
0.439
0.330
0.913
0.701
0.436
-
-
0.943
0.897
0.714
-
-
0.641
0.894
0.084
0.670
0.022
0.995 1.000
1.000 1.000
1.000 1.000
1.000 1.000
1.000 0.999
0.971 0.964
0.755 0.985
0.483 0.853
0.117 0.757
0.193 0.661
0.432 0.690
0.977 0.997
0.723 0.939
0.272 0.826
0.910 0.962
0.530 0.711
0.794 0.913
0.921 0.923
0.593 0.707
0.760 0.819
0.042 0.125
Table VII. Mean runtime in seconds per community. Note that for the global methods a partition of the nodes is computed
only once.
14
Dataset
gSBM gDCBM aSBM aDCBM aDCBM-1k
YL LEMON
HK PPR
Global methods
Local methods
LFR (mu=0.1)
LFR (mu=0.2)
LFR (mu=0.3)
LFR (mu=0.4)
LFR (mu=0.5)
LFR (mu=0.6)
Amazon
DBLP
Youtube
LiveJournal
Orkut
0.017
0.017
0.018
0.018
0.017
0.018
0.036
0.032
0.059
0.130
0.095
0.034
Amazon (top 5000)
DBLP (top 5000)
0.034
0.056
Youtube (top 5000)
LiveJournal (top 5000) 0.124
Orkut (top 5000)
0.101
Karate
Football
Pol.Blogs
Pol.Books
Flickr
0.016
0.016
0.016
0.016
0.020
0.017 0.024
0.017 0.026
0.018 0.029
0.018 0.031
0.018 0.032
0.018 0.030
0.035 0.022
0.034 0.026
0.055 0.854
0.116 0.726
0.095 7.551
0.032 0.020
0.036 0.022
0.056 0.707
0.118 0.111
0.088 1.960
0.016 0.017
0.016 0.017
0.016 0.044
0.016 0.018
0.019 3.701
0.024
0.028
0.032
0.032
0.033
0.032
0.023
0.027
1.138
0.684
4.923
0.018
0.023
0.398
0.095
1.774
0.015
0.016
0.074
0.016
4.015
0.030
0.033
0.035
0.035
0.035
0.035
0.128
0.149
0.069
0.128
0.139
0.132
4.418
0.029
5.799
0.035
0.200
18.975
0.508 189.899
3.487 1632.087
2.629
0.027
5.637
0.028
0.146
18.295
0.095 101.696
2.144 1542.724
0.019
0.020
0.069
0.021
2.017
0.009
0.019
0.055
0.011
25.639
0.113 0.047 1.012
0.122 0.061 1.095
0.047 0.034 0.649
0.131 0.068 1.091
0.132 0.069 1.123
0.133 0.072 1.116
1.564 0.031 2.803
1.757 0.039 1.405
4.959 0.074 0.514
- 0.115 0.312
- 0.212 0.488
1.559 0.022 1.643
1.736 0.036 1.319
4.855 0.078 0.520
- 0.101 0.446
- 0.228 0.602
0.008 0.007 0.017
0.012 0.006 0.046
0.038 0.015 0.365
0.008 0.006 0.040
11.929 0.045 0.133
|
1610.09516 | 1 | 1610 | 2016-10-29T14:30:57 | Finding Street Gang Members on Twitter | [
"cs.SI",
"cs.CL",
"cs.CY",
"cs.IR"
] | Most street gang members use Twitter to intimidate others, to present outrageous images and statements to the world, and to share recent illegal activities. Their tweets may thus be useful to law enforcement agencies to discover clues about recent crimes or to anticipate ones that may occur. Finding these posts, however, requires a method to discover gang member Twitter profiles. This is a challenging task since gang members represent a very small population of the 320 million Twitter users. This paper studies the problem of automatically finding gang members on Twitter. It outlines a process to curate one of the largest sets of verifiable gang member profiles that have ever been studied. A review of these profiles establishes differences in the language, images, YouTube links, and emojis gang members use compared to the rest of the Twitter population. Features from this review are used to train a series of supervised classifiers. Our classifier achieves a promising F1 score with a low false positive rate. | cs.SI | cs | Finding Street Gang Members on Twitter
Lakshika Balasuriya
Kno.e.sis Center
Wright State University
Dayton OH, USA
[email protected]
Sanjaya Wijeratne
Kno.e.sis Center
Derek Doran
Kno.e.sis Center
Amit Sheth
Kno.e.sis Center
Wright State University
Wright State University
Wright State University
Dayton OH, USA
[email protected]
Dayton OH, USA
[email protected]
Dayton OH, USA
[email protected]
6
1
0
2
t
c
O
9
2
]
I
S
.
s
c
[
1
v
6
1
5
9
0
.
0
1
6
1
:
v
i
X
r
a
Abstract-Most street gang members use Twitter to intimidate
others, to present outrageous images and statements to the world,
and to share recent illegal activities. Their tweets may thus be
useful to law enforcement agencies to discover clues about recent
crimes or to anticipate ones that may occur. Finding these posts,
however, requires a method to discover gang member Twitter
profiles. This is a challenging task since gang members represent
a very small population of the 320 million Twitter users. This
paper studies the problem of automatically finding gang members
on Twitter. It outlines a process to curate one of the largest sets
of verifiable gang member profiles that have ever been studied.
A review of these profiles establishes differences in the language,
images, YouTube links, and emojis gang members use compared
to the rest of the Twitter population. Features from this review
are used to train a series of supervised classifiers. Our classifier
achieves a promising F1 score with a low false positive rate.
Keywords-Street Gangs, Twitter Profile Identification, Gang
Activity Understanding, Social Media Analysis
I.
INTRODUCTION AND MOTIVATION
The crime and violence street gangs introduce into neigh-
borhoods is a growing epidemic in cities around the world1.
Today, over 1.23 million people in the United States are
members of a street gang [1], [2], which is a coalition of peers,
united by mutual interests, with identifiable leadership and
internal organization, who act collectively to conduct illegal ac-
tivity and to control a territory, facility, or enterprise [3]. They
promote criminal activities such as drug trafficking, assault,
robbery, and threatening or intimidating a neighborhood [2].
Moreover, data from the Centers for Disease Control in the
United States suggests that the victims of at least 1.3% of all
gang-related2 homicides are merely innocent bystanders who
live in gang occupied neighborhoods [4].
Street gang members have established online presences co-
inciding with their physical occupation of neighborhoods. The
National Gang Threat Assessment Report confirms that at least
tens of thousands of gang members are using social networking
websites such as Twitter and video sharing websites such as
YouTube in their daily life [1]. They are very active online; the
2007 National Assessment Center's survey of gang members
found that 25% of individuals in gangs use the Internet for at
least 4 hours a week [5]. Gang members typically use social
networking sites and social media to develop online respect
for their street gang [6] and to post intimidating, threatening
images or videos [7]. This "Cyber-" or "Internet banging" [8]
behavior is precipitated by the fact that an increasing number
1http://goo.gl/OjWeYf
2The terms 'gang' and 'street gang' are used interchangeably in this paper.
of young members of the society are joining gangs [9], and
these young members have become enamored with technology
and with the notion of sharing information quickly and publicly
through social media3. Stronger police surveillance in the
physical spaces where gangs congregate further encourages
gang members to seek out virtual spaces such as social media
to express their affiliation, to sell drugs, and to celebrate their
illegal activities [10].
Gang members are able to post publicly on Twitter without
fear of consequences because there are few tools law enforce-
ment can use to surveil this medium [11]. Police departments
across the United States instead rely on manual processes to
search social media for gang member profiles and to study
their posts. For example, the New York City police department
employs over 300 detectives to combat teen violence triggered
by insults, dares, and threats exchanged on social media,
and the Toronto police department teaches officers about the
use of social media in investigations [12]. Officer training is
broadly limited to understanding policies on using Twitter in
investigations and best practices for data storage [13]. The
safety and security of city neighborhoods can thus be improved
if law enforcement were equipped with intelligent tools to
study social media for gang activity.
The need for better tools for law enforcement cannot be un-
derscored enough. Recent news reports have shown that many
incidents involving gangs start on Twitter, escalate over time,
and lead to an offline event that could have been prevented
by an early warning. For example, the media reported on a
possible connection between the death of a teenage rapper
from Illinois and the final set of tweets he posted. One of
his last tweets linked to a video of him shouting vulgar words
at a rival gang member who, in return, replied "I'ma kill you"
on social media4. In a following tweet, the teenage rapper
posted "im on 069", revealing his location, and was shot dead
soon after that post. Subsequent investigation revealed that the
rivalry leading to his death began and was carried out entirely
on social media. Other reporting has revealed how innocent
bystanders have also become targets in online fights, leaving
everyone in a neighborhood at risk5.
This paper investigates whether gang member profiles can
be identified automatically on Twitter, which can enable better
surveillance of gang members on social media. Classifying
Twitter profiles into particular types of users has been done
in other contexts [14], [15], [16], but gang member profiles
3http://www.hhs.gov/ash/oah/news/e-updates/eupdate-nov-2013.html
4http://www.wired.com/2013/09/gangs-of-social-media/
5https://goo.gl/75U3ME
Fig. 1: Twitter profile descriptions of known gang members.
Pursuant to an IRB governing human subject research, we are
prohibited from revealing personally identifiable information
in this paper. We only report Twitter handles that have already
been revealed in widely reported publications and were not
collected by the research team for this work.
pose unique challenges. For example, many Twitter profile
classifiers search for contextual clues in tweets and profile
descriptions [17], but gang member profiles use a rapidly
changing lexicon of keywords and phrases that often have only
a local, geographic context. This is illustrated in Figure 1,
which shows the Twitter profile descriptions of two verified
deceased gang members. The profile of @OsoArrogantJoJo
provides evidence that he belongs to a rival gang of the Black
Disciples by #BDK, a hashtag that is only known to those
involved with gang culture in Chicago. @PappyNotPapi's
profile mentions #PBG and our investigations revealed that this
hashtag is newly founded and stands for the Pooh Bear Gang,
a gang that was formerly known as the Insane Cutthroat Gang-
sters. Given the very local, rapidly changing lexicon of gang
members on social media, building a database of keywords,
phrases, and other identifiers to find gang members nationally
is not feasible. Instead, this study proposes heterogeneous sets
of features derived not only from profile and tweet text but also
from the emoji usage, profile images, and links to YouTube
videos reflecting their music culture. A large set of gang
member profiles, obtained through a careful data collection
process, is compared against non-gang member profiles to find
contrasting features. Experimental results show that using these
sets of features, we can build a classifier that has a low false
positive rate and a promising F 1-score of 0.7755.
This paper is organized as follows. Section II discusses
the related literature and positions how this work differs from
other related works. Section III discusses the data collection,
manual feature selection and our approach to identify gang
member profiles. Section IV gives a detailed explanation for
evaluation of the proposed method and the results in detail.
Section V concludes the work reported while discussing the
future work planned.
II. RELATED WORK
Gang violence is a well studied social science topic dating
back to 1927 [18]. However,
the notions of "Cyber-" or
"Internet banging", which is defined as "the phenomenon of
gang affiliates using social media sites to trade insults or make
violent threats that lead to homicide or victimization" [8], was
only recently introduced [19], [11]. Patton et al. introduced the
concept of "Internet banging" and studied how social media is
now being used as a tool for gang self-promotion and as a way
Fig. 2: Gang member dataset creation.
for gang members to gain and maintain street credibility [8].
They also discussed the relationship between gang-related
crime and hip-hop culture, giving examples on how hip-hop
music shared on social media websites targeted at harassing
rival gang members often ended up in real-world collisions
among those gangs. Decker et al. and Patton et al. have also
reported that street gangs perform Internet banging with social
media posts of videos depicting their illegal behaviors, threats
to rival gangs, and firearms [20], [21].
The ability to take action on these discoveries is limited by
the tools available to discover gang members on social media
and to analyze the content they post [19]. Recent attempts
to improve our abilities include a proposed architecture for
a surveillance system that can learn the structure, function,
and operation of gangs through what
they post on social
media [11]. However, the architecture requires a set of gang
member profiles for input, thus assuming that they have already
been discovered. Patton et al. [21] devised a method to
automatically collect tweets from a group of gang members
operating in Detroit, MI. However, their approach required the
profile names of the gang members to be known beforehand,
and data collection was localized to a single city in the country.
This work builds upon existing methods to automatically
discover gang member profiles on Twitter. This type of user
profile classification problem has been explored in a diverse
set of applications such as political affiliation [14], ethnic-
ity [14], gender [16], predicting brand loyalty [14], and user
occupations [17]. However, these approaches may utilize an
abundance of positive examples in their training data, and only
rely on a single feature type (typically, tweet text). Whereas
most profile classifiers focus on a single type of feature (e.g.
profile text), we consider the use of a variety of feature types,
including emoji, YouTube links, and photo features.
III. DISCOVERING GANG MEMBER PROFILES
This section discusses the methodology we followed to
study and classify the Twitter profiles of gang members auto-
matically. It includes a semi-automatic data collection process
to discover a large set of verifiable gang member profiles, an
evaluation of the tweets of gang and non-gang member posts
to identify promising features, and the deployment of multiple
supervised learning algorithms to perform the classification.
A. Data collection
Discovering gang member profiles on Twitter to build train-
ing and testing datasets is a challenging task. Past strategies
1. Seed Term Discovery2. Gang Affiliated Rappers' Twitter Profile DiscoverySearch Twitter API3. Manual Verification Of Twitter Profiles5. Using Followers and Followees to discover more profiles4. Using Retweets to discover more profilesGang MemberDatasetYESDiscardNOMethod
Seed term discovery
Gang Affiliated Rappers
Retweets, Followers & Followees
Total
Number of Profiles
280
22
98
400
TABLE I: Number of gang member profiles captured.
to find these profiles were to search for keywords, phrases,
and events that are known to be related to gang activity in a
particular city a priori [11], [21]. However, such approaches are
unlikely to yield adequate data to train an automatic classifier
since gang members from different geographic locations and
cultures use local languages, location-specific hashtags, and
share information related to activities in a local region [11].
Such region-specific tweets and profiles may be used to train
a classifier to find gang members within a small region but
not across the Twitterverse. To overcome these limitations, we
adopted a semi-automatic workflow, illustrated in Figure 2, to
build a dataset of gang member profiles suitable for training a
classifier. The steps of the workflow are:
1. Seed Term Discovery: Following the success of identifying
gang member profiles from Chicago [11], we began our data
collection with discovering universal
terms used by gang
members. We first searched for profiles with hashtags for
Chicago gangs noted in [11], namely #BDK (Black Disciple
Killers) and #GDK (Gangster Disciples Killers). Those pro-
files were analyzed and manually verified as explained in
Step 3. Analysis of these profiles identified a small set of
hashtags they all use in their profile descriptions. Searching
Twitter profiles using those hashtags, we observed that gang
members across the U.S. use them, thus we consider those
terms to be location neutral. For example, gang members
post #FreeDaGuys in their profile to support their fellow
members who are in jail, #RIPDaGuys to convey the grieving
for fallen gang members, and #FuckDaOpps to show their
hatred towards police officers. We used these terms as key-
words to discover Twitter profiles irrespective of geographical
location. We used the Followerwonk Web service API6 and
Twitter REST API7 to search Twitter profile descriptions by
keywords #FreeDaGuys, #FreeMyNigga, #RIPDaGuys,
and #FuckDaOpps. Since there are different informal ways
people spell a word in social media, we also considered
variations on the spelling of each keyword; for example,
for #FreeDaGuys, we searched both #FreeDaGuys, and
#FreeTheGuys.
2. Gang Affiliated Rappers' Twitter Profile Discovery:
Finding profiles by a small set of keywords is unlikely to
yield sufficient data. Thus, we sought additional gang member
profiles with an observation from Patton et al. [8] that the
influence of hip-hop music and culture on offline gang member
activities can also be seen in their social media posts. We
thus also consider the influence of hip-hop culture on Twitter
by exploring the Twitter network of known gangster rappers
who were murdered in 2015 due to gang-related incidents8.
We searched for these rapper profiles on Twitter and manually
checked that the rapper was affiliated to a gang.
3. Manual verification of Twitter profiles: We verified each
6https://moz.com/followerwonk/bio
7https://dev.twitter.com/rest/public
8http://www.hipwiki.com/List+of+Rappers+Murdered+in+2015
profile discovered manually by examining the profile picture,
profile background image, recent tweets, and recent pictures
posted by a user. During these checks, we searched for terms,
activities, and symbols that we believed could be associated
with a gang. For example, profiles whose image or background
included guns in a threatening way, stacks of money, showing
gang hand signs and gestures, and humans holding or posing
with a gun, appeared likely to be from a gang member.
Such images were often identified in profiles of users who
submitted tweets that contain messages of support or sadness
for prisoners or recently fallen gang members, or used a high
volume of threatening and intimidating slang language. Only
profiles where the images, words, and tweets all suggested
gang affiliation were labeled as gang affiliates and added to
our dataset. Although this manual verification does have a
degree of subjectivity, in practice, the images and words used
by gang members on social media are so pronounced that we
believe any reasonable analyst would agree that they are gang
members. We found that not all the profiles collected belonged
to gang members; we observed relatives and followers of gang
members posting the same hashtags as in Step 1 to convey
similar feelings in their profile descriptions.
4. Using Retweets to discover more profiles: From the set
of verified profiles, we explored their retweet and follower
networks as a way to expand the dataset. We first considered
authors of tweets which were retweeted by a gang member
in our seed set. In Twitter, "retweeting" is a mechanism by
which a user can share someone else's tweet to their follower
audience. Assuming that a user only retweets things that
they believe or their audience would be interested in, it may
be reasonable to assume that gang members would only be
interested in sharing what other gang members have to say,
and hence, the authors of gang members' retweets could also
be gang members.
5. Using Followers and Followees to discover more profiles:
We analyzed followers and followees of our seed gang member
profiles to find more gang member profiles. A Twitter user
can follow other Twitter users so that the individual will be
subscribed to their tweets as a follower and they will be able
to start a private conversation by sending direct messages
to the individual. Motivated by the sociological concept of
homophily, which claims that individuals have a tendency to
associate and bond with similar others9, we hypothesized that
the followers and followees of Twitter profiles from the seed
set may also be gang members. Manual verification of Twitter
profiles collected from retweets, followers, and followees of
gang members showed that a majority of those profiles are non-
gang members who are either family members, hip-hop artists,
women or profiles with pornographic content. To ensure that
our dataset is not biased towards a specific gang or geographic
location, only a limited number of profiles were collected via
retweets, followers and followees.
Table I summarizes the number of profiles manually verified
as gang members from Twitter profiles collected in step 1, 2,
4 and 5. Altogether we collected 400 gang member's Twitter
profiles. This is a large number compared to previous studies
of gang member activities on social media that curated a
maximum of 91 profiles [11]. Moreover, we believe the profiles
9http://aris.ss.uci.edu/∼lin/52.pdf
(a) Gang members.
(b) Non-gang members.
Fig. 3: Comparison of words used in tweets.
collected represent a diverse set of gang members that are not
biased toward a particular geographic area or lingo as our data
collection process used location-independent terms proven to
be used by gang members when they express themselves.
B. Data analysis
We next explore differences between gang and non-gang
member Twitter usage to find promising features for classify-
ing profiles. For this purpose, profiles of non-gang members
were collected from the Twitter Streaming API10. We collected
a random sample of tweets and the profiles of the users
who authored the tweets in the random sample. We manually
verified that all Twitter profiles collected in this approach
belong to non-gang members. The profiles selected were then
filtered by location to remove non-U.S. profiles by reverse
geo-coding the location stated in their profile description by
the Google Maps API11. Profiles with location descriptions
that were unspecified or did not relate to a location in the
U.S. were discarded. We collected 2,000 non-gang member
profiles in this manner. In addition, we added 865 manually
verified non-gang member profiles collected using the location
neutral keywords discussed in Section III. Introducing these
profiles, which have some characteristics of gang members
(such as cursing frequently or cursing at law enforcement) but
are not, captures local languages used by family/friends of
gang members and ordinary people in a neighborhood where
gangs operate.
With the Twitter REST API12, we collected the maximum
number of most recent tweets that can be retrieved (3,200)
along with profile descriptions and images (profile and cover
photos) of every gang and non-gang member profile. The
resulting dataset consists of 400 gang member Twitter profiles
and 2,865 non-gang member Twitter profiles. The dataset
has a total of 821,412 tweets from gang member profiles
and 7,238,758 tweets from non-gang member profiles. Prior
to analyzing any text content, we removed all of the seed
words used to find gang member profiles, all stop words, and
performed stemming across all tweets and profile descriptions.
10https://dev.twitter.com/streaming/overview
11https://developers.google.com/maps/
12https://dev.twitter.com/rest/public
Fig. 4: Word usage in profile descriptions: gang vs non-gang.
1) Tweet text: Figure 3 summarizes the words seen most
often in the gang and non-gang members' tweets as clouds.
They show a clear difference in language. For example, we
note that gang members more frequently use curse words in
comparison to ordinary users. Although cursing is frequent in
tweets, they represent just 1.15% of all words used [22]. In
contrast, we found 5.72% of all words posted by gang member
accounts to be classified as a curse word, which is nearly five
times more than the average curse word usage on Twitter. The
clouds also reflect the fact that gang members often talk about
drugs and money with terms such as smoke, high, hit, and
money, while ordinary users hardly speak about finances and
drugs. We also noticed that gang members talk about material
things with terms such as got, money, make, real, need whereas
ordinary users tend to vocalize their feelings with terms such
as new, like, love, know, want, look, make, us. These differences
make it clear that the individual words used by gang and
non-gang members will be relevant features for gang profile
classification.
2) Twitter Profile Description: On Twitter, a user can give
a self-description as a part of the user's profile. A comparison
of the top 10 words in gang members' and non-gang mem-
bers' Twitter profile descriptions is shown in Figure 4. The
first 10 words are the most frequently used words in non-
gang members' profiles and the latter 10 words are the most
frequently used words in gang members' profiles. Word com-
parison shows that gang members prefer to use curse words
(nigga, fuck, shit) in their profile descriptions while non-gang
members use words related to their feelings or interests (love,
life, live, music, book). The terms rip and free which appear
in approximately 12% of all gang member Twitter profiles,
suggest that gang members use their profile descriptions as a
space to grieve for their fallen or incarcerated gang members.
The term gang in gang members' profile descriptions suggest
that gang members like to self-identify themselves on Twitter.
Such lexical features may therefore be of great importance
for automatically identifying gang member profiles. We take
counts of unigrams from gang and non-gang members' Twitter
profile descriptions as classification features.
Fig. 6: Examples for gang members' tweets with emojis.
emoji in an 'emoji chain'. Figure 6 presents some prototypical
'chaining' of emojis used by gang members. The chains may
reflect their anger at law enforcement officers, as a cop emoji
is often followed up with the emoji of a weapon, bomb, or
explosion. We found that 32.25% of gang members in our
dataset have chained together the police and the pistol emoji,
compared to just 1.14% of non-gang members. Moreover, only
1.71% of non-gang members have used the hundred points
emoji and pistol emoji together in tweets while 53% of gang
members have used them. A variety of the angry face emoji
such as devil face emoji and imp emoji were also common
in gang member tweets. The frequency of each emoji symbol
used across the set of user's tweets are thus considered as
features for our classifier.
5) Profile image: In our profile verification process, we
observed that most gang member profiles portray a context
representative of gang culture. Some examples of these profile
pictures are shown in Figure 7, where the user holds or points
weapons, is seen in a group fashion which displays a gangster
culture, or is showing off graffiti, hand signs, tattoos and
bulk cash. Descriptions of these images may thus empower
our classifier. Thus, we translated profile images into features
with the Clarifai web service14. Clarifai offers a free API to
query a deep learning system that tags images with a set of
scored keywords that reflect what is seen in the image. We
tagged the profile image and cover image for each profile
using 20 tags identified by Clarifai. Figure 8 offers the 20
most often used tags applied to gang and non-gang member
profiles. Since we take all the tags returned for an image, we
see common words such as people and adult coming up in the
top 20 tag set. However, gang member profile images were
assigned unique tags such as trigger, bullet, worship while
non-gang images were uniquely tagged with beach, seashore,
dawn, wildlife, sand, pet. The set of tags returned by Clarifai
were thus considered as features for the classifier.
C. Learning algorithms
The unigrams of tweets, profile text, and linked YouTube
video descriptions and comments, along with the distribution
of emoji symbols and the profile image tags were used to
train four different classification models: a Naive Bayes net, a
Logistic Regression, a Random Forest, and a Support Vector
Machine (SVM). These four models were chosen because
they are known to perform well over text features, which is
the dominant type of feature considered. The performance of
the models are empirically compared to determine the most
suitable classification technique for this problem. Data for
the models are represented as a vector of term frequencies
where the terms were collected from one or more feature sets
described above.
Fig. 5: Emoji usage distribution: gang vs non-gang.
3) Music interests: It has been recognized that music is
a key cultural component in an urban lifestyle and that gang
members often want to emulate the scenarios and activities the
music conveys [8]. Our analysis confirms that the influence
of gangster rap is expressed in gang members' Twitter posts.
We found that 51.25% of the gang members collected have a
tweet that links to a YouTube video. Following these links, a
simple keyword search for the terms gangsta and hip-hop
in the YouTube video description found that 76.58% of the
shared links are related to hip-hop music, gangster rap, and
the culture that surrounds this music genre. Moreover, this
high proportion is not driven by a small number of profiles
that prolifically share YouTube links; eight YouTube links are
shared on average by a gang member.
Recognizing the frequency with which gang members post
YouTube links on gangster rap and hip-hop, we consider the
YouTube videos posted in a user's tweets as features for the
classifier. In particular, for each YouTube video tweeted, we
used the YouTube API13 to retrieve the video's description
and its comments. Further analysis of YouTube data showed
a difference between terms in gang members' YouTube data
and non-gang members' YouTube data. For example, the top
5 terms (after stemming and stop word removal) used in
YouTube videos shared by gang members are shit, like, nigga,
fuck, lil while like, love, peopl, song, get are the top 5 terms in
non-gang member video data. To represent a user profile based
on their music interests, we generated a bag of words from the
video descriptions and comments from all shared videos.
4) Emoji: Motivated by recent work involving the use of
emojis by gang members [23], we also studied if and how gang
and non-gang members use emoji symbols in their tweets. Our
analysis found that gang members have a penchant for using
just a small set of emoji symbols that convey their anger and
violent behavior through their tweets. Figure 5 illustrates the
emoji distribution for the top 20 most frequent emojis used by
gang member profiles in our dataset. The fuel pump emoji was
the most frequently used emoji by the gang members, which
is often used in the context of selling or consuming marijuana.
The pistol emoji is the second most frequent in our dataset,
which is often used with the guardsman emoji or the police cop
13https://developers.google.com/youtube/
14http://www.clarifai.com/
DONT EVEN ASK EM WHO DEY WIT JUS BLOW EM FACES I LOST MY BRO 2 DESE STREETS NOW IM FUCKED UP #SHITREPEATF**K YOUR BLING BLING DEY GOT MY BROTHERS IN CHAINS #FREEXXXX #FREEXXXXX #FTPFig. 7: Sample gang member profile images.
IV. EVALUATION
We next evaluate the performance of classifiers that use
the above features to discover gang member profiles on
Twitter. For this purpose, we use the training set discussed
in Section III with 400 gang member profiles (the 'posi-
tive'/'gang' class) and 2,865 non-gang member profiles (the
'negative'/'non-gang' class). We trained and evaluated the
performance of the classifiers mentioned in Section III-C
under a 10-fold cross validation scheme. For each of the
four learning algorithms, we consider variations involving only
tweet text, emoji, profile, image, or music interest (YouTube
comments and video description) features, and a final variant
that considers all types of features together. The classifiers that
use a single feature type were intended to help us study the
quality of their predictive power by itself. When building these
single-feature classifiers, we filtered the training dataset based
on the availability of the single feature type in the training
data. For example, we only used the twitter profiles that had
at least a single emoji in their tweets to train classifiers that
consider emoji features. We found 3,085 such profiles out of
the 3,265 profiles in the training set. When all feature types
were considered, we developed two different models:
1) Model(1): This model is trained with all profiles in
the training set.
2) Model(2): This model is trained with profiles that
contain every feature type.
Because a Twitter profile may not have every feature type,
Model(1) represents a practical scenario where not every
Twitter profile contains every type of feature. In this model,
the non-occurrence of a feature is represented by 'zeroing out'
the feature value during model training. Model(2) represents
the ideal scenario where all profiles contain every feature type.
For this model, we used 1,358 training instances (42% of all
training instances), out of which 172 were gang members (43%
of all gang members) and 1,186 were non-gang members (41%
of all non-gang members). We used version 0.17.1 of scikit-
learn15 machine learning library to implement the classifiers.
For each 10-fold cross validation experiment, we report
three evaluation metrics for the 'gang' and 'non-gang' classes,
namely, the Precision = tp/(tp + f p), Recall = tp/(tp + f n),
15http://scikit-learn.org/stable/index.html
Fig. 8: Image tags distribution: gang vs non-gang.
and F 1-score = 2 ∗ (P recision ∗ Recall)/(P recision +
Recall), where tp is the number of true positives, f p is the
number of false positives, tn is the number of true negatives,
and f n is the number of false negatives. We report these
metrics for the positive 'gang' and negative 'non-gang' classes
separately because of class imbalance in our dataset.
A. Experimental results
Table II presents the average precision, recall, and F 1-score
over the 10 folds for the single-feature and combined feature
classifiers. The table includes, in braces ('{ }'), the number
of gang and non-gang profiles that contain a particular feature
type, and hence the number of profiles used for the 10-fold
cross validation. It is reasonable to expect that any Twitter
profile is not that of a gang member, predicting a Twitter user
as a non-gang member is much easier than predicting a Twitter
user as a gang member. Moreover false positive classifications
of the 'gang' class may be detrimental to law enforcement
investigations, which may go awry as they surveil an innocent
person based on the classifier's suggestion. We thus believe
that a small false positive rate of the 'gang' class to be an
especially important evaluation metric. We say that a classifier
is 'ideal' if it demonstrates high precision, recall, and F 1-score
for the 'gang' class while performing well on the 'non-gang'
class as well.
The best performing classifier that considers single features
is a Random Forest model over tweet features (T), with a rea-
sonable F 1-score of 0.7229 for the 'gang' class. It also features
the highest F 1-score for the 'non-gang' class (0.9671). Its
strong performance is intuitive given the striking differences in
language as shown in Figure 3 and discussed in Section III-B1.
We also noted that music features offer promising results, with
an F 1-score of 0.6505 with a Naive Bayes classifier, as well
as emoji features with an F 1-score of 0.6067 also achieved by
a Naive Bayes classifier. However, the use of profile data and
image tags by themselves yield relatively poor F 1-scores no
matter which classifier considered. There may be two reasons
for this despite the differences we observed in Section III-B.
Features
Total Number of Profiles
{#Gang : #Non-Gang}
Classifier
Tweets (T)
Emojis (E)
3,265 {400 : 2,865}
3,085 {396 : 2,689}
Profile data (P)
2,996 {378 : 2,618}
Image tags (I)
2,910 {357 : 2,553}
Music interest (Y)
1,630 {196 : 1,434}
Model(1) {T + E + P + I + Y}
3,265 {400 : 2,865}
Model(2) {T + E + P + I + Y}
1,358 {172 : 1,186}
Naive Bayes
Logistic Regression
Random Forest
SVM
Naive Bayes
Logistic Regression
Random Forest
SVM
Naive Bayes
Logistic Regression
Random Forest
SVM
Naive Bayes
Logistic Regression
Random Forest
SVM
Naive Bayes
Logistic Regression
Random Forest
SVM
Naive Bayes
Logistic Regression
Random Forest
SVM
Naive Bayes
Logistic Regression
Random Forest
SVM
Precision
0.4354
0.6760
0.8433
0.6301
0.4934
0.6867
0.7279
0.4527
0.6000
0.8015
0.5719
0.7501
0.2692
0.4832
0.4131
0.3889
0.5865
0.7101
0.8403
0.6232
0.3718
0.7250
0.8792
0.6442
0.4405
0.7588
0.8961
0.7185
Gang
Recall
0.9558
0.6623
0.6401
0.6545
0.7989
0.3995
0.5079
0.5642
0.243
0.2160
0.1441
0.2225
0.6973
0.1853
0.1512
0.1454
0.7424
0.5447
0.3953
0.6067
0.9387
0.6880
0.6374
0.6791
0.9386
0.7396
0.6994
0.7394
Results
F 1-score
0.5970
0.6666
0.7229
0.6388
0.6067
0.4969
0.5931
0.4955
0.464
0.3362
0.2239
0.3394
0.3851
0.2624
0.2147
0.205
0.6505
0.6110
0.5277
0.6072
0.5312
0.7038
0.7364
0.6583
0.5926
0.7433
0.7755
0.7213
Precision
0.9929
0.9529
0.9517
0.9514
0.9676
0.9164
0.9292
0.9329
0.8765
0.8974
0.8886
0.8978
0.9458
0.8950
0.8911
0.8898
0.9632
0.9395
0.9232
0.9463
0.9889
0.9564
0.9507
0.9546
0.9889
0.9639
0.9575
0.9638
Non-Gang
Recall
0.8278
0.9544
0.9832
0.9442
0.8785
0.9733
0.9721
0.8953
1.0000
0.9924
0.9859
0.9897
0.7357
0.9722
0.9731
0.9679
0.9297
0.9679
0.9895
0.9476
0.7791
0.9637
0.9881
0.9469
0.8254
0.9662
0.9873
0.9586
F 1-score
0.9028
0.9536
0.9671
0.9477
0.9207
0.9438
0.9500
0.9133
0.9341
0.9424
0.9346
0.9414
0.8271
0.9318
0.9300
0.9270
0.9460
0.9534
0.9550
0.9467
0.8715
0.9599
0.9690
0.9506
0.8991
0.9649
0.9720
0.9610
TABLE II: Classification results based on 10-fold cross validation.
First, these two feature types did not generate a large number
of specific features for learning. For example, descriptions are
limited to just 160 characters per profile, leading to a limited
number of unigrams (in our dataset, 10 on average) that can be
used to train the classifiers. Second, the profile images were
tagged by a third party Web service which is not specifically
designed to identify gang hand signs, drugs and guns, which
are often shared by gang members. This led to a small set of
image tags in their profiles that were fairly generic, i.e., the
image tags in Figure 8 such as 'people', 'man', and 'adult'.
Combining these diverse sets of features into a single
classifier yields even better results. Our results for Model(1)
show that the Random Forest achieves the highest F 1-scores
for both 'gang' (0.7364) and 'non-gang' (0.9690) classes and
yields the best precision of 0.8792, which corresponds to a low
false positive rate when labeling a profile as a gang member.
Despite the fact that it has lower positive recall compared
to the second best performing classifier (a Random Forest
trained over only tweet text features (T)), for this problem
setting, we should be willing to increase the chance that a gang
member will go unclassified if it means reducing the chance
of applying a 'gang' label to a non-gang member. When we
tested Model(2), a Random Forrest classifier achieved an F 1-
score of 0.7755 (improvement of 7.28% with respect to the
best performing single feature type classifier (T)) for 'gang'
class with a precision of 0.8961 (improvement of 6.26% with
respect to (T)) and a recall of 0.6994 (improvement of 9.26%
with respect to (T)). Model(2) thus outperforms Model(1), and
we expect its performance to improve with the availability of
more training data with all feature types.
B. Evaluation Over Unseen Profiles
We also tested the trained classifiers using a set of Twitter
profiles from a separate data collection process that may
emulate the classifier's operation in a real-time setting. For this
experiment, we captured real-time tweets from Los Angeles,
CA16 and from ten South Side, Chicago neighborhoods that
are known for gang-related activities [11] using the Twitter
streaming API. We consider these areas with known gang
presence on social media to ensure that some positive profiles
would appear in our test set. We ultimately collected 24,162
Twitter profiles: 15,662 from Los Angeles, and 8,500 from
Chicago. We populated data for each profile by using the 3,200
most recent tweets (the maximum that can be collected from
Twitter's API) for each profile. Since the 24,162 profiles are
far too many to label manually, we qualitatively study those
profiles the classifier placed into the 'gang' class.
We used the training dataset to train our best performing
random forest classifier (which use all feature types) and tested
it on the test dataset. We then analyzed the Twitter profiles
that our classifier labeled as belonging to the 'gang' class.
Each of those profiles had several features which overlap with
gang members such as displaying hand signs and weapons in
their profile images or in videos posted by them, gang names
or gang-related hashtags in their profile descriptions, frequent
use of curse words, and the use of terms such as "my homie"
to refer to self-identified gang members. Representative tweets
extracted from those profiles are depicted in Figure 9. The most
frequent words found in tweets from those profiles were shit,
nigga, got, bitch, go, fuck etc. and their user profiles had terms
such as free, artist, shit, fuck, freedagang, and ripthefallen.
They had frequently used emojis such as face with tears of joy,
hundred points symbol, fire, skull, money bag, and pistol. For
some profiles, it was less obvious that the classifier correctly
identified a gang member. Such profiles used the same emojis
and curse words commonly found in gang members profiles,
but their profile picture and tweet content was not indicative of
a gang affiliation. In conclusion, we find that in a real-time-
like setting, the classifier to be able to extract profiles with
features that strongly suggest gang affiliation. Of course, these
16http://isithackday.com/geoplanet-explorer/index.php?woeid=2442047
Fig. 9: Sample tweets from identified gang members.
profiles demand further investigation and extensive evidence
from other sources in order to draw a concrete conclusion,
especially in the context of a law enforcement investigation.
We refrain from reporting any profile names or specific details
about the profiles labeled as a 'gang' member to comply with
the applicable IRB governing this human subject research.
V. CONCLUSION AND FUTURE WORK
This paper presented an approach to address the problem
of automatically identifying gang member profiles on Twitter.
Despite the challenges in developing such automated systems,
mainly due to difficulties in finding online gang member
profiles for developing training datasets, we proposed an
approach that uses features extracted from textual descriptions,
emojis, images and videos shared on Twitter (textual features
extracted from images, and videos). Exploratory analysis of
these types of features revealed interesting, and sometimes
striking differences in the ways gang and non-gang members
use Twitter. Classifiers trained over features that highlight these
differences, were evaluated under 10-fold cross validation. Our
best classifier achieved a promising F 1-score of 0.7755 over
the 'gang' profiles when all types of features were considered.
Future work will strengthen our training dataset by in-
cluding more gang member Twitter profiles by searching for
more location-independent keywords. We also plan to develop
our own image classification system specifically designed to
classify images found on gang member profiles. We would
also like to experiment with building dictionaries that contain
gang names to understand whether "having a gang name in
the profile description" as a feature can improve our results.
Finally, we would also like to study how can we further
improve our classifier models using word embeddings [24] and
social networks of known gang members.
VI. ACKNOWLEDGEMENT
We are thankful to Uday Kiran Yeda for helping us with
data collection. We acknowledge partial support from the
National Science Foundation (NSF) award: CNS-1513721:
"Context-Aware Harassment Detection on Social Media", Na-
tional Institutes of Health (NIH) award: MH105384-01A1:
"Modeling Social Behavior for Healthcare Utilization in De-
pression" and Grant No. 2014-PS-PSN-00006 awarded by the
Bureau of Justice Assistance. The Bureau of Justice Assistance
is a component of the U.S. Department of Justice's Office
of Justice Programs, which also includes the Bureau of Jus-
tice Statistics, the National Institute of Justice, the Office of
Juvenile Justice and Delinquency Prevention, the Office for
Victims of Crime, and the SMART Office. Points of view or
opinions in this document are those of the authors and do not
necessarily represent the official position or policies of the U.S.
Department of Justice, NSF or NIH.
REFERENCES
[1] 2011 National Gang Threat Assessment Issued Emerging Trends, 2011.
[2] National Gang Report, National Gang Intelligence Center, 2013.
[3] W. B. Miller, Crime by youth gangs and groups in the United States.
US Department of Justice, Office of Justice Programs, Office of Juvenile
Justice and Delinquency Prevention Washington, DC, 1992.
"Gang homicides-five us cities, 2003-2008." Morbidity and mortality
weekly report, vol. 61, no. 3, pp. 46–51, 2012.
[4]
[5] Survey of Gang Members Online Habits and Participation (2007)
Survey results reported at the i-SAFE Annual Internet Safety Education
Review Meeting Carlsbad, California. National Assessment Center.
J. E. King, C. E. Walpole, and K. Lamon, "Surf and turf wars online-
growing implications of internet gang violence," Journal of Adolescent
Health, vol. 41, no. 6, Supplement, pp. S66 – S68, 2007.
[6]
[7] D. C. Pyrooz, S. H. Decker, and R. K. M. Jr., "Criminal and routine
activities in online settings: Gangs, offenders, and the internet," Justice
Quarterly, vol. 32, no. 3, pp. 471–499, 2015.
[8] D. U. Patton, R. D. Eschmann, and D. A. Butler, "Internet banging:
New trends in social media, gang violence, masculinity and hip hop,"
Computers in Human Behavior, vol. 29, no. 5, pp. A54 – A59, 2013.
J. C. Howell, "Gang prevention: An overview of research and programs.
juvenile justice bulletin." Office of Juvenile Justice and Delinquency
Prevention, 2010.
[9]
[10] M. Ito, S. Baumer, M. Bittanti, R. Cody, B. Herr-Stephenson, H. A.
Horst, P. G. Lange, D. Mahendran, K. Z. Mart´ınez, C. Pascoe et al.,
"Hanging out, messing around, and geeking out," Digital media, 2010.
[11] S. Wijeratne, D. Doran, A. Sheth, and J. L. Dustin, "Analyzing the social
media footprint of street gangs," in IEEE International Conference on
Intelligence and Security Informatics (ISI), 2015, May 2015, pp. 91–96.
[12] P. E. R. Forum, "Social media and tactical considerations for law
enforcement," United States Office of Community Oriented Policing
Services and United States Department of Justice, Tech. Rep., 2013.
J. Brunty, L. Miller, and K. Helenek, Social media investigation for law
enforcement. Routledge, 2014.
[13]
[14] M. Pennacchiotti and A.-M. Popescu, "A machine learning approach to
twitter user classification," 2011.
[15] R. Tinati, L. Carr, W. Hall, and J. Bentwood, "Identifying communicator
roles in twitter," in Proceedings of the 21st International Conference on
World Wide Web, ser. WWW '12 Companion. New York, NY, USA:
ACM, 2012, pp. 1161–1168.
[16] W. Liu and D. Ruths, "Whats in a name? using first names as features
for gender inference in twitter," 2013.
[17] H. Purohit, A. Dow, O. Alonso, L. Duan, and K. Haas, "User taglines:
Alternative presentations of expertise and interest in social media," in
2012 International Conference on Social Informatics (Social Informat-
ics), Washington, D.C., USA, December 14-16, 2012, pp. 236–243.
[18] F. M. Thrasher, The gang: A study of 1,313 gangs in Chicago.
University of Chicago Press, 1963.
[19] D. U. Patton, J. S. Hong, M. Ranney, S. Patel, C. Kelley, R. Eschmann,
and T. Washington, "Social media as a vector for youth violence: A
review of the literature," Computers in Human Behavior, 2014.
[20] S. Decker and D. Pyrooz, "Leaving the gang: Logging off and moving
on. council on foreign relations," 2011.
[21] D. U. Patton, "Gang violence, crime, and substance use on twitter:
A snapshot of gang communications in detroit," Society for Social
Work and Research 19th Annual Conference: The Social and Behavioral
Importance of Increased Longevity, jan 2015.
[22] W. Wang, L. Chen, K. Thirunarayan, and A. P. Sheth, "Cursing
in english on twitter," in Proceedings of the 17th ACM Conference
on Computer Supported Cooperative Work & Social Computing, ser.
CSCW '14. New York, NY, USA: ACM, 2014, pp. 415–425.
[23] D. U. Patton, J. Lane, P. Leonard, J. Macbeth, and J. R. Smith-Lee,
"Gang violence on the digital street: Case study of a south side chicago
gang members twitter communication," New Media & Society, 2016.
[24] S. Wijeratne, L. Balasuriya, D. Doran, and A. Sheth, "Word embed-
dings to enhance twitter gang member profile identification," in IJCAI
Workshop on Semantic Machine Learning (SML 2016). New York
City, NY: CEUR-WS, 07/2016 2016.
WHOLE LOTTA GOIN ON CPDK DEM BITCHESBITCH WE TAKIN GLOKS WE AIN BUY'N NUN F**K FEDS TOOK ALL DA WISE GUYS OUT THE HOOD! |
1703.02852 | 1 | 1703 | 2017-02-20T20:19:32 | Introduction to a Temporal Graph Benchmark | [
"cs.SI",
"physics.soc-ph"
] | A temporal graph is a data structure, consisting of nodes and edges in which the edges are associated with time labels. To analyze the temporal graph, the first step is to find a proper graph dataset/benchmark. While many temporal graph datasets exist online, none could be found that used the interval labels in which each edge is associated with a starting and ending time. Therefore we create a temporal graph data based on Wikipedia reference graph for temporal analysis. This report aims to provide more details of this graph benchmark to those who are interested in using it. | cs.SI | cs | Introduction to a Temporal Graph Benchmark
Wouter Ligtenberg and Yulong Pei
Department of Mathematics and Computer Science
TU Eindhoven, The Netherlands
[email protected]
Abstract. A temporal graph is a data structure, consisting of nodes and
edges in which the edges are associated with time labels. To analyze the
temporal graph, the first step is to find a proper graph dataset/benchmark.
While many temporal graph datasets exist online, none could be found
that used the interval labels in which each edge is associated with a
starting and ending time. Therefore we create a temporal graph data
based on Wikipedia reference graph for temporal analysis. This report
aims to provide more details of this graph benchmark to those who are
interested in using it.
Keywords: Temporal Graph, Graph Analysis, Graph Benchmark
1
Introduction
A temporal graph is a data structure, consisting of nodes and edges in which
the edges are associated with time labels. While many temporal graph datasets
exist online, none could be found that used the interval labels in which each
edge is associated with a starting and ending time. For this reason we generated
several synthetic datasets and modified two existing datasets, i.e., Wikipedia
reference graph [2] and the Facebook message graph, for analysis. In this report,
we introduce the creation of the Wikipedia reference graph and analyze some
properties of this graph from both static and temporal perspectives. This report
aims to provide more details of this graph benchmark to those who are interested
in using it and also serves as the introduction to the dataset used in the master
thesis of Wouter Ligtenberg [1].
2 Creation of the Temporal Graph Benchmark
This dataset was created from the Wikipedia refence set [2]. In this dataset
edges represent Wikipedia articles and every edge represents a reference from one
article to another. The edges have 2 values, one with the time stamp of the edge
creation or the edge removal, and one indicating if it was added or removed. We
transformed this dataset into an interval set in which we connected the creation
of an edge to the removal of an edge to create an edge with an interval. In this
dataset we only included edges that were first added and later removed. If an
7
1
0
2
b
e
F
0
2
]
I
S
.
s
c
[
1
v
2
5
8
2
0
.
3
0
7
1
:
v
i
X
r
a
2
Introduction to a Temporal Graph Benchmark
edge is added but never removed we ignore it. Since this is the first real interval
set we contacted both Konect1 and Icon2 to submit this dataset to their index
for further research. Both instances accepted the dataset to their database.
In details, this graph dataset contains the evolution of hyperlinks between
articles of the Dutch version of Wikipedia. Each node is an article. Each edge is
a hyperlink from one page to another (directed). In the dataset, each edge has a
start and an end time, which allows us to look at the network in different points
in time. The network under study has 67,8907 vertices and 472,9035 edges. The
first edge is created on Tuesday August 28, 2001, and the last edge removal takes
place on Sunday July 10, 2011. So, our data roughly has a time span of 10 years.
3 Properties of the Temporal Graph Benchmark
In this section, we introduce the properties of this temporal graph benchmark
in two different perspectives, i.e., static and temporal. For the static graph anal-
ysis, we ignore the time stamps and view this dataset as a static graph. Then
we calculate three graph measures on this graph including degree, clustering
coefficient and PageRank.
3.1 Static Graph Analysis
Degree The average degree, average in-degree and average out-degree charac-
terize the network in a way that it gives an indication of how many edges there
are connected on average to a node. We also calculate the max degree as the
comparison. The results are shown in Table 1.
The degree distribution using a logarithmic scale for both the degree fre-
quencies as the number of nodes including the degree distribution, in-degree
distribution and out-degree distribution, are shown in Figure 1. The curves in-
dicate that these degree distributions follow the power law distribution.
average
Degree
10.62
In-degree
Out-degree
5.31
5.31
max 12298 (n=394) 10521 (n=394) 4302 (n=306188)
Table 1. Degree statistics of the static graph.
Clustering coefficient How much nodes cluster together and form neighbor-
hoods can be measured using the clustering coefficient. This measure quantifies
the proportion of a node's neighbors to which the node is connected through
1 http://konect.uni-koblenz.de/
2 https://icon.colorado.edu
Introduction to a Temporal Graph Benchmark
3
Fig. 1. Degree distributions of the static graph.
triangles (three-node cycles). The clustering coefficient Ci of node i is defined
as:
Ci =
2ti
ki(ki − 1)
,
(1)
where ti is the number of triangles (three-node cycles) through i and and ki is
the degree of node i. Ci = 0 if none of the neighbors of a vertex are connected,
and Ci = 1 if all of the neighbors are connected. Remark that the graph is
considered as if it was undirected.
In this graph dataset, the average clustering coefficient is 0.114. For 28638
nodes Ci = 1, which means that for 4.22% of the nodes all neighbors are con-
nected. On the other hand, there are also 57.40% of the nodes have Ci = 0. This
means that these nodes are not part of any triangle at all.
PageRank This measure ranks nodes by their importance. The PageRank value
of a node is based on the nodes linking to and from that node. PageRank is
mainly used by Google to rank websites by calculating the importance each
website, but can also be used for other purposes such as rating Wikipedia articles.
To visualize the results a boxplot was plotted, which is shown in Figure 2. The
figure clearly shows that only a few pages are classified as important, i.e. that
have a high PageRank. While a lot of nodes/pages have relative small PageRank,
i.e., less importance.
3.2 Temporal Graph Analysis
We use the snapshot-based method to analyze the temporal graph. Therefore the
first step is choose the time window to divide the temporal graph into several
snapshots. The time between the creation of the first edge, and the removal
of the last edge covers a time period of 311,268,466 seconds, which is almost
10 years (9.87 years). For simplicity, we use the time window of 1 year in the
temporal analysis to divide the temporal graph into 10 snapshots.
4
Introduction to a Temporal Graph Benchmark
Fig. 2. PageRank of the static graph.
Degree In Figure 3 the degree distributions per snapshot are visualized. Each
year has its own color, ranging from blue (year 1) to red (year 10). We see a
similar pattern for degree, in-degree and out-degree. In the first years, the graph
shows a fairly large deviation from the power law. As the years pass, the graph
develops to fit the power line better. The years 5 to 8 show a similar graph as
we have seen in the static analysis of the graph. The last two years again start
to deviate from this diagonal, although still keeping a fairly diagonal line. This
behavior can be partly explained by the fact that the graph is growing at the
beginning, and getting smaller again at the end. In all snapshots it seems to
approximately hold that this network thus is a scale-free network. Moreover, the
change of degrees in different graph snapshots is shown in Figure 4.
Fig. 3. Degree distributions of the temporal graph in different graph snapshots.
Clustering coefficient Figure 5 shows the change of cluster coefficient of the
temporal graph in different snapshots and the clustering does change over time.
It is with relatively small steps, but we can conclude that the graph shows a
downward trend. This trend might indicate that more Wikipedia pages tend
Introduction to a Temporal Graph Benchmark
5
Fig. 4. Change of degrees in different graph snapshots.
to link to pages outside their general topic, which would lower the clustering
coefficient.
Fig. 5. Change of cluster coefficient in different graph snapshots.
PageRank We use the PageRank to analyze the importance of nodes change
over time. To visualize the results, we pick the top 30 nodes that scored the
highest on PageRank and the results are shown in Figure 6. From the results,
there is not a single most important node over the complete time period. Times
change, inventions are done and new articles are written about new subjects.
This is something one would expect in a data file like this, and thus is confirmed
by the data.
Acknowledgments
Section 3, i.e., the analysis of graph properties, is from the advanced homework
of 2IID0 - Web Analytics course. We thank Evertjan Peer, Hilde Weerts, Jasper
Adegeest and Gerson Foks (students of Group 12 in 2IID0) for their efforts in
the network analysis.
6
Introduction to a Temporal Graph Benchmark
Fig. 6. Top nodes with highest PageRank in different graph snapshots.
References
1. Wouter Ligtenberg. Tink, a temporal graph analytics library for Apache Flink. Mas-
ter Thesis, 2017.
2. Julia Preusse, J´erome Kunegis, Matthias Thimm, Steffen Staab, and Thomas Got-
tron. Structural dynamics of knowledge networks. In ICWSM, 2013.
|
1701.07490 | 1 | 1701 | 2017-01-17T18:52:22 | What Are People Tweeting about Zika? An Exploratory Study Concerning Symptoms, Treatment, Transmission, and Prevention | [
"cs.SI"
] | The purpose of this study was to do a dataset distribution analysis, a classification performance analysis, and a topical analysis concerning what people are tweeting about four disease characteristics: symptoms, transmission, prevention, and treatment. A combination of natural language processing and machine learning techniques were used to determine what people are tweeting about Zika. Specifically, a two-stage classifier system was built to find relevant tweets on Zika, and then categorize these into the four disease categories. Tweets in each disease category were then examined using latent dirichlet allocation (LDA) to determine the five main tweet topics for each disease characteristic. Results 1,234,605 tweets were collected. Tweets by males and females were similar (28% and 23% respectively). The classifier performed well on the training and test data for relevancy (F=0.87 and 0.99 respectively) and disease characteristics (F=0.79 and 0.90 respectively). Five topics for each category were found and discussed with a focus on the symptoms category. Through this process, we demonstrate how misinformation can be discovered so that public health officials can respond to the tweets with misinformation. | cs.SI | cs | Paper type: Original Paper
What Are People Tweeting about Zika? An Exploratory
Study Concerning Symptoms, Treatment, Transmission, and
Prevention
Corresponding Author
Michele Miller MS
Wright State University
Biological Sciences
3640 Colonel Glenn Hwy, Dayton, OH 45431
Phone (574)261-3969
Fax (937)775-3320
[email protected]
Dr. Tanvi Banerjee PhD
Wright State University
Computer Science and Engineering
3640 Colonel Glenn Hwy, Dayton, OH 45431
Roopteja Muppalla
Wright State University
Computer Science and Engineering
3640 Colonel Glenn Hwy, Dayton, OH 45431
Dr. William Romine PhD
Wright State University
Biological Sciences
3640 Colonel Glenn Hwy, Dayton, OH 45431
Dr. Amit Sheth PhD
Wright State University
Computer Science and Engineering
3640 Colonel Glenn Hwy, Dayton, OH 45431
Abstract.
Background So far an exploratory study concerning what people are tweeting about Zika has not
been performed.
Objective The purpose of this study was to do a dataset distribution analysis, a classification
performance analysis, and a topical analysis concerning what people are tweeting about four
disease characteristics: symptoms, transmission, prevention, and treatment.
Methods A combination of natural language processing and machine learning techniques were
used to determine what people are tweeting about Zika. Specifically, a two-stage classifier
system was built to find relevant tweets on Zika, and then categorize these into the four disease
categories. Tweets in each disease category were then examined using latent dirichlet allocation
(LDA) to determine the five main tweet topics for each disease characteristic.
Results 1,234,605 tweets were collected. Tweets by males and females were similar (28% and
23% respectively). The classifier performed well on the training and test data for relevancy
(F=0.87 and 0.99 respectively) and disease characteristics (F=0.79 and 0.90 respectively). Five
topics for each category were found and discussed with a focus on the symptoms category.
Conclusion Through this process, we demonstrate how misinformation can be discovered so that
public health officials can respond to the tweets with misinformation.
Keywords: Zika; Epidemiology; Social Media; Machine Learning; Topic Modeling; Big Data
Analysis
Introduction
the globe. It was shown that the spread of misinformation led to deaths due to improper practice
of appropriate preventative measures [1].
The 2014/2015 Ebola outbreak caused fear and misinformation to spread wildly across
Experts at the Center for Disease Control (CDC) and the World Health Organization
(WHO) admit that they botched the response for Ebola by not responding to the threat sooner
[2]. One year after the Ebola outbreak ended, the Zika outbreak started and also caused fear and
misinformation to spread. In the recent years, citizen sensing has picked up greatly with the rise
of mobile device popularity, as well as with the rise in social media sites such as Facebook and
Twitter. The idea with citizen sensing is that citizens play the role of sensors in the environment
[3]; providing information regarding healthcare issues such as disease outbreaks in case of Ebola
and Zika [4].
Big social data eliminate the time lag caused by traditional survey based methods,
allowing for studying public opinions on issues while addressing privacy concerns of users by
studying collective public behavior on specific issues. In particular, public opinion mining has
been studied in the past for exploration of public views on important social issues such as
gender-based violence [5], as well as to mine health related beliefs [6-7].
With respect to Zika, Twitter has served as a source of misinformation. To counter, the
CDC has been responding with correct information. For example, one user tweeted "Apparently
Florida is immune to the Zika virus" while the CDC has tweeted about Zika in Florida several
times including this tweet "Updated: CDC travel and testing recommendations for Miami-Dade
county b/c of continued local #Zika transmission". Another common misconception is found in
this re-tweet "RT @user: I saw the Zika virus has made its way to Houston. It's really only bad
for you if you are pregnant .. ". However, while Zika is typically mild to unnoticeable in adults,
it can cause health issues in some adults as the CDC explains in this tweet "Symptoms of
Guillain-Barre syndrome include weakness in arms and legs. GBS (Guillain-Barre syndrome) is
linked w/ #Zika. Learn more. bit.ly/2dqL7Dv". One more common misconception is that "It
won't do any good 2 attempt 2 prevent Zika Virus; instead, devote all funds 2 researching a
vaccine, or anecdote". Firstly, assuming that the tweet meant "antidote" instead of "anecdote,"
the statement is still incorrect since antidotes are a substance that stops the harmful effects of
poison. This tweet puts forth a fatalistic attitude towards Zika prevention in its indication that
there is nothing citizens can do to prevent Zika. The CDC responds to this by posting several
tweets about what the public can do to prevent Zika infection such as "Treating your clothing &
gear w/ permethrin can help prevent mosquito bites. Learn more ways to #ZapZika" and
In this exploratory study, a combination of natural language processing and machine
"Prevent #Zika spread after travel. Use condoms: 6 months after travel for men, 8 weeks for
women".
learning techniques were used to determine what information about Zika symptoms,
transmission, prevention, and treatment people were discussing using tweets. Specifically, a two-
stage classifier system was built that was used to find relevant tweets on Zika, and then
categorize those into four disease categories: symptoms, transmission, prevention, and treatment
(Figure 1). This information could then be used by health professionals such as people at the
CDC and WHO to know what information the public does and does not know about Zika. Such a
system may help inform them on what they need to include in messages to the public, as well as
target specific user groups to prevent the spread of misinformation.
Figure 1. Block diagram of the pragmatic function-oriented content retrieval using a hierarchical
supervised classification technique, followed by deeper analysis for characteristics of disease
content.
Zika
Zika belongs to the Flaviviridae family of viruses [8]. This family contains a few
arboviruses that are very important clinically, such as dengue virus, yellow fever virus, West
Nile Virus, tick-borne encephalitis virus, and Japanese encephalitis virus [8]. Prior to 2007 there
had only been 14 confirmed cases of Zika; however, many people do not even realize they are
sick from Zika, let alone need to go to the hospital and death due to Zika is extremely rare [9].
The Zika virus usually only causes mild symptoms such as a headache, rash, fever,
conjunctivitis, and joint pain which can last from a few days to a week after being infected.
These symptoms are similar to Dengue and Chikungunya, which are also spread by the same
mosquito as Zika. The incubation period is unknown at this time but suspected to be a few days
to a week. The virus typically remains in the blood for about a week, but has been found later in
some people. People at risk of getting Zika include people that travel or live in an area where
Zika has been found and has been bit by a mosquito, and partners of men that have traveled to an
area with the Zika virus. In the next several months the countries with active cases is expected to
increase [9].
Complications such as Guillain-Barré syndrome, microcephaly, and maculopathy may
occur in infants [8]. In Brazil, the number of infants with microcephaly increased 20 times after
the start of the Zika virus epidemic. Fetuses and infants have also been found to have cerebral
calcification and retinal abnormalities such as macular pigment mottling, macular neuroretinal
atrophy, optic nerve hypoplasia, chorioretinal atrophy, and foveal reflex loss. Since this is the
first outbreak of Zika associated with these defects, management is still an important challenge.
There are three main ways to get Zika: (i) being bitten by an infected Aedes mosquito, (ii)
through sexual contact, and (iii) from mother to fetus [9]. The Aedes mosquito aggressively bites
during the daytime, but can also bite at night. Mosquitos get the virus by feeding on someone
with the virus and then spread it by feeding on other people. An infected mother can pass the
virus to a newborn during pregnancy. It has been shown that the virus can somehow cross the
placenta. As of yet, there is no evidence of a mother passing the virus to her newborn through
breastfeeding. There have been cases of an infected man spreading the virus to his partner during
intercourse. It has been found that the virus persists in semen longer than blood and that the virus
can be spread before, during, and after, the man has symptoms. There have been no confirmed
cases of someone in the US getting Zika after receiving a blood transfusion as of February, 1,
2016. However, there have been reports of people in Brazil getting Zika from a blood transfusion
[9].
A person is most likely protected from future infections once already infected [9]. There
is currently no medicine or vaccine to treat the Zika virus. Experts suggest rest, plenty of fluids,
and acetaminophen or paracetamol for fever and pain. They say to avoid aspirin and other non-
steroidal anti-inflammatory drugs until it is confirmed to be Zika and not Dengue. Sexual
transmission can be prevented by abstaining or using condoms. Infection by mosquito bite can be
prevented by wearing long-sleeved shirts and long pants, staying in places with air conditioning,
staying in places that have door and window screens, sleeping under a mosquito net, and using
insect repellants. People returning from places with Zika should prevent being bitten by a
mosquito for three weeks to prevent the spread of the virus to uninfected mosquitoes [9].
Related Works
A study about misinformation about Ebola on Twitter found that a lot of misinformation
about cures for Ebola was circulating around Twitter [10]. They found that 44% (248) of the
tweets about Ebola were retweeted at least once. Of those 248 tweets, 38.3% were scientifically
accurate while 58.9% were inaccurate. They also found that most of the tweets containing
misinformation were never corrected.
Alvaro et al. [11] used a Twitter streaming application program interface (API) to obtain
a random sample of tweets collected over a 12-month period about first-hand experience with
cognitive enhancers or selective serotonin reuptake inhibitors. Tweets were categorized by drug
and an upper bound of 300 tweets per drug was set to collect a balanced sample with a total of
1548 tweets actually used for the study. One hundred tweets were annotated and used as the
ground truth to evaluate other annotators from crowd sourcing. In order to verify agreement
between layman annotators and experienced annotators, Cohen's Kappa and Fleiss's Kappa were
computed for different questions such as whether the tweet is in English, whether the tweet
contains drug mention, etc. These scores are then ranked using Spearman's Rho and Kendall's
tau with values of 0.471 and 0.352 respectively. N-grams, hashtags, URLs, were extracted and
classifiers were built. Bayesian Generalized Linear Modeling was found to be the best technique
for interpretation of the data in this study.
One study sought to understand how people responded to the Ebola outbreak on social
media, what type of messages people post, what factors affect these reactions, and patterns
within these reactions [4]. At first 2 billion tweets were collected using the keyword 'Ebola'
from 90 different languages. After removing duplicates and the languages with less than 100
tweets, the final tweet count is 1,167,539 tweets from 35 languages, out of which 569,888 are
geotagged. For the non-geotagged tweets, users' profile locations on Twitter were used to get the
location information that was then analyzed. In order to investigate the spatio-temporal
properties about the information propagation from the central cities (the cities where the
outbreak is reported, in this case, New York and Dallas), they considered the tweets (46,598)
which are over 2 days from the starting day of the outbreak in these cities. Results also showed
that the first reported incident had more impact and received more attention than any other
showing that people pay more attention and react more since it is a new topic. Finally, it showed
the significance of social ties in propagating the information by analyzing how the Twitter
followers post/retweet based on their followee's tweets.
Another study used Twitter to track 300 million tweets about the spread of influenza from
November 2008 to June 2010 [12]. Tweets were annotated as being positive or negative by
annotators, with positive being tweets where the person with the flu tweeted or someone around
a person with the flu tweeted. All other tweets were considered negative. This positive and
negative annotations were considered their influenza corpus. Using a support vector machine
(SVM) based classifier, they eliminated tweets that did not actually mention flu patients based on
their developed influenza corpus. The tweets were divided into four seasons: winter 2008,
summer 2009, winter 2009, and summer 2010 for the test-set. Annotations and estimated values
were compared using the Pearson correlation. They found their method performed well during
non-news periods (0.89 correlation) but did not perform well during excessive news periods, like
during the H1N1 flu epidemic. While these different studies highlighted the utility of using
social media to monitor people's thoughts regarding a specific disease outbreak, they did not
explore the specific themes within a disease.
In this study we conduct an exploratory analysis of finding the subcategories of
discussion topics from Zika related tweets; specifically in four key characteristics of Zika:
symptoms, transmission, treatment, and prevention. Using the system described in Figure 1, we
address the following research questions:
R1: Dataset Distribution Analysis: What proportion of male and female users tweeted about
Zika, what were the polarities of the tweets by male and female users, and what were the
proportion of tweets that discussed topics related to the different disease characteristics -
symptoms, transmission, treatment, and prevention?
R2: Classification Performance Analysis: What was the agreement among the annotators who
labeled a sample of the data that was used as ground truth in this study, what was the
classification performance to detect the tweets relevant to Zika, and how well were the classifiers
able to detect between tweets on the different disease characteristics?
R3: Topical Analysis: What were the main discussion topics in each of these characteristics that
can further inform members at CDC on the biggest concerns or misconceptions regarding Zika
virus?
Methods
Data Collection
Tweets are collected between the time 2016-02-24 and 2016-04-27 for a total of
1,234,605 tweets using Twitris 2.0 [13]. The keywords used to collect the tweets were "Zika,"
"Zika virus," "Zika treatment," and "Zika virus treatment." One thousand four hundred and
sixty-seven random tweets were put in the following categories: relevant or non-relevant, and
then if they were relevant they were further categorized as symptoms, treatment, transmission,
and prevention. These four categories were used because they are characteristics of disease used
in any medical journal and by the CDC and WHO and are what is important for scientists and
medical professionals to know about a disease.
Labeling Process/ Data Annotation
One-thousand four hundred and sixty-seven tweets were annotated as relevant or not, and
then by the four subcategories if they were relevant, by three microbiology and immunology
experts. Inter-rater reliability was found using Fleiss Kappa [14].
Preprocessing
As the initial step, the data were further preprocessed to remove the URL, screen handles
(@username), retweet indicators, and non-ascii characters. Data were further normalized by
removing capital letters, numbers, punctuations and whitespaces from the tweets. Terms were
filtered out to remove single characters like 'd', 'e' which do not convey any meaning about the
topics in the corpus and top words like "and", "so", etc were removed For the classification
stage, each tweet is represented as a feature vector of the words present in the tweet using
unigrams.
Classification
Supervised classification techniques including the decision tree (J48), multinomial naive
bayes (MNB), Bayesian networks (Bayes Net), SMO (sequential minimal optimization) using
SVM, Adaboost, as well as bagging or bootstrapping (Bagging) techniques were implemented on
the Zika dataset for a) classifying relevant tweets on zika, and b) if relevant, further categorizing
it into the disease characteristics. Supervised techniques rely on labeled data, in this case tweets,
that are manually labeled as relevant to Zika virus, as well as the category it belongs to: Zika
symptoms, Zika treatment, Zika transmission, and Zika prevention. They "learn" the nature of
the tweets in the different groups and subgroups.
The performance of each classifier was assessed using 10-fold cross validation, which is
a commonly used method for the evaluation of classification algorithms that diminishes the bias
in the estimation of classifier performance [15]. This approach uses the entire dataset for both
training and testing, and is especially useful when the manually labeled data set is relatively
small. In 10 fold cross-validation, the manually labeled data set is randomly partitioned into 10
equal-sized subsets. The cross-validation process is then repeated 10 times (the folds). Each time,
a single subset is retained as the validation data for testing the model, and the remaining 9
subsamples are used as training data. The 10 results from the folds are then averaged to produce
a single estimation. The study reports the average of the precision, recall, F-scores, and area
under the curve (AUC) calculated by the system. Precision is defined as the number of correctly
classified positive examples divided by the number of examples labeled by the system as
positive. Recall, also referred to as sensitivity, is defined as the number of correctly classified
positive examples divided by the number of positive examples in the manually coded gold
standard data. An F-score is a combination (harmonic mean) of precision and recall measures
[15]. The area under the curve also evaluates the tradeoff between precision and recall using
different threshold values that affect the sensitivity as well as the specificity of the different
algorithms. For the ideal classifier the AUC value would be 1, and the AUC for a random
predictor would be 0.5, so most classifiers have a value between 0.5 and 1.
Topic Modeling
Studies such as Hong [16] have shown the utility of using traditional topic modeling
methods like LDA for grouping the themes occurring in short text documents. The basic idea in
LDA is that documents (tweets in this case) are represented as random mixtures over hidden
topics, where each topic is characterized by a distribution over words that occur the most
frequently within that topic [17]. As an example, if person A makes a decision to sit at a
particular table T at a conference, the probability of A sitting at T is proportional to the other
people sitting at T. Also, as more people join the conference, the probabilities for choosing tables
converge. In LDAs the people are the words, and the tables are the topics present in a given
dataset. In this study, we use topic modeling for finding the underlying topics in each of the four
disease characteristics to find out more about the important issues in each of these categories.
Results
Dataset Distribution (addressing R1):
Overall, 42% of tweets contained a retweet and 85% contained a URL. Tweets by gender
were found using the twitter usernames using the genderize API [18]. According to genderize,
twenty-eight percent of the tweets were by males, twenty-three percent by females and 41% were
by unknown gender.
[19] (Table 1).
Table 1. Polarity and proportion of tweets divided in the gender categories.
The polarity of the individual tweets were also found using the sentiment package in R
Category All tweets
Male tweets
Female tweets
Positive
313,742 (24%) 90,928 (26%)
70,171 (25%)
Negative 783,327 (59%) 220,359 (63%) 180,276 (63%)
Neutral
137,536 (10%) 40,166 (11%)
33,760 (12%)
The polarity of the tweets between males and females were similar. Although a majority
of the tweets are categorized as having negative polarity, the percent of positive tweets was
higher than expected. Some examples of tweets that were classified as positive were "Case
report: assoc btw #Zika/teratogenicity strengthened & evidence shows impact on fetus may take
time to manifest", "RT @NEJM: At recent int'l meeting about #Zika, experts exchanged insights,
identified knowledge gaps, and agreed on a plan", and "91,387 Cases of Zika Confirmed in
Brazil This Year: Brazil has confirmed 91,387 cases of…". Words such as "strengthened",
"agreed", "confirmed" may be why some tweets are being classified as positive.
There was a class imbalance in the categories. Since there is no treatment for Zika, not
many people tweeted about it. Transmission and prevention tweets were high since they were the
most talked about topics concerning Zika. Sample tweets from these different categories as
provided in Table 3.
s
t
e
e
w
T
f
o
#
120000
100000
80000
60000
40000
20000
0
Symptoms
Treatment
Transmission
Prevention
Disease Characteristic
Figure 2. Number of tweets in each disease categorization after running all tweets (1.2 million
tweets) through the best classification model.
Classification Performance (Addressing R2)
In the first stage of the categorization process for the ground truth tweets, tweets were
first classified as being relevant or not relevant to zika (Table 2).
Table 2. Sample tweets relevant and not relevant to zika.
Classification Sample Tweets
Relevant
I guess we can now add Zika to the list of STDs
Millions of GM mosquitoes to fight Zika virus in Caymans
Not Relevant After violent crime, shoddy construction and police brutality in Brazil, Zika
seems minor.
#MoreTrustedThanHillary going to Brazil during Zika virus season
Tweets that were relevant were then categorized as being about symptoms, treatment,
transmission, or prevention (Table 3).
Table 3. Sample tweets from the four categories of relevant tweets.
Classification Sample Tweets
Symptoms WHO sees scientific consensus on Zika virus as cause for disorders
Puerto Rico Reports First Zika-Related Death Amid Outbreak
Treatment
Healthcare providers: See CDC guidelines for caring for pregnant women w/
possible #Zika exposure.
Zika drug breakthrough may be the first step towards treatment.
Transmission Zika virus strain responsible for the outbreaks in Brazil has been detected in
Africa
Zika threatens TWO BILLION people across the world: New maps reveal
where virus is likely.
Prevention
#CDC officials say men who have the #Zika virus should wait 6 months
before trying to conceive. #health
Senate Nears Deal for at Least $1.1 Billion to Fight Zika Virus
One-thousand four hundred and sixty-seven tweets were manually labeled to train the
classifiers and evaluate their performance. Figure 2 provides the distribution of the relevant
tweets in the four categories. As seen from Figure 1, the distribution of the labeled gold standard
dataset was similar to the distribution of the large data corpus.
400
350
300
250
200
150
100
50
0
s
t
e
e
w
T
f
o
#
Symptoms
Treatment
Transmission
Prevention
Disease Characteristics
Figure 3. Number of tweets from the labeled dataset for each of the four categories of disease
characteristics.
Inter-rater Reliability
Fleiss's Kappa was calculated for each category to check inter-rater reliability between
three labelers with domain expertise in microbiology and immunology. Kappa values ranged
from 0.62 to 0.93 for both the relevancy and the four disease characteristics. This indicates
substantial to almost perfect agreement among the raters [20]. Once the inter-rater reliability was
found to be substantial, a model needed to be built based on the gold standard dataset.
Classification and Performance
The table below gives the performance of different classifiers on 1,467 preprocessed
Twitter data to find the relevancy of the tweet towards Zika (Table 4). Unigram features were
extracted from the texts using the Weka toolbox [21]. For this dataset, the classifiers perform
fairly well with AUC values ranging from 0.78 to 0.94. MNB outperforms other classifiers using
both the metrics F Measure (0.86) and AUC (0.94) (Table 4). MNB classifiers perform better for
data sets that have a large variance in document length (in this case, the length of the tweets) by
incorporating the evidence of each appearing word into its model [22].
Table 4. Different classifier performances for detecting relevant tweets using J48, MNB,
Bayesian networks (Bayes Net), SMO using SVM, as well as bagging or bootstrapping
(Bagging) techniques.
Classifier
TP
FP
Precision Recall F Measure AUC
J48
0.821 0.390 0.812
0.821 0.815
0.784
MNB (bayes) 0.880 0.368 0.881
0.880 0.868
0.943
Bayes Net
0.832 0.479 0.821
0.832 0.812
0.837
SMO
0.895 0.252 0.892
0.895 0.892
0.822
Bagging
0.857 0.411 0.852
0.857 0.843
0.877
The tables below detail the actual and predicted results of MNB using the confusion
matrix (Table 5). The class imbalance was affecting the classifier performance. Although the
AUC value was high (0.94), the classifier predicted a tweet was relevant more often than not
relevant since ~80% of the tweets belong to the relevant category. This also affected the false
positive rate which was much higher than the false negative rate as seen in Table 5.
Table 5. Confusion Matrix using the best classifier MNB.
Predicted
1 (relevant) 0 (Not)
Actual
1 (relevant) 1116
0 (Not)
155
21
175
The table below gives the performance of different classifiers on 1,135 preprocessed
twitter data to find the categorical classification (symptoms, treatment, transmission, and
prevention) of the tweets (Table 6). Again, the classifiers performed fairly well with AUC values
ranging from 0.83 to 0.94. With this dataset, MNB outperforms other classifiers again.
Table 6. Different classifier performances for detecting the four disease categories within the
relevant tweets using J48, MNB, Bayesian networks (Bayes Net), SMO using SVM, as well as
bagging or bootstrapping (Bagging) techniques.
Classifier
TP
FP
Precision Recall F Measure AUC
J48
0.694 0.122 0.702
0.694 0.695
0.838
MNB
0.784 0.084 0.787
0.784 0.785
0.940
Bayes Net
0.697 0.121 0.729
0.697 0.702
0.885
SMO (SVM) 0.775 0.088 0.780
0.775 0.777
0.877
Bagging
0.727 0.112 0.741
0.727 0.730
0.901
In order to further understand the best classifier's performance a confusion matrix was
created. The tables below detail the actual and predicted results using the MNB classifier (Table
7). Here, again the proportion of categories in the gold standard dataset affects the classifier
predictions. The treatment was predicted the least number of times (169 out of 1135). However,
the diagonal values (True positives) were higher than the misclassification values which accounts
for the high AUC value. That said, there was also a noticeable overlap between Transmission
and Prevention (42 tweets belonging to Prevention categorized as Transmission and 41 tweets
belonging to Transmission categorized as Prevention). The reason these overlap may be due to
the fact that the words mosquito and sex was used to describe how Zika is transmitted and how
to prevent transmission. Also, they are closely linked in that prevention cannot occur unless the
mode of transmission is known.
Table 7. Confusion Matrix using the best classifier MNB.
Predicted
Actual
Symptoms Treatment Transmission Prevention
Symptoms
205
Treatment
11
Transmission 20
Prevention
20
4
146
4
15
45
6
264
42
8
29
41
275
Based on the above results, the two-staged classifier system was able to have a high
precision, as well as a high recall performance in categorizing the tweets into relevant and not
relevant, and further classifying the tweets into the four disease categories. Once the
performance of the model based on the gold standard data set was confirmed to have high
precision and recall, the model needed to be tested on a new set of tweets.
Confusion Matrix Error Analysis
Similar to the study by Jiang [23], an error analysis was performed on the large test
dataset by randomly selecting 530 tweets, manually labeling them, and comparing the results
using the best performing MNB classifiers for identifying relevancy (Table 8), and then further
categorizing the relevant tweets into the four subcategories (Table 9). Reevaluating the
performance using the test set enables the unbiased assessment of the generalization error of the
final chosen model. Here, 530 tweets were further annotated and tested the MNB classifiers from
the earlier section. High precision and recall values were obtained for the relevance classifier
with Precision =0.99 and Recall =0.99. Hence, the F measure was also 0.99 (harmonic mean of
precision and recall). This high performance of the classifier indicates that the gold standard
dataset was a good representation of the distribution of the tweets in the large data corpus.
Moreover, the dataset was significantly less noisy when comparing the performance of these
models with other domain areas such as gender based violence [5], drug-related tweets [24] and
religion [25].
Table 8. Relevant tweet error analysis.
Annotator
Not-relevant
Relevant
MNB
Not-relevant
Relevant
23
7
30
Table 9. Disease characteristics error analysis results.
7
493
500
30
500
530
Annotator
Symptoms Treatment Transmission Prevention Total
Symptoms
88
MNB
Treatment
2
Transmission 13
Prevention
5
0
29
1
0
5
3
129
10
Total
108
30
147
1
6
25
152
184
94
40
168
167
469
Even though the classes were unbalanced, high precision and recall values were still
obtained (Table 10). An overall high F measure of 0.9 was obtained. This further indicated the
gold standard dataset was a good representation of the tweets, as well as the disease categories in
the larger corpus and that the dataset was not very noisy.
Table 10. Precision recall and F measure for each of the four disease characteristics.
Category Symptoms Treatment Transmission Prevention Average
precision 0.98
recall
0.81
0.97
0.97
0.86
0.88
0.94
0.83
0.94
0.87
F
0.89
0.97
0.87
0.88
0.90
The error analysis indicated that the classifiers performed well with the unseen test data
and were generalized enough to work with the large dataset. The dataset was further examined
with a focus on the insights provided in the disease categories. More specifically, the topics
discussed on Twitter in the symptoms category was examined to discover the latent semantic
topics discussed.
Topical Analysis (Addressing R3):
Topic Modeling
Below the results of LDA are discussed for each of the four disease characteristics
(Tables 13-14). Based on heuristical results, the number of topics was restricted to 5 while
discussing the topics for each category. Topic modeling results are shared here [26] for the
research community to examine the outcome of using topic modeling, as well as the overlap
among the topics generated. First the results for the three categories prevention, transmission and
treatment will be discussed. Then a more detailed analysis of the topic modeling results for the
symptoms category will be discussed along with the misinformation tweeted by users in that
domain.
Prevention, Transmission and Treatment
Table 11 provides the topics for the three categories along with the sample tweets in each
topic.
Prevention: Within the prevention topics, topic #1 was about the need to control/prevent
spread, topic #2 was about the need for money to combat mosquitoes and research treatments,
topic #3 was about ways to actually prevent spread, topic #4 was about the bill to get funds, and
topic #5 was research (Table 11). These topics were not surprising considering all the discussion
about how to prevent Zika, the need for funding to prevent Zika, and the research required to
find a cure for Zika since it is an emerging disease. There is also a need to better understand Zika
virus, the disease it causes, and ways to combat it [27].
Transmission: In transmission, there was a strong overlap in topics #1 (vector i.e.
mosquitoes for Zika) and #4 (disease spread) that highlight the overlap between the mosquito
spread, and the disease in general. Looking at the tweets, both highlight the concerns and risks
associated with zika spread. Another topic (#2) was sexual which is another mode of
transmission besides through mosquitoes. The next topic (#3) was infants, who are most affected
by this epidemic due to the risk of microcephaly. The final topic (#5) was sports since the tweets
were collected during baseball season just before the olympics and many athletes were
concerned about getting affected with Zika while competing in Rio, 2016.
Treatment: There was slight overlap between topics #1 (lack of treatment) and #3
(vaccine development) for treatment primarily due to the large co-occurrence of the word
vaccine in both these topics. Blood testing (#4) was another major topic since some people got
infected with Zika after receiving a blood transfusion. Since no treatment exists, a lot of research
is focused on developing a drug for Zika, which is why test development (#5) was the final topic.
Table 11. Prevention, transmission, and treatment topic modelling results.
Disease
Characteristic
Topic
Sample Tweets for each Topic
Prevention
(#1) Control
RT @DrFriedenCDC: A2. The best way to prevent
#Zika & other diseases spread by mosquitoes is to
protect yourself from mosquito bites. #Reut
(#2) Money
Need
#healthy Congress has not yet acted on Obama's $2
billion in emergency funding for Zika, submitted in
February
(#3) Prevention RT @bmj_latest: Couples at risk from exposure to Zika
virus should consider delaying pregnancy, says
@CDCgov
(#4) Bill
https://t.co/Ke12LOdypf Senate Approves $1.1 Billion
In Funding To Fight The Zika Virus #NYCnowApp
(#5) Research
Florida is among those at greatest risk for Zika.
@FLGovScott's sweeping abortion bill blocks scientists'
access to conduct research
Transmission
(#1) Vectors
(mosquitoes)
This map shows the Northeast is at risk for Zika
mosquitos this summer
(#2) Sexual
@user1 First Sexually Transmitted Case Of Zika Virus
In U.S. Confirmed
(#3) Infants
CDC reports 157 cases of U.S. pregnant women infected
with Zika virus.
(#4) Spread
Zika strain from Americas outbreak spreads in Africa for
first time: WHO (Update)
(#5) Sports
MLB moves games from Puerto Rico due to Zika
concerns....uh..what about the Olympics?? Can't be good.
Treatment
(#1) Lack of
Treatment
RT @DrFriedenCDC: Much is still unknown about
#Zika and there is no current medicine for treatment or
vaccine to prevent the virus.
(#2) Zika Test
Rapid Zika Test Is Introduced by Researchers The test,
done with a piece of paper that changes color if the virus
…
(#3) Vaccine
Development
Researchers discover structure of Zika virus, a key
discovery in development of antiviral treatments and
vaccines
(#4) Blood Test Experimental blood test for Zika screening approved
(#5) Test
Development
New mouse model leads way for #Zika drug, vaccine
tests
Symptoms: In the topic model results for symptoms, topics #1 (zika effects), #2 (brain
defects) and #4 (zika scarier than thought) were well separated while topics #3 (confirmation of
defects) and #5 (initial reports) overlap significantly (Figure 4 & Table 12). The topics are
described in Table 16. Topics #3 and #5 overlap for symptoms because a lot of the initial reports
were about health official confirming defects. Topic #3 was more about the defects that were
confirmed while topic #5 focused on where reports came from.
Figure 4. LDA of symptoms.
All three topics (#1, #3, #5) were closely related in that they are about the defects caused
by Zika, but point to slightly different concepts (Table 12). For example, microcephaly is not the
only defect, there is also Guillain-Barre which would be topic #1. Topic #2 focuses on
microcephaly because that was a major topic of discussion as seen in these tweets: "RT
@USATODAYhealth: Zika affects babies even in later stages of pregnancy. Microcephaly seen
in babies from moms infected in 6th month"and "Zika Virus May Cause Microcephaly by
Hijacking Human Immune MoleculeFetal brain model provides first clues on how Z…"Topic #3
contains tweets when the defects were confirmed to be caused by Zika and not something else:
"Zika linked to fetal brain damage: Finnish study: infectious Zika virus from fetal tissue in cell
culture.The virus", and "Enough conspiracy theories; nature is nasty enough: U.S. health
officials confirm Zika cause of severe birth defects".
Topic #4 for symptoms was primarily just people discussing a British Broadcasting
Corporation article [28] on how more birth defects have been linked to Zika and that the virus
was expected to travel further than initially thought, leading to experts saying Zika is scarier than
they first thought. The statement of Zika being "scarier than we first thought" by the CDC was a
big topic on twitter "CDC says zika virus scarier than thought as US prepares for outbreak: On
Monday, the U.S. Centers for Disease…", and this also affected the U.S political environment:
"#2016elections U.S. Officials Warn Zika Scarier Than Initially Thought: By Timothy Gardner
and Jeff Mason WA…", , This discussion lead to some more tweets about the danger of Zika
virus: "The Edge: Zika Is Now Even More Terrifying", "Zika virus 'shrinks brains' in tests", and
"#Zika Survivor Says 'I Could Feel My Skin Shrinking' CBS Boston". These tweets demonstrate
how a statement by the CDC can be spread and how users can tweak the wording of these CDC
statements to generate more concern than the actual impact of the disease. Finally, topic #5
includes tweets about initial reports of Zika outbreaks and deaths.
Misinformation: Within symptoms, several tweets in topic #1 were calling Zika a hoax,
"Zika HOAX exposed by South American doctors: Brain deformations caused by larvicide
chemical", "The Zika Virus is a hoax! It is like calling the common cold an epidemic. It's what
they put in the drinking water.", and "CDC likely fabricating link between Zika virus and
microcephaly cases". However the CDC has stated multiple times that Zika and microcephaly
are definitely linked "CDC: Zika definitely causes severe birth defects", and"Here's a #Zika
basic: Zika infection during pregnancy can cause some severe birth defects". Some of the people
saying Zika is a hoax are misunderstanding this quote from the CDC "People usually don't get
sick enough to go to the hospital, and they very rarely die of Zika. For this reason, many people
might not realize they have been infected. Once a person has been infected, he or she is likely
protected from future infections". This statement is true for the majority of healthy adults.
However, for infants it can cause microcephaly and in some cases Guillain-Barre syndrome in
healthy adults "Symptoms of Guillain-Barre syndrome include weaknesses in arms & legs. GBS
is linked w/ #Zika". There also has already been a couple of deaths due to Zika as was detailed in
topic #5 in the LDA. The CDC has also been directly answering people's questions about Zika
on twitter. One user tweeted at the CDC "Why is #Zika of particular concern to women who are
pregnant or considering becoming pregnant? #WellnessWed #ZikaVirus" to which the CDC
responded "Zika infection in pregnancy can cause microcephaly and other severe brain defects.
http://1.usa.gov/1Pf79sK #WellnessWed". This shows that while some misinformation is still
getting tweeted, the CDC is working to get the correct information out there. This is useful
because it shows the CDC could potentially target specific user groups directly through the topic
modelling approach, and respond to users within a topic group with a similar response that can
allow the information to spread to a larger population with relatively lesser effort.
Table 12. Symptoms topic modelling results.
Topic
Words
Tweets
(#1) Zika
Effects
(#2) Brain
Defects
infect, babies, mosquito,
cause, microcephaly,
symptom, pregnancy
RT @USATODAYhealth: Zika affects babies
even in later stages of pregnancy. Microcephaly
seen in babies from moms infected in 6th month
brain, link, studies,
microcephaly, baby,
disorder, cause, damage,
infect, fetal
'Zika Virus May Cause Microcephaly by
Hijacking Human Immune MoleculeFetal brain
model provides first clues on how Z…
(#3)
Confirmed
Defects
defect, cause, birth,
confirm, health, severe,
link, official
Enough conspiracy theories; nature is nasty
enough: U.S. health officials confirm Zika cause
of severe birth defects
(#4) Scarier
Than Thought
scarier, than, thought, us,
official, health, CDC,
warn, learn, first
(#5) Initial
Reports
first, report, death, case,
puerto, confirm, rico,
cause, colombia, defect
#breakingnews Zika Virus 'Scarier Than We
First Thought,' Warn US Health Officials
Colombia Reports First Cases of Microcephaly
Linked to Zika Virus - Sun Jan 09 15:13:20 EST
In this section, the topic modeling results generate insightful results that allow
researchers to understand the citizens' concerns, as well as the misinformation spread. According
to the theory of LDA, each topic represents certain common properties, which reflects the pattern
in the tweets. Finding out the exact meanings of the topics requires additional information and
domain knowledge. We see that for each of the disease characteristics, the discovered topics can
be easily interpreted by using some domain specific knowledge.
Discussion
Classification Analysis
One of the interesting findings of our analysis was the fact that the Multivariate Naive
Bayes classifier or the MNB outperformed the other more popular classifiers in text analytics:
random forest (J48) and SVM. According to one study [29], this has to do with the class
imbalance issue in our dataset: both for the relevancy case, as well as for the disease categories
case. This also highlights the possible orthogonality of the features used in our study: the
unigrams. Specifically in this dataset, measuring the likelihood of the features in a given class
independently outperforms other complex models such as J48 and SVM. This possibly also
relates to the fact that the data are less noisy since they have been evaluated by expert annotators.
Naive bayes is one of the simplest classification models available to us, but it is nonetheless
among the most effective for this dataset. This result is non-intuitive, but is not surprising when
we consider that using text for classification is relatively imprecise compared to other types of
data. In datasets with large amounts of error, simpler models are less likely to overfit the data.
Hence we recommend that future research on text analytics begin with Naive Bayes and then
proceed to using more complex models to see if these actually improve classification accuracy.
Annotation Observations
One major issue annotating tweets was what to do about news tweets like this one: "Your
Wednesday Briefing: Bernie Sanders, Hillary Clinton, Zika Virus: Here's what you need to know
to start …". The issue was that this does give information about Zika in that it tells what news
stations were talking about it and what else was going on at the same time as the Zika outbreak.
However, the tweet itself does not give any information about Zika symptoms, treatment,
transmission, and prevention. The researchers decided to code these tweets as relevant because
they were about Zika, but not include them in the disease characteristics annotations since they
do not have any information about Zikas disease characteristics. Sporting events in general were
also included because they could be sources of transmission from athletes and fans not taking
proper precautions.
Topic Modeling
example, control, money need, prevention, bill, and research were all major topics of prevention
discussions. This indicates the classification model accurately labelled tweets. It also indicates
tweets about major topics were collected and accurately reflected in our topic model. Also, while
all four disease characteristics are important, symptoms was discussed in detail because the
researchers felt it included the most important information for public health officials to know
especially once the misconceptions/ misinformation about Zika being a hoax was found.
Categorizing the symptoms into the different topics using topic modeling also allowed us to get
deeper into the themes within the symptoms category that can allow a more targeted interaction
with agencies like CDC and specific users to provide interventions for misinformation spread.
Limitations
All of the topics under the different disease characteristics fit the characteristic. For
While we have clearly provided an exploratory framework in mining the different
characteristics of Zika, we point out the limitations we face in our dataset, and the use of social
media.
Language constraint: We have restricted our study to English language tweets that
certainly limit the strength of our study. This is more critical to address given that South
American countries were initially affected by Zika. This also restricts our analysis of measuring
disease outbreak which is why we refrained from doing so in our study.
Keyword constraint: As described in the Data collection section, we used the keywords
Zika, Zika virus, Zika treatment, and Zika virus treatment in our study. One interesting
observation here is that although the keyword "treatment" was part of the crawling process, the
treatment subcategory was still the smallest class in the distribution of the dataset (see Figures 2
and 3). Clearly, this certainly affected our dataset. This also would overlook tweets that referred
to the disease in a different name or talked about the disease without using the word Zika.
Gender & Polarity constraint: Only 49% were labeled by the gender API using the
profile name (Table 1). Similarly, around 10% of the tweets were not labeled on their polarity.
This needs to be addressed moving forward with this study by creating a customized gender
recognition tool using machine learning specifically for twitter data.
Conclusion and Future Work
This is one of the first studies to report successful creation of an automated content
classification tool to analyze Zika–related tweets; specifically in the area of epidemiology. Such
a system will help advance the field's technological and methodological capabilities to harness
social media sources for disease surveillance research. Future studies will include creating an
automated technique to detect misinformation using tweets to allow for well-targeted, timely
interventions. Such a platform will generate data on emerging temporal trends for more timely
interventions and policy responses to misinformation on Zika studies leveraging information
sources including blogs, news articles, as well as social media data.
Acknowledgements
We would like to thank Dr. Rua, Scott Holdgreve, Ryan, Becker, Amber Todd, and Sampath
Gogineni for their help.
Abbreviations
LDA: Latent dirichlet allocation
CDC: Center for Disease Control
WHO: World Health Organization
GBS: Guillain-Barre syndrome
DC: Disease classifier
RC: Relevancy classifier
API: Application program interface
SVM: Support vector machine
J48: Decision tree
MNB: Multinomial naive bayes
SMO: Sequential minimal optimization
AUC: Area under the curve
Works Cited
1. Nanlong, MT. 2014. Nigeria: Ebola - Two die after drinking salt water in Jos. Vanguard.
http://www.webcitation.org/6mhjzekwJ
2. Centers for Disease Control and Prevention (CDC). 2016. Transcript for CDC telebriefing:
Zika summit press conference. Retrieved from: http://www.webcitation.org/6mhnFbn5e
3. Berg, N. 2013. How citizens have become sensors. Retrieved from:
http://www.webcitation.org/6mhnJVcJ8
4. Tran, T, & Lee, K. Understanding citizen reactions and Ebola-related information
propagation on social media. Presented at: International Conference on Advances in Social
Networks Analysis and Mining; 2016; Retrieved from:
http://www.webcitation.org/6mhnQkdoi
5. Purohit, H, Banerjee, T, Hampton, A, Shalin, VL, Bhandutia, N, & Sheth. AP. Gender-based
violence in 140 characters or fewer: a #BigData case study of Twitter. First Monday 2016; 21(1).
6. Paul, MJ, & Dredze, M. You are what you Tweet: Analyzing Twitter for public health.
Presented at: ICWSM; 2011;20:265-272.
7. Bhattacharya, S, Tran, H, & Srinivasan, P. Discovering Health Beliefs in Twitter. Presented
at: AAAI-2012 Fall Symposium on Information Retrieval and Knowledge Discovery in
Biomedical Text 2012. Washington, DC.
8. Wong, SS, Poon, RW, & Wong, SC. Zika virus infection-the next wave after Dengue?
Journal of the Formosan Medical Association 2016;115(4):226-242.
9. Center for Disease Control (CDC). 2016. Zika Virus. Retrieved from:
http://www.webcitation.org/6mhnTZk4b
10. Oyeyemi, SO, Gabarron, E, Wynn, R. Ebola, Twitter, and misinformation: a
dangerous combination? BMJ 2014;349. doi: http://dx.doi.org/10.1136/bmj.g6178
11. Alvaro, N, Conway, M, Doan, S, Lofi, C, Overington, J, & Collier, N. Crowdsourcing
Twitter annotations to identify first-hand experiences of prescription drug use. Journal of
Biomedical Informatics 2015;58:280-287.
12. Aramaki, E, Maskawa, S, & Morita, M. Twitter catches the flu: Detecting influenza
epidemics using Twitter. Presented at: 2011 Conference on Empirical Methods in Natural
Language Processing; 2011; 1568-1576.
13. Jadhav, A, Purohit, H, Kapanipathi, P, Ananthram, P, Ranabahu, A, Nguyen, V, Mendes, P,
Smith, AG, Cooney, M, & Sheth, A. Twitris 2.0: Semantically empowered system for
understanding perceptions from social data. Presented at: Semantic Web Application Challenge
at ISWC 2010; Shanghai, China.
14. McHugh, ML. Interrater reliability: the kappa statistic. Lessons in Biostatistics
2012;22(3):276-282.
15. Hastie, T, Tibshirani, R, & Friedman, J. The elements of statistical learning: Data mining,
inference, and prediction. New York: Springer; 2009.
16. Hong, L, & Davison, BD. Empirical study of topic modeling in twitter. Presented at:
Proceedings of the first workshop on social media analytics; 2010; 80-88.
17. Blei, DM, Ng, AY, & Jordan, MI. Latent dirichlet allocation. The Journal of Machine
Learning Research 2003;3:993–1022.
18. http://www.webcitation.org/6mhnfgwtR
19. http://www.webcitation.org/6mhnirAFy
20. Landis, JR, & Koch, GG. The measurement of observer agreement for categorical data.
Biometrics 1977;33(1):159–174.
21. Frank, E., Hall, M. A., & Witten I. H. 2016. The WEKA Workbench. Online Appendix for
"Data mining: Practical machine learning tools and techniques", Morgan Kaufmann, Fourth
Edition.
22. McCallum, A, & Nigam, K. A comparison of event models for naive bayes test
classification. Presented at: AAAI-98 workshop on learning for text categorization 1998;752:41-
48.
23. Jiang, L, Yu, M, Zhou, M, Liu, X, & Zhao, T. (2011). Target-dependent twitter sentiment
classification. Presented at: Proceedings of the 49th Annual Meeting of the Association for
Computational Linguistics: Human Language Technologies;1:151-160.
24. Daniulaityte, R, Chen, L, Lamy, FR, Carlson, RG, Thirunarayan, K, & Sheth, A. "When
'bad' is 'good'": Identifying personal communication and sentiment in drug-related tweets.
JMIR Public Health Surveillance 2016;2(2):162.
25. Chen, L, Weber, I, & Okulicz-Kozaryn, A. U.S. Religious landscape on Twitter. Presented
at: Proceedings of the 6th International Conference on Social Informatics 2014.
26. http://www.webcitation.org/6mhnmw2I3
27. National Institute of Allergy and Infectious Disease (NIAID). Zika virus. Retrieved from:
http://www.webcitation.org/6mhnqsP3D
28. British Broadcasting Corporation (BBC). 2016. Zika virus 'scarier than thought' says US.
Retrieved from: http://www.webcitation.org/6mhp7CZwI
29. Frank, E, and Bouckaert, R. Naive bayes for text classification with unbalanced classes.
Presented at: Proceedings of PKDD 2006;503–510.
|
1801.01239 | 2 | 1801 | 2018-08-20T04:51:24 | How to Beat Science and Influence People: Policy Makers and Propaganda in Epistemic Networks | [
"cs.SI",
"physics.soc-ph"
] | In their recent book Merchants of Doubt [New York:Bloomsbury 2010], Naomi Oreskes and Erik Conway describe the "tobacco strategy", which was used by the tobacco industry to influence policy makers regarding the health risks of tobacco products. The strategy involved two parts, consisting of (1) promoting and sharing independent research supporting the industry's preferred position and (2) funding additional research, but selectively publishing the results. We introduce a model of the Tobacco Strategy, and use it to argue that both prongs of the strategy can be extremely effective--even when policy makers rationally update on all evidence available to them. As we elaborate, this model helps illustrate the conditions under which the Tobacco Strategy is particularly successful. In addition, we show how journalists engaged in "fair" reporting can inadvertently mimic the effects of industry on public belief. | cs.SI | cs |
How to Beat Science and Influence People:
Policy Makers and Propaganda in Epistemic Networks
James Owen Weatherall, Cailin O'Connor
Department of Logic and Philosophy of Science
University of California, Irvine
Justin P. Bruner
Department of Theoretical Philosophy
University of Groningen
Abstract
In their recent book Merchants of Doubt [New York:Bloomsbury 2010], Naomi Oreskes and
Erik Conway describe the "tobacco strategy", which was used by the tobacco industry to
influence policy makers regarding the health risks of tobacco products. The strategy involved
two parts, consisting of (1) promoting and sharing independent research supporting the
industry's preferred position and (2) funding additional research, but selectively publishing
the results. We introduce a model of the Tobacco Strategy, and use it to argue that both
prongs of the strategy can be extremely effective -- even when policy makers rationally update
on all evidence available to them. As we elaborate, this model helps illustrate the conditions
under which the Tobacco Strategy is particularly successful.
In addition, we show how
journalists engaged in 'fair' reporting can inadvertently mimic the effects of industry on
public belief.
1. Introduction
In December 1952, Readers Digest -- the publication with the largest circulation in the world
at the time -- published an article with the title "Cancer by the Carton" (Norr [1952]).1
Coming on the heels of a period during which smoking rates had risen significantly, the
article brought the growing body of evidence that cigarette smoking caused cancer to the
attention of a wide audience. Six months later, a group of doctors at Sloan-Kettering
Memorial Hospital completed a study in which they demonstrated that mice painted with
Email addresses: [email protected] (James Owen Weatherall), [email protected] (Cailin O'Connor),
[email protected] (Justin P. Bruner)
1The history presented in these opening paragraphs draws heavily on the account given by Oreskes and
Conway [2010, Ch. 1]. Note that the chronology we describe differs slightly from theirs, as they report
that the Reader's Digest article was published in the wake of the 1953 Wynder article, whereas in fact it
appeared almost a year earlier. See also the discussion in O'Connor and Weatherall [2019].
Draft of August 21, 2018
PLEASE CITE THE PUBLISHED VERSION IF AVAILABLE!
cigarette tar developed malignant carcinomas (Wynder et al. [1953]). To a public already
primed by the Reader's Digest article, this paper provided a direct and visceral link between
a known by-product of smoking and fatal cancer. It produced a media frenzy, with articles
reporting the result in a number of national newspapers and magazines.
The tobacco industry panicked. The heads of six major U.S. tobacco companies con-
tracted with the New York public relations firm Hill and Knowlton to combat claims that
their product had serious adverse health effects. At a meeting in December of 1953, they
agreed on a novel strategy: they would fight science with science. In 1954 they hired a promi-
nent geneticist, C. C. Little, to run the newly create Tobacco Industry Research Committee
(TIRC). The goal of this committee was ostensibly to support and promote research on the
health effects of tobacco. But in fact, it was a propaganda machine whose principal activity
was to find, fund, and promote scientific research that contradicted the growing consensus
that smoking kills. The goal was to create a false sense of uncertainty and controversy, so
as to delay policy change in the service of public health.
As historians Oreskes and Conway [2010] painstakingly document, drawing on documents
released as part of a series of lawsuits in the 1990s, the tobacco industry initiated this
strategy -- which Oreskes and Conway dub the "Tobacco Strategy" -- despite the fact that
their own internal research had already established a link between smoking and various
health risks.2 The Tobacco Strategy had multiple parts. One part, which we will call selective
sharing, consisted of identifying and promoting research produced independently of industry
that happened to support the industry's preferred position. For instance, in 1954 the TIRC
distributed a pamphlet entitled "A Scientific Perspective on the Cigarette Controversy" to
nearly 200,000 doctors, journalists, and policy-makers, in which they emphasized favorable
research and questioned results supporting the contrary view. A second part of the Tobacco
Strategy, which we will call biased production, consisted of funding their own research, either
through in-house scientists or by offering research grants to scientists pursuing research
activities that the industry supported, and then publishing the results of that research only
if it supported industry views.
Oreskes and Conway [2010] make a compelling case both that the Tobacco Strategy was
self-consciously adopted by industry to influence public opinion, and that those goals were
apparently achieved. They also argue that the Tobacco Strategy succeeded, in the sense
of playing a causal role in realizing these ends. But the historical analysis they provide is
necessarily in situ, and the details are complex. It is difficult to clearly distinguish the causal
role played by the TIRC's activities from other cultural and psychological considerations
that may have influenced public opinion and slowed policy-change, such as the facts that
smoking was culturally ingrained, including among doctors and legislators, and that the
tobacco industry made significant political contributions. One might worry that it was over-
determined that cultural and political change regarding tobacco would be slow, so that it is
not clear that the Tobacco Strategy played a significant role.
In this paper, we attempt to strengthen the causal link between the Tobacco Strategy and
public opinion by proposing and analyzing an agent-based model of the Tobacco Strategy.
2For other discussions of this strategy, see for instance Michaels and Monforton [2005]; Michaels [2008].
2
Our model is based on the network epistemology framework introduced by Bala and Goyal
[1998], later adapted to philosophy of science by Zollman [2007], and used more recently
by Holman and Bruner [2015, 2017] to study industry effects on science.3 This approach
allows us to test counterfactual effects of industry propaganda on public belief, free from
compounding factors.4 As we will argue, our model provides evidence that the Tobacco
Strategy can, in principle, be very effective. We also provide important insight into how
(and when) it works. As we will argue, the Tobacco Strategy trades on the fact that
empirical research into difficult, probabilistic problems will yield results that, individually,
support more than one position. It is only by viewing a maximal, unbiased sample of the
output of a research community that one can hope to come to hold reliable beliefs about the
problem at hand. This means that even subtle manipulations, not in the scientific record
itself, but in the sample of that record that one is exposed to, can have disproportionate
impact on one's beliefs5.
An important take-away from these arguments is that what may seem like weak or
subtle interventions are often most effective for the would-be propagandist. In particular,
outright scientific fraud -- intentional publication of incorrect, fabricated, or purposely mis-
leading results -- is not only unnecessary to influence public opinion on topics of scientific
inquiry, it is also riskier and often less effective than other forms of manipulation. Biased
production, which does not involve fabricating results, is a successful strategy for mislead-
ing the public. And in many cases, biased production is itself less effective than selective
sharing -- even though it involves more direct and explicit interventions on the production of
science. These observations support claims by Holman and Bruner [2017] that more subtle
industry influences -- like their "industrial selection", which we will discuss at length in the
conclusion of this paper -- can be very effective. In fact, as we will also argue in what follows,
even interventions with no malicious intent, such as those of journalists who aim to be "fair"
in their reporting on controversial science, can unwittingly mimic the effects of an active
propagandist.
Before proceeding, we wish to emphasize what is at stake in this discussion. Recognizing
how the Tobacco Strategy works is essential for understanding the relationship between
science, public policy, and democracy. There is now a large literature in philosophy of science
3Similar methods are used by O'Connor and Weatherall [2019], O'Connor and Weatherall [2017], and
Weatherall and O'Connor [2018] to discuss the propagation of false beliefs in social networks more generally.
4 To be clear, we take this ability to intervene in our model to be the key aspect that helps us strengthen
the causal link between the Tobacco Strategy and public policy related to tobacco products. The model
allows us to test where and how the presence of a propagandist can influence public belief. It also lets us
explore the effects of a propagandist in isolation from other potential causal factors. That said, we do not
claim that the factors we consider here are the only relevant causal factors, nor that other models could
not be used to identify other counterfactual relationships and possible causal factors. For more on the
interventionist account of causation that is lurking in the background here, see Woodward [2003]; see also
note 8 for more on the relationship between the model we discuss and "how-possibly" modeling.
5This conclusion is in line with prior work in social epistemology exploring how subjects come to form
incorrect beliefs on the basis of selective reporting (for an overview, see Romero [2016]). We demonstrate how
the public can be systematically mislead even in those circumstances where all experiments are published
and scientists exhibit no bias in favor of industry.
3
on what it means for science to be suitably "democratic," in the sense of reflecting the needs
and values of the members of a society affected by scientific results.6 This literature focuses
on how democratic ideals should shape scientific research. But the other direction, of how to
best understand the role that scientific knowledge plays in democratic institutions, is equally
important -- and requires us to reckon with the fact that there are powerful political and
economic interests that wish to manipulate and interfere with the distribution of scientific
knowledge. Understanding the mechanisms by which public understanding of science can fail
is crucial to developing institutions and interventions which might be effective in defanging
the Tobacco Strategy, and, in the case of 'fair' reporting, improving journalistic practice to
protect public belief.
The remainder of the paper will be structured as follows. In the next section we will
introduce the model we consider in the paper. Sections 3 and 4 will present results concerning
selective sharing and biased production, respectively. Section 5 will describe results from
a slightly modified model in which we consider ways in which journalistic practice with no
malicious intent can simulate the actions of a propagandist. We will conclude with some
reflections on the results, including a discussion of possible interventions.
2. Epistemic Network Models
Bala and Goyal [1998] introduce a model where individuals in a community try to choose
which of two theories, or practices, is the better one. In order to decide, they make use
evidence from two sources. First, each individual tests the theory they favor, and second,
they share their results with those in their social network. Over time, they update their
beliefs about the theories based on this evidence, until, in many cases, the whole group comes
to believe that one or the other is better. Zollman [2007, 2010] shows how simulations of
this model can be applied to understand scientific discovery and consensus. Under his
interpretation, each individual in the model is a scientist testing a hypothesis. For instance,
suppose a new treatment for cancer is introduced. How do researchers go about deciding
whether to adopt the new treatment or stick with the old one?
The model starts with a network, defined by a set of scientists and a set of fixed links
representing pathways of communication between them. Inquiry is modeled using what is
called a two-armed bandit problem. Each scientist is aware that there are two actions they
can perform. Action A is well understood, and is known to be successful 50% of the time.
Action B, on the other hand, is less well understood, and the agents are uncertain whether
it is more or less successful than A. In particular, the instantiation of the model we use here
assumes that B is a bit better than A, so that its chance of success is pB = .5+.7 Scientists,
however, do not know whether it is a bit better, or a bit worse (success rate .5−). Their aim
is then to discover which of these possibilities is the better one, and so adopt the superior
6See, for instance, Longino [1990, 2002], Kitcher [2003, 2011], Douglas [2009], Elliott [2011], and references
therein.
7The payoff of success for both actions is the same, and failure yields no payoff, so action B has a strictly
higher expected payoff.
4
action. In what follows, we will refer to "theory A" as the view that action A is preferable,
and "theory B" as the view that action B is preferable.
At the beginning of a simulation, scientists are given random credences about which
theory is better, represented by numbers between 0 and 1. (For example, a scientist with
credence .7 believes there is a 70% chance that theory B is right.) Each round, scientists
apply their preferred theory to the world. Agents with a credence < .5 believe that theory
A is probably correct and employ it. Agents with credence > .5, on the other hand, use
theory B. This might correspond to doctors who approve of a new treatment deciding to try
it on patients, while others stick with a more conservative approach.
In each round, scientists observe how their choices worked, and change their beliefs in
light of new evidence. In particular, it is assumed that they test their theory some number
of times, n. They then update their credence using Bayes' rule based on what they, and
all their network neighbors, have observed. Simulations stop when either all agents believe
in theory A -- and so do not learn anything new about theory B -- or when all agents have
reached some certainty threshold (say .99 credence) that B is correct, and so are exceedingly
unlikely to end up changing their minds. Both outcomes occur in simulations. Sometimes
initial beliefs and/or strings of data supporting theory A are enough to create a mistaken
consensus around the worse theory, and sometimes the community gets enough good data
to settle on the better one.
As noted in the introduction, we are particularly interested in the role of industry, and
propagandists in general, in shaping policy based on science, and in influencing popular
belief. For this reason, our models follow the framework developed by Bala and Goyal
[1998] and Zollman [2007], but with a few, key alterations. First, we introduce a new set of
agents, which we will call policy makers. These agents have beliefs, and update these in light
of evidence, but do not gather evidence themselves. Each one listens to some, or all, of the
scientists in the network, but does not influence them or anyone else. We assume that at the
beginning of each simulation, policy makers are skeptical about the new, uncertain theory,
in the sense that their initial credences are sampled from a uniform distribution supported
on the interval (0, .5).
We also introduce one further agent that we call the propagandist. This agent observes
all the scientists, and communicates with all the policy makers. Their goal is to convince
the policy makers to prefer the worse theory A, by sharing evidence that suggests action A
is preferable to action B. We consider two treatments, corresponding to different strategies
by which the propagandist may do this. The idea is to represent an individual, or set of
individuals, who are motivated to use all their resources to publicize data that is ultimately
misinformation. The actions of the propagandist capture various aspects of the Tobacco
Strategy: by sharing a biased sample of evidence with policy makers (and the public) they
seek to divide public opinion from scientific consensus.8
8 It is common in discussions of idealized models of epistemic communities -- and philosophical discussion
of modeling in the social sciences generally -- to suppose that such models provide, at best, "how-possibly"
information about a target phenomenon. (See Frey and Seselja [2018] for a discussion of this view.) We
wish to explicitly reject this attitude, at least with regard to the inferences we draw from the present
5
3. Selective Sharing
In the first treatment, which we call selective sharing, the propagandist adopts the following
strategy: in each round of the simulation, they search the network of scientists for results
that tend to favor theory A, and then they share only those results with the policy makers.
The policy makers then update their credence in light of both the evidence they receive from
the scientists to whom they are connected and the evidence received from the propagandist,
which includes a subset of the results produced by the scientists.9 In other words, each policy
maker receives, and updates on, a biased sample of evidence including a disproportionate
number of results favoring theory A. However, all of the results the policy makers receive are
"real" in the sense that they are produced by members of the scientific community, without
bias or influence by the propagandist or anyone else. In addition, the propagandist does
nothing to influence the scientific community; they only seek to shape policy maker beliefs.10
We analyze this model by varying parameter values including the number of scientists
in the network, K, the number of draws each round, n, the probability that action B is
successful, pB = .5 + , and the number of scientists each policy maker listens to, k.11 (Each
policy maker could connect to one scientist, or to two, or to three, etc.) We consider models
where the network of scientists is either a cycle, where each scientist is connected to two
peers in a ring structure, or a complete network, where every scientist communicates with
every other. Figure 1 shows these two structures. They differ in that it will tend to take
longer for the cycle to converge to a consensus, especially for large communities, because
fewer scientists share data with each other. This network structure affects our results, as
we will make clear, mainly by influencing the amount of time it takes the communities of
scientists to reach consensus. All reported results were averaged over 1k runs of simulation
model. On our view, there is ample and convincing historical evidence that the tobacco industry has
intervened to influence public beliefs using strategies very similar to the ones discussed here. The present
model supplements this historical evidence by allowing us to ask counterfactual questions concerning how
precisely this kind of intervention works. For this reason, we adopt the position that our model provides
"how-potentially" information concerning the causal role of this sort of intervention. What we mean by
this is that the model is realistic enough to explore processes that have the potential to really occur. In
this sense, we take this model to lie somewhere on a spectrum between "how-possibly" and "how-actually"
(i.e., fully realistic) models. Exploring how-potentially models can direct further inquiry into whether at
these processes are really at play, or (as in this case) supplement existing empirical work on these processes
(Rosenstock et al. [2017]). See also 4. We are grateful to an anonymous referee for pressing us to clarify
our stance on these issues, and for emphasizing that these models lie on a spectrum (a point with which we
agree).
9As we discuss below, this model involves some double-counting of results favorable to theory A, as a
given policy maker may receive the same evidence from both a scientist and from the propagandist.
10In this way, the model we consider differs significantly from that of Holman and Bruner [2015], who
consider an industry scientist who influences other scientific beliefs. We will return to this relationship in the
next section, as the treatment discussed there is somewhat closer to that discussed by Holman and Bruner.
11We consider subsets of the following parameter values: population size K = 4, 6, 10, 20, 50, number of
draws n = 1, 2, 5, 10, 20, 50, 100, 500, 1000, success of better theory pB = .51, .55, .575, .6, .7, and number of
scientists listened to by each policy maker ranges from 1 to all of them. Our choices were influenced, to
some degree, by tractability considerations; simulations with low pB and many scientists, in particular, took
longer to run.
6
that terminated when either correct or incorrect consensus was reached.12
Figure 1: Cycle and complete network structures.
We find that the presence of a single propagandist who communicates only actual findings
of (ideal, unbiased) epistemically motivated scientists can have a startling influence on the
beliefs of policy makers. No one in this scenario is doing bad science. No one is falsifying
data, or even publishing it selectively. The propagandist communicates only real scientific
findings. Nonetheless, under many scenarios we find that while the community of scientists
converges on true beliefs about the world, the policy makers reach near certainty in the false
belief. This point will become clearer as we share results in this section and the next -- for
a wide range of parameter values, public belief is highly accurate when no propagandist is
at play, but as inaccurate as it could possibly be under the influence of the propagandist.
We find that the likelihood of this sort of disagreement between science and public belief
depends on features of the community and the problem studied. First, unsurprisingly, when
policy makers listen to more scientists they are harder to deceive. Figure 2 shows the
average credence that policy makers have in the correct theory at the point where scientists
reach a correct consensus, which we understand as a state in which all members of the
scientific community have credence greater than .99. The x-axis tracks the proportion of
scientists in the entire community that each policy maker consults. As we can see, without
a propagandist, public beliefs lag behind scientific beliefs slightly, though the more scientists
are consulted, the better the public does. With a propagandist, the public is convinced that
the false theory is preferable, though if they are connected to more scientists, this effect is
ameliorated.13 In related work, Holman and Bruner [2015] model the effects of industrial
propagandists who share biased data with scientists and observe that it is best for scientists
to be highly connected to each other in such cases.14
12We ignore outcomes where scientists do not converge to the correct belief. (In these cases, policy makers
also tend to accept the worse theory.) This means that our results are averaged over fewer than 1k rounds.
In the worst case scenario, though, this only meant ignoring 10% of data points.
13These results are a cycle network with K = 20, n = 10, and pB = .55. This trend occurred across all
parameter values, as did the other trends reported unless otherwise specified.
14This shows how the suggestion from Zollman [2007, 2010] that less connected scientific communities are
more successful at reaching the truth does not hold when industry attempts to sway consensus.
7
Figure 2: Policy maker beliefs as influenced by their connections to scientists.
It is also harder to deceive policy makers when the size of the effect -- i.e., the difference
in expected payoff between action A and B -- is larger. As pB (the probability that the bet-
ter action pays off) increases, so that the difference between the better and worse theories
is more stark, the policy makers are more likely to learn the truth. This is because there
are fewer studies that happen to support the worse theory, and thus less material for the
propagandist to publicize. Figure 3 shows how as the difference between the success rates of
the two theories increases, policy makers tend to end up holding the true belief regardless of
propaganda.15 This observation is especially relevant to the biomedical sciences, because hu-
man bodies are highly variable, which means that data is often highly equivocal. We should
expect studies of human subjects to provide plenty of material for potential propagandists
looking to obscure true evidential trends.
The number of draws each round, n, also has a strong effect on the ability of the propa-
gandist to mislead. This parameter may be thought of as the sample size for each experiment
performed by the scientists. For fixed pB (i.e., fixed effect size), it is roughly analogous to
the statistical power of each scientist's experiments: the higher it is, the less likely that a
study will erroneously support theory A.16 Thus scientists who run the equivalent of well-
15Results are for K = 20 scientists in a cycle, each policy maker listening to 50% of scientists (k = 10),
and n = 10. Again the trend is stable across parameter values.
16More precisely, if we take the null hypothesis to be that that PB < PA, and the alternative hypothesis to
be that PB > PA, then for virtually any hypothesis test one considers, if we fix the effect size, = PB − .5,
increasing n will increase statistical power in the sense that it will increase the probability that the false null
hypothesis is rejected in favor of the true alternative hypothesis. Of course, our agents are Bayesians, and
so frequentist notions such as power are not strictly relevant -- the agents update their beliefs in light of any
and all evidence that they receive. Still, thinking of n as roughly tracking power is useful, here, because it
gives an intuitive sense of why small n studies are generally better for the propagandist.
8
Figure 3: Policy maker beliefs as influenced by the difficulty of the scientific problem.
powered studies and produce fewer spurious results also produce less for the propagandist
to work with. Figure 4 shows the final average beliefs of policy makers with and without a
propagandist as n increases.17 Note that the x-axis is on a log scale to make the trend more
visible. For high enough n, the propagandist can do almost nothing since they very rarely
have the spurious results necessary to mislead the public.
In these cases, policy makers
figure out the truth despite the propagandist's efforts.18
One might think that increasing the number of scientists in a network, K, holding all
else fixed, would decrease the effectiveness of the propagandist. More scientists means more
data, and more epistemically motivated minds searching for truth. But this does not occur
in general in these models. Assume that policy makers listen to some fixed number of
scientists, k. This is not an unreasonable assumption given limits on the amount of time
and energy policy makers or the public devote to science. In such cases, as the total number
of scientists increases, there is no benefit to policy makers, since they continue to listen to k
scientists. On the other hand, the increased number of scientists increases the total number
of spurious results that the propagandist can then share with policy makers, often worsening
policy maker belief.19 In the next section, we will engage in some further discussion of the
17This figure is for K = 10 scientists in a complete network, each policy maker listening to 90% of
scientists, and pB = .55.
18In an interesting connection, Holman and Bruner [2015] find that when a propagandist shares biased
data with scientists, and when these scientists are able to ignore data that is statistically unlikely given their
credences, scientists do better when n is large. This is for a different reason than we describe. When n is
large in their models, it is easier to detect a propagandist and ignore them. If n is small, more results are
statistically likely given some agent's credence.
19This is not always the case since as we outline in the Appendix the size of the community also influences
the speed of convergence to scientific consensus, which can influence policy maker beliefs.
9
Figure 4: Policy maker beliefs as influenced by the amount of data gathered by scientists.
effects that the size of the scientific community has on policy maker beliefs.
The final consideration that influences the success of the propagandist has to do with how
much time it takes for the scientific community to converge to consensus. The convergence
time depends on various factors. For instance, the size of a network generally influences
how long it takes for all scientists to reach agreement. (In a sparsely connected network,
more scientists means a longer time until each one is convinced.) In addition, as mentioned
above, for fixed population size the cycle and complete network arrangements differ in that
cycle networks take longer to converge. This is because scientists listen to fewer of their
colleagues, meaning that disagreements will tend to persist as actors in different parts of the
network gather different sorts of data.
Previous results from Zollman [2007, 2010] have shown that in many cases factors that
slow convergence can be beneficial for an epistemic community. These factors lead to tran-
sient diversity of opinion, which is important for preventing scientists from settling too
quickly on a theory that might be wrong. Heavily connected communities, on the other
hand, are easily swayed by strings of misleading evidence that are widely shared.20 But
our results show that other considerations can complicate this issue. When industrial actors
have a stake in a community's findings, taking a long time to settle on consensus can provide
more opportunity for the propagandist to find and promote results that went the wrong way
under conditions where spurious results are likely.
To try and better understand the relationship between time to convergence of the sci-
entific network and the effectiveness of the propagandist, we derive semi-analytic results
20Rosenstock et al. [2017] show that this will only occur for the region of parameter space in which the
problem of selecting the better theory is hard (due to there being fewer scientists, less difference between
theories, or lower n).
10
predicting expected outcomes in this model. In general, we can think of each policy maker's
belief as influenced by two separate factors. One comes from the community of scientists,
which, on average, will tend to pull credences in theory B up. The other comes from the
propagandist and will tend to pull credence in theory B down.
In other words, a policy
maker's belief in round t + 1 of simulation on average can be represented by:
B(t+1) = YP × YS × Bt,
where Bt is their prior belief, and YP and YS represent the average effects of the propagandist
and scientists. In the appendix, we derive expressions for these quantities and show that it
will always be the case that YP < 1 and YS > 1.
We can thus think of the dynamics in this model as a sort of tug of war between science
and industry over public belief. In general, for any set of parameter values in our model,
and some state of scientist/policy maker beliefs, one side will be winning because either
YP × YS < 1 or YP × YS > 1.21 This means that when the propagandist is winning on
average, they do better during long periods of scientific debate. In such cases, policy makers
do better when scientists quickly reach consensus. Conversely, when the YP × YS > 1
more evidence will tend to to lead the policy makers towards the true belief -- with the
propagandist's main effect being to slow this progress.22
For an example of the effects of time to convergence on belief, consider figure 5, which
shows the beliefs of policy makers consulting cycle and complete networks. We show results
in a scenario that favors true belief -- pB = .7 and n = 20 -- and also one that disfavors it --
pB = .55 and n = 5. In the first case, the slower cycle network gives policy makers time to
learn the correct theory from scientists, while relatively unencumbered by the propagandist.
In the second case, the faster complete network gives the propagandist less time to share
spurious data, and so is better for policy makers.
To be clear, if we look again at the simulation results we have presented, we can observe
that, since policy makers, on average, start simulation at credence .25, any outcome where
their final beliefs are < .25 is one where the propagandist is pulling harder than the scientists,
and vice versa. If we imagined that the process kept going -- scientists kept performing action
B, and the propagandist kept publicizing spurious results -- we would expect policy makers
to become completely convinced in either A or B eventually, with the relative values of YS
and YP determining which one. But the community can end up at a better or worse state
depending how quickly this happens. The most important take-away here is that there are
reasons to think that a long argumentative process between scientists might actually be
a bad thing when public belief is on the line. Thus we find a curious trade-off with the
Zollman effect: at least in some cases, maximizing convergence time is truth conducive for
the scientists, but not for the public.
21The situation in which the two influences exactly cancel is a knife's edge case.
22One interesting observation is that the size of the scientific network, besides influencing time to conver-
gence, also influences the rate at which policy makers change their beliefs. Adding more scientists increases
the total amount of data both coming directly from scientists and coming from the propagandist. When
the scientists are winning the tug of war, this increase benefits the policy makers. When the propagandist
is winning, this simply increases the rate at which policy makers decrease their credence in PB.
11
Figure 5: Influence of scientific network structure on policy maker beliefs.
In the next section, we will move on to discuss the second part of the Tobacco Strategy --
where industry funds their own scientists and disseminates the resulting research. Before
doing so, we mention a few potential concerns about the models just discussed, and robust-
ness checks meant to alleviate those concerns. First, as noted above, data in our model can
be "double counted" in the sense that a policy maker might update their belief on data from
a scientist and then update on the same evidence as it comes from the propagandist. We
take this to be a feature, rather than a bug, because it captures how the prevalence and
repetition of evidence can increase its impact. Nonetheless, we also ran the same simulations
where data could not be double counted this way. Results were qualitatively similar, though
the strength of the propagandist was diminished, particularly for policy makers connected to
many scientists. We also varied the pattern with which policy makers connected to scientists
to ensure that this did not have a significant effect on the results.
4. Biased Production
As mentioned in the introduction, another part of the Tobacco Strategy involved producing
industry-funded data that could be used to counter the research coming from the scientific
community.23 Our second treatment concerns this aspect of the strategy. To model this, we
23There is a close connection here to the work of Holman and Bruner [2015], who consider biased agents
in a scientific community. Like our "biased production" propagandist, their "intransigently biased agent"
(IBA) produces and shares evidence that tends to favor the wrong theory. However, in their case the IBA
draws from a biased arm relative to the other scientists in the community, whereas, as we describe, our
propagandist performs the same actions as the scientists but selectively publishes results. In addition, they
focus on the effect an IBA might have on beliefs within a scientific community, showing how industry can
shape scientific consensus itself, rather than public belief in particular.
12
now assume that the propagandist has their own resources that they can allocate towards
gathering data about the uncertain theory B. After gathering this data, the propagandist
then shares only those studies that spuriously indicated that theory A was the better one.
Notice that we do not allow the propagandist to do 'bad science' in the sense of falsifying
data, or to use biased methodologies. Their data gathering process is, in fact, identical
to scientists attempting to find the truth. The only intervention we allow on the scientific
process is one that is currently widely practiced (and not always considered particularly
unethical): selectively choosing not to publish some results.
We varied several new parameter values in this treatment. First, we varied the total
amount of resources available to the propagandist. (Think of this as the total number of
pulls from a bandit arm the propagandist can perform.) We also varied how the propagandist
chose to divide up these resources into studies. Did they run many low powered studies, or
just a few high powered ones?24
In this scenario, holding other parameters fixed, more scientists are unequivocally ben-
eficial to policy makers' beliefs. Scientists no longer unintentionally provide grist for the
propagandist, and, instead, produce and publicize data that is more likely to point in the
right direction.
It is also consistently better, as in the last section, for policy makers to
consult more scientists. The more data they receive from epistemically motivated actors,
the less the impact of the propagandists' spurious studies on their beliefs. And, again, the
better the successful theory, the lower the chance that the propagandist generates enough
spurious results to influence policy makers.
Unsurprisingly, more resources are better for the propagandist. If they have the where-
withal to run more studies, they have a greater chance of generating results supporting
theory A. Suppose each scientist has the resources to collect 10 data points per trial. As-
sume that the propagandist runs trials of the same size, but can run a different number of
these depending on their level of resources. As figure 6 shows, as this number increases, the
likelihood that the policy makers believe the correct theory goes down.25
Suppose that we hold fixed the resources a propagandist has at their disposal. The last
question we ask is: given this, what is the best way for the propagandist to allocate these
resources to different studies? The answer is that it is always better for them to break
their data up into the smallest possible chunks. Suppose the propagandist has resources
to collect 1000 data points. In the most extreme case, we could imagine a scenario where
the propagandist runs 1000 studies with one draw each. They could then report only those
where action B failed (on average this would be (.5−)∗1000 data points), making it look to
policy makers as if action B was never successful in these experiments. At the other extreme,
the propagandist would run a single experiment with 1000 data points. The chances that
24We ran simulations for a subset of the following parameter values: population size = 4, 6, 10, 20, number
of draws n = 1, 2, 10, 25, 50, 100, success of better theory pB = .55, .6, .7., and number of scientists consulted,
k, ranged from 1 to all of them. Propagandist total resources varied from equal to that of one scientist, to
equal to those of the whole scientific community. Propagandist n ranged between 1 and their total possible
pulls.
25These results are for 10 scientists, n = 10 for scientists, pB = .55, and policy makers listening to half of
scientists.
13
Figure 6: Propagandists with more resources are better able to mislead policy makers.
this experiment would support the better theory B are quite high, leaving the propagandist
with nothing to disseminate. In general, the propagandist should choose the smallest n they
can get away with.
Figure 7 shows this effect. For propagandists with resources to gather 50 data points,
If
the smaller the studies they run, the worse the eventual beliefs of the policy makers.
propagandists run a few, good studies, they are unable to mislead anyone.26
This observation actually has an analog in the previous set of results on propagandists
who selectively share others' data rather than gathering their own. In that model, given a set
of available resources for a community, it is better to use these to run fewer, better studies
than to run many less well-powered ones. We can observe this by comparing how policy
makers do given communities that have a finite amount of resources distributed differently.
Figure 8 demonstrates this. The scientific network, in this figure, has the resources to gather
a total of 100 data points each round. This is divided up by the number of scientists involved
in exploring the phenomenon so that, for example, 10 scientists gather 10 data points each
or two scientists gather 50 data points each. Without a propagandist policy makers develop
successful beliefs regardless of how resources are allocated. As the individual studies get
smaller, though, the propagandist is increasingly able to take advantage of the stochasticity
involved in gathering data to forward their agenda. Small studies mean confused policy
makers.
26These results are for 10 scientists, n = 10 (for scientists), policy makers listening to all scientists, and
pB = .55.
14
Figure 7: Propagandists who use their resources to perform small studies are better at misleading policy
makers.
5. Journalists as Unwitting Propagandists
In the two treatments we have discussed so far, the propagandist has adopted strategies
intended to influence the policy makers' beliefs. In both cases, we found that the propagan-
dist can succeed, at least under some circumstances. The basic mechanism at work in both
strategies is that the propagandist endeavors to bias the total body of evidence that the
policy makers see. They do not do this through fraud, or even by sampling from a different
distribution than the other scientists (as in Holman and Bruner [2015]). Instead, they do it
by choosing results so that the total evidence available, even though it was all drawn from
a fixed distribution, does not reflect the statistics of that distribution. What these results
show is that in many cases, particularly when evidence is relatively difficult to get or equiv-
ocal, it is essential that policy makers (and the public) have access to a complete, unbiased
sampling of studies. This suggests that curation, or even partial reporting, of evidence can
lead to epistemically poor results.
But propagandists are not the only agents who regularly curate scientific results. Non-
malicious actors can also play this role. For instance, journalists often select scientific studies
to feature in articles. Few journalists are experts in the relevant science, and in any case, the
goal is rarely to give a uniform and even-handed characterization of all available evidence.
To the contrary, journalistic practices often encourage, or even require, journalists to share
either only the most striking, surprising, or novel studies; or else, when they choose to
share a study on a controversial topic, to endeavor to be "fair" by sharing research that
supports both sides.
Indeed, the U.S. Federal Communications Commission (FCC) had
an official policy, from 1949 to 1987, that required broadcast news to present controversial
In practice, this meant giving roughly
topics of public interest in a "balanced" manner.
15
Figure 8: Policy makers do better when fixed resources are allocated to a few, good studies rather than
many with small samples.
equal time to multiple perspectives. The policy was known as the "Fairness Doctrine".
Oreskes and Conway [2010] argue that this Doctrine became a tool of the tobacco industry's
propagandists, who used it to insist that pro-industry science get publicized.
To study the effects of the Fairness Doctrine, we consider the following modification of
the models we have considered thus far.27 The network structures remain the same, but
in place of the propagandist, we have a "journalist", who like the propagandist can see all
of the scientists' results and can communicate with all of the policy makers. In this case,
we suppose that the policy makers receive all of their information from the journalist, and
consider different ways in which the journalist might share that data.
Suppose, for instance, that the journalist -- abiding by the Fairness Doctrine -- shares two
results from the network of scientists each round, one of which supports theory B, and one of
which supports theory A. More precisely: we suppose that each round, the journalist chooses
randomly among all of the results that support theory A and all that support theory B. In
rounds where no results support one of the two theories, the journalist shares the result they
shared the previous round (capturing the idea that sometimes journalists need to search past
data to find something to adequately represent the "other side"), unless there has never been
a result favoring a given theory, in which case the journalist shares only one result. What
we find is that this addition artificially slows the policy-makers' acceptance of theory B.
27We also considered a version of the model in which the journalist only published results that were
sufficiently "surprising" in the sense that the journalist judged them to have had a low probability of
occurring. For some parameter values, this sort of journalistic practice led policy makers to accept the
wrong theory. But we deemed the results to be ambiguous, because they depended sensitively on the value
of n chosen.
16
To show this, it is most informative to compare the policy makers' beliefs under the
action of this journalist (Fair) with what one would find if (a) the journalist shared two
randomly selected pieces of data each round (Random) and (b) the journalist simply shared
all available evidence each round (All). We find that (on average across runs) the Fairness
Doctrine never improves the epistemic performance of the policy makers, and for many
parameter values, policy makers receiving evidence from a journalist abiding by the Fairness
Doctrine end up with beliefs substantially less accurate than under conditions (a) or (b).
In all cases we consider, the policy makers' beliefs still tend towards the truth (whenever
the scientists' beliefs do), but they do so much more slowly.28 In this sense, then, the "fair"
journalist mimics the propagandist under the conditions where they are losing the tug-of-war
for policy makers' beliefs, but nonetheless slow the policy makers' progress.
Figure 9 shows average policy maker beliefs when scientists reach consensus on the true
belief for complete networks under different parameter values.29 Data points are for simula-
tions where journalists share Fair, Random, or All data as described above. The trend line
shows the average beliefs across parameters under each condition. As is evident, when jour-
nalists share all the data, policy maker beliefs are very accurate. With less data available --
two random sets of data -- their convergence to true beliefs is slowed. Under fair reporting,
policy makers converge to true beliefs much more slowly, since they see a result that supports
theory A every time they see a result supporting B. The strength of this effect is dependent
on parameter values, but, as mentioned, fair reporting only worsens, and never improves,
policy maker beliefs in comparison to reporting randomly or reporting all data.
Journalists are not the only actors who perform data curation. University faculty, when
teaching courses, may endeavor to give a panoptic and even-handed view of a field, but they
will not be able to share all available relevant data with a class. Literature reviews and
survey articles also curate data, commenting on its quality and selecting what seems most
relevant or significant. The mechanisms by which researchers and university instructors
select material to present are arguably motivated by epistemic considerations -- they seek
to give a compact overview that supports the views they believe are best supported, given
the total evidence that they have seen -- but it is hard to see how they can do this without
using their own beliefs -- which may be influenced by various factors -- to guide the choices.
And so, it is not clear that even this sort of curation is certain to accurately track the
statistics of the total available evidence. In this way, even independent researchers, in their
teaching and writing, can unwittingly act as propagandists. In addition, it has been widely
observed that scientists regularly fail to publish negative or null results. This 'file drawer'
effect biases the pool of evidence available to the entire community, and has already been
28When policy makers see one result supporting B and one supporting A each round, on average the result
supporting B is still stronger since this is in fact the better arm. So they learn the truth eventually.
29We chose a representative set of data points including all combinations of K = 6, 10, 20, pB = .55, .6, .7,
and n = 5, 10, 20. As in the previous models, initial policy maker beliefs were skeptical. Complete networks
demonstrated the effect more strongly because cycle networks are slow to converge and thus there is more
time for policy makers to learn true beliefs even under 'fair' reporting. But even with cycle networks the
effects of fair reporting were always neutral or negative.
17
Figure 9: 'Fair' reporting slows policy makers from reaching accurate beliefs.
shown to potentially have negative effects on scientific beliefs (Romero [2016]).30
6. Conclusion
We have now considered two aspects of the Tobacco Strategy as described by Oreskes and
Conway. We take the results we have presented to provide strong evidence that the Tobacco
Strategy can work, in the sense that biasing the total evidence presented to a group of agents
can lead those agents to converge to the incorrect belief. Of course, modeling alone cannot
establish that this did happen in the case of tobacco industry propaganda efforts. But when
you combine the modeling results we have presented with the careful historical analysis and
arguments offered by Oreskes and Conway [2010], there are strong reasons to believe that
the Tobacco Strategy was an important causal factor in the long delay between when a
link between cigarettes and cancer was established by the medical research community, and
large-scale changes in regulation and public attitudes. Moreover, we take it that if these
strategies have succeed in the past, they are very likely to succeed now and in the future.31
30See also Ioannidis [2005].
31Returning one more to the themes of notes 4 and 8: we emphasize that, at very least, these models
provide "how-possibly" information: the processes we decribe with these models can possibly occur. Fur-
thermore, as we argue here, the theoretical and historical knowledge developed by Oreskes and Conway
increases our confidence that these processes have been important ones in the real world. As noted, we
cannot be sure that this is the case. But we do not take this to be a special problem for models of this sort.
With almost any sort of scientific exploration, including experimental and other empirical work, conclusions
are drawn from data via theoretically supported inference. (See Longino and Doell [1983] for more on this
point.) In this case, we draw (conservative) inferences based on a combination of modeling and historical
work.
18
What is perhaps most interesting about the results we have presented is not that they
show what can work, but rather the insight they provide into how those strategies work.
As we have emphasized above, in our discussion on unwitting propagandists, the basic
mechanism at play in our models is that the propagandist biases the total evidence on
which the policy-makers update their beliefs. The fact that each result that is shared is, in
some sense, "real" ends up being irrelevant, because it is the statistical properties of the total
available evidence that matter. For this reason, we see that producing results favorable to
industry -- say, through industry funding -- is not necessary to manufacture favorable public
beliefs, at least in cases where the evidence is probabilistic and spurious results are possible.
On this point: one might have expected that actually producing biased science would
have a stronger influence on public opinion than merely sharing others' results. But when
one compares the two treatments we consider above, there are strong senses in which the less
invasive, more subtle strategy of selective sharing is more effective than biased production,
all things considered, particularly when the scientific community is large and the problem
at hand is difficult (or the power of generic experiments is low). The reason is that such a
scientific community will produce, on its own, plenty of research that, taken without proper
context, lends credence to falsehoods. Merely sharing this already-available evidence is cost-
effective, and much less risky than producing one's own research -- which, after all, can cost
a great deal to produce, fail to generate the desired results, and ultimately be disqualified
or ignored because of the association with industry. From this point of view, producing
industry science (or even outright fraud) is simply not worth it. In many cases, another
more effective, less expensive, and more difficult to detect strategy is available.
Indeed, if industrial interests do wish to spend their money on science, perhaps rather
than producing their own results and publishing them selectively, they would do better to
adopt a different strategy, which Holman and Bruner [2017] have called "industrial selec-
tion". The idea behind industrial selection is that there are many experimental protocols,
methodologies, and even research questions that scientists may adopt, often for their own
reasons. Some protocols may tend to produce more industry-friendly results than others.32
Industrial selection involves identifying methods already present among the community of
scientists that tend to favor one's preferred outcome, and then funding scientists who al-
ready use those methods. This extra funding works to amplify these scientists' results, by
allowing them to publish more, perform higher powered studies, and train more students
who will go on to produce consonant results. Indeed, there is a strong potential feedback
effect between industrial selection and selective sharing: by increasing the number of am-
bient industry-favorable results in a scientific literature, and then further amplifying those
results by sharing them selectively, propagandists can have an even stronger effect.
It is worth emphasizing that industrial selection does not require some scientists to have
adopted bad or unreliable research methods; it may also just be that they have focused on
32Holman and Bruner [2017] consider, for instance, the case of a class of drugs intended to stop heart
failure (Moore [1995]). In that case, studies that used reducing arrhythmia as a proxy for preventing heart
failure found that the drugs were highly successful, whereas studies that directly measured death rates from
heart failure later showed that the drugs were substantially increasing the likelihood of death.
Industry
swayed scientific practice by funding the former type of study, but not the latter.
19
research topics that promote an industrial agenda. For instance, Oreskes and Conway [2010,
p. 17] describe how the Tobacco Industry Research Council supported the work of noted
asbestos researcher Wilhelm C. Hueper of the National Cancer Institute. Hueper's research
was not methodologically flawed; to the contrary, it very convincingly established the (real)
link between lung cancer and asbestos. But for the tobacco industry, it was valuable to have
evidence that other environmental factors played a role in lung cancer, since that could be
used to obfuscate the role their own product played. Taken together, then, selective sharing
and industrial selection suggest those interested in dampening industry influence should
turn their attention to the more subtle ways propagandists can come to bias epistemic
communities. This will to a certain extent require philosophers of science to reorient their
focus, as extant work tends to address explicit, direct ways industry can impact inquiry.
It is natural to ask, given the past success of the Tobacco Strategy and the results we
have described, whether there are ways in which policy makers or members of the public
can protect themselves against a propagandist using the methods described. Of course,
one natural suggestion is to stop listening to propagandists. But this is difficult to do, in
large part because propagandists pose as (or, in some cases, are) credentialed scientists.33
Another possibility, perhaps more realistic, is to gather evidence from as many scientists as
possible: as we discuss above, policy makers connected to more scientists tend to do better,
because the propagandist has to produce more evidence to effectively influence such policy
makers' beliefs.34 Connecting to many scientists may also allow policy makers to to identify
propagandists on statistical grounds:
indeed, as Holman and Bruner [2015] point out, in
some cases it may be possible to identify biased agents by comparing the statistics of their
results with those of other agents in their network. Finally, and along similar lines, it might
also be possible, at least in some circumstances, for policy makers to adjust their updating
rule to accommodate the possibility that some of the evidence they receive is exaggerated,
filtered, or otherwise intended to mislead.35 On the other hand, as O'Connor and Weatherall
[2017] show, some apparently reasonable heuristics for updating belief in light of unreliable
sources can lead to bad epistemic outcomes, including stable polarization. We think that
it would be valuable, in future work, to study how these latter two reactions might be
implemented, and how and when they would be effective.
We will conclude by noting a few ways in which the incentive structure of science con-
tributes to the success of the would-be propagandist, particularly when employing the se-
lective sharing strategy. As we noted above, selective sharing is most effective when (a) the
problem is difficult (in the sense that pB is close to .5); (b) the number of data points per
scientist per round is small; (c) there are many scientists working on a given problem; and
33Indeed, perhaps the most striking message of Oreskes and Conway [2010] is that the most effective
propagandists have been prestigious scientists, often coming from different fields, with a political ax to
grind.
34We note that connecting to more scientists was particularly effective in the selective sharing treatment
when "double-counting" was eliminated, suggesting that policy makers would do well to attend to cases
where a small number of studies are used repeatedly to prove a point, when other studies are also available.
35We are grateful to David Manheim [2018] for emphasizing this latter possibility, which is also quite close
to what Holman and Bruner [2015] propose.
20
(d) policy makers are connected to few scientists. This situation interacts with how scien-
tists are rewarded for their work in complex, troubling ways.36 For instance, although there
are some incentives for scientists to make their work accessible and to try to communicate
it with the public and policy makers, it continues to be the case that academic scientists are
evaluated on the basis of their research productivity -- and there are sometimes reputational
hazards associated with "popularizing" too much. This sort of effect can limit the number
of scientists to whom policy makers are connected.
But a more troubling way in which propaganda and incentives intersect concerns the role
of low-powered studies. Scientists are strongly encouraged to publish research articles, and to
do so often. Moreover, publishing positive results is strongly preferred to null results. Finally,
scientists work with limited funds that they must use to meet many demands. All of these
considerations lead to strong incentives to run studies with relatively low power (particularly,
fewer data points) whenever possible (Smaldino and McElreath [2016]).37 Of course, most
scientific fields recognize that, all else being equal, higher powered studies are more rigorous,
more reliable, and make for all-around better science. But there is little incentive, and
often few resources, for individual scientists to produce consistently high quality studies.
And as we have seen, low powered studies are more likely to spuriously support erroneous
conclusions. In cases where industry is not involved, this is not as worrying: spurious results
can be detected via meta-analysis. But in the presence of a propagandist, they become a
powerful tool in shaping public belief.
Discussions of low-powered science often focus on their role in controversies about par-
ticular results, in the context of the so-called "replication crisis" in the behavioral sciences
(and especially psychology) (Open Science Collaboration [2015]). And the regular publica-
tion and acceptance of ultimately incorrect results is certainly worrying. But the arguments
and results we have given here suggest that even more is at stake: the same sorts of con-
ditions that led to a replication crisis in the first place also provide extra fodder for indus-
trial propaganda. This makes reshaping scientists' incentives to publish many, low-powered
"least-publishable units" crucial to foiling propagandists. For instance, scientists should be
granted more credit for statistically stronger results -- even in cases where they happen to be
null. Scientists should not be judged on the number of publications they produce, but on the
quality of the research in those articles, so that a single publication with a very high powered
study, even if it shows a null result, should be "worth" more than many articles showing
surprising and sexy results, but with low power. Similar reasoning suggests that, given some
fixed financial resources, funding bodies should allocate those resources to a few very high-
36Previous authors have assumed that scientists are motivated by a quest for credit, in the same way
'Credit economy' models have been used, for example, to show why
normal people seek money or goods.
scientists might divide labor (Kitcher [1990]) or commit fraud (Bright [2017]).
37The ubiquity of low-powered studies in some fields, such as neuroscience (Button et al. [2013]; Szucs
and Ioannidis [2017]), ecology (Lemoine et al. [2016]), and evolutionary biology (Hersch and Phillips [2004]),
for instance, has been remarked upon and widely discussed within those fields. Smaldino and McElreath
[2016] perform a meta-analysis of work in the behavioral sciences over the last 60 years and argue that
despite repeated calls to increase power, little change has occurred. In addition, they show why scientific
communities might move towards producing low quality, low effort studies.
21
powered studies, rather than splitting it up into many small grants with only enough funding
to run lower-powered studies. Or a more democratic alternative might involve scientists who
work together to generate and combine smaller studies before publishing, making it more
difficult for the propagandist to break off individual, spurious results.
Appendix A. Semi-analytic results
Here we describe a semi-analytic treatment of the expected progress of the models presented
in section 3.
Consider a population of K scientists each performing n trials each round, solving a
problem with pB = .5 + . Consider a policy maker connected to k scientists, with credence
Bt at time t in the true proposition that arm B is advantageous. This observer will update
her beliefs by conditionalization in light of two sources of evidence, from the scientists she
is connected to and from the propagandist. Thus, at the end of the round, we will have:
B(t+1) = YP × YS × Bt,
(A.1)
where YS represents the contribution from scientists and Yp represents the contribution from
the propagandist. What are these contributions on average?
In a generic round of play, the average result for each scientist performing the informative
action should be E = n∗pB, i.e., the expectation value for n draws from a binomial distribu-
tion with probability pB. We estimate Ys by supposing that the policy maker receives, from
each scientist performing action B that they are connected to, the average (i.e., expected)
result, and update. This yields:
(cid:18) P (n ∗ (.5 + )H)
P (n ∗ (.5 + ))
(cid:19)r∗k
YS =
(A.2)
where r ≤ 1 is the fraction of scientists in the population performing the informative action,
so r ∗ k ≤ k approximates the number of scientists connected to the observer who are
performing the informative action. Here H is the policy maker's hypothesis about the
success rate of arm B. When multiplied by the current belief, Bt, as in equation A.1, this
is just Bayes rule for the expected evidence. Notice that this equation does not account for
the fact that B will change as an agent updates on different sets of evidence within a time
step. We should think of this approximation as most useful for cases where B is changing
slowly.
One can show by direct computation that YS reduces to:
(cid:18)
YS =
1
(cid:19)r∗k
where
X =
Bt + (1 − Bt)X
(cid:18)1 − 2
(cid:19)2n
,
(A.3)
.
1 + 2
22
Observe that X < 1, and so for any value of Bt, YS > 1.
It follows that updating on
evidence from the scientists will, on average, increase credence that arm B is preferable.
Moreover, one can see that as n and each increase, X will decrease, and thus YS will
increase. Likewise, YS will increase as r, the number of scientists testing the preferred arm,
increases, and as k, the number of scientists a policy maker listens to, increases. Of course,
in the actual model stochastic effects can defeat this; we are describing average behavior.
Note that as Bt decreases, YS also becomes larger, so as observers become more skeptical,
evidence from scientists will become more powerful. Importantly this means that a set of
parameter values alone will not determine the average behavior of the model: the belief
state of a policy maker Bt and the belief states of the scientists, as represented by r, will
influence which way policy maker beliefs trend.
Now consider YP . Here we consider all (and only) spurious results produced by the
population of scientists each round. First, observe that we can calculate a rate at which
these will occur if all scientists perform the informative action, given by z = P (x < n/2)×K,
where x is the number of times arm B pays off. This expression is just the probability of
getting a spurious result -- one that suggests PB < .5 -- times the number of scientists in the
population. For instance, for even n, we have:
P (x < n/2) =
n!
i!(n − i)!
(PB)i(1 − PB)n−i
(A.4)
This is the sum of the probabilities of drawing each possible x < n/2 from a binomial
distribution with n draws and PB.
We can also calculate an expectation value for such spurious draws, E, which is given
by (again for even n):
E =
1
P (x < n/2)
n/2−1(cid:88)
i=0
in!
i!(n − i)!
(PB)i(1 − PB)n−i
(A.5)
This equation multiplies the value of each possible spurious draw, i, by the probability
of that draw, conditional on the assumption that the draw will be spurious.
This leads to an estimate for YP of:
YP =
Bt + (1 − Bt) X
,
(A.6)
where now
X =
Once again, r is the fraction of the population of scientists performing the informative action,
while z, remember, is the rate of spurious results. Observe that, by definition E < n/2, and
so whatever else is the case (2 E − n) < 1, so X > 1, which means YP is always less than 1.
Hence the propagandist will always tend to decrease the observer's confidence in the true
23
n/2−1(cid:88)
i=0
(cid:18)
(cid:19)r∗z
(cid:19)2 E−n
1
(cid:18)1 − 2
1 + 2
proposition, and this effect will be stronger when more scientists take the informative action
and the rate of spurious results is higher (more on this shortly).
Beyond these observations, it is harder to analyze the dependence of YP on other pa-
rameters, on account of the complexity of the function E. An analytic simplification of
the expression for E is apparently not available, but a numerical analysis reveals that for
small , E is very well approximated for sufficiently large n by a linear function in n, of
the form E = −.62 + 0.47n. (This expression is determined by taking a linear best fit in
Mathematica.) Thus we have:
(cid:18)1 − 2
(cid:19)−.06n−1.24
X =
1 + 2
(A.7)
We see that as becomes larger, X becomes smaller (i.e., approaches 1), and thus YP ap-
proaches 1, so that the propagandist is less effective. Notice though that as n increases in
this equation, X becomes larger, thus YP gets smaller, so the propagandist gets more effec-
tive. Thus n influences YP in two, countervailing ways. A large n makes z, the probability
of a spurious result, smaller. On the other hand, when spurious results do occur, they are
In addition, X tends to grow slowly in n and whether the
more convincing for large n.
propagandist ends up swaying the observer depends on the relative scaling of YP and YS
with n, which in turn depends on . We also have that, as Bt approaches 1, YP approaches
1, so that the propagandist becomes less effective. (Thus, both the propagandist and the
scientists are more effective when policy makers have low credence in arm B.)
A final consideration concerns z, the rate of spurious results. Clearly as z increases,
the propagandist becomes more effective. This will happen as K, the number of scientists,
increases. (Though if policy makers listen to all the scientists, k will increase as K does,
strengthening YS as well.) The rate z will also increase as r, the fraction of scientists
performing the informative action, increases, though an increase in r will increase both YS
and YP . There is also a dependence in z on P (x < n/2).
It is difficult to get a good
first order approximation for this function, but by studying plots one can characterize some
qualitative features. In general, for fixed n, increasing decreases P (x < n/2), and thus
decreases z, making the propagandist less successful.
For sufficiently large n, we find that as n increases, P (x < n/2) decreases, again making
the propagandist less effective. This is what one would expect: the probability of spurious
results decreases as n increases. But what is surprising is that for small n, there is a regime
in which increasing n actually increases P (x < n/2). For sufficiently large (say > .1 or so),
this regime is a small part of n-space. But for small (say, ≈ .001), P (x < n/2) actually
increases with n for all values of n that we study. So increasing n under these circumstances
makes the propagandist more effective. Again, an increase in n also makes scientists more
effective, so the overall influence of n will depend on whether it increases YP or YS to a
greater degree.
24
Acknowledgments
This material is based upon work supported by the National Science Foundation under
grant number 1535139 (O'Connor). The majority of the work on this project was completed
while O'Connor and Weatherall were Visiting Fellows at the Australian National University;
we are grateful to the Research School for Social Science and the School of Philosophy for
support. We are also grateful to audiences at the ANU, University of Groningen, UC Irvine,
UC Merced, UC San Diego, and the 2018 PPE Society Meeting for helpful feedback on talks
related to this work, and to Jeff Barrett, Craig Callender, Bennett Holman, David Manheim,
Aydin Mohseni, Mike Schneider, and Chris Smeenk for helpful discussions.
References
Bala, V. and Goyal, S. [1998]: 'Learning from neighbors', Review of Economic Studies, 65(3), pp. 595 -- 621.
Bright, L. K. [2017]: 'On fraud', Philosophical Studies, 174(2), pp. 291 -- 310.
Button, K. S., Ioannidis, J. P. A., Mokrysz, C., Nosek, B. A., Flint, J., Robinson, E. S. J. and Munaf`o,
M. R. [2013]: 'Power failure: why small sample size undermines the reliability of neuroscience', Nature
Reviews Neuroscience, 14(5), pp. 365 -- 376.
Douglas, H. [2009]: Science, policy, and the value-free ideal , Pittsburgh, PA: University of Pittsburgh Press.
Elliott, K. C. [2011]: Is a Little Pollution Good For You? , Oxford, UK: Oxford University Press.
Frey, D. and Seselja, D. [2018]: 'What Is the Epistemic Function of Highly Idealized Agent-Based Models
of Scientific Inquiry?', Philosophy of the Social Sciences.
Hersch, E. I. and Phillips, P. C. [2004]:
'Power and potential bias in field studies of natural selection',
Evolution; International Journal of Organic Evolution, 58(3), pp. 479 -- 485.
Holman, B. and Bruner, J. [2017]: 'Experimentation by industrial selection', Forthcoming in Philosophy of
Science.
Holman, B. and Bruner, J. P. [2015]: 'The problem of intransigently biased agents', Philosophy of Science,
82(5), pp. 956 -- 968.
Ioannidis, J. P. [2005]: 'Why most published research findings are false', PLoS medicine, 2(8), pp. e124.
Kitcher, P. [1990]: 'The division of cognitive labor', The journal of philosophy, 87(1), pp. 5 -- 22.
Kitcher, P. [2003]: Science, truth, and democracy, New York, NY: Oxford University Press.
Kitcher, P. [2011]: Science in a democratic society, Amherst, NY: Prometheus Books.
Lemoine, N. P., Hoffman, A., Felton, A. J., Baur, L., Chaves, F., Gray, J., Yu, Q. and Smith, M. D. [2016]:
'Underappreciated problems of low replication in ecological field studies', Ecology, 97(10), pp. 2554 -- 2561.
'Body, bias, and behavior: A comparative analysis of reasoning in two
Longino, H. and Doell, R. [1983]:
areas of biological science', Signs: Journal of Women in Culture and Society, 9(2), pp. 206 -- 227.
Longino, H. E. [1990]: Science as social knowledge: Values and objectivity in scientific inquiry, Princeton,
NJ: Princeton University Press.
Longino, H. E. [2002]: The fate of knowledge, Princeton, NJ: Princeton University Press.
Manheim, D.
"How to Beat
'Comment
[2018]:
on
Science
and
Influence People"',
Https://medium.com/@davidmanheim/comment-on-how-to-beat-science-and-influence-people-https-
arxiv-org-abs-1801-01239-5e96f0ad49bd.
Michaels, D. [2008]: Doubt is Their Product, Oxford, UK: Oxford University Press.
Michaels, D. and Monforton, C. [2005]: 'Manufacturing uncertainty: contested science and the protection
of the public's health and environment', American journal of public health, 95(S1), pp. S39 -- S48.
Moore, T. J. [1995]: Deadly medicine: why tens of thousands of heart patients died in America's worst drug
disaster , New York, NY: Simon & Schuster.
Norr, R. [1952]: 'Cancer by the carton', Reader's Digest, 61(368), pp. 7 -- 8.
O'Connor, C. and Weatherall, J. O. [2017]: 'Scientific Polarization', arXiv:1712.04561 [cs.SI].
25
O'Connor, C. and Weatherall, J. O. [2019]: The Misinformation Age: How False Beliefs Spread , New Haven,
CT: Yale University Press.
Open Science Collaboration [2015]:
'Estimating the reproducibility of psychological science', Science,
349(6251), pp. aac4716.
¡http://science.sciencemag.org/content/349/6251/aac4716¿
Oreskes, N. and Conway, E. M. [2010]: Merchants of Doubt, New York, NY: Bloomsbury Press.
Romero, F. [2016]: 'Can the behavioral sciences self-correct? A social epistemic study', Studies in History
and Philosophy of Science Part A, 60, pp. 55 -- 69.
Rosenstock, S., Bruner, J. and O'Connor, C. [2017]: 'In Epistemic Networks, Is Less Really More?', Philos-
ophy of Science, 84(2), pp. 234 -- 252.
Smaldino, P. E. and McElreath, R. [2016]: 'The natural selection of bad science', Open Science, 3(9), pp.
160384.
Szucs, D. and Ioannidis, J. P. A. [2017]: 'Empirical assessment of published effect sizes and power in the
recent cognitive neuroscience and psychology literature', PLOS Biology, 15(3), pp. e2000797.
¡http://journals.plos.org/plosbiology/article?id=10.1371/journal.pbio.2000797¿
Weatherall, J. O. and O'Connor, C.
[2018]:
'Conformity in Scientific Networks',
arXiv:1803.09905
[physics.soc-ph].
Woodward, J. [2003]: Making things happen: A theory of causal explanation, Oxford university press.
Wynder, E. L., Graham, E. A. and Croninger, A. B. [1953]: 'Experimental production of carcinoma with
cigarette tar', Cancer Research, 13(12), pp. 855 -- 864.
Zollman, K. J. [2007]:
74(5), pp. 574 -- 587.
'The communication structure of epistemic communities', Philosophy of science,
Zollman, K. J. [2010]: 'The epistemic benefit of transient diversity', Erkenntnis, 72(1), pp. 17.
26
|
1607.08673 | 2 | 1607 | 2016-10-29T23:29:48 | Measuring and Modeling Bipartite Graphs with Community Structure | [
"cs.SI",
"physics.soc-ph"
] | Network science is a powerful tool for analyzing complex systems in fields ranging from sociology to engineering to biology. This paper is focused on generative models of large-scale bipartite graphs, also known as two-way graphs or two-mode networks. We propose two generative models that can be easily tuned to reproduce the characteristics of real-world networks, not just qualitatively, but quantitatively. The characteristics we consider are the degree distributions and the metamorphosis coefficient. The metamorphosis coefficient, a bipartite analogue of the clustering coefficient, is the proportion of length-three paths that participate in length-four cycles. Having a high metamorphosis coefficient is a necessary condition for close-knit community structure. We define edge, node, and degreewise metamorphosis coefficients, enabling a more detailed understanding of the bipartite connectivity that is not explained by degree distribution alone. Our first model, bipartite Chung-Lu (CL), is able to reproduce real-world degree distributions, and our second model, bipartite block two-level Erd\"os-R\'enyi (BTER), reproduces both the degree distributions as well as the degreewise metamorphosis coefficients. We demonstrate the effectiveness of these models on several real-world data sets. | cs.SI | cs |
1 of 23
Measuring and Modeling Bipartite Graphs with Community Structure
Department of Mathematics, University of California, San Diego, CA
SINAN AKSOY
Sandia National Laboratories, Livermore, CA. Corresponding author: [email protected]
TAMARA G. KOLDA
AND
ALI PINAR
Sandia National Laboratories, Livermore, CA
[Received on 1 November 2016]
Network science is a powerful tool for analyzing complex systems in fields ranging from sociology to
engineering to biology. This paper is focused on generative models of large-scale bipartite graphs, also
known as two-way graphs or two-mode networks. We propose two generative models that can be easily
tuned to reproduce the characteristics of real-world networks, not just qualitatively, but quantitatively.
The characteristics we consider are the degree distributions and the metamorphosis coefficient. The
metamorphosis coefficient, a bipartite analogue of the clustering coefficient, is the proportion of length-
three paths that participate in length-four cycles. Having a high metamorphosis coefficient is a necessary
condition for close-knit community structure. We define edge, node, and degreewise metamorphosis
coefficients, enabling a more detailed understanding of the bipartite connectivity that is not explained
by degree distribution alone. Our first model, bipartite Chung-Lu (CL), is able to reproduce real-world
degree distributions, and our second model, bipartite block two-level Erdos-R´enyi (BTER), reproduces
both the degree distributions as well as the degreewise metamorphosis coefficients. We demonstrate the
effectiveness of these models on several real-world data sets.
Keywords: bipartite generative graph model, two-way graph model, two-mode network, metamorphosis
coefficient, bipartite clustering coefficient, complex networks
1. Introduction
Network science is a powerful tool for analyzing complex systems in fields ranging from sociology to
engineering to biology. The ability to develop realistic models of the networks is needed for several
reasons. Pragmatically, we need to generate artificial networks to facilitate sharing of realistic network
data while respecting concerns about privacy and security of data. More generally, generative models
enable unlimited network data generation for computational analysis, e.g., varying the characteristics
of the graph to test a graph algorithm under different scenarios. Ultimately, we hope to understand
the underlying nature of complex systems, and modeling them mathematically is a way to test our
understanding.
This paper is focused on generative models of bipartite graphs, also known as two-way graphs or
two-mode networks. Many real-world systems are naturally expressed as bipartite graphs. The defining
characteristic of a bipartite graph is that its vertices are divided into two partitions, U and V , such that
2 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
edges, E, only connect vertices across the two partitions, i.e.,
G = (U,V,E) with U ∩V = /0
and E ⊆ U ⊗V.
Examples of bipartite graphs include author-paper networks, user-product purchase histories, user-song
play lists, actor-movie connections, document-keyword mappings, and so on. Hypergraphs can be rep-
resented as bipartite graphs in the sense of an incidence graph: the nodes and hyperedges are represented
by U and V , respectively, and edge (i, j) exists if node i is in hyperedge j. Bipartite graphs have been
widely studied; see [9, 13, 14, 20, 33, 36] and references therein. An example bipartite graph is shown
in Fig. 1.
u1
u2
u3
v1
v2
v3
v4
FIG. 1: Bipartite graph
We propose a generative model that can be easily tuned to reproduce the characteristics of real-world
networks, not just qualitatively, but quantitatively. The measurements we consider in this paper are the
degree distributions and the bipartite analog of the clustering coefficient. Of course, there are many
other measurements that we could consider, and we come back to those shortly. The degree distribution
is the number (or proportion) of nodes of degree d for each d = 1,2, . . .. A bipartite graph has two
degree distributions, one for each vertex partition. As we see in the results in Section 4.3, these two
distributions may be quite different from one another, in part because the size (and, consequently, the
average degree) for each partition may be quite different. The clustering coefficient of a one-way graph,
introduced by Holland and Leinhardt [16], is the probability that a two-path (or wedge) participates in a
three-cycle (or triangle); i.e.,
c =
3n(cid:52)
n∧ =
3× (total number of triangles)
total number of wedges
.
One characteristic of a bipartite graph is that is has no odd-length cycles; hence, it cannot have a triangle.
Robins and Alexander [33] propose a bipartite clustering coefficient that is the probability that a bipartite
three-path (or caterpillar) participates in a bipartite four-cycle (or butterfly), i.e.,
c =
4n
n =
4× (total number of butterflies)
total number of caterpillars
.
(1.1)
We call c in (1.1) the metamorphosis coefficient in reference to the notion of how often caterpillars
become butterflies. Opsahl [30] says "it could be considered a measure of reinforcement between two
individuals rather than clustering of a group of individuals." The multiplier of four in the numerator is
because every butterfly contains four distinct caterpillars, just as every triangle contains three distinct
wedges; see Fig. 2. A high metamorphosis coefficient in a bipartite graph is indicative of greater com-
munity structure in the graph, analogous to the role of a high clustering coefficient in a one-way graph.
MEASURING AND MODELING BIPARTITE GRAPHS
3 of 23
The metamorphosis coefficient plays an important role in communities because any tight-knit commu-
nity will have a high metamorphosis coefficient. In Section 5.1, we extend (1.1) to define edge, node,
and degreewise metamorphosis coefficients, enabling a more detailed understanding of the bipartite
community structure.
(a) Caterpillars
(b) Butterfly
FIG. 2: A butterfly contains four distinct caterpillars
As mentioned above, there are numerous more complex metrics that can be used in the analysis of
bipartite graphs; see, e.g., [20, 33]. Examples of such metrics include graph diameter (i.e., the maxi-
mum distance between any pair of nodes), singular values of the adjacency matrix, centrality measures,
joint degree distributions (i.e., the proportion of nodes of degree d that connect to nodes of degree d(cid:48)
for all possible pairs (d,d(cid:48))), assortativity (i.e., degree correlations), subgraph census (i.e., counts of all
patterns of three nodes, four nodes, and so on). Moreover, we can consider the analysis of the product
graphs that are produced by considering just one vertex partition and connecting any two nodes that
share a common neighbor in the bipartite graph. Because these quantities are often expensive to com-
pute for large graphs, we do not consider them in this paper. Instead, we consider the simpler metrics
of degree distribution and metamorphosis coefficients here for reasons analogous to those considered
by [20, 35]. The degree distributions are interesting because many large real-world graphs (including
the ones we consider here) do not have the Poisson distributions that occur if edges are distributed at
random; instead, they have heavy-tailed distributions (hypothesized to be power law [2] or log-normal
[18]). The metamorphosis coefficient is interesting because random graphs that have the same degree
distribution as a real-world graph tend to have a much lower metamorphosis coefficients, as we show
in Section 4.4. This is a well-known phenomena for the clustering coefficient of one-way graphs [28].
We contend that matching metamorphosis coefficients is critical for capturing social or, more generally,
interconnectedness behavior in networks.
With the goals of capturing both degree distribution and our newly-defined degreewise metamorpho-
sis coefficients, we develop two different models. The first is a straightforward extension of Chung-Lu
(CL) [1, 6, 7], which is very closely related to the configuration model. Our experimental results show
that this model is effective at reproducing the degree distributions. However, the bipartite CL graphs do
not produce the same metamorphosis coefficients as observed in real-world networks. Therefore, the
second model we propose is a bipartite extension of the Block Two-Level Erdos-R´enyi (BTER) [18, 35]
model. The BTER model is a good starting point because it reproduces both the degree distribution and
degreewise clustering coefficients of a given network. To do so, it groups nodes into Erdos-R´enyi (ER)
subgraphs, called affinity blocks, that are highly connected and so produce high clustering coefficients.
We propose a bipartite BTER that reproduces both the degree distributions and the degreewise metamor-
phosis coefficients. This extension is not straightforward since the affinity block concept does not carry
over easily to the bipartite case, so we develop a new method for creating the blocks. Computational
results for bipartite BTER show that it achieves our goals of matching both the degree distributions and
the degreewise metamorphosis coefficients.
4 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
Before we continue, we briefly survey related work. As mentioned above, the proposed bipartite
CL model is very similar to bipartite configuration models. Both Newman, Strogatz, and Watts [29]
and Guillaume and Latapy [14] propose bipartite configuration models that sample node degrees from
a distribution (one per partition), create stubs for each node equal to its degree, and then match the
stubs. Our bipartite CL model is very similar, and we discuss the connections further in Section 4.2.
On the theoretical side, Kannan, Tetali, and Vempala [17] consider the convergence of a Markov chain
rewiring algorithm for generating a bipartite graph and show that their process is rapidly mixing for
regular bipartite graphs, i.e., graphs where all the node degrees are the same. Later, this result was
extended to graphs in which only one partition is required to be regular [22]. In statistics, researchers
consider the problem of generating binary contingency tables with given row and columns sums. This
problem is equivalent to specifying the degrees in a bipartite graph. In [4, 5], the focus is on an algorithm
that is guaranteed to produce a specified row and column sums, assuming its realizable. The proposed
algorithm is not considered practical but rather of theoretical interest. As for one-way graphs, there are
also incremental growth models in which the output graph is iteratively constructed by adding vertices
and edges according to some rule. The methods are sequential since the connections created for new
nodes usually depend on the state of the graph at the iteration in which the nodes are created. Guillaume
and Latapy [14] analyze a bipartite growing model in which new vertices are linked via a preferential
attachment process. Other work has considered a similar idea except that one vertex partition remains
fixed while the other grows [12, 32]. Lastly, we note a variety of application-specific generative bipar-
tite graph models have been introduced to model specific networks, including pollination networks in
ecology [10, 34], and protein-domain networks in biology [26].
2. Data sets
We test our methods on publicly-available real-world datasets, whose properties are summarized in
Table 1. Their degree distributions are shown in Figs. 3 to 5. CondMat represents an author-paper
network from arXiv preprints in condensed matter physics from 1995–99 [27]; this has mostly been used
in the context of the coauthorship graph, but here we consider the underlying data [31]. The majority
of authors have only a single paper, whereas the most prolific author has 116 papers. Conversely, the
most coauthors on a single paper is 18, and the most likely scenario is for a paper to have 2 or 3 authors.
IMDB links movies and the actors that appeared in them [19, 20], as collected from the Internet Movie
Database. The busiest actor was in 294 movies; conversely, the largest production had 646 actors. Flickr
[24, 25] is an online photo-sharing site, and the network represents group membership of various users.
The most connected user is in 2186 groups, whereas the largest group has 34989 members. MovieLens
[8, 15] is a very famous dataset that links movies and their reviewers/critics. The most-reviewed movie
had 34864 reviews, and the most active critic reviewed 7359 movies (orange). This dataset apparently
excludes critics with less than 20 reviews. The MillionSong [3, 21, 39] dataset connects users and the
songs they played. The dataset only includes listeners of ten songs or more. The widest-ranging user
listened to 4,400 distinct songs. The top song was played by 110,479 distinct listeners. The Peer2Peer
dataset [19, 20] links users (peers) and the files they uploaded or downloaded. The busiest user touched
19,496 files. On the other hand, the most popular file only had 3396 downloads. LiveJournal [24, 25]
represents user-group memberships from a blogging site. The most engaged user is in 300 groups, which
appears to be the maximum allowed, since there are five persons in that category. The largest group has
over one million members.
MEASURING AND MODELING BIPARTITE GRAPHS
5 of 23
Table 1: Real-world bipartite graphs
Name
CondMat [27, 31]
IMDB [19, 20]
Flickr [24, 25]
MovieLens [8, 15]
MillionSong [3, 21, 39]
Peer2Peer [19, 20]
LiveJournal [24, 25]
Partition 1
16,726 authors
127,823 actors
1,728,701 users
65,133 movies
1,019,318 users
1,986,588 peers
5,284,451 users
Partition 2
22,016 papers
383,640 movies
103,648 groups
71,567 critics
384,546 songs
5,380,546 files
7,489,296 groups
Edges
58,595
1,470,418
8,545,307
10,000,054
48,373,586
55,829,392
112,307,385
3. Notation
We set up the notation for one-way and two-way graphs. We assume all graphs are simple, meaning that
there are no multiple edges. In the one-way case, we let n = V and index nodes in V by i, j ∈ {1, . . . ,n}.
In the two-way case, we let nu = U and nv = V denote the sizes of partitions one (left) and two
(right), respectively. We use i ∈ {1, . . . ,nu} and j ∈ {1, . . . ,nv} to index nodes in partition one and
two, respectively. Without loss of generality, indexing by i assumes partition one and likewise for j and
partition two. For instance, if i = j = 2 in the two-way case, although vertices i and j have the same
vertex label of 2, they belong to different partitions and are thus two distinct vertices.
One-Way Graph
G = (V,E)
Vertices : V
Edges : E ⊆ V ⊗V
# Vertices : n = V
# Edges : m = E
# Wedges : n∧
# Triangles : n(cid:52)
Clust. Coeff. : c = 3n(cid:52)/n∧
Vertex Index : i ∈ {1, . . . ,n}
Degree of i : di = { j ∈ V (i, j) ∈ E }
Table 2: Notation
Two-Way Graph
G = (U,V,E)
Vtx. Partition 1 : U
Vtx. Partition 2 : V
Edges : E ⊆ U ⊗V
# Vertices in U : nu = U
# Vertices in V : nv = V
# Edges : m = E
# Caterpillars : n
# Butterflies : n
Meta. Coeff. : c = 4n /n
Index in U : i ∈ {1, . . . ,nu}
Index in V : j ∈ {1, . . . ,nv}
Degree of i : du
Degree of j : dv
i = { j ∈ V (i, j) ∈ E }
j = {i ∈ U (i, j) ∈ E }
4. Fast Bipartite Chung-Lu Model
We adapt the Chung-Lu generative model [1, 6, 7] to bipartite graphs and demonstrate its ability to
reproduce bipartite degree distributions. We follow the notation described in Section 3.
6 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
4.1 Chung-Lu for One-way Graphs
Consider a one-way graph G = (V,E). The Chung-Lu (CL) model attempts to match the desired degrees
{d1, . . . ,dn} where di denotes the desired degree of vertex i. The model generates a random graph on n
vertices such that the probability that vertex i is adjacent to j is given by
Pr((i, j) ∈ E) =
did j
2m
n
∑
1
2
where m =
di = desired number of edges.
tation of the CL model on n vertices flips a coin for each of the(cid:0)n
To ensure the quantities are all true probabilities, we assume di (cid:54) √
i=1
(cid:1) = Ω (n2) possible edges. Many
2m for all i. A classical implemen-
2
real-world graphs are large and sparse, i.e., the number of edges m = O(n). For this reason, we favor
"fast" CL that flips only 2m coins [11, 18]. We explain the fast method below in the context of two-way
graphs.
4.2 Chung-Lu for Two-way Graphs
Consider the bipartite graph G = (U,V,E). Here we have separate desired degrees for the vertices in U
and V , denoted
{du
i }nu
i=1
and
{dv
j }nv
j=1 ,
respectively. Necessarily, the sums of the degrees in each partition must be equal to each other and to
the number of edges, i.e.,
m =
du
i =
nu
∑
i=1
nv
∑
j=1
dv
j .
Hence, the bipartite CL model generates a random bipartite graph on nu vertices in the first partition and
nv vertices in the second partition such that
i dv
du
Pr((i, j) ∈ E) =
j
m .
i (cid:54) √
m for all i and dv
j (cid:54) √
(4.1)
To ensure these are true probabilities, we assume du
m for all j. A naıve
implementation of bipartite Chung-Lu would flip a coin for all nunv possible edges. Instead, we adopt
the "fast" approach as follows. Rather than flipping a coin for every possible edge, we instead randomly
choose two endpoints for every expected edge. Since the graph is sparse, we may assume that m (cid:28) nunv,
so this approach requires many fewer random samples. For each of the m edges, we choose endpoints
in U and V proportional to
dv
j
m ,
respectively. The probability that edge (i, j) exists is then given by
and Pr( j) =
Pr(i) =
du
i
m
Pr((i, j) ∈ E) = m· Pr(i)· Pr( j) =
du
i dv
j
m ,
which is the same as (4.1). Although both implementations of CL yield identical expected degrees, a key
distinction is that multiple edges between the same pair of vertices are possible in fast CL. In practice,
for large graphs with heavy-tailed degree distributions, this rarely presents a problem. The fast bipartite
CL algorithm is described in Algorithm 1.
MEASURING AND MODELING BIPARTITE GRAPHS
7 of 23
Algorithm 1 Fast Bipartite CL
i }, {dv
j })
i
m ← ∑i du
E ← /0
for k = 1, . . . ,m do
1: procedure FBCL({du
2:
3:
4:
5:
6:
7:
8:
9: return E
10: end procedure
end for
Randomly select i ∈ U proportional to du
Randomly select j ∈ V proportional to dv
E ← E ∪ (i, j)
i /m
j /m
(cid:46) Duplicate edges discarded
As mentioned in the introduction, a closely-related approach is the bipartite configuration model
[14, 29]. These differ in some details; for instance, in the CL model, the degree distribution is not
specified exactly but rather each degree is sampled from a distribution. However, if we ignore that
detail, we may consider that each node i ∈ U has du
j stubs,
and the stubs from partition one are randomly connected to the stubs in partition two. As with fast
bipartite CL, we discard any repeated edges. In all three cases, bipartite CL, fast bipartite CL, and the
bipartite configuration models, the expected degree of a vertex is the same.
i stubs and likewise each node j ∈ V has dv
4.3 Experimental Results
We generate random graphs using CL and the degree distributions of the graphs described in Section 2.
The degree distributions are shown in Figs. 3 to 5. The degree distribution of the original graph is shown
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
103
101
10−1
Original
CL
100
101
Degree
103
101
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
10−1
100
Original
CL
101
Degree
(a) Mode 1: CondMat (Authors/Papers)
(b) Mode 2: CondMat (Authors/Papers)
FIG. 3: Mode 2: CondMat (Authors/Papers)
in blue, and the degree distribution of the graph generated by bipartite CL is shown in orange. These
are binned degree distributions, as advocated in [23]. We use powers of two for the bin borders, so the
x-coordinate 2k corresponds to the bin from [2k,2k+1). The y-coordinate is the average value for that
bin, including zero values, so the y-coordinate can be less than one. Overall, the degree distributions are
very close, especially for IMDB (Figs. 4a and 4b), Flickr (Figs. 4c and 4d), and LiveJournal (Figs. 5e
8 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
103
100
Original
CL
10−3
100
101
Degree
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
105
101
10−3
Original
CL
102
100
101
102
Degree
(a) Mode 1: IMDB (Actors/Movies)
(b) Mode 2: IMDB (Actors/Movies)
105
101
10−3
102
10−1
10−4
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
105
100
10−5
Original
CL
Original
CL
100
101
102
Degree
103
100
101
103
104
102
Degree
(c) Mode 1: Flickr (Users/Groups)
(d) Mode 2: Flickr (Users/Groups)
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
103
100
10−3
Original
CL
101
102
Degree
103
Original
CL
100
101
103
104
102
Degree
(e) Mode 1: MovieLens (Movies/Critics)
(f) Mode 2: MovieLens (Movies/Critics)
FIG. 4: Mode 2: MovieLens (Movies/Critics)
MEASURING AND MODELING BIPARTITE GRAPHS
9 of 23
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
104
100
Original
CL
101
10−4
100
105
100
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
Original
CL
102
Degree
103
100
101
103
102
Degree
104
105
(a) Mode 1: MillionSong (Users/Songs)
(b) Mode 2: MillionSong (Users/Songs)
105
100
Original
CL
101
10−5
100
103
104
102
Degree
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
105
101
10−3
Original
CL
100
101
102
Degree
103
(c) Mode 1: Peer2Peer (Peers/Files)
(d) Mode 2: Peer2Peer (Peers/Files)
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
104
102
100
Original
CL
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
107
100
10−7
Original
CL
100
101
Degree
102
100
102
104
106
Degree
(e) Mode 1: LiveJournal (Users/Groups)
(f) Mode 2: LiveJournal (Users/Groups)
FIG. 5: Mode 2: LiveJournal (Users/Groups)
10 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
and 5f). For CondMat (Figs. 3a and 3b), the distribution of degrees on the author nodes is a close match,
but there is some trouble matching the paper degree distribution. The model slightly overestimates at
the higher end of the degree scale and underestimates at the lower end. This is largely due to the small
size of the graph and the very small distribution (maximum of 18 authors for a paper). For MovieLens
(Figs. 4e and 4f), the model generates a few "critic" nodes of degree less than 20, even though no nodes
exist in the true degree distribution. A similar phenomena occurs for the "user" nodes in MillionSong.
In general, the CL model cannot handle gaps in the degree distribution because of Poisson distributions
in its expectations. In Peer2Peer (Figs. 5c and 5d), the number of degree-1 peer nodes is underestimated,
for reasons described in [11].
Shortcomings of bipartite CL
4.4
Overall, if we provide the degree distributions of real-world graph, the fast bipartite CL model generates
a random graph whose degree distribution closely matches the degree distribution of the original graph.
However, the graphs generated by CL typically have many fewer butterflies than the original graphs.
Table 3 shows that the number of butterflies from bipartite CL is smaller than the original graph in every
case, and sometimes by one or more orders of magnitude (CondMat, IMDB, Peer2Peer). The number of
caterpillars for the original and the generated graphs on the other hand, is closer, so the metamorphosis of
the original graph is much higher than for the generated graph with low butterfly counts. This indicates
that the bipartite CL model is omitting some important structure.
Note that the butterfly structure is what underlies the cohesive, close-knit structure in many real-
world graphs. Just as a triangle can be considered as the smallest unit of cohesion on one-way graphs,
butterflies can be considered as the smallest unit of cohesion in bipartite graphs. Conversely, without
butterflies, a bipartite graph will not have a community structure. This is our motivation for considering
a more complex model in the next section.
Table 3: Properties of the original and the BCL graphs.
Graph
Size
CondMat-Orig
CondMat-CL
IMDB-Orig
IMDB-CL
Flickr-Orig
Flickr-CL
MovieLens-Orig
MovieLens-CL
MillionSong-Orig
MillionSong-CL
Peer2Peer-Orig
Peer2Peer-CL
LiveJournal-Orig
LiveJournal-CL
nu
1.67e4
1.67e4
1.28e5
1.28e5
1.73e6
1.73e6
6.51e4
6.51e4
1.02e6
1.02e6
1.99e6
1.99e6
5.28e6
5.28e6
nv
2.20e4
2.20e4
3.84e5
3.84e5
1.04e5
1.04e5
7.16e4
7.16e4
3.85e5
3.85e5
5.38e6
5.38e6
7.49e6
7.49e6
Edges
m
5.86e4
5.86e4
1.47e6
1.47e6
8.55e6
8.39e6
1.00e7
8.78e6
4.84e7
4.81e7
5.58e7
5.58e7
1.12e8
1.11e8
Cats.
n
1.24e6
2.22e6
8.56e8
1.11e9
2.57e12
2.20e12
2.46e13
1.37e13
2.21e13
2.59e13
8.18e11
1.20e12
3.36e14
3.31e14
Buts.
n
7.05e4
3.57e2
3.50e6
1.41e5
3.53e10
1.52e10
1.20e12
5.34e11
2.15e11
6.74e10
3.80e9
1.14e8
3.30e12
2.04e12
Meta.
c
2.28e−1
6.43e−4
1.64e−2
5.10e−4
5.49e−2
2.78e−2
1.95e−1
1.56e−1
3.89e−2
1.04e−2
1.86e−2
3.79e−4
3.92e−2
2.47e−2
MEASURING AND MODELING BIPARTITE GRAPHS
11 of 23
5. Bipartite BTER Model
In the BTER model for one-way graphs, the goal is to match both the degree distribution as well as
the degreewise clustering coefficients [18, 35]. Our goal here is to extend those notions to the bipartite
case. We use (1.1) as the bipartite definition of the clustering coefficient, though other metrics exist as
surveyed by Latapy, Magnien, and Vecchio [20] and Opsahl [30].
5.1 Degreewise Metamorphosis Coefficient
BTER matches the degreewise clustering coefficient, so we need a similar measure for bipartite graphs.
We describe the degreewise metamorphosis coefficient, which provides a more nuanced measurement
of bipartite community structure than the metamorphosis coefficient. To the best of our knowledge, this
idea has not been proposed before.
We define the metamorphosis of an edge (i, j) as
n(i, j)
n(i, j)
0
c(i, j) =
=
number of butterflies containing (i, j)
number of caterpillars centered at (i, j)
if n(i, j) > 0,
if n(i, j) = 0.
(5.1)
We know the number of caterpillars centered at (i, j) immediately from the degrees of its endpoints, i.e.,
(5.2)
From this, we define the metamorphosis coefficients of vertices i ∈ U and j ∈ V as the mean value over
all edges incident to the vertex:
i − 1)(dv
n(i, j) = (du
j − 1).
cu
i =
1
du
i
∑
(i, j)∈E
c(i, j)
and
cv
j =
1
dv
j
∑
(i, j)∈E
c(i, j).
(5.3)
We may consider (5.3) to be the bipartite analogue of the clustering coefficient of a vertex, as introduced
by Watts and Strogatz [38]. Finally, we can define the per-degree metamorphosis coefficients to be
cu
d =
1
Ud ∑
i∈Ud
cu
i
and
cv
d =
1
Vd ∑
j∈Vd
cv
j,
(5.4)
where Ud and Vd denote the subsets of degree-d nodes, i.e.,
Ud = {i ∈ U du
i = d}
and Vd = { j ∈ V dv
j = d} .
Degreewise metamorphosis coefficients control for the effects of both vertex mode and vertex degree
on bipartite clustering. Accordingly, this metric may reveal insights otherwise lost in metrics based only
on the ratio of total butterfly to caterpillar counts. To illustrate, consider the CondMat author-paper
network, whose degreewise metamorphosis coefficients are shown by the blue line in Figs. 6c and 6d.
The degreewise metamorphosis coefficients are also binned in the same way that we binned the data for
the degree distributions: We use powers of two for the bins, so the x-coordinate 2k corresponds to the
bin from [2k,2k+1). The y-coordinate is the average value for that bin. For the binning, we define cu
d = 0
for any degree such that Ud = 0 (i.e., when there are no nodes of degree d), and likewise for cv
c. We
see that degreewise metamorphosis coefficients in the author mode (Fig. 6c) are higher for low degrees
than for high degrees, meaning that authors with fewer papers tended to have higher proportion of repeat
collaborations than authors with many papers. Conversely, the paper mode (Fig. 6d) shows that authors
of papers with few authors tend to have more repeats of the same author set.
12 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
5.2 Affinity Blocks
In BTER for one-way graphs, dense ER subgraphs are key to producing triangles. For bipartite BTER,
we will use dense bipartite ER subgraphs to produce butterflies. We refer to these dense ER subgraphs
as affinity blocks.
In (one-way) BTER, an affinity block ideally consists of a set of d + 1 vertices of degree d. The
connectivity of each block is computed according to the degree-d clustering coefficient. The bipartite
affinity blocks are similar in spirit, but the bipartite nature of the graph raises issues that require an
entirely new approach to the block construction.
The first key difference is that each affinity block in bipartite BTER consists of two sets of vertices,
one from each partition. While each partition set in an affinity block ideally contains vertices of the
same degree, the degrees do not necessarily match between partition sets. Indeed, in many bipartite
graphs, one partition set may have a very different range of degrees than the other, so attempting to
create blocks that match inter-partition degree is not a realistic goal.
Consequently, a second key difference concerns how we determine the sizes of the partition sets for
the affinity blocks. In the one-way BTER method, the size of each block only depends on the degree
of the vertices in the block. In the two-way case, the sizes of each partition set within a block is more
complicated.
To work out the calculations of sizes and connectivity for the blocks, we consider building a single
affinity block denoted by G = ( U, V , E). Without loss of generality, we assume all nodes in U want
degree du and all nodes in V want degree dv. Note that these degrees are with respect to the entire
graph, not the subgraph. We further assume all nodes in U want metamorphosis coefficient cu and
likewise for V and cv. When matching a real-world graph, we choose the degreewise metamorphosis
coefficients corresponding to the target degrees as defined in (5.4), i.e.,
cu = c du
and
cv = c dv.
The goal is to determine the sizes nu = U and nv = V and the connectivity, ρ, which is the probability
of an edge between a node in nu and a vertex in nv, and thus the number of edges, E
For i ∈ U, we can compute its expected metamorphosis coefficient as follows. By definition (5.3),
we have
cu
i =
1
du
i
∑
(i, j)∈E
c(i, j) =
1
du
i
c(i, j) + ∑
(i, j)∈E\ E
c(i, j)
∑
(i, j)∈ E
c(i, j).
(5.5)
du
i
The last step comes from the assumption that nearly all butterflies in the larger graph come from the
affinity blocks. Using definition (5.1), we can rewrite (5.5) as
cu
i =
1
du
i
∑
(i, j)∈ E
n(i, j)
n(i, j)
=
1
du
i
∑
(i, j)∈ E
n(i, j)
i − 1)(dv
(du
j − 1)
.
(5.6)
We have assumed that the degrees and clustering coefficients within G are constant, so (5.6) becomes
cu =
1
du( du − 1)( dv − 1) ∑
(i, j)∈ E
n(i, j) =
2ni
du( du − 1)( dv − 1)
.
(5.7)
The last equality uses the fact that the sum of butterflies involving edges of the form (i, j) is equal to
two times the number of butterflies involving node i since each such butterfly has two edges involving i.
∑
(i, j)∈ E
≈ 1
MEASURING AND MODELING BIPARTITE GRAPHS
13 of 23
In expectation,
(cid:18) nv
(cid:19)
= ρ4( nu − 1)
.
ni
because there are ( nu − 1) other choices for the second node in U and(cid:0) nv
2
,
(cid:1) choices for the two nodes in
(5.8)
V . Finally, ρ4 is the probability that all four edges exist. Combining (5.7) and (5.8) gives
2
cu .
=
ρ4 nv( nu − 1)( nv − 1)
du( du − 1)( dv − 1)
.
Using analogous reasoning for cv, we ultimately want
cu du( du − 1)( dv − 1)
nv( nu − 1)( nv − 1)
ρ4 =
=
cv dv( du − 1)( dv − 1)
nu( nu − 1)( nv − 1)
Ideally, we would have
nu = dv
and
nv = du,
(5.9)
(5.10)
(5.11)
but we cannot generally satisfy (5.10) and (5.11) at the same time. Therefore, we choose one of the
equalities in (5.11) and then solve for the other number of nodes and connectivity using (5.10) to get
nu = dv ⇒ nv =
nv = du ⇒ nu =
cu
cv
cv
cu
du,
ρ =
dv. ρ =
( du − 1)( cv)2
cu du − cv
( dv − 1)( cu)2
cv dv − cu
.
(5.12)
(5.13)
So that we can have the possibility of using a complete bipartite subgraph to yield metamorphosis
coefficients of one, we constrain our choices to satisfy:
nu (cid:62) dv
(5.14)
cv (cid:62) 1 and (5.13) otherwise. It is easy to see from (5.10) that
To satisfy (5.14), we choose (5.12) if cu
this has the added bonus of ensuring ρ (cid:54) 1. This logic forms the basis of building affinity blocks for
bipartite BTER.
nv (cid:62) du.
and
5.3 Bipartite BTER algorithm
As explained in Section 5.2, the affinity block building process for bipartite BTER takes into account
both the desired vertex degrees and corresponding desired per-degree metamorphosis coefficients when
setting the partition sizes and connectivity of each affinity block. This information is then used to model
each affinity block as an ER subgraph, where the preponderance of the graph butterflies are created.
Accordingly, the affinity block construction is key to matching per-degree metamorphosis coefficients.
In order to match the desired degree distribution, the remaining excess degree (i.e., edges not used in
constructing the affinity blocks) is connected via a fast bipartite CL procedure. The full bipartite BTER
algorithm is listed in Algorithm 2.
14 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
Algorithm 2 Bipartite BTER
i }, {dv
1: procedure BIBTER({du
j }, {cu
d }, {cv
d } )
We assume that degrees are sorted in increasing order
i
m ← ∑i du
E ← /0
i } ← {du
{eu
i ← min{i du
repeat
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
j } ← {dv
j }
i }, {ev
i > 1}, j ← min{ j dv
j > 1}
(cid:46) Excess degree initialization
(cid:46) Create affinity blocks until nodes exhausted
i , dv ← dv
du ← du
j
cu ← c du, cv ← c dv
if cu/ cv (cid:62) 1 then
else
nu ← dv, nv ← round
nv ← du, nu ← round
(cid:16) cu
cv du(cid:17)
, ρ ←(cid:16) ( du−1)( cv)2
, ρ ←(cid:16) ( dv−1)( cu)2
(cid:16) cv
cu dv(cid:17)
cu du− cv
cv dv− cu
(cid:17)1/4
(cid:17)1/4
end if
if i + nu − 1 (cid:54) nu and j + nv − 1 (cid:54) nv then
for j = j, j + 1, . . . , j + nv − 1 do
for i = i,i + 1, . . . ,i + nu − 1 do
r ← U(0,1)
if r <= ρ then
E ← E ∪ (i, j)
i = max{0,eu
eu
end if
i − 1}, ev
j = max{0,ev
j − 1}
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28: end procedure
end for
end for
end if
i ← i + nu, j ← j + nv
i } ,{ev
until i > nu or j > nv
E ← E ∪ FBCL({eu
j })
(cid:46) Create ER subgraph
(cid:46) Uniform random value in [0,1]
(cid:46) Update excess degree
MEASURING AND MODELING BIPARTITE GRAPHS
15 of 23
5.4 Experimental Results
We generate bipartite BTER graphs using the procedure described in Section 5.3. We first discuss
a single graph: CondMat. We show the resulting degree distribution and degreewise metamorphosis
coefficients in Fig. 6. The degree distributions, shown in Figs. 6a and 6b, show little difference between
bipartite BTER and CL; both are good matches to the original degree distribution. The degreewise
metamorphosis coefficients are shown in Figs. 6c and 6d. Although there is not a perfect match between
bipartite BTER and the original graph, it is much better than CL, which has almost no butterflies.
104
102
100
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
Original
CL
BTER
100
101
Degree
103
101
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
10−1
100
Original
CL
BTER
101
Degree
(a) Mode 1: CondMat (Authors/Papers)
(b) Mode 2: CondMat (Authors/Papers)
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
0.40
0.20
0.00
Original
CL
BTER
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
0.30
0.20
0.10
0.00
Original
CL
BTER
101
Degree
100.5
101
Degree
(c) Mode 1: CondMat (Authors/Papers)
(d) Mode 2: CondMat (Authors/Papers)
FIG. 6: Degree distribution and degreewise metamorphosis coefficients on the original CondMat graph
as well as the models generated by CL and bipartite BTER.
Summary data for all graphs is shown in Table 4. This is the same as Table 3 except that now we
have added a row for bipartite BTER. For the first four graphs, we are reporting average values over
100 experiments, and we also report the entire range of values; we do not do multiple trials for the
larger graphs because the postprocessing to count the butterflies is extremely expensive. The number
of butterflies and metamorphosis coefficients are significantly improved as compared to CL. We see
that CondMat has 70,000 butterflies, bipartite CL produces less than 400 butterflies, but bipartite BTER
produces 120,000 butterflies. The bipartite BTER number is a slight overestimate, but overall much
better than CL.
16 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
Table 4: Metamorphosis coefficients for original versus BCL graphs.
Graph
Size
nu
1.67e4
1.67e4
1.67e4
nv
2.20e4
2.20e4
2.20e4
Edges
m
5.86e4
5.86e4
6.00e4
Cats.
n
1.24e6
2.22e6
2.36e6
Buts.
n
7.05e4
3.57e2
1.10e5
[1.67 – 1.67]
[2.20 – 2.20]
[6.00 – 6.01]
[2.31 – 2.42]
[1.01 – 1.16]
1.28e5
1.28e5
1.28e5
3.84e5
3.84e5
3.84e5
1.47e6
1.47e6
1.47e6
[1.28 – 1.28]
[3.84 – 3.84]
[1.47 – 1.47]
1.73e6
1.73e6
3.96e5
1.04e5
1.04e5
1.04e5
8.55e6
8.39e6
8.34e6
[3.96 – 3.96]
[1.04 – 1.04]
[8.34 – 8.34]
6.51e4
6.51e4
1.07e4
7.16e4
7.16e4
6.99e4
1.00e7
8.78e6
8.52e6
[1.07 – 1.07]
[6.99 – 6.99]
[8.51 – 8.52]
1.02e6
1.02e6
1.02e6
1.99e6
1.99e6
1.99e6
5.28e6
5.28e6
3.20e6
3.85e5
3.85e5
3.85e5
5.38e6
5.38e6
5.38e6
7.49e6
7.49e6
7.49e6
4.84e7
4.81e7
4.80e7
5.58e7
5.58e7
5.60e7
1.12e8
1.11e8
1.10e8
8.56e8
1.11e9
1.35e9
[1.35 – 1.36]
2.57e12
2.20e12
2.36e12
[2.35 – 2.37]
2.46e13
1.37e13
1.23e13
[1.23 – 1.23]
2.21e13
2.59e13
2.93e13
8.18e11
1.20e12
1.66e12
3.36e14
3.31e14
3.50e14
3.50e6
1.41e5
6.77e6
[6.62 – 6.91]
3.53e10
1.52e10
4.25e10
[4.23 – 4.27]
1.20e12
5.34e11
1.08e12
[1.07 – 1.08]
2.15e11
6.74e10
1.90e11
3.80e9
1.14e8
6.71e9
3.30e12
2.04e12
4.61e12
CondMat-Orig
CondMat-CL
CondMat-BTER
BTER 100 Trial Range
IMDB-Orig
IMDB-CL
IMDB-BTER
BTER 100 Trial Range
Flickr-Orig
Flickr-CL
Flickr-BTER
BTER 100 Trial Range
MovieLens-Orig
MovieLens-CL
MovieLens-BTER
BTER 100 Trial Range
MillionSong-Orig
MillionSong-CL
MillionSong-BTER
Peer2Peer-Orig
Peer2Peer-CL
Peer2Peer-BTER
LiveJournal-Orig
LiveJournal-CL
LiveJournal-BTER
Meta.
c
2.28e−1
6.43e−4
1.86e−1
[1.73 – 1.99]
1.64e−2
5.10e−4
2.00e−2
[1.95 – 2.04]
5.49e−2
2.78e−2
7.21e−2
[7.19 – 7.23]
1.95e−1
1.56e−1
3.51e−1
[3.50 – 3.51]
3.89e−2
1.04e−2
2.59e−2
1.86e−2
3.79e−4
1.61e−2
3.92e−2
2.47e−2
5.26e−2
MEASURING AND MODELING BIPARTITE GRAPHS
17 of 23
The degreewise metamorphosis coefficients for the remaining graphs are shown in Figs. 7 and 8.
Even in cases where bipartite CL's overall numbers are close to the original graph as shown in Table 4,
the degreewise metamorphosis coefficients are essentially zero. Bipartite BTER corrects this problem
and gets metamorphosis coefficients that are much closer to what we see in the original graph. In some
cases like MovieLens (Fig. 7e), the CL metamorphosis coefficients are much higher than zero, which
is the result of the overall high density of the graph. Indeed, it has been proven (see Lemma 1 in [37])
that under mild assumptions, any bipartite graph with m edges and partition sizes nu and nv contains at
least on the order of ( nu
nu+nv )4 many butterflies. Thus, the presence of a certain minimum number
butterflies in bipartite graphs of sufficient density is inevitable; nevertheless, the original graph still has
higher values that are matched better by bipartite BTER. MovieLens also has an unusual profile in Mode
2 (see Fig. 7f), which is really just an artifact of the data collection. Nevertheless, bipartite BTER is able
to obtain a reasonable approximation. For completeness, the degree distributions for bipartite CL and
BTER as compared to the original graphs are shown in Figs. 9 and 10. There is little difference between
bipartite BTER and CL in terms of the degree distribution.
nv )2 · ( m
6. Conclusions
We have considered the problem of how to generate realistic bipartite graphs to reproduce the charac-
teristics of large real-world networks. Our first model, bipartite CL, accurately reproduces the degree
distribution. Our second model, bipartite BTER, goes further to capture the degreewise metamorphosis
coefficients. High coefficients are indicative of a relatively large number of butterflies indicating cohe-
sion or community structure, which is rare in sparse random graphs unless there are some behaviors that
go beyond just the degree structure. Creating realistic graph models leads to some hypotheses about the
ways the graphs were formed. In the cases where CL greatly underestimated the number of butterflies
(CondMat, IMDB, and Peer2Peer), we can surmise that there is some significant community-like behav-
ior. This is easy to see for authorship of papers (CondMat) and actors appearing in movies (IMBD). For
the Peer2Peer network, we might hypothesize that some tight-knit peer groups are sharing many files
between themselves. The other graphs have a smaller difference between the number of butterflies pro-
duced by CL and the real-world graph, indicating that there is much less community structure. In fact,
some graphs are so dense that CL has a nonzero metamorphosis coefficient, especially MovieLens.
Although these models match real-world observations in some aspects, more study is needed to
understand their limitations. How well do these models reproduce other metrics such as graph diameter,
singular values of the adjacency matrix, centrality measures, joint degree distributions, assortativity,
subgraph census, and so on? Can we find evidence that affinity blocks exist in real-world graphs?
We have created non-overlapping blocks; is that realistic? We have not mentioned time-evolution, but
certainly all networks are evolving in time and we need models that capture such changes. These are
but a few topics for future investigation.
Funding
This work was supported in part by the Defense Advanced Research Project Agency (DARPA). San-
dia National Laboratories is a multi-program laboratory managed and operated by Sandia Corpora-
tion, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's
National Nuclear Security Administration under contract DE-AC04-94AL85000.
18 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
0.08
0.06
0.04
0.02
0.00
Original
CL
BTER
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
0.04
0.02
0.00
Original
CL
BTER
101
102
Degree
101
102
Degree
(a) Mode 1: IMDB (Actors/Movies)
(b) Mode 2: IMDB (Actors/Movies)
0.15
0.10
0.05
0.00
Original
CL
BTER
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
0.10
0.05
0.00
Original
CL
BTER
100
101
102
Degree
103
100
101
103
102
Degree
104
(c) Mode 1: Flickr (Users/Groups)
(d) Mode 2: Flickr (Users/Groups)
0.40
0.20
0.00
Original
CL
BTER
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
0.40
0.20
0.00
Original
CL
BTER
100
101
103
102
Degree
104
100
101
102
Degree
103
(e) Mode 1: MovieLens (Movies/Critics)
(f) Mode 2: MovieLens (Movies/Critics)
FIG. 7: Mode 2: MovieLens (Movies/Critics)
MEASURING AND MODELING BIPARTITE GRAPHS
19 of 23
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
0.05
0.00
Original
CL
BTER
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
0.08
0.06
0.04
0.02
0.00
Original
CL
BTER
100
101
102
Degree
103
100
101
102
103
Degree
104
105
(a) Mode 1: MillionSong (Users/Songs)
(b) Mode 2: MillionSong (Users/Songs)
0.08
0.06
0.04
0.02
0.00
0.10
0.05
0.00
Original
CL
BTER
100
101
103
104
102
Degree
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
0.10
0.05
0.00
100
Original
CL
BTER
101
102
Degree
103
(c) Mode 1: Peer2Peer (Peers/Files)
(d) Mode 2: Peer2Peer (Peers/Files)
Original
CL
BTER
Original
CL
BTER
)
n
i
B
r
e
p
n
a
e
M
(
s
i
s
o
h
p
r
o
m
a
t
e
M
0.15
0.10
0.05
0.00
101
102
100
102
104
106
Degree
Degree
(e) Mode 1: LiveJournal (Users/Groups)
(f) Mode 2: LiveJournal (Users/Groups)
FIG. 8: Mode 2: LiveJournal (Users/Groups)
20 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
103
100
10−3
100
Original
CL
BTER
101
Degree
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
105
101
10−3
Original
CL
BTER
102
100
101
102
Degree
(a) Mode 1: IMDB (Actors/Movies)
(b) Mode 2: IMDB (Actors/Movies)
105
101
10−3
102
10−1
10−4
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
105
100
10−5
Original
CL
BTER
Original
CL
BTER
100
101
102
Degree
103
100
101
103
104
102
Degree
(c) Mode 1: Flickr (Users/Groups)
(d) Mode 2: Flickr (Users/Groups)
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
103
100
10−3
Original
CL
BTER
101
102
Degree
103
Original
CL
BTER
100
101
103
104
102
Degree
(e) Mode 1: MovieLens (Movies/Critics)
(f) Mode 2: MovieLens (Movies/Critics)
FIG. 9: Degree distributions illustrating the original (blue), fast BCL (orange), and bipartite BTER
(green). The data is log-binned.
MEASURING AND MODELING BIPARTITE GRAPHS
21 of 23
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
104
100
10−4
Original
CL
BTER
105
100
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
Original
CL
BTER
100
101
102
Degree
103
100
101
103
102
Degree
104
105
(a) Mode 1: MillionSong (Users/Songs)
(b) Mode 2: MillionSong (Users/Songs)
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
105
100
10−5
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
105
101
10−3
Original
CL
BTER
100
101
102
Degree
103
Original
CL
BTER
100
101
103
104
102
Degree
(c) Mode 1: Peer2Peer (Peers/Files)
(d) Mode 2: Peer2Peer (Peers/Files)
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
104
102
100
Original
CL
BTER
)
n
i
B
r
e
p
n
a
e
M
(
t
n
u
o
C
107
100
10−7
Original
CL
BTER
100
101
Degree
102
100
102
104
106
Degree
(e) Mode 1: LiveJournal (Users/Groups)
(f) Mode 2: LiveJournal (Users/Groups)
FIG. 10: Degree distributions illustrating the original (blue), fast BCL (orange), and bipartite BTER
(green). The data is log-binned.
22 of 23
S. AKSOY, T. G. KOLDA, AND A. PINAR
Acknowledgments
We thank our colleagues for helpful discussions in the course of this work, especially Grey Ballard,
Kenny Chowdhary, Danny Dunlavy, Kevin Matulef, and Michael Wolf. We also thank the two anony-
mous referees for insightful comments that improved the work considerably.
REFERENCES
1. Aiello, W., Chung, F. & Lu, L. (2001) A random graph model for power law graphs. Experimental Mathemat-
ics, 10, 53–66.
2. Barab´asi, A.-L. & Albert, R. (1999) Emergence of scaling in random networks. Science, 286, 509–512.
3. Bertin-Mahieux, T., Ellis, D. P. W., Whitman, B. & Lamere, P. (2011) The Million Song Dataset. In ISMIR
2011: Proc. 12th Intl. Conf. on Music Information Retrieval. University of Miami.
4. Bez´akov´a, I., Bhatnagar, N. & Vigoda, E. (2006) Sampling binary contingency tables with a greedy start.
Random Structures and Algorithms, 30(1-2), 168205.
5. Chen, Y., Diaconis, P., Holmes, S. P. & Liu, J. S. (2005) Sequential Monte Carlo Methods for Statistical
Analysis of Tables. Journal of the American Statistical Association, 100(469), 109120.
6. Chung, F. & Lu, L. (2002a) The average distances in random graphs with given expected degrees. Proceedings
of the National Academy of Sciences, 99(25), 15879–15882.
7. Chung, F. & Lu, L. (2002b) Connected components in random graphs with given degree sequences. Annals of
Combinatorics, 6, 125–145.
sity of Minnesota.
8. Davies, R. (2009) MovieLens 10M. GroupLens, Department of Computer Science and Engineering, Univer-
9. Dhillon, I. S. (2001) Co-clustering documents and words using bipartite spectral graph partitioning. In KDD
'01: Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data
mining, pages 269–274, New York, NY, USA. ACM.
10. Dormann, C. F., Frund, J., Bluthgen, N. & Gruber, B. (2009) Indices, Graphs and Null Models: Analyzing
Bipartite Ecological Networks. The Open Ecology Journal, 2(1), 724.
11. Durak, N., Kolda, T. G., Pinar, A. & Seshadhri, C. (2013) A Scalable Null Model for Directed Graphs Match-
ing All Degree Distributions: In, Out, and Reciprocal. In NSW 2013: Proceedings of IEEE 2013 2nd Interna-
tional Network Science Workshop, pages 23–30.
12. Ganguly, N., Ghosh, S., Krueger, T. & Srivastava, A. (2012) Degree distributions of evolving alphabetic
bipartite networks and their projections. Theoretical Computer Science, 466, 2036.
13. Guillaume, J.-L. & Latapy, M. (2004) Bipartite structure of all complex networks. Information Processing
14. Guillaume, J.-L. & Latapy, M. (2006) Bipartite Graphs as Models of Complex Networks. Physica A, 371,
15. Harper, F. M. & Konstan, J. A. (2015) The MovieLens Datasets. ACM Transactions on Interactive Intelligent
Letters, 90(5), 215221.
795–813.
SystemsMar, 5(4), 1–19.
16. Holland, P. W. & Leinhardt, S. (1970) A Method for Detecting Structure in Sociometric Data. American
Journal of Sociology, 76(3), 492–513.
17. Kannan, R., Tetali, P. & Vempala, S. (1999) Simple Markov-chain algorithms for generating bipartite graphs
and tournaments. Random Structures and Algorithms, 14(4), 293308.
18. Kolda, T. G., Pinar, A., Plantenga, T. & Seshadhri, C. (2014) A Scalable Generative Graph Model with
Community Structure. SIAM Journal on Scientific Computing, 36(5), C424–C452.
19. Latapy, M. (2006) Bipartite Graph Tools, Version 1.0. .
20. Latapy, M., Magnien, C. & Vecchio, N. D. (2008) Basic Notions for the Analysis of Large Two-mode Net-
works. Social Networks, 30(1), 31–48.
21. McFee, B., Bertin-Mahieux, T., Ellis, D. P. & Lanckriet, G. R. (2012) The Million Song Dataset Challenge.
In WWW'12 Companion: Proc. 21st Intl. Conf. Companion on World Wide Web, pages 909–916.
22. Mikl´os, I., Erdos, P. L. & Soukup, L. (2013) Towards random uniform sampling of bipartite graphs with given
MEASURING AND MODELING BIPARTITE GRAPHS
23 of 23
degree sequence. Electronic Journal of Combinatorics, 20(1), P16.
23. Milojevi´c, S. (2010) Power Law Distributions in Information Science: Making the Case for Logarithmic
Binning. Journal of the American Society for Information Science and Technology, 61(12), 2417–2425.
24. Mislove, A. (2015) Personal Communication. .
25. Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P. & Bhattacharjee, B. (2007) Measurement and Anal-
ysis of Online Social Networks. In IMC'07: Proceedings of the 7th ACM SIGCOMM Conference on Internet
Measurement, pages 29–42, San Diego, CA.
26. Nacher, J. C., Ochiai, T., Hayashida, M. & Akutsu, T. (2009) A mathematical model for generating bipartite
graphs and its application to protein networks. Journal of Physics A: Mathematical and Theoretical, 42(48),
485005.
27. Newman, M. E. J. (2001) The Structure of Scientific Collaboration Networks. Proceedings of the National
Academy of Sciences, 98(2), 404–409.
28. Newman, M. E. J. (2003) The Structure and Function of Complex Networks. SIAM Review, 45(2), 167–256.
29. Newman, M. E. J., Strogatz, S. H. & Watts, D. J. (2001) Random graphs with arbitrary degree distributions
30. Opsahl, T. (2013) Triadic Closure in Two-mode Networks: Redefining the Global and Local Clustering Coef-
and their applications. Physical Review E, 64(2).
ficients. Social Networks, 35(2), 159–167.
31. Opsahl, T. (2015) Tnet Datasets. .
32. Peruani, F., Choudhury, M., Mukherjee, A. & Ganguly, N. (2007) Emergence of a non-scaling degree distri-
bution in bipartite networks: A numerical and analytical study. Europhysics Letters (EPL), 79(2), 28001.
33. Robins, G. & Alexander, M. (2004) Small Worlds Among Interlocking Directors: Network Structure and
Distance in Bipartite Graphs. Computational & Mathematical Organization Theory, 10(1), 69–94.
34. Saavedra, S., Reed-Tsochas, F. & Uzzi, B. (2008) A simple model of bipartite cooperation for ecological and
organizational networks. Nature, 457(7228), 463466.
35. Seshadhri, C., Kolda, T. G. & Pinar, A. (2012) Community Structure and Scale-free Collections of Erdos-
R´enyi Graphs. Physical Review E, 85(5).
36. Sun, J., Qu, H., Chakrabarti, D. & Faloutsos, C. (2005) Relevance Search and Anomaly Detection in Bipartite
Graphs. SIGKDD Explorations Newsletter, 7(2), 48–55.
37. Tait, M. & Verstraete, J. (2016) On Sets of Integers with Restrictions on Their Products. European Journal of
Combinatorics, 51, 268–274.
38. Watts, D. & Strogatz, S. (1998) Collective dynamics of 'small-world' networks. Nature, 393, 440–442.
39. The Echo Nest Taste Profile Subset,
the Official User Data Collection for the Million Song Dataset.
http://labrosa.ee.columbia.edu/millionsong/tasteprofile.
|
1712.02245 | 2 | 1712 | 2018-01-15T15:18:12 | Viral content propagation in Online Social Networks | [
"cs.SI"
] | Information flows are the result of a constant exchange in Online Social Networks (OSNs). OSN users create and share varying types of information in real-time throughout a day. Virality is introduced as a term to describe information that reaches a wide audience within a small time-frame. As a case, we measure propagation of information submitted in Reddit, identify different patterns and present a multi OSN diffusion analysis on Twitter, Facebook, and 2 hosting domains for images and multimedia, ImgUr and YouTube. Our results indicate that positive content is the most shared and presents the highest virality probability, and the overall virality probability of user created information is low. Finally, we underline the problems of limited access in OSN data. Keywords: Online Social Networks, Virality, Diffusion, Viral Content, Reddit, Twitter, Facebook, ImgUr, YouTube | cs.SI | cs |
Viral content propagation in Online Social
Networks
Giannis Haralabopoulos
University of Southampton
[email protected]
Ioannis Anagnostopoulos
University of Thessaly
[email protected]
Sherali Zeadally
University of Kentucky
[email protected]
January 17, 2018
Abstract
Information flows are the result of a constant exchange in Online Social
Networks (OSNs). OSN users create and share varying types of informa-
tion in real-time throughout a day. Virality is introduced as a term to
describe information that reaches a wide audience within a small time-
frame. As a case, we measure propagation of information submitted in
Reddit, identify different patterns and present a multi OSN diffusion anal-
ysis on Twitter, Facebook, and 2 hosting domains for images and multi-
media, ImgUr and YouTube. Our results indicate that positive content
is the most shared and presents the highest virality probability, and the
overall virality probability of user created information is low. Finally, we
underline the problems of limited access in OSN data.
Keywords: Online Social Networks, Virality, Diffusion, Viral Content,
Reddit, Twitter, Facebook, ImgUr, Youtube
1 Problem Definition
Online Social Networks (OSNs) are modern information systems that allow users
to interact with friends, acquaintances, family members, colleagues or even un-
known individuals. The information exchanged in these networks is diverse and
includes local or world news, general and scientific facts, quotes, personal pref-
erences, and so on. OSN providers focus on developing new information-sharing
schemes where users can easily disseminate information efficiently.
Information propagation and diffusion fields emphasize the temporal aspects
of information systems. The scale and usability of OSNs have introduced new
terms to describe the propagation phenomenon. Rapid sharing of information
1
on a large scale is informally known as virality. The dynamics of information
describe the properties that constitute, sustain, or modify the topology of the
OSNs based on diffusion and propagation processes such as hierarchy, network
partition, clustering, and others. User influence characterizes the capacity of
OSN nodes to be a compelling force on behaviour and opinion shaping.
Our study focuses on content originating from Reddit, mainly because this
OSN is comprised of both original and reused content, and it offers a liberal
data access policy, and an open Application Programming Interface (API) with
extensive documentation. Reddit is a social news and entertainment site pow-
ered by user generated content. Registered users submit content through a
descriptive link, subject to (up/down)votes. Users who have created a post or
commented on one, gain or lose "karma", a Reddit metric for user ranking.
This metric is calculated as, the sum of all the upvotes minus the sum of all
the downvotes a user receives. Posts that acquire a high vote ratio (positive
to negative) in a short time period after their submission, are moved to the
front page. It is apparent that Reddit community defines the popularity of the
disseminated content and determines its "success" or "failure".
Information is shared and spread among various OSNs, such as Twitter,
Facebook, and Google Plus. Information submitted in any of these OSNs affects
the others as well. Our goal is to measure this impact, along with its properties
and tempo-spatial attributes. We present the two main patterns observed in
information propagation, based on whether the content existed before or was
created for the particular OSN submission. A wider range of sub-patterns is
presented in [12].
2 Related Work
The topic of diffusion has been at the center of sociology interest for many years.
Even before the emergence of OSNs, social ties and information flows have been
studied in traditional real-life social networks.
The notion that information flows, from mass media to opinion leaders and
later on to a wider population as final consumers, was first introduced during
the middle of 40's [19]. Almost a decade later, Kaltz and Lazarsfeld revisited
the subject by proposing their theory of "Two step flow of communication" [17].
In a similar conceptualization, Granovetter and Mark suggested the analysis of
social networks, as a tool for linking micro and macro levels of sociology theory
[7]. Similar conclusions were verified in OSNs after nearly 40 years, while at the
same time, interest in social media analysis skyrocketed [2, 26].
Viral marketing was introduced in 1997 by Juvertson and Draper [15]. Porter
and Golan in [25], found that provocative content is a crucial virality factor.
Leskovec et al.
in [20], modelled outbreak detection via node selection, while
performing a two-fold evaluation of their model. Concerning word of mouth
scenarios, Allsop et al.
in [1], noted that 59% of individuals frequently share
online content. Berger and Milkman in [3], observed that positive content is
more viral than negative.
2
The authors in [5] focused on identifying the optimal network that best
describes information propagation in news media and blogs. In [14], authors
analysed word of mouth through email. Social influence modeling was studied
in [6]. Similarly, the authors in [13], investigated the social influence in meme
social graph. In [32], the authors studied virality lifespan issues in Twitter, as
also mentioned in [13]. In the same OSN (Twitter), Sakaki et al.
[29] studied
users as social sensors by monitoring information flow and dissemination during
earthquake incidents. In [18], the authors analysed the entire Twitter graph in
order to assess its topological characteristics.
In [30], Tucker measured the effectiveness of virality as a marketing tool.
While in [15] direct messages were measured. Interactions had a negative effect
on virality while sharing, engaging, provocative (as defined in [25]) or humorous
content and visual appeal, affected virality in a positive way. In [24], the authors
created a map of the so-called "life cycle" of the blog. Likewise, a virality study
in OSNs conducted by Guerini et al., showed that content is more important
to virality than the influencer itself [9]. By focusing on diffusion analysis of
Twitter, Hansen et al. in [11], observed the effect of negativity on virality. In
other OSN-related researches, the authors of [4] studied the maximization of
influence. The work described in [27] examines the passivity of Twitter users.
In [23], the authors developed an algorithm to describe influence propagation.
Rajyalakshmi et al. in [26], proposed a stochastic model for the diffusion of
several topics. The authors discovered that strong ties play a significant role
in virality, having homophily as a major contributor as observed in [18]. Micro
and macro scales of the network become relevant, as seen in [7]. Furthermore,
the authors of [18] note that, acts within groups have a global impact. Romero
et al.
in [28], analyse hashtag diffusion in Twitter and discovered that initial
adopters of hashtags were fairly important. Yang and Leskovec also studied
content exposure growth and how it fades over time in Twitter [33]. Huang
et al.
in [21] tried to effectively select a number of nodes in order to monitor
information diffusion. In a different but of related context study, Guerini et al.
in [8] noted that the dynamics of Social Networks exist in the scientific literature
and used psycholinguistic analysis to determine how abstracts affect virality.
The authors of [10], studied the dynamics of information diffusion process.
Furthermore in [2], Bakshy et al. addressed the problem of information diffusion
in OSNs. The authors ended up with the statement stated in [7, 18] that, strong
ties are more influential but weak ties are responsible for propagating novel
In [16], the authors investigated why and how some messages
information.
in OSNs become viral. Finally, Weng et al.
in [31], analysed longitudinal
microblogging data.
In this research, we aim to quantify the linkage of various OSNs based on
contextual analysis, as well as to measure the diffusion in these OSNs, thus
addressing a gap in the related literature. Based on the related works discussed,
in this work, we:
• Aim to identify patterns of propagation similar to the work described in
[14]
3
• Validate virality upon time with an easy to calculate criterion similar to
metrics described in works [3, 6, 13, 30, 9, 11]
• Expand the concept of information diffusion across multiple OSNs, unlike
the works described in [32, 18, 4, 27], and [16] that deal with the same
concept but within one OSN
3 Methodology and Dataset
For our study, we need domains that provide viewership counters in order to
monitor and examine information propagation features. ImgUr and YouTube
count views according to the users IP address, Reddit only provides the voting
count of a post. As such, the sum of negative and positive votes is used as the
Reddit views counter. We were aware that both the absence of an IP based view
counter and the method Reddit uses to fuse voting, introduce some inaccuracy
in our results. However, since our main aim is toward propagation rather than
viewership volume, such kind of inaccuracy does not affect our initial perception
of information flows.
In some preliminary tests we performed on Facebook and Google Plus, we
observed that both demonstrated a fairly low propagation even on viral content.
This is because both APIs of the above mentioned OSNs do not provide access to
private posts. Thus, only public posts were taken into consideration. Addition-
ally, the network usage of Google Plus is fairly low compared to Facebook. After
considering these factors, we decided to include only Facebook in our analysis.
Finally, in order to present our results in a consistent format between different
OSNs, we address all kinds of viewership count as "Units of Interest" (UoI).
A single Unit of Interest is equal to one content view in its domain (ImgUr or
YouTube), one vote in Reddit, one mention in Twitter or one mention/like in
Facebook.
To discard content that is not gaining attention rapidly, we employed a
simple rule (mentioned hereafter as check criterion). In this rule, we examined
if "Units of Interest" in Reddit are doubled in absolute numerical values for
every check, for the first 4 checks after the creation of the post, as required by
our virality criterion. Ou proposed criterion can be applied in real time with
only a few calculations, a key difference from existing methods . Only only a
small percentage of all posts reached high viewership counts within such a short
time span. 0.66% of the posts analyzed actually passed this UoI check criterion
in our dataset (682 out of nearly 102400 posts).
4 Results
In this section, we present and analyse the results derived from our scraping
procedure. Data is separated based on the the hosting domain. Reddit posts
include topics such as "AdviceAnimals", "Aww", "Eathpon", "Funny", "Gam-
4
ing", "Gif", "Movies", "Music", "Pics", "TIL", "Videos" and "WTF", and all
were discovered with our scraping period.
4.1 Posts and Counters
We scrapped two different subreddits, "new" and "rising". In total, we found
nearly 45000 ImgUr and YouTube posts in the "rising" category and nearly
70000 in the "new" category. More specifically, the posts of the "rising" cate-
gory revealed 40966 links to ImgUr and 3084 links to YouTube. Similarly, the
distribution for posts from the "new" category for ImgUr and YouTube was
51984 and 6366 respectively.
We also observed that the "new" subreddit content is more likely to become
viral compared to the content in "rising" subreddit. Content featured in "new"
subreddit was twice as likely to pass our UoI check, while content in "rising"
category presented a higher initial UoI count but fell short on our criterion
(which is doubling the UoI count in the first four check). Out of 40966 posts
linking to ImgUr in "rising" subreddit, only 200 satisfied our check criterion
(0.48%). As for posts linking to YouTube, out of 3084 posts in total, only 14
satisfy our check (0.45%). In contrast, in "new" subreddit, out of the 51984
posts that linked to ImgUr, 431 doubled their UoI count in 4 subsequent checks
(0.82%). Similarly, the number of posts that linked to YouTube and successfully
passed our UoI criterion, was 37 out of 6366 (0.58%).
The UoI criterion presented is not a virality validation, yet it provides strong
evidence that the posts analysed have been viewed by enough viewers, within a
small time-frame and the interest is not diminishing. Among 682 highly viewed
posts, 631 were linked to ImgUr and 51 were linked to YouTube.
As mentioned in [1, 3], positive and entertaining content was found as the
most frequently shared topic.
In our case, we could label "AdviceAnimals",
"Funny" and "WTF topics", as entertaining content. "Aww" and "Eathpon"
can be considered as containing emotive content, as described in [25]. "TIL"
is mainly informative, while "Pics" and "Videos" characterize mixed content
types. "Gaming", "Movies" and "Music" contain entertainment content.
Entertaining content and positive content are shared more frequently than
anything else. Although provocative content and controversial content can be
created within Reddit and ImgUr, they rarely get enough votes to appear on
the front page. Most of the time, they appear in the form of a "news" or
"TIL" post. The number of "gaming" posts that passed our check criterion is
descriptive of the interests of Reddit users, especially when compared to other
forms of established entertainment such as movies and music. Out of the 682
posts, 371 were mentioned in Twitter, 7 in Facebook and 172 in both OSNs.
Posts of "funny" topic are the most shared in both Twitter and Facebook,
but are not included among the top-shared topics. Additionally, almost every
category presents high Twitter and low Facebook sharing percentage (a direct
result of the Facebook API limitations). "Eathpon" posts with photographs
from around the world were 100% shared in Twitter. The majority of "Music"
and "TIL" posts are shared in both OSNs, but the number of posts in these
5
categories is low. In contrast, 50% of of viral posts from "Videos" and "Movies"
are shared on all OSNs, confirming the positive attitude of Internet users towards
multimedia content.
Topics with high number of viral posts ("AdviceAnimals", "Aww", "Funny",
"Gaming" and "Pics"), were found to have the highest sharing percentage for
both OSNs pertaining to "Pics" post from "rising" subreddit (41.38%), followed
by "Funny" posts from "new" subreddit (29.75%).
In contrast, "Aww" and
"Gaming" posts from the "new" subreddit had the lowest percentages (10.53%
and 13.04% respectively). Posts from "new" subreddit were more often shared
in Twitter compared to posts from "rising" subreddit, for every topic except
"Funny".
4.2 Online Social Network Propagation
UoI checks were simultaneously conducted on (at least) an hourly-basis for Red-
dit, Twitter, Facebook and the domain the image or video was hosted (ImgUr
or YouTube). Thus, we were able to observe the propagation of a certain Reddit
post and content in both OSNs. We wanted to measure a slow-rate information
propagation from its source to both OSNs. In fact, such a propagation pattern
was indeed found and was the most common propagation standard throughout
our analysis of the posts and topics.
Figure 1: Percent UoI Variation over time, ImgUr
The time interval between subsequent checks performed in the tested do-
mains (Reddit, ImgUr or YouTube, Twitter and Facebook) is at least one hour
and the first check of every post has zero UoI. Each post was monitored for 7
days. We found that after 14 checks, the interest (in terms of UoI variation)
declines significantly. The mean number of checks was 65 per post, while the
14th check happened within a 24-hour period from the creation of the post.
6
2468101210−1100101102ImgUrRedditTwitter Adj.Facebook Adj.All posts are filtered to include those that manage to double their UoI (in
absolute numerical values) on Reddit on an hourly basis for a 4-hour time-frame.
Consequently, every post we analysed had high Reddit UoI variance for the first
5 checks, but only a few of them had higher levels of variance after that point.
As far as our OSN data scraping is concerned, we only had access to information
from the public API of Facebook, while on Twitter we could only check messages
within a timespan of a week due to Twitter API limitations.
Figure 1 presents the UoI variation over time for ImgUr, where its UoI are
growing at a high rate concurrently with Reddit, followed by Twitter with a
relatively small level of interest, and Facebook with delayed and low interest.
Similar patterns appeared in all of the distinct categories, while in most of
the cases Facebook had nearly zero level of interest. This specific pattern was
the most common in our research and appeared in 14 out of 18 ImgUr topics.
Topics such as "AdviceAnimals", "Aww, "Funny", "Eathpon", "Gif" "Pics"
and "WTF", followed this pattern - in both "rising" and "new" subreddits.
However in both "Gif" categories, interest variation in Reddit is slightly higher
than Domain.
Figure 2: Percent UoI Variation over time, YouTube
On YouTube content, we encountered a completely different propagation
pattern, Figure 2. In most cases, domain UoI was not seriously affected by the
increased interest in OSNs and Reddit. This is mainly because shared content
in YouTube is not necessarily new, but a video that existed for a long time and
becomes mildly popular over time. In our evaluation, the videos under study
presented a very high initial UoI count which resulted in a low UoI variance.
Apart from that, we observed high UoI variance in Reddit and Twitter, low UoI
variance in Facebook, and practically zero UoI variance in the YouTube.
7
2468101210−1100101102103YouTubeRedditTwitter Adj.Facebook Adj.5 Discussion - Future Work
Our analysis verified many observations of previous researches mainly with re-
spect to the micro and macro effects of information flows [19, 17, 16]. More
specifically, a single post (micro effect) in the parent domain connected with a
post in Reddit, starts to accumulate views (macro effect) up to a point where
the information hops to OSNs (first in Twitter and then in Facebook) flow-
ing through individuals and eventually the interest dies off. Positive content
is confirmed to be the mostly shared content in OSNs as mentioned in [25, 3].
Similarly to [13], we found out that a Reddit post is most popular within the
first few hours after its creation. This effect is also enhanced by the classification
method of Reddit, where new posts need fewer votes (compared to old posts)
to move to the first page.
As mentioned, we have observed that the most shared posts are positive and
entertaining content as observed in [1, 3]. These categories include post from
topics such as "AdviceAnimals", "Funny" and "WTF topics, while we also iden-
tified emotive posts, as described in [25] on topics such as "Aww" and "Eath-
pon". Unfortunately, not enough viral posts of such content were found, in order
to allow the identification of their propagation model. "Gaming", "Movies" and
"Music" contain user-centric and very specific entertainment content, with low
post appearance but a high viral to total posts ratio, while, "TIL" is mainly
informative and is rarely used in posts linking to either ImgUr or Youtube.
The fact that only public Facebook can be scraped is a big factor to those
particular UoI. This means that content posts and view counts on Facebook
are significantly higher. Nonetheless, the approximate propagation timeframe
should not be affected because of the ripple effect of social interactions [22]. To
summarize, the most notable results of our research are:
• Online Social Networks are connected via shared information
• Shared content is mostly positive and positive content is more viral
• Shared (user generated) content has a small lifetime
• Low percentage of content can be considered as viral
• Information flows have micro and macro effects across networks they tra-
verse
• API limitations prevent further diffusion analysis
Information starts within a domain and hops to various other media within
minutes. However, upon its propagation, information flows within the original
domain do not stop, but slow down within a small period of time. Entertainment
content and positively emotive content are the most "viral", and persistence
was only found in gaming posts. Movies related posts were the only ones that
spread nearly simultaneously to every domain and OSN. We should consider a
8
new perception of information flow, one that would accurately describe content
sharing in modern OSNs.
The research community can examine what kinds of social media platforms
play the role of information broker for other ones, as well as what kinds of in-
formation their users prefer to link across different media and why. Are some
social media not capable enough of making a post viral? Is the linkage made
intentionally, or users are biased? On the other hand, social media managers
can investigate probable common information channels across other social net-
working services, reveal groups of users with similar interests, or even compare
usage and market share (market position). Finally, one can also identify the dis-
tinct role of any OSN with respect to information propagation and information
lifespan (e.g. in contrast to Twitter users, users of Reddit use the service for not
time-sensitive posts like bookmarking), by utilizing similar research methods.
In our next step, we will consider precise diffusion analysis relative to time.
Since we have already confirmed the connection of several OSNs in this work,
in the future we will look into the time frames of each OSN diffusion. But such
analysis would require data timestamps and an algorithm designed for speed.
Unfortunately our serial algorithm was designed without any time considerations
and lacked the ability to simultaneously analyse thousands of posts. We plan to
refine our scraping and analysis method to achieve those goals. Our long-term
objective is to create a viral post tool that can analyse every OSN available.
We hope that future data from these OSNs will not be locked behind pay-walls
and data access would be unobstructed, so that every scientist will be able to
analyse these unique large-scale, content-based social networks.
Additionally, we also plan to analyse a wider range of topics (such as news
or similar, which lacked required counters to observe its diffusion) in as many
OSNs as we can. We were surprised to observe that various posts in Reddit of
News topic attracted users' attention within Reddit long before being reported
in dedicated news sites. Similarly, more sites with unrestricted APIs could be
added to our analysis tool so that we can analyse similar information diffusion
metrics. Diversity of topics and sites does not affect virality analysis but it
would however have an impact on the complexity of our algorithm, while being
able to provide more interesting results. In the future, we will investigate the
aforementioned issues with a strong focus on virality, information flows and
time.
9
References
[1] Dee T Allsop, Bryce R Bassett, and James A Hoskins. 2007. Word-of-mouth
research: principles and applications. Journal of advertising research 47, 4
(2007), 398–411.
[2] Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. 2012.
The role of social networks in information diffusion. In Proceedings of the
21st international conference on World Wide Web. ACM, 519–528.
[3] Jonah Berger and Katherine L Milkman. 2012. What makes online content
viral? Journal of marketing research 49, 2 (2012), 192–205.
[4] Francesco Bonchi. 2011. Influence Propagation in Social Networks: A Data
Mining Perspective. IEEE Intelligent Informatics Bulletin 12, 1 (2011), 8–
16.
[5] Manuel Gomez Rodriguez, Jure Leskovec, and Andreas Krause. 2010. In-
ferring networks of diffusion and influence. In Proceedings of the 16th ACM
SIGKDD international conference on Knowledge discovery and data min-
ing. ACM, 1019–1028.
[6] Amit Goyal, Francesco Bonchi, and Laks VS Lakshmanan. 2010. Learning
influence probabilities in social networks. In Proceedings of the third ACM
international conference on Web search and data mining. ACM, 241–250.
[7] M Granovetter. 1973. The Strength of Weak ties American journal of
Sociology 78: 13 60-1380. Examines the role of ties within a group and
their effect on performance (1973).
[8] Marco Guerini, Alberto Pepe, and Bruno Lepri. 2012. Do linguistic style
and readability of scientific abstracts affect their virality?. In ICWSM.
[9] Marco Guerini, Carlo Strapparava, and Gozde Ozbal. 2011. Exploring Text
Virality in Social Networks.. In ICWSM.
[10] Adrien Guille and Hakim Hacid. 2012. A predictive model for the temporal
dynamics of information diffusion in online social networks. In Proceedings
of the 21st international conference on World Wide Web. ACM, 1145–1152.
[11] Lars Kai Hansen, Adam Arvidsson, Finn Arup Nielsen, Elanor Colleoni,
and Michael Etter. 2011. Good friends, bad news-affect and virality in
twitter. Future information technology (2011), 34–43.
[12] Giannis Haralabopoulos, Ioannis Anagnostopoulos, and Sherali Zeadally.
2015. Lifespan and propagation of information in On-line Social Networks:
A case study based on Reddit. Journal of network and computer applica-
tions 56, (2015), 88–100. Elsevier.
10
[13] Dino Ienco, Francesco Bonchi, and Carlos Castillo. 2010. The meme ranking
problem: Maximizing microblogging virality. In Data Mining Workshops
(ICDMW), 2010 IEEE International Conference on. IEEE, 328–335.
[14] Jos´e Luis Iribarren and Esteban Moro. 2011. Affinity paths and information
diffusion in social networks. Social networks 33, 2 (2011), 134–142.
[15] Steve Jurvetson and Tim Draper. 1997. Viral marketing: Viral marketing
phenomenon explained. DFJ Network News (1997).
[16] Aditya Karnik, Atul Saroop, and Vivek Borkar. 2013. On the diffusion of
messages in on-line social networks. Performance Evaluation 70, 4 (2013),
271–285.
[17] Elihu Katz and Paul Felix Lazarsfeld. 1966. Personal Influence, The part
played by people in the flow of mass communications. Transaction Publish-
ers.
[18] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. 2010. What
is Twitter, a social network or a news media?. In Proceedings of the 19th
international conference on World wide web. ACM, 591–600.
[19] Paul Felix Lazarsfeld, Bernard Berelson, and Hazel Gaudet. 1948. The
peoples choice: how the voter makes up his mind in a presidential campaign.
(1948).
[20] Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos,
Jeanne VanBriesen, and Natalie Glance. 2007. Cost-effective outbreak de-
tection in networks. In Proceedings of the 13th ACM SIGKDD international
conference on Knowledge discovery and data mining. ACM, 420–429.
[21] Yongcheng Li, Shuguang Huang, Chaoran Fan, and Guozheng Yang. 2013.
The selection of information diffusion monitoring nodes in directed online
social networks. In Proceedings of the 2012 international conference on in-
formation technology and software engineering. Springer, 533–540.
[22] Norman Long. 2003. Development sociology: actor perspectives. Routledge.
[23] Michael Mathioudakis, Francesco Bonchi, Carlos Castillo, Aristides Gionis,
and Antti Ukkonen. 2011. Sparsification of influence networks. In Proceed-
ings of the 17th ACM SIGKDD international conference on Knowledge
discovery and data mining. ACM, 529–537.
[24] Karine Nahon, Jeff Hemsley, Shawn Walker, and Muzammil Hussain. 2011.
Blogs: spinning a web of virality. In Proceedings of the 2011 iConference.
ACM, 348–355.
[25] Lance Porter and Guy J Golan. 2006. From subservient chickens to brawny
men: A comparison of viral advertising to television advertising. Journal
of Interactive Advertising 6, 2 (2006), 30–38.
11
[26] S Rajyalakshmi, Amitabha Bagchi, Soham Das, and Rudra M Tripathy.
2012. Topic diffusion and emergence of virality in social networks. arXiv
preprint arXiv:1202.2215 (2012).
[27] Daniel M Romero, Wojciech Galuba, Sitaram Asur, and Bernardo A Hu-
berman. 2011. Influence and passivity in social media. In Proceedings of
the 20th international conference companion on World wide web. ACM,
113–114.
[28] Daniel M Romero, Brendan Meeder, and Jon Kleinberg. 2011. Differences
in the mechanics of information diffusion across topics:
idioms, political
hashtags, and complex contagion on twitter. In Proceedings of the 20th
international conference on World wide web. ACM, 695–704.
[29] Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake
shakes Twitter users: real-time event detection by social sensors. In Pro-
ceedings of the 19th international conference on World wide web. ACM,
851–860.
[30] Catherine E Tucker. 2014. The reach and persuasiveness of viral video ads.
Marketing Science 34, 2 (2014), 281–296.
[31] Lilian Weng, Jacob Ratkiewicz, Nicola Perra, Bruno Gon¸calves, Carlos
Castillo, Francesco Bonchi, Rossano Schifanella, Filippo Menczer, and
Alessandro Flammini. 2013. The role of information diffusion in the evolu-
tion of social networks. In Proceedings of the 19th ACM SIGKDD interna-
tional conference on Knowledge discovery and data mining. ACM, 356–364.
[32] Jiang Yang and Scott Counts. 2010. Predicting the Speed, Scale, and Range
of Information Diffusion in Twitter. ICWSM 10 (2010), 355–358.
[33] Jaewon Yang and Jure Leskovec. 2011. Patterns of temporal variation in
online media. In Proceedings of the fourth ACM international conference
on Web search and data mining. ACM, 177–186.
12
|
1302.4765 | 1 | 1302 | 2013-02-19T22:11:52 | Design Features for the Social Web: The Architecture of Deme | [
"cs.SI",
"cs.SE"
] | We characterize the "social Web" and argue for several features that are desirable for users of socially oriented web applications. We describe the architecture of Deme, a web content management system (WCMS) and extensible framework, and show how it implements these desired features. We then compare Deme on our desiderata with other web technologies: traditional HTML, previous open source WCMSs (illustrated by Drupal), commercial Web 2.0 applications, and open-source, object-oriented web application frameworks. The analysis suggests that a WCMS can be well suited to building social websites if it makes more of the features of object-oriented programming, such as polymorphism, and class inheritance, available to non-programmers in an accessible vocabulary. | cs.SI | cs | To appear in 8th Int’l Wo rkshop on Web-Orien ted Software Techno logies (IWWOST 2009)
Design Features for the Social Web:
The Architecture of Deme
Todd R. Davies and Mike D . Mintz
Symbolic Systems P rogram, S tan ford University , Stanford, California, 94305-2150 USA
[email protected] tanfo rd.edu, MikeM [email protected] rd.edu
Abstract. We characterize the “social Web” and argue for several features that are
desirable for users of socially o riented web applications. We describe the architec-
ture of Deme, a web content management sy stem (WCMS) and extensible frame-
work, and show how it implements these desired features. We then compare Deme
on our desiderata with other web technologies: traditional HTML, previou s open
source WCMS s (illustrated by Drupal), commercial Web 2.0 application s, and
open-source, object-oriented web application frameworks. The analysis suggests
that a WCMS can be well suited to building social websites if it makes more of the
features of object-o riented programm ing, such as polymorphism , and class inheri-
tance, availab le to nonprogrammers in an accessible vocabulary.
Keywords: conten t management sy stems, content management frameworks, social
web applications, user controlled data
1 Introduction
In early February of 2009, the social networking website Facebook.com changed its
Terms of Serv ice (ToS) agreement, apparently taking away users’ r ight to remove, and
thereby to revoke Facebook’s license to, their con ten t [16]. The move by Facebook
caused considerable con troversy, lead ing to a threatened lawsuit by privacy advocates ,
headline stories in major media, and an online revolt within Facebook by groups of its us-
ers. After several press commun iqués and blog posts by Facebook representatives defend-
ing the new ToS failed to convince skeptics, the company changed course and rever ted to
its previous Terms of Serv ice agreement [10].
The controversy over Facebook’s ToS showed both the g rowing importance of the
Web’s social functions, as ev idenced by the w idespread media coverage it received, and
also the widespread sensitiv ity of users to questions about who controls their data. Th is
paper exp lores how the arch itecture of a web application can reflect these and o ther goals
in the emerg ing, more socially orien ted Web. Af ter d iscussing use character istics that
distinguish social web applications, we define concep ts and desired features for the social
Web, and then describe the arch itecture of a new, socially oriented web conten t manage-
ment system (WCMS) and ex tensible framework we call Deme (pronounced “deem”),
which imp lements our approach to the challenges posed by our desiderata.
1
Todd R. Davies and Mike D. Min tz
The unusual characteristics of the Web that pose engineering challenges were enumer-
ated by Murugesan and G inige [11]. There are var ious possible approaches to web engi-
neering, includ ing model-driven approaches [e.g. 5,15], principle-based approaches such
as represen tational state transfer (REST)[8], and programming techn iques such as agile
programming [4]. Within specif ic programming language families, a notable development
has been the widespread use of web application frameworks such as Ruby on Rails . A
WCMS is a tool for building web applications without requiring website bu ilders to have
a background in computer programming.1 Our approach combines the user exper ience
goals of WCMSs with concep ts and princip les from object-orien ted web application
frameworks in an architecture built for the social Web .
2 Web 2.0 and the Social Web
The set of trends often referred to as “Web 2.0” – the second generation of web design
and developmen t – compr ise roughly the following [cf 9,14]:
− websites that act as rich Internet applications (RIAs), with substan tial and complex
processing of HTTP requests;
− heavier use of clien t-side processing, i.e. more code loaded into the browser and less
need for full page requests;
− larger websites supporting many in teracting users, such as Wik ipedia, Youtube, and
Facebook; and
− availab ility and use of new , higher- level programming tools such as web app lication
frameworks and rich Internet application frameworks.
In contrast to Web 2 .0, the earlier generation (“Web 1.0”) was based on the browser/client
requesting full HTML pages or med ia files from a server directory, thin clien ts, relatively
little in teractiv ity with users, and little server-side code. The transition between the two
was gradual, w ith some features of Web 2 .0 being present even on some ear ly websites .
Web conten t management systems pre-dated the introduction of the term “Web 2 .0” in
2004 [14], and their development has lagged beh ind the phenomena cited above. The
most popular general-purpose WCMSs today (Joomla/Mambo, Drupal, and Plone) were
all first released in 2001-’02, and since then site administrators have grav itated toward
newer versions of these tools rather than to newer WCMSs.2 The greater emphasis on
large (usually commercial) sites availab le to end users, on one hand, and developer tools
requiring programming skills, on the other , has made nonprogrammers who admin ister
websites less represented in the grow th of the Web than both end users and programmers.
But, as we will see, the characteristics of WCMSs are especially appropriate for the social
Web.
While “Web 2 .0” refers to a generation of technologies and trends that emerged in the
second decade of the Web’s existence, the term “social Web” refers to character istics of
1 See http ://www .contentmanager.eu.com/histo ry.htm.
2 See http://mameou.wordpress.com/2008/05/31/dries-buytaert-vision-of-drupal/. Wordpress, wh ich
is more specific to blog management, was introduced a few years later and also been very suc-
cessful. It could also be classified as a CMS , but is less general purpose than the other three tools
cited.
2
To appear in 8th Int’l Wo rkshop on Web-Orien ted Software Techno logies (IWWOST 2009)
web applications that pre-dated and will ou tlast the Web 2.0 era. The following use char-
acteristics distinguish social web applications from non-social ones [2,12]:
User-generated social content. Social web applications enable site visitors to submit
conten t that others can access, such as photos , their own profile data, links to other web-
sites, and comments on o ther users’ conten t.
Social network ing. Users of social web applications jo in together in online groups and
relationships (e.g. friends), which allow them to see iden tity-related information about the
people to whom they are connected .
Collaborat ion. Users engage in conversations , co-creation of content (e.g. on w ikis) ,
collaborative filtering , and collective action.
Cross-platform data sharing. Increasingly, shar ing content requires that a user be
able to transfer data across sites , imp lying that the site on which the remote content is to
be shared can interface correctly with the other site’s data. When the remo te data need to
be processed locally , the two sites must agree on its meaning, which is a def ining charac-
ter istic of the semantic Web [1,12].
A website need not exhibit all of the above characteristics in order to be considered so-
cial. For examp le, a newspaper b log may enable users to make commen ts, but w ith no
support for networking through member profiles or collaboration. For our purposes, the
main thing that defines the social Web is that it enables visitors, not just site admin istra-
tors, to contribu te some form of content that o ther users can access .
3 Content Management Concepts
We aim to show that our approach to content management provides advantages for the
social Web over other approaches. To do this, we will def ine a set of dimensions through
which content technologies can be compared . Consider the following concepts, with ex-
amples drawn primar ily from traditional web concep ts :
Unit. A chunk of content that can be referenced independently of other chunks, e.g. an
HTML f ile/webpage.
Subsegment. A content segment or portion of a unit; for example, a semantic element
in an HTML file.
Unit type. The classification of a unit of con ten t that def ines its subsegment structure
and constrains what v iewer code can be execu ted in order to display it, e.g. a MIME type.
Behav iors . A set of actions available to a user with respect to a given unit of content,
e.g. the GET, POST, PUT, and DELETE methods of HTTP .
Container. A data structure for grouping multiple units together , e.g . a directory on a
file server.
Type structure. The relationships between un it types , e.g. XHTML is a subtype of
XML.
Type-viewer matching . A system for specifying which v iew code to invoke for a
given unit type, e.g. the preferences-applications table in the Firefox browser.
Relation specif ier. A way to represent and disp lay a relationship between un its , e.g. a
hyperlink.
Access control. The system for specifying a user’s abilities to perform actions , such as
read and write, on a unit of content, e.g. through file system permissions.
3
Todd R. Davies and Mike D. Min tz
Addressing. The means of specifying a particu lar un it, e.g. the URL of a page.
Versioning. A system for stor ing previous versions of a unit, e.g. an arch ive of old
files.
Deletion method(s). A behav ior of a un it that results in it becoming h idden or re-
moved from use, e.g . the rm command in Un ix and the DELETE method of HTTP .
Software license. A legal agreement w ith users specify ing the rights and responsibili-
ties of bo th the user and the provider of a site’s software.
In the next section, we will argue for specific features along these dimensions that are
most compatible w ith the social Web.
4 Guiding Features for Social Web Content Management
The use characteristics of the social Web suggest preferred features from the perspective
of users (i.e. what users themselves are likely to want) . These guiding features can be de-
fined w ith respect to the conten t managemen t concep ts defined in section 3.
Units shou ld be page independent. A web page may contain many pieces of data to
which a user might want independen t access. For example, the comments at the bottom of
a blog posting should, logically , each be addressab le and includable ind ividually, as
should any subset of them. Under HTML, by con trast, the page is the unit of reference.
References to individual elemen ts are possib le through anchors or the DOM, but these are
still tied to a par ticular page. Database tables are page- independent, bu t users do not gen-
erally have page-independent access to them. WCMSs generally allow users or admin is-
trators to def ine page independent units , such as the “nodes” of Drupal,3 but commercial
Web 2.0 sites such as Youtube do not permit end users this capab ility for each conten t
unit, e.g. a par ticular comment. They requ ire a user to refer to a unit through a URL.
Subsegments should be fu lly po intab le. Units themselves can be made up of parts or
subsegmen ts. But a user or content manager in a social web application may want a sub-
segmen t to be a reference to ano ther unit, or to a subsegment within a unit. We call this
feature “full poin tability”. The “creator” subsegmen t of a content unit might poin t, for ex-
ample, to a unit represen ting a particular person. If the unit describ ing a person is div ided
into their name, email address , telephone number , etc., one of their fr iends might want to
place their email address, w ithout any of the other information about that person, in a list
that will dynamically update whenever the email address changes . Although database-
driven web applications generally allow references to o ther units, and the WCMS Drupal
supports pointing to subsegments (node fields) in its Conten t Constructor Kit module,4 in
general commercial Web 2 .0 sites do not allow the user to refer d irectly to con tent fields
or subsegmen ts.
Unit types should be polymorphic. Polymorphism refers to the ability of a unit of data
of one type to be treated as hav ing a different type [3]. Th is is important for the social
Web because, as no ted in section 2, when one person shares conten t with another person,
they may not be on the same platform , and so the code necessary to view a specific type
may not be available to every user. Po lymorphism exists for a unit when its type is a sub-
3 See http ://drupal.o rg/node/19828.
4 See http ://drupal.o rg/project/fieldreference.
4
To appear in 8th Int’l Wo rkshop on Web-Orien ted Software Techno logies (IWWOST 2009)
type of an understood supertype (e.g. an HTML file w ith microformat markup can be
rendered by any HTML interpreter). The Web 2.0 emphasis on both server- and clien t-
side processing can break polymorphism for social web applications, because a g iven
user’s browser may not be compatib le w ith a specific type of content. Cross-p latform data
sharing may also be impossible between differen t applications or even different installa-
tions of the same app lication.
Behaviors should be extensible. In general, a designer of a website w ill not anticipate
all the possible actions and sequences of actions a user may want to do. For examp le, a
user of a search engine may want to sort the results by a cr iterion for which there is no
widget on the site, or a reader of a message board migh t want to view all the posts by
people from a cer tain city. Extensib ility implies that the user can create new behaviors for
a given unit type. Bu t this depends on an ability to modify either the data model or the
view code. WCMSs such as Drupal provide this ability by allowing modif ications of the
open source code, and through optional contributed modules . Commercial Web 2 .0 sites ,
by contrast, often leave the user w ithout a way to add a desired behavior when the code is
not available for modif ication. For examp le, users of many v ideo shar ing sites cannot sort
videos by date.
Containers should be referen tia l. In a tree-structured file system paradigm , the con-
tainer (a folder or directory) stores a copy of each unit (a file), and every file must be
stored in a folder . As Ted Nelson has pointed out [13], th inking this way results in unnec-
essary f ile duplication that can cause incompatibilities . Referential containers , by con-
trast, store only the addresses of content units , and units are stored separately. Th is form
of container is better suited to the Web than value containers are, because differen t people
have d ifferen t ways of categorizing content, and with reference-based categor ies , they
need not in terfere w ith each o ther. Referential containers allow for a single poin t of stor-
age, rather than copies that can be updated d ifferentially and become inconsistent. Social
web applications emphasize practices such as the shar ing of tags or labels , which are ref-
erence containers .
Type structure should be inheritance hierarchical. In Drupal, conten t types such as
“article” and “even t” are def ined in a flat hierarchy , with configurable options, but w ith-
out inheritance of structure from other types.5 A site developer who uses Drupal ex-
pressed the need for type inheritance in the fo llow ing blog commen t in December 20086:
“…the structure of most of our con ten t types is similar, or close enough that much of
the template is the same for all of them . Most of the code in each temp late is repeated
from one to the next. I really w ish there was some kind of content type hierarchy or in-
heritance so those types of proper ties could be passed on to "children" con ten t types.”
The trad itional structure of web pages is very nonhierarchical. Internet media types can
associate different actions to different types of conten t in the browser, bu t they do not ex-
ist in an inheritance hierarchy. Content type inheritance, wh ich is found in only a few en-
terprise CMSs such as Alfresco and Documentum (and no t, to our knowledge, in general
use Web CMSs) has been called by one blogger “the holy grail of conten t management”.7
Type-viewer matching should be server-side specialized. The advantage of content typ-
ing is only fu lly realized if each con tent type is associated with v iew code that is tailored
5 See http ://drupal.o rg/project/inherit regarding experimental conten t type inheritance in Drupal.
6 See http ://www .yelvington.com/node/517.
7 See http ://gadgetopia.com/post/6360.
5
Todd R. Davies and Mike D. Min tz
to that type. This makes it possib le to tailor the user in terface exper ience to the content
type. WCMSs that allow content typing generally specialize the v iew by type to some ex-
tent, but when, as in Drupal, a user can create new conten t types by filling out a form, the
view code must be gener ic enough across con tent types to allow the def inition of a new
type withou t writing code for an associated viewer . This limits the ex tent to which the
viewer can be specialized . Again , web browsers trad itionally render all content as pages
of HTML, and Internet med ia/MIME types are handled differently by each browser . If a
site administrator wan ts all (or near ly all) end users to be able to view content in a spe-
cialized way, the v iew code must be def ined at the server level.
Relation specifiers should be in tegrally un itizab le. Relations between con tent units
such as hyper links have traditionally been specified within one unit, po inting to ano ther
unit. This leads to a basic structure for links that is one-way , which can make it diff icu lt
to detect incoming links. Moreover, specify ing relations with in a unit usually requ ires that
the user specifying the relation have write pr ivileges for the target unit, and that these re-
lations be visible to all users viewing the target unit, such as a web page. In social web
applications , on the other hand, users may wish to specify relations between units in a
way that is external to the related units. For examp le, a user may w ish to inser t a com-
ment at a particu lar location in a document, which will have differen t associated permis-
sions from those of the document itself. Th is is especially useful when referring to docu-
ments on other websites . A lthough even basic HTML supports linking to an external
page, th is kind of reference specifier is not in tegrated within the application, because it is
not visible when v iew ing the referenced pages. A solu tion is to allow relations between
specific locations in con ten t units to be specif ied as units themselves, w ith their own per-
missions, and an integrated tool for displaying references when view ing an item . WCMSs
such as Drupal generally support th is8 but not for the general case of relationships be-
tween locations within units,9
Access contro l should be flu id-granular . Web applications generally provide much
coarser con trol over who can view, ed it, and delete content than does an operating sys-
tem . But th is type of control is what users typically want, because each piece of conten t is
different. Moreover, the ideal pr ivilege def initions are even more complex than in operat-
ing systems , since they can be defined for an arbitrary number of groups, with compli-
cated ru les of precedence, and for each subsegment (field) o f each conten t unit. Commer-
cial websites generally g ive limited control to the user to define these permissions ,
although social networking sites such as Facebook have evolved to be fairly granular.10
Drupal embodies fluid ity through the ability to def ine an indefinite number of roles , or
packages of privileges, and its Content Creator Kit module makes f ield-level permissions
availab le as well.11 But the comb ination of fluid ity (many distinctions between adminis-
trator and user) and granularity (control over each field o f a unit) is very difficult to
achieve and generally not found in commercial Web 2.0 sites .
Addressing should be domain independen t. As much as possible, conten t should be
addressab le independen tly of its path, so that links will no t break if the content moves.
8 See http ://drupal.o rg/node/414018.
9 A well-known advocate of more flex ible reference specifiers, w ith support fo r two-way links and
deep transclusion, has been Ted Nelson [13].
10 See http ://www .allfacebook.com/2009/04/facebook-privacy -limitations/.
11 See http ://drupal.o rg/node/310 and http ://drupal.org/p roject/cck_field_perms.
6
To appear in 8th Int’l Wo rkshop on Web-Orien ted Software Techno logies (IWWOST 2009)
This can be imp lemen ted through redirects , but that depends on the con tent owner’s con-
trol over a domain, since URLs are tied to domain names. Commercial web applications
generally do not support domain- independen t addressing, but Drupal does support a lim-
ited version of it, internally to a site, through the node ID combined w ith the ability to
move the database to ano ther domain .
Versioning should be comprehensive. Since, on a social web site users are provid ing
conten t, they may need access to earlier versions of a unit. This is built into Drupal12 as
well as w iki sites, but is generally not available on commercial Web 2.0 sites .
Deletion methods should be user con trolled . In a social web application, a user
uploads content to the host site in lieu of placing it on their own site. For commercial
Web 2.0 sites , th is means that the user’s ab ility to remove content is limited by the tools
provided to users, and by the ToS agreement. As in the Facebook ToS controversy , this
can lead users to feel that they have lost contro l over their own data, and may pose pri-
vacy risks . A site should not unduly limit users’ ability to delete their own data, e.g. by
making true deletion impossible (as opposed to flagging the data as h idden in a database).
Drupal makes true deletion availab le to users,13 but commercial sites generally do not.
Software licenses should be free/open source. Another aspect of user contro l is the
ability to inspect and modify the code. Although this generally requires moving data to
one’s own server space, and most users w ill not want to do it, a free/open source platform
gives all users f lexib ility by enabling others to provide alternative hosting environmen ts
for their data.
5 The Deme Architecture
In this section, we describe the arch itecture of Deme,14 our new WCMS and framework
written in Django/Python, w ith a PostgreSQL database, licensed under the Affero GPLv3
license.15 Recently, the term “content management framework” has been used, somewhat
controversially, to denote “an application programming in terface for creating a custom-
ized content management system”.16 We use the term “framework” to indicate that the
system is designed to facilitate custom code developmen t. Deme attempts to make avail-
able the concep ts of ob ject-oriented programming (OOP) to end users and nonprogram-
mer website administrators, using language that we believe will be more understandable
to nonprogrammers. We def ine the terminology of Deme below with respect to concepts
familiar to a technical aud ience. Desired features from section 4 are noted in bold ita lics.
Items and item types . Un its of con ten t in Deme are stored in “items”. An item is an
instance of a par ticular “item type”. The Deme item types are inheritance hierarchical. If
the Person item type inherits from the Agent item type, then any item that is a Per-
son is also an Agent. Every item type ultimately inherits from the Item item type
12 See http ://drupal.o rg/node/70591.
13 See http ://agaric.com/note/disable-delete-regular-u sers.
14 See http ://deme.stan ford.edu.
15 See http ://www .gnu.org/licenses/agpl-3.0.htm l.
16 See fo r example
http://en.w ikipedia.org/w/index.php?title=List_of_content_management_framewo rks&old id=282
731961
7
Todd R. Davies and Mike D. Min tz
(which corresponds to the Object class in many programming languages). We allow mu l-
tip le inheritance, and use it occasionally (e.g., TextComment inher its from both Com-
ment and TextDocument). Deme items are stored in a database using object relational
mapping (ORM) 17 with mu lti-table inher itance. For example, if our item type h ierarchy is
Item -> Agent -> Person, and our items are Mike[Person] and Robot[Agent],
then there w ill be one row in the Person tab le (for Mike), two rows in the Agent table
(for Mike and Robot), and two rows in the Item tab le (for Mike and Robot). An
abridged basic v iew of the Deme item type hierarchy is shown in F igure 1.
Fig. 1. The Deme item type hierarchy (abridged basic view ).
Pieces. Every item type def ines the “pieces” (mapped to f ields/columns in the data-
base) relevan t for that type’s items, and item types inherit p ieces from their supertypes. If
Item defines the description piece, Agent defines no new pieces, and Person de-
fines the first_name piece, then every person has a description and a
first_name.
17 See Sco tt W. Ambler’s explanation ORM at
http://www .ag iledata.org/essay s/mappingObjects.htm l.
8
To appear in 8th Int’l Wo rkshop on Web-Orien ted Software Techno logies (IWWOST 2009)
Piece types . Every piece of an item has a type (e.g. String, Integer, and Boo-
lean). Pieces can point to other items (foreign keys in the database), and can addition-
ally specify which piece of another item is being pointed to (fully poin table) . Pointing
pieces are usefu l for defining relationsh ips between items. For example, the Item item
type has a creator piece pointing to the Agent that created it. Multiple items can
point to a common item . Pieces cannot store data structures like lists. So rather than stor-
ing differen t contact methods as pieces of each Agent, we make ContactMethod an
item type, and give it an agent_pointer piece. The contact methods for agent 123
are represented by all of the ContactMethods that have agent_pointer equal to
123.
Item IDs . The most importan t piece of an item is the id (a page-independent primary
key). Every item has a unique, immutable id. Items share the same id w ith their su-
pertype versions (so Mike’s row in the Person table has the same id as Mike’s row in
the Agent and Item tables) . Pointing pieces are references to the id of the pointed-to
item. A lthough not imp lemen ted yet, we p lan to make available (optionally) “universal
item id’s” through a reserved namespace approach like URNs or i-names , for doma in-
independen t addressability across installations of Deme. Relations between items and
pieces are shown for a portion of the item type hierarchy in F igure 2.
Other h ighligh ts of the Deme architecture include the following.
Versioning. For every item type, there is a comprehensive “old versions” tab le.
Deleting items . There are two ways to delete items: deactivate and destroy.
Decativating is recoverable (through reactivate), but destroy is not (user control).
The user interface ensures that deactivating happens before destroying.
Collect ion. An item type that represents an unordered referential set of o ther items ,
Collections use pointers from Memberships (which are items in their own right; in-
tegra l un itizability) to represen t their con ten ts, so multip le Collections can poin t to
the same contained items. Collections “directly” contain items via Memberships ,
but they also “ind irectly” contain items via chained Memberships.
Transclusion. An embedded reference from a location in a specif ic version of a
TextDocument to ano ther Item . A Transclusion [13] is a separate item (in tegra l
unitizab ility).
Comment. A unit of discussion about an item. Each Comment specif ies the com-
mented item and item_version_number. Comments can be associated with spe-
cif ic locations in a TextDocument v ia Transclusions.
Excerpt . An item that refers to a portion of another item or (in a planned future ver-
sion) an external resource, such as a webpage (fu ll poin tability).
Permissions. Permissions define what actions an arbitrary g roup of Agents (fluid ity)
can and cannot do to each item and its pieces (granu larity).
Viewer types. Deme takes advantage of the model-view-temp late architecture of
Django. A viewer is a Python class that processes browser or API requests . Each viewer
defines the item type it can accept (server side specia lization), and mu ltiple viewers can
accept the same item type. V iewers that accept an item type will also accept sub types of
that item (polymorph ism). Each viewer type def ines a set of actions , e.g. item_show .
Custom viewers and item types can define new actions (extensibility).18
18 There are many other item types and architectural featu res not discussed above. For a fu ll de-
scription, see http://deme.stanford.edu/static/docs/index.html.
9
Fig. 2. A detailed partial view of the Deme item type hierarchy. Solid connecto rs denote supertype-
subtype inheritance. Do tted connecto rs denote pointers from pieces to items.
Todd R. Davies and Mike D. Min tz
6 Comparing Deme With Other Technologies for the Social Web
Table 1 summarizes how Deme achieves the desired features for the social Web , by com-
parison with other web technologies: (a) file system-based “Web 1.0” sites (basic
HTML); (b) the w idely used WCMS Drupal; (c) commercial Web 2.0 sites such as You-
tube, Facebook, and Myspace; and (d) object-orien ted web application frameworks such
as Ruby on Rails and Django.
On three dimensions (unit type, type structure, and addressing), the only other technol-
ogy besides Deme that achieves the desired feature is OOP /web applicaton frameworks,
which require programming skill. On eigh t dimensions (unit, subsegment, behav iors, rela-
tion specif iers , access control, versioning, deletion methods, and software license) , all of
the open-source approaches (Drupal, web frameworks, and Deme) achieve the desired
features, but commercial Web 2.0 sites do not. The remaining two dimensions (con tainer
and type-viewer) are ones for which all of the technolog ies beyond basic HTML achieve
the desired feature.
The social Web is especially associated with commercial Web 2.0 sites. Bu t our analy-
sis suggests that these sites do not meet users’ needs as well as open-source technologies
that g ive more con trol to users . Previous WCMSs, represented here by Drupal, generally
exhibit more of the desired features than large commercial sites do, and they do no t re-
quire a programming background to administer them. Bu t they do not meet the desired
social web cr iteria quite as well as OOP web frameworks do. The frameworks, on the
10
To appear in 8th Int’l Wo rkshop on Web-Orien ted Software Techno logies (IWWOST 2009)
other hand, require more programming skill. Deme makes availab le powerfu l OOP con-
cepts from web frameworks to nonprogrammers for managing content, in a code base that
is built for modif ication. We also believe that the terminology used in Deme w ill make it
easier for nonprogrammers to learn than Drupal, but that remains to be tested empirically.
Table 1. Comparison o f web technologies by content management concept. Approaches that make
available the desired feature fo r each content concept are highlighted in bold.
Content
Desired
(a) File sys-
(b) Web
(c)Commer-
(d) OOP
(e) Deme
/Web app
cial Web
CMS
tem/Web
social
managment
v0.9 WCMS
2.0 sites
feature
frameworks
(Drupal)
1.0 HTML
concep t
object/row
node
item
page
photo,
file/page
unit
video, etc.
independen t
field
attribute/
piece,
fully
semantic
custom
subsegment
field
excerp t
pointable
fields
element
class
item type
polymor-
content type custom
Internet
unit type
phism
media type
types
menus
methods
actions
exten sible
HTTP
widgets
behaviors
methods
container
tags/labels
categories
collection
referential
directo ry
container
classes
class
item type
inheritance
(flat)
(flat)
MIME type
type
inheritance
hierarchy
hierarchy
/subtype
structu re
site-defined
views and
model-view
viewer
server-side
browser
type-viewer
separa tion
modules
viewer
types
specialized
application
matching
preferences
relation
relation
transclu-
integ rally
limited
one-way
relation
nodes
objects
sions,
unitizable
hyperlinks
bidirectional
specifiers
member-
links
ships
customiza-
perm ission s
fluid-
custom
ble
granular
permissions
object
(universal)
domain
permalink
identiy
item id
independen t
version
old ver-
comprehen-
none or
wiki diffs
contro l sys-
sions table
sive
tem
file edit and
deactivate,
user
file system
limited data
deletion
delete
destroy
controlled
delete
removal
methods
open
Affero
free/open-
default
usually
softwa re
source
GPLv3
source
copyright
proprietary
license
The version of Deme presented here is the latest step in a multi-year project aimed at
creating a p latform for deliberative in teractions , e.g. document-cen tered discussion [6].
Future work will involve ref ining the interface to enable easier collaboration and com-
menting. The social Web is ultimately about foster ing conversation. In the words of Cory
Doctorow [7], “Conversation is king. Content is just something to talk about.” Users are
likely to continue to wan t this conversation to ex tend to an open dialogue abou t the social
web platform itself. Even the most techn ically minded of tool providers should be pre-
admins and
roles
node ID
conten t
versioning
node delete
GPLv2
access
control
addressing
versioning
restricted
directo ries
URL
old files
11
Todd R. Davies and Mike D. Min tz
pared to justify their design and licensing cho ices to end users in relation to their needs
and desires , and to provide technology that is responsive to user demands.
Acknowledgments
We wish to thank Leo Perry, Ben Newman, Brendan O’Connor, Joseph Marrama, Jane
Huang, and Ivan Sag for helpful contribu tions to this version of Deme.
References
1. Berners-Lee, T., Hendler, J., Lassila, O . The Semantic Web. Sci. Am. 284(5), 34-43 (2001)
2. Boulos, M .N., Wheelert, S. The Emerging Web 2.0 Social Software: An Enabling Suite o f So-
ciable Technologies in Health and Health Care Education. Health Information and Libraries
Journal. 24, 2 -23 (2007)
3. Cardelli, L, Wegner, P. On Understanding Types, Data Abstraction , and Polymorphism. Com-
puting Surveys. 17(4), 471-522 (1985)
4. Cohen, D., Lindvall, M ., Costa, P. An Introduction to Agile Methods. In Advances in Comput-
ers. pp. 1-66. E lsevier Science (2004)
5. Constantine, L.L., Lockwood, L.A.D. Usage-Cen tered Engineering for Web Applications.
IEEE Software. 19(2), 42-50 (2002)
6. Davies, T., Newman, B., O'Connor, B. Tam, A, Perry , L. Document Centered Discu ssion: A
Design Pattern for Online Deliberation. In Schuler, D. (ed.). L iberating Voices: A Pattern Lan-
guage fo r Communication Revolution. pp. 384-386. MIT Press (2008)
7. Doctorow, C. D isney Exec: Piracy Is Just a Business Model. October 10 (2006),
http://www .boingboing.net/2006/10/10/disney-exec-p iracy -i.h tml, quoted in Shirky, C. Here
Comes Everybody. Penguin (2008)
8. Fielding, R.T.; Tay lor, R .N.. Principled Design of the Modern Web Arch itecture. ACM Trans-
actions on Internet Technology. 2(2), 115–150 (2002)
9. MacManus, R ., Porter, J. Web 2 .0 for Designers. Digital Web Magazine, May 4 (2005)
10. Milian, M., Facebook Backtracks on Terms of Use Update. Lo s Angeles Times. February 18
(2009). , h ttp://latimesblogs.latimes.com/technology/2009/02/facebook-tos.htm l
11. Murugesan, S ., G inige, A . Web Engineering: Introduction and Perspectives. Idea Group (2005)
12. Mikroyannidis, A. Toward a Semantic Social Web . Computer. 40(11), 113-115 (2007)
13. Nelson, T.H. Xanalogical Structure, Needed Now More than Ever: Parallel Documents, Deep
Links to Content, Deep Versioning, and Deep Re-Use. ACM Computing Surveys. 31(4 )
(1999)
14. O’Reilly , T. What Is Web 2.0? September 30 (2005),
http://www .oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web -20.html
15. Rossi, G. Urbieta, M., Ginzburg, J., Distante, D., Garrido, A. Refactoring to Rich Internet Ap-
plications: A Model-D riven Approach. In 8th In ternational Conference on Web Engineering.
pp. 1-12. IEEE (2008)
16. Walters, C . Facebook’s New Terms of Service: We Can Do Whatever We Want With Your
Content, Fo rever. The Consumerist. Feb ruary 15 (2009).
http://consumerist.com /5150175/facebooks-new -terms-o f-service-we-can -do-anyth ing-we-
want-with -your-content-fo rever
12
|
1504.05163 | 1 | 1504 | 2015-04-20T19:19:10 | Trend of Narratives in the Age of Misinformation | [
"cs.SI",
"cs.HC",
"physics.soc-ph"
] | Social media enabled a direct path from producer to consumer of contents changing the way users get informed, debate, and shape their worldviews. Such a {\em disintermediation} weakened consensus on social relevant issues in favor of rumors, mistrust, and fomented conspiracy thinking -- e.g., chem-trails inducing global warming, the link between vaccines and autism, or the New World Order conspiracy.
In this work, we study through a thorough quantitative analysis how different conspiracy topics are consumed in the Italian Facebook. By means of a semi-automatic topic extraction strategy, we show that the most discussed contents semantically refer to four specific categories: {\em environment}, {\em diet}, {\em health}, and {\em geopolitics}. We find similar patterns by comparing users activity (likes and comments) on posts belonging to different semantic categories. However, if we focus on the lifetime -- i.e., the distance in time between the first and the last comment for each user -- we notice a remarkable difference within narratives -- e.g., users polarized on geopolitics are more persistent in commenting, whereas the less persistent are those focused on diet related topics. Finally, we model users mobility across various topics finding that the more a user is active, the more he is likely to join all topics. Once inside a conspiracy narrative users tend to embrace the overall corpus. | cs.SI | cs |
Trend of Narratives in the Age of Misinformation
Alessandro Bessi1, 2(cid:89), Fabiana Zollo2,(cid:89), Michela Del Vicario2,¤a, Antonio Scala2,3‡,
Guido Caldarelli2,3,4‡, Walter Quattrociocchi2,*,
1 IUSS Pavia, Italy
2 IMT Lucca, Italy
3 ISC-CNR, Rome, Italy
4 LIMS, London, UK
* [email protected]
Abstract
Social media enabled a direct path from producer to consumer of contents changing the
way users get informed, debate, and shape their worldviews. Such a disintermediation
weakened consensus on social relevant issues in favor of rumors, mistrust, and fomented
conspiracy thinking – e.g., chem-trails inducing global warming, the link between
vaccines and autism, or the New World Order conspiracy.
In this work, we study through a thorough quantitative analysis how different
conspiracy topics are consumed in the Italian Facebook. By means of a semi-automatic
topic extraction strategy, we show that the most discussed contents semantically refer to
four specific categories: environment, diet, health, and geopolitics. We find similar
patterns by comparing users activity (likes and comments) on posts belonging to
different semantic categories. However, if we focus on the lifetime – i.e., the distance in
time between the first and the last comment for each user – we notice a remarkable
difference within narratives – e.g., users polarized on geopolitics are more persistent in
commenting, whereas the less persistent are those focused on diet related topics. Finally,
we model users mobility across various topics finding that the more a user is active, the
more he is likely to join all topics. Once inside a conspiracy narrative users tend to
embrace the overall corpus.
Introduction
According to [1], causation is bound to the way communities attempt to make sense to
events and facts. Such a phenomenon is particularly evident on the web where users,
immersed in homophile and polarized clusters, process information through a shared
system of meaning [2, 3]. Indeed, social media enabled a direct path from producers to
consumers of contents – i.e., disintermediation – changing the way users get informed,
debate, and shape their opinions [4–8]. However, confusion about causation encourages
speculation, rumors, and mistrust [9]. In 2011 a blogger claimed that Global Warming
was a fraud aimed at diminishing liberty and democratic tradition [10]. More recently,
rumors about Ebola caused disruption to health-care workers [11–13]. Such a scenario
fostered the production of an impressive amount of conspiracy-like narratives aimed at
explaining reality and its phenomena, and provide an unprecedented opportunity to
study the dynamics of narratives’ emergence, production, and popularity.
1/18
Recently, we pointed out that the more the users are exposed to unsubstantiated
rumors, the more they are likely to jump the credulity barrier [2, 3]. As pointed out
by [14], individuals can be uninformed or misinformed, and the actual means of
corrections in the diffusion and formation of biased beliefs are not effective. In
particular, in [15] online debunking campaigns have been shown to create a
reinforcement effect in usual consumers of conspiracy stories. Narratives grounded on
conspiracy theories have a social role in simplifying causation because they tend to
reduce the complexity of reality and are able at the same time to contain the
uncertainty they generate [16–18]. Conspiracy theories create a climate of
disengagement from mainstream society and from officially recommended practices [19] –
e.g. vaccinations, diet, etc.
Despite the enthusiastic rhetoric about the collective intelligence [20, 21] the role of
socio-technical systems in enforcing informed debates and their effects on the public
opinion still remain unclear. However, the World Economic Forum listed massive digital
misinformation as one of the main risks for modern society [22]. A multitude of
mechanisms animates the flow and acceptance of false rumors, which in turn create false
beliefs that are rarely corrected once adopted by an individual [23–26]. The process of
acceptance of a claim (whether documented or not) may be altered by normative social
influence or by the coherence with the system of beliefs of the individual [27, 28]. A
large body of literature addresses the study of social dynamics on socio-technical
systems from social contagion up to social reinforcement [6, 7, 29–36].
In this work we analyze a collection of conspiracy news sources in the Italian
Facebook. In particular, we focus on the emergence of conspiracy topics and the way
they are consumed. We identify pages diffusing conspiracy news – i.e. pages promoting
contents neglected by main stream media. We define the space of our investigation with
the help of Facebook groups very active in debunking conspiracy theses (Protesi di
Protesi di Complotto, Che vuol dire reale, La menzogna diventa verita e passa alla
storia). We categorize pages according to their contents and their self description.
Concerning conspiracy news pages, their self claimed mission is to inform people
about topics neglected by main stream media. Through a semi-automatic topic
extraction strategy, we show that the most discussed contents refer to four well specified
topics: environment, diet, health, and geopolitics. Such topics are consumed in a very
similar way by their respective audience – i.e, users activity in terms of likes and
comments on posts belonging to different categories are similar and resolves in
comparable information consumption patterns. Conversely, if we focus on the lifetime
–i.e., the distance in time between the first and the last comment for each user – we
notice a remarkable difference within topics. Users polarized on geopolitics subjects are
the most persistent in commenting, whereas the less persistent users are those focused
on diet narratives. Finally we analyze mobility of users across topics. Our findings show
that users can jump independently from one topic to another, and such a probability
increases with the user engagement. This work provides important insights about the
fruition of conspiracy like rumors in online social media and more generally about the
mechanisms behind misinformation diffusion.
Results and Discussion
The analysis aims at characterizing the topical space in the conspiracy corpus of the
Italian Facebook. We start our investigation by outlining the emerging topics and then
we focus on the information consumption patterns. Finally we provide a data-driven
model of users information consumption patterns.
Details about the mathematical and statistical tools as well as the data used in the
analysis are described in Methods section.
2/18
Topics extraction and validation
As a first step in our analysis we apply a semi-automatic topic extraction strategy
aimed at classifying content.
We have 205, 703 posts (98.62% of the total corpus of conspiracy posts) containing a
message – i.e. a simple text or a description of the associated photo, video, or link. We
build a Document-Term matrix (205, 703 posts × 216, 696 terms) and take all the terms
with more than 500 occurrences (1820). We then apply a supervised preprocessing in
order to identify terms related to the conspiracy storytelling. Such a supervised task is
performed by 20 volunteers separately1. The resulting set is composed by 159 terms.
Then, we derive the co-occurrence network of conspiracy terms – i.e., a graph where
nodes are conspiracy terms, edges bond two nodes if the corresponding terms are found
in the same post, and weights associated to edges indicate the number of times the two
terms appear together in the corpus. Such a graph has 159 nodes and 11, 840 edges.
Since the co-occurrence network is a dense graph, we apply a filter in order to
remove edges which are not significant. More precisely, we apply the disparity filter
algorithm [37] (see Methods section for details) to extract the network backbone
structure, thus reducing the number of edges while preserving its multi-scale nature.
The application of the filtering algorithm with a statistical significance level of α = 0.05
results in a graph with 159 nodes and 1, 126 edges. We asked to the volunteers to give a
generic class to each term. By accounting only for 90% of concordance within volunteers
tags on names, the semantics of conspiracy terms results in four main categories:
environment, health, diet, and geopolitics. In Figure 1 we show the backbone of the
co-occurrence term network, where different colors indicate nodes belonging to different
conspiracy class.
Figure 1. Backbone of conspiracy terms co-occurence network. Different
colors indicate nodes belonging to different conspiracy topics according to our manual
classification. In particular, purple nodes belong to geopolitics, red nodes to
environment, blue nodes to health, and green to diet.
1We consider as conspiracy terms only those terms labeled as conspiratorial by at least the 90% of
volunteers.
3/18
HEALTHGEOPOLITICSENVIRONMENTDIETTo validate the classification, we apply three different community detection
algorithms – i.e., Walktrap [38], Multilevel [39], and Fast greedy [40] (see Methods
section for further details) – to the backbone of conspiracy terms co-occurence network.
In Figure 2 we show the classification provided by each community detection
algorithm. Multilevel and Walktrap algorithms assign each term to the same community
and their accuracy with respect to our manual classification is 100%, while the
concordance index of the Fast greedy algorithm is 88.68%.
(a) Walktrap
(b) Multilevel
(c) Fast greedy
Figure 2. Communities of conspiracy terms. Membership of conspiracy terms
according to different community detection algorithms. Purple nodes belong to
geopolitics, red nodes to environment, blue nodes to health, and green to diet.
We assign a post to a given topic according to the term in it. In case of terms
belonging to different topics, we apply the majority rule, in case of ties, the post is not
labeled. Through such a criterion we are able to label 44, 259 posts – i.e. 9, 137
environment posts, 8, 668 health posts, 3, 762 diet posts, and 22, 692 geopolitics posts.
Attention patterns
Content consumption
In order to characterize how information belonging to the different categories of
conspiracy topics are consumed, we perform a quantitative analysis on users’
interactions – i.e. likes, shares, and comments2.
In Figure 3 we show the complementary cumulative distribution functions (CCDFs)3
of the number of likes, comments, and shares received by posts belonging to different
conspiracy categories of topics. Likes, comments, and shares of posts are long-tailed
distributed and best fitted by discrete power law distributions. To further characterize
differences within the distributions, in Table 1 we summarize the estimated lower
bounds and scaling parameters for each distribution.
2Notice that each of these actions has a particular meaning [41]. A like stands for a positive feedback
to the post; a share expresses the will to increase the visibility of a given information; and a comment is
the way in which online collective debates take form around the topic promoted by posts. Comments
may contain negative or positive feedbacks with respect to the post.
3We prefer to show CCDFs rather than CDFs since the former allow to plot heavy-tailed distributions
in doubly logarithmic axes, and thus emphasize their long tail behavior.
4/18
(a)
(b)
(c)
Figure 3. Topics attention patterns. Complementary cumulative distribution
functions (CCDFs) of the number of likes (a), comments (b), and shares (c) received by
posts belonging to different conspiracy topics.
Environment
Health
Diet
Geopolitics
Likes
xmin
142
172
135
167
α
2.82
2.68
2.84
2.36
α
Comments
xmin
42
37
15
135
2.82
2.59
2.36
3.14
Shares
α
xmin
408
435
358
407
2.62
2.39
2.59
2.25
Table 1. Power law fit of conspiracy topics attention patterns. Lower bounds
and scaling parameters estimates for the distributions of the number of likes, comments,
and shares received by posts belonging to different conspiracy topics.
To analyze lifetime of posts from different categories, we compute the temporal
distance between the first and last comment for each post. In Figure 4 we show the
Kaplan-Meier estimates of survival functions (see Methods for further details) for posts
belonging to different conspiracy topics. The p-value associated to the Gehan-Wilcoxon
test (a modification of the log-rank test) is p = 0.091, which lets us conclude that there
are not significant statistical differences between the survival functions of posts
belonging to different conspiracy topics.
5/18
likesCCDFllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll10010110210310410510-510-410-310-210-1100lEnvironmentHealthDietGeopoliticscommentsCCDFlllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll10010110210310410-510-410-310-210-1100lEnvironmentHealthDietGeopoliticssharesCCDFlllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll10010110210310410510-510-410-310-210-1100lEnvironmentHealthDietGeopoliticsFigure 4. Lifetime of conspiracy topics. Kaplan-Meier estimates of survival
functions of posts belonging to different conspiracy topics.
Our findings show that conspiracy topics are consumed in a similar way. In
particular, we find that survival functions of posts belonging to different conspiracy
topics do not show different statistical signatures.
Users activity
Here, we consider users’ attention patterns with respect to different conspiracy topics by
analyzing the number of likes and comments, as well as the lifetime of each user – i.e.
the temporal distance between his first comment and last comment on a post belonging
to a specific category – that can be intended as an approximation of users persistence in
online collective debating.
We consider as conspiracy users those whose liking activity on conspiracy pages is
greater than the 95% of their total liking activity – i.e. a conspiracy user left at most
5% of her likes on posts belonging to science pages. Such a method allows to identify
790, 899 conspiracy users. Moreover, we consider a user polarized towards a given
conspiracy topic if she has more than the 95% of her likes on posts belonging to that
topic. Such a criterion allows to classify 232, 505 users (29.39% of the total). Table 2
summarizes the classification task’s results. We observe that the majority of users is
concerned about conspiracy stories related to geopolitics (62.95%), whereas conspiracy
narratives about environment (18.39%) and health (12.73%) attract a smaller yet
substantial number of users, while diet (5.94%) seems to be considered a less attractive
subject. However, notice that here we are analyzing conspiracy users that have the most
of their total activity on a given topic. Indeed, Figure 3 shows that diet receives as
much attention as the other conspiracy topics, even if it is not a polarizing topic, as
shown in Table 2.
In Figure 5 we show the CCDFs of the number of likes and comments of users
polarized towards different conspiracy topics. We observe minor yet significant
6/18
t (days)S(t)0102030405000.20.40.60.81EnvironmentHealthDietGeopoliticsGeopolitics
Environment
Health
Diet
Users
146, 359
42, 750
29, 587
13, 807
%
62.95
18.39
12.73
5.94
Table 2. Polarization of users towards different conspiracy topics.
differences between attention patterns of different conspiracy users. Table 3 summarizes
the estimated lower bounds and scaling parameters for each distribution. These results
show that users polarized towards different conspiracy topics consume information in a
comparable way – i.e, with some differences all are well described by a power law.
(a)
(b)
Figure 5. Users attention patterns. CCDFs of the number of likes (a) and
comments (b) by users polarized on different conspiracy topics.
Environment
Health
Diet
Geopolitics
Likes
xmin
5
5
4
6
α
4.37
2.51
5.52
3.61
Comments
xmin
α
3
3
3
6
2.49
2.56
2.94
2.88
Table 3. Powerlaw fit of conspiracy users attention patterns. Lower bounds
and scaling parameters estimates for the distributions of the number of likes and
comments left by users polarized towards different conspiracy topics.
In order to analyze the persistence of users polarized towards different conspiracy
topics, we compute the temporal distance between the first and last comment of each
user on posts belonging to the conspiracy topic on which the user is polarized. In Figure
6 we show the Kaplan-Meier estimates of survival functions (see Methods section for
further details) for conspiracy users polarized towards different topics.
functions (all p-values are less than 10−6).
The Gehan-Wilcoxon test assesses a significant difference between the four survival
7/18
likesCCDFllllllllllllllllllllllllllllllllllllllll10-510-410-310-210-1100100101102103lEnvironmentHealthDietGeopoliticscommentsCCDFlllllllllllllllllllll10-510-410-310-210-1100100101102103104lEnvironmentHealthDietGeopoliticsFigure 6. Persistence of conspiracy users. Kaplan-Meier estimates of survival
functions for users polarized towards different conspiracy topics.
Summarizing, we observe minor yet significant differences in the way users polarized
towards different conspiracy topics consume information. Moreover, by focusing on the
lifetime – i.e. the temporal distance between users’ first and last comment – we find a
remarkable difference within those users. In particular, we notice that users polarized
on geopolitics subjects are the most persistent in commenting, whereas the less
persistent users are those focused on diet narratives.
Modeling user mobility
In this section we focus on users’ activity across different conspiracy topics. In Table 4
we summarize users’ behavior by showing the Pearson correlations of their liking
activity within the different categories of topics. We see meaningful correlations
between the liking activity of users across different conspiracy topics.
Envir
Health
Diet
GeoPol
Envir Health Diet GeoPol
1.00
0.64
0.65
0.48
1.00
0.68
1.00
0.61
0.78
1.00
Table 4. Mobility of users across topics. Pearson correlations coefficients of
conspiracy users’ liking activity between different categories.
We analyze the relationship between the engagement of a user – i.e. the number of
likes she left on conspiracy posts – and how her activity is distributed across categories.
Figure 7 shows that the more a conspiracy user is engaged the more his activity is
distributed across different conspiracy topics.
8/18
t (days)S(t)020040060080000.20.40.60.81EnvironmentHealthDietGeopoliticsFigure 7. Engagement and mobility across topics. Light blue lines represent the
median of the likes distributions; pale blue shaded boxes represent the interquartile
range (25–75 percentile); horizontal bars represent the extremes of the distributions.
Users active on 4 topics are 15, 510; users active on 3 topics are 20, 929; users active on
2 topics are 21, 631; and users active on 1 topic are 9, 980.
By considering only users with at least 4 likes (n = 68, 050) – necessary condition to
In particular, we consider the number of topics liked by users as the ordinal
be active on the four identified topics – we can model the relationship between the
number of likes and the number of considered topics by means of a proportional odds
model (see Methods section for an extended discussion).
dependent variable, i.e. we have j = (K − 1) = 3 ordered categories: 12, 23, and 34.
We consider the number of likes left by users as the predictor of our model. Thus, we
need to estimate three intercepts and one regression coefficient. Table 5 reports details
about the performed regression.
The estimated coefficient, β, can be difficult to interpret because it is scaled in terms
of logs. Another way to interpret these kind of regression models is to convert the
coefficient into a odds ratio (see Methods section for further details). To get the odds
ratio (OR) we exponentiate the estimate:
OR = exp(β) = exp(0.1141) = 1.12
Since OR > 1, an increase in the number of likes left by a user raises her probability
to consider a greater number of topics. In particular, an increase in the number of likes
is associated with 12% times increased odds of considering a higher number of topics.
The model provides four probabilities for each user to belong to one of the four
categories. For each user we consider the category associated with the higher
probability as the predicted category. In order to evaluate the goodness of fit of the
model, we compare the predicted categories vs the real ones by means of the absolute
9/18
4321# of topics# likes100101102103Coefficients Value
0.1141
# of likes
Std. Error
t-value
0.001016
112.3
p-value
< 10−6
Intercepts Value
-0.7602
1.0783
2.9648
12
23
34
Std. Error
0.0135
0.0126
0.0177
p-value
t-value
-56.4267 < 10−6
< 10−6
85.7607
167.4990 < 10−6
Table 5. Proportional Odds Model. Log-odds regression coefficient and intercepts
with related standard errors, t-values, and p-values. Confidence interval at 95% for the
estimated coefficient is (0.1121, 0.1161). Chi-Square test’s p-value is 1, so we do not
reject the null hypothesis (H0 : current model is good enough) and conclude that the
model is a good fit.
distance coefficient and we find that:
δ = 1 −
(cid:80)di
n(K − 1)
= 0.852,
where di = xi − yi is the absolute distance between the real and the predicted
categories, n is the total number of users, and K is the number of categories. Since the
absolute distance coefficient is close to 1, the proposed model provides a good fit for the
data.
Summarizing, the more a user is engaged in conspiracy storytelling the more her
probability to consider a higher number of different conspiracy topics. Indeed, we
deliver a data-driven model of information consumption pointing out that users
engagement on different topics is mainly driven by their overall commitment on
conspiracy storytelling and that with the increasing of the engagement they tend to
embrace the overall corpus without a specific pattern.
Conclusions
Conspiracy theories are considered to belong to false beliefs overlooking the pervasive
unintended consequences of political and social action [9, 42]. Social media fostered the
production of an impressive amount of rumors, mistrust, and conspiracy-like narratives
aimed at explaining (and oversimplifying) reality and its phenomena. Such a scenario
provides an unprecedented opportunity to study the dynamics of topics emergence,
production, and popularity. Indeed, in this work we focus on how conspiracy topics are
consumed in the Italian Facebook.
The understanding of consumption patterns behind unsubstantiated claims might
provide important insight both at the level of popularity of topics as well as to prevent
misinformation spreading. Users activity in terms of likes and comments on posts
belonging to different categories are similar and resolves in similar information
consumption patterns. Conversely, if we focus on the lifetime – i.e., the distance in time
between the first and the last comment for each user – we notice a remarkable difference
within topics. Users polarized on geopolitics subjects are the most persistent in
commenting, whereas the less persistent users are those focused on diet narratives.
Finally we focus on the mobility of users across topics. In particular we address the
patterns behind the consumption of different topics. Users can jump independently
from one topic to another, and such a probability increases with the user engagement
(number of likes on a specific topic). Each new like on the same category increases of
10/18
the 12% the probability to pass to a new one. Our work provides important insights
about the diffusion and emergence of misinformed narratives.
11/18
Acknowledgments
Funding for this work was provided by EU FET project MULTIPLEX nr. 317532 and
SIMPOL nr. 610704. The funders had no role in study design, data collection and
analysis, decision to publish, or preparation of the manuscript.
Methods
Data Collection
We define the space of our investigation with the help of some Facebook groups very
active in the debunking of conspiracy theses. The resulting dataset is composed by 39
public Italian Facebook pages.
Notice that the dataset is the same used in [2] and [43]. However, in this paper we
focus on the 39 (exhaustive set) conspiracy pages with the intent to further characterize
the attention dynamics driving the diffusion of conspiracy topics on the Italian
Facebook. We download all posts from these pages in a timespan of 4 years (2010 to
2014). In addition, we collect all the likes and comments from the posts, and we count
the number of shares. In total, we collect around 9M likes and 1M comments,
performed by about 1.2M and 280K Facebook users, respectively. In Table 6 we
summarize the details of the data collection.
Entity
Pages
Posts
Likes
Comments
Shares
Likers
Commenters
Total
39
208, 591
6, 659, 382
836, 591
16, 326, 731
864, 047
226, 534
Table 6. Breakdown of the Facebook dataset.
Preliminaries and Definitions
Bipartite Network. We consider a bipartite network whose nodes are conspiracy
posts and conspiracy terms. The presence of a term on a given post determines a link
between the term and the post. More formally, a bipartite graph is a triple
G = (A, B, E) where A = {ai i = 1, . . . , nA} and B = {bj j = 1, . . . , nB} are two
disjoint sets of nodes, and E ⊆ A × B is the set of edges – i.e. edges exist only between
nodes of the two different sets A and B. The bipartite graph G is described by the
matrix M defined as
(cid:26) 1
Mij =
if an edge exists between ai and bj
0
otherwise
Referring to A as the set of conspiracy terms, in our analysis we use the
co-occurrence matrix C A = M M T , that is the weighted adjacency matrix of the
co-occurrence of conspiracy terms on conspiracy posts. Each non-zero element of C A
corresponds to an edge among nodes ai and aj with weight P A
ij .
12/18
Disparity Filter. Disparity filter is a network reduction algorithm which extracts
the backbone structure of a weighted network, thus reducing its size without destroying
its multi-scale nature. In particular, the method introduced in [37] is based on the null
hypothesis that the normalized weights corresponding to the connections of a given
node with degree k are uniformly distributed. The disparity filter identifies which links
for each node should be preserved in the network. The null model allows such a
discrimination through the computation – for each edge of a given node – of the
probability αij that its normalized weight pij is compatible with the null hypothesis. All
the links with αij smaller than a certain significance level α reject the null hypothesis,
and can be considered as significant heterogeneities characterizing the network. The
statistically significant edges will be those whose weights satisfy the relation
(cid:90) pij
αij = 1 − (k − 1)
(1 − x)k−2dx < α,
indicating that by decreasing the significance level α we can filter out additional
links, and thus focus on more relevant edges.
0
In order to validate our manual classification
Community Detection Algorithms.
of conspiracy terms, we apply three well known community detection algorithms to the
backbone of the conspiracy terms co-occurrence network.
Walktrap [38] computes a measure of similarities between nodes based on random
walks which has several important advantages: it captures well the community structure
in a network, it can be computed efficiently, and it can be used in an agglomerative
algorithm to compute efficiently the community structure of a network. Such an
algorithm runs in time O(mn2) and space O(n2) in the worst case, and in time
O(n2 log n) and space O(n2) in most real-world cases, where n and m are respectively
the number of nodes and edges in the network.
Multilevel [39] is based on multilevel modularity optimization. Initially, each node is
Fast greedy [40] it is a hierarchical agglomeration algorithm for detecting community
assigned to a community on its own. In every step, nodes are re-assigned to
communities in a local, greedy way. Nodes are moved to the community in which they
achieve the highest modularity. Such an algorithm runs in linear time when m ∼ n,
where n and m are respectively the number of nodes and edges in the network.
structure. Its running time on a network with n nodes and m edges is O(md log n)
where d is the depth of the dendrogram describing the community structure. Many
real-world networks are sparse and hierarchical, with m ∼ n and d ∼ log n, in which
case such an algorithm runs in essentially linear time, O(n log2 n).
Kaplan-Meier estimator. Let us define a random variable T on the interval [0,∞),
indicating the time an event takes place. The cumulative distribution function (CDF),
F (t) = Pr(T ≤ t), indicates the probability that such an event takes place within a
given time t. The survival function, defined as the complementary CDF (CCDF4) of T ,
represents the probability that an event lasts beyond a given time period t. To estimate
this probability we use the Kaplan–Meier estimator [44].
Let nt denote the number of that commented before a given time step t, and let dt
denote the number of users that stop commenting precisely at t. Then, the estimated
survival probability after time t is defined as (nt − dt)/nt. Thus, if we have N
observations at times t1 ≤ t2 ≤ ··· ≤ tN , assuming that the events at times ti are jointly
4We remind that the CCDF of a random variable X is one minus the CDF, the function f (x) =
Pr(X > x).
13/18
independent, the Kaplan-Meier estimate of the survival function at time t is defined as
(cid:89)
(
ti<t
nti − dti
nti
).
S(t) =
Odds ratio. Probability and odds are two basic statistical terms to describe the
likeliness that an event will occur. Probability is defined5 as the fraction of desired
outcomes in the context of every possible outcome with a value in [0, 1], where 0 would
be an impossible event and 1 would represent an inevitable event. Conversely, odds can
assume any value in [0,∞), and they represent a ratio of desired outcomes versus
undesired outcomes. Given a desired outcome A, the relationship between the
probability P (A) that event A will occur, and its odds O(A) is
P (A) =
O(A)
1 + O(A)
and O(A) =
P (A)
1 − P (A)
.
It follows that the odds ratio (OR) of two events A and B is defined as
OR(A, B) =
O(A)
O(B)
=
P (A)
1−P (A)
P (B)
1−P (B)
P (A)[1 − P (B)]
P (B)[1 − P (A)]
.
=
Proportional Odds Model. The proportional odds model is a class of generalized
linear models used for modeling the dependence of an ordinal response on discrete or
continuous covariates.
Formally, let Y denote the response category in the range 1, . . . , K with K ≥ 2, and
let πj = Pr(Y ≤ j x) be the cumulative response probability when the covariate
assumes value x. The most general form of linear logistic model for the jth cumulative
response probability,
logit(πj) = ln
= αj + βT
j x,
(cid:19)
(cid:19)
(cid:18) πj
1 − πj
(cid:18) πj
1 − πj
is one in which both the intercept α and the regression coefficient β depend on the
category j. The proportional odds model is a linear logistic model in which the
intercepts depend on j, but the slopes are all equal, i.e.
logit(πj) = ln
= αj + βT x.
In other words, proportional odds model takes logistic regression one step further in
order to account for ordered categorical responses. For instance, in our analysis we
could have used a logistic regression model to investigate the effect of the number of
comments on the odds ratio (OR) of ”considering < 3 topics” vs ”considering ≥ 3
topics”. However, in such a case the cut-point would be arbitrary, and we could have
used a similar logistic regression model to analyze the effect on the odds ratio (OR) of
”considering < 2 topics” vs ”considering ≥ 2 topics”. In this sense, proportional odds
model averages up over all possible cut-point logistic regression models to maximize the
amount of information one can get out of the data.
5For the sake of brevity we consider only the frequentist approach.
14/18
References
1. Furedi F. Culture of Fear Revisited. Bloomsbury Publishing; 2006. Available
from: http://books.google.it/books?id=34CvAwAAQBAJ.
2. Bessi A, Coletto M, Davidescu GA, Scala A, Caldarelli G, Quattrociocchi W.
Science vs Conspiracy: collective narratives in the age of (mis)information. Plos
ONE. accepted;.
3. Mocanu D, Rossi L, Zhang Q, Karsai M, Quattrociocchi W. Collective attention
in the age of (mis)information. Computers in Human Behavior.
accepted;abs/1403.3344.
4. Brown J, Broderick AJ, Lee N. Word of mouth communication within online
communities: Conceptualizing the online social network. Journal of interactive
marketing. 2007;21(3):2–20.
5. Kahn R, Kellner D. New media and internet activism: from the ‘Battle of Seattle’
to blogging. new media and society. 2004;6(1):87–95.
6. Quattrociocchi W, Conte R, Lodi E. Opinions Manipulation: Media, Power and
Gossip. Advances in Complex Systems. 2011;14(4):567–586.
7. Quattrociocchi W, Caldarelli G, Scala A. Opinion dynamics on interacting
networks: media competition and social influence. Scientific Reports. 2014;4.
Available from: http://dx.doi.org/10.1038/srep04938.
8. Kumar R, Mahdian M, McGlohon M. Dynamics of Conversations. In:
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining. KDD ’10. New York, NY, USA: ACM; 2010. p.
553–562.
9. Sunstein CR, Vermeule A. Conspiracy theories: Causes and cures*. Journal of
Political Philosophy. 2009;17(2):202–227.
10. The Goal Is Power: The Global Warming Conspiracy; 2011.
http://www.forbes.com/sites/charleskadlec/2011/07/25/
the-goal-is-power-the-global-warming-conspiracy/. Forbes.
11. Ebola Lessons: How Social Media Gets Infected; 2014. Available from:
http://www.informationweek.com/software/social/
-ebola-lessons-how-social-media-gets-infected/a/d-id/1307061 [cited
29.10.2014].
12. The Ebola Conspiracy Theories; 2014. Available from: http://www.nytimes.
com/2014/10/19/sunday-review/the-ebola-conspiracy-theories.html
[cited 29.10.2014].
13. The inevitable rise of Ebola conspiracy theories; 2014. Available from:
http://www.washingtonpost.com/blogs/wonkblog/wp/2014/10/13/
the-inevitable-rise-of-ebola-conspiracy-theories/ [cited 29.10.2014].
14. Kuklinski JH, Quirk PJ, Jerit J, Schwieder D, Rich RF. Misinformation and the
Currency of Democratic Citizenship. The Journal of Politics. 2000;62(3):790–816.
Available from:
http://www.journals.cambridge.org/abstract_S0022381600000335.
15/18
15. Bessi A, Caldarelli G, Del Vicario M, Scala A, Quattrociocchi W. Social
Determinants of Content Selection in the Age of (Mis)Information. In: Aiello L,
McFarland D, editors. Social Informatics. vol. 8851 of Lecture Notes in Computer
Science. Springer International Publishing; 2014. p. 259–268. Available from:
http://dx.doi.org/10.1007/978-3-319-13734-6_18.
16. Byford J. Conspiracy Theories: A Critical Introduction. Palgrave Macmillan;
2011. Available from: http://books.google.it/books?id=vV-UhrQaoecC.
17. Fine GA, Campion-Vincent V, Heath C. Rumor Mills: The Social Impact of
Rumor and Legend. Social problems and social issues. Transaction Publishers;.
Available from: http://books.google.it/books?id=dADxBwgCF5MC.
18. Hogg MA, Blaylock DL. Extremism and the Psychology of Uncertainty.
Blackwell/Claremont Applied Social Psychology Series. Wiley; 2011. Available
from: http://books.google.it/books?id=GTgBQ3TPwpAC.
19. Bauer M. Resistance to New Technology: Nuclear Power, Information Technology
and Biotechnology. Cambridge University Press; 1997. Available from:
http://books.google.it/books?id=WqlRXkxS36cC.
20. Surowiecki J. The Wisdom of Crowds: Why the Many Are Smarter Than the
Few. Abacus; 2005. Available from:
http://books.google.it/books?id=_EqBQgAACAAJ.
21. Welinder P, Branson S, Belongie S, Perona P. The Multidimensional Wisdom of
Crowds. In: NIPS; 2010. p. 2424–2432.
22. Howell L. Digital Wildfires in a Hyperconnected World. In: WEF Report 2013.
World Economic Forum; 2013. .
23. Garrett RK, Weeks BE. The promise and peril of real-time corrections to
political misperceptions. In: Proceedings of the 2013 conference on Computer
supported cooperative work. CSCW ’13. New York, NY, USA: ACM; 2013. p.
1047–1058. Available from: http://doi.acm.org/10.1145/2441776.2441895.
24. Meade M, Roediger H. Explorations in the social contagion of memory. Memory
& Cognition. 2002;30(7):995–1009. Available from:
http://dx.doi.org/10.3758/BF03194318.
25. Koriat A, Goldsmith M, Pansky A. Toward a psychology of memory accuracy.
Annu Rev Psychol. 2000;51:481–537. Available from:
http://research.haifa.ac.il/~{}iipdm/personal_homepages/Papers/
towards_a_psychology_of_memory_accuracy.pdf.
26. Ayers M, Reder L. A theoretical review of the misinformation effect: Predictions
from an activation-based memory model. Psychonomic Bulletin & Review.
1998 Mar;5(1):1–21. Available from: http://dx.doi.org/10.3758/bf03209454.
27. Zhu B, Chen C, Loftus EF, Lin C, He Q, Chen C, et al. Individual differences in
false memory from misinformation: Personality characteristics and their
interactions with cognitive abilities. Personality and Individual Differences.
2010;48(8):889 – 894. Available from:
http://www.sciencedirect.com/science/article/pii/S0191886910000784.
28. Frenda SJ, Nichols RM, Loftus EF. Current Issues and Advances in
Misinformation Research. Current Directions in Psychological Science.
2011;20:20–23.
16/18
29. Onnela JP, Reed-Tsochas F. Spontaneous emergence of social influence in online
systems. Proceedings of the National Academy of Sciences. 2010
Oct;107(43):18375–18380. Available from:
http://dx.doi.org/10.1073/pnas.0914572107.
30. Ugander J, B L, M C, Kleinberg J. Structural diversity in social contagion.
Proceedings of the National Academy of Sciences. 2012;Available from:
http://www.pnas.org/content/early/2012/03/27/1116502109.abstract.
31. Lewis K, Gonzalez M, Kaufman J. Social selection and peer influence in an
online social network. Proceedings of the National Academy of Sciences. 2012
Jan;109(1):68–72. Available from:
http://dx.doi.org/10.1073/pnas.1109739109.
32. Kleinberg J. Analysis of large-scale social and information networks.
Philosophical Transactions of the Royal Society A: Mathematical, Physical and
Engineering Sciences. 2013;371.
33. Paolucci M, Eymann T, Jager W, Sabater-Mir J, Conte R, Marmo S, et al. Social
Knowledge for e-Governance: Theory and Technology of Reputation. Roma:
ISTC-CNR; 2009.
34. Quattrociocchi W, Paolucci M, Conte R. On the effects of informational cheating
on social evaluations: image and reputation through gossip. International Journal
of Knowledge and Learning. 2009;5(5/6):457–471.
35. Bond R, Fariss J, Jones J, Kramer A, Marlow C, Settle J, et al. A
61-million-person experiment in social influence and political mobilization.
Nature. 2012;489(7415):295–298.
36. Centola D. The Spread of Behavior in an Online Social Network Experiment.
Science. 2010;329(5996):1194–1197.
37. Serrano MA, Boguna M, Vespignani A. Extracting the multiscale backbone of
complex weighted networks. Proceedings of the National Academy of Sciences.
2009;106(16):6483–6488. Available from:
http://dx.doi.org/10.1073/pnas.0808904106.
38. Pons P, Latapy M. Computing Communities in Large Networks Using Random
Walks. In: Lecture Notes in Computer Science. vol. 3733; 2005. p. 284–293.
39. Blondel VD, Guillaume JL, Lambiotte R, Lefebvre E. Fast unfolding of
communities in large networks. Journal of Statistical Mechanics: Theory and
Experiments. 2008;2008. Available from:
http://dx.doi.org/10.1088/1742-5468/2008/10/P10008.
40. Clauset A, Newman MEJ, Moore C. Finding community structure in very large
networks. Phys Rev E. 2004 Dec;70:066111. Available from:
http://link.aps.org/doi/10.1103/PhysRevE.70.066111.
41. Ellison NB, Steinfield C, Lampe C. The Benefits of Facebook ” Friends:” Social
Capital and College Students’ Use of Online Social Network Sites. Journal of
Computer-Mediated Communication. 2007 July;12(4):1143–1168.
42. Locke S. Conspiracy culture, blame culture, and rationalisation1. The
Sociological Review. 2009;57(4):567–585.
17/18
43. Bessi A, Caldarelli G, Vicario MD, Scala A, Quattrociocchi W. Social
determinants of content selection in the age of (mis)information. Proceedings of
SOCINFO 2014. 2014;abs/1409.2651. Available from:
http://arxiv.org/abs/1409.2651.
44. Kaplan EL, Meier P. Nonparametric Estimation from Incomplete Observations.
Journal of the American Statistical Association. 1958;53(282):457–481.
18/18
|
1311.7213 | 1 | 1311 | 2013-11-28T05:43:32 | Finding a Maximum Clique using Ant Colony Optimization and Particle Swarm Optimization in Social Networks | [
"cs.SI",
"cs.NE"
] | Interaction between users in online social networks plays a key role in social network analysis. One on important types of social group is full connected relation between some users, which known as clique structure. Therefore finding a maximum clique is essential for some analysis. In this paper, we proposed a new method using ant colony optimization algorithm and particle swarm optimization algorithm. In the proposed method, in order to attain better results, it is improved process of pheromone update by particle swarm optimization. Simulation results on popular standard social network benchmarks in comparison standard ant colony optimization algorithm are shown a relative enhancement of proposed algorithm. | cs.SI | cs | Finding a Maximum Clique using Ant Colony Optimization and Particle Swarm
Optimization in Social Networks
Mohammad Soleimani-Pouri
Department of Electrical, Computer
and Biomedical Engineering, Qazvin
branch, Islamic Azad University,
Qazvin, Iran
[email protected]
Alireza Rezvanian
Computer and Information
Technology Engineering Department
Amirkabir University of Technology,
Tehran, Iran
[email protected]
Mohammad Reza Meybodi
Computer and Information
Technology Engineering Department
Amirkabir University of Technology,
Tehran, Iran
[email protected]
Abstract—Interaction between users in online social networks
plays a key role in social network analysis. One on important
types of social group is full connected relation between some
users, which known as clique structure. Therefore finding a
maximum clique is essential for some analysis. In this paper,
we proposed a new method using ant colony optimization
algorithm and particle swarm optimization algorithm. In the
proposed method, in order to attain better results, it is
improved process of pheromone update by particle swarm
optimization. Simulation results on popular standard social
network benchmarks in comparison standard ant colony
optimization algorithm are shown a relative enhancement of
proposed algorithm.
Keywords- social network analysis; clique problem; ACO;
PSO.
I.
INTRODUCTION
Today online social networks are formed a new type of
life due to some facilities and services for a wide ranges of
ages such as young to old. There is no doubt about either
influence or growth of social networks. Therefore, several
many of researchers are focused on social network analysis
aspects. It seems to be useful, studying structure of relation
between users in social networks. One of the important user
group structure associated with a full connected of some
users, which known as clique structure [1]. Several
applications of finding clique are reported by researchers
such as social networks analysis [2], online shopping
recommendation [3] and evolution of social networks [12].
In literature, finding clique is categorized as NP-complete
problems in graph theory [4].
Evolutionary
stochastic
are
(EAs)
algorithms
optimization techniques based on the principles of natural
evolution which applied several NP problems [13-15] such
as clique problem. Various types of algorithms have been
presented to solve clique problem, while evolutionary
algorithms such as genetic algorithm (GA) and ant colony
optimization (ACO) have been used more. Popular algorithm
named Ant-clique algorithm, which make a maximal clique
using sequential greedy heuristics based on ant colony
optimization by adding vertices to the partial cliques
iteratively [5]. Besides, another ACO based method
hybridized by simulated annealing (SA) [6] and tabu search
[7]. Although new hybrid algorithm obtained good results,
they have a high complexity in practice.
In this study, Particle Swarm Optimization (PSO)
algorithm has been applied as the heuristic to enhance the
performance of ACO algorithm for finding a maximal clique
in social network graph. Simulation results on social network
benchmark are shown the better results in comparison with
standard ACO algorithm. In the rest of this paper, section II
and III are consisted of ACO and PSO introduction
respectively, in section IV, proposed method is discussed.
Simulation results on social networks datasets are reported in
section V.
II. ANT COLONY OPTIMIZATION (ACO)
Ant Colony optimization (ACO) algorithm works well
for solving several discrete problems. The basic algorithm of
ACO was proposed by Dorigo as a multi agent approach in
order to solve traveling salesman problem (TSP) [8]. The
main idea of ACO algorithm is inspired from the behavior of
seeking out food by colonies of ants. Ants search their
environment randomly to find food. They return some of the
food to their nest once found a food and leave pheromone in
their return path. The amount of pheromone left on their path
depends on quality and size of the food source and it
evaporates gradually. Remaining pheromones will persuade
other ants to follow the path and just after a short time,
majority of the ants will trace the shorter path which is
marked with stronger pheromone. Procedure of ACO
algorithm has been presented in Figure 1.
Procedure ACO_MetaHeuristic
while(termination_conditions)
generateSolutions()
daemonActions() {Optional}
pheromoneUpdate()
end while
end procedure
Figure 1. Pseudo-code of ACO algorithm [9]
During running of the algorithm, ants first produce
different solutions randomly
in
the main
loop after
initialization. Afterwards, the solutions are improved by
updating the pheromones and using a local search optionally.
According to the problem and graph traverse, pheromones
set on vertices or edges of graph. Traversing the edge
between vertices i and j depends on the probability of edge
which is calculated as below:
(
)
τ
α
ij
(
τ
∑
α
ij
(1)
=
)
p
k
ij
k is probability of traversing the edge between
Where, pij
α is amount of pheromone present on
vertices i and j, while τij
the above mentioned edge. An optional local search can
contribute to improvement of the results prior to updating the
pheromones. However, method of updating the pheromones
can be like this:
(
1
+ =
1
+ Δ
)
ρτ
t
ij
(2)
τ
t
ij
τ
t
ij
−
t+1 is
Where, ρ is evaporation rate of pheromone, τij
t is
amount of new pheromone for edge between i and j, τij
t
amount of current pheromone for edge between i and j, Δτij
is amount of reinforced pheromone for proper solutions
which can be calculated from the following equation.
τ
Δ
t
ij
τ
∈
good s olution
t
ij
Otherw ise
(3)
if
1
⎧
⎪
= ⎨
0
⎪⎩
III.
PARTICLE SWARM OPTIMIZATION (PSO)
Particle swarm optimization (PSO) is a population based
optimization technique developed by Eberhart and Kennedy
in 1995, which inspired from social behavior of birds
seeking for food. In this method, group of birds seek for food
in a specified space randomly. Birds follow the bird with the
shortest distance to food in order to find position of the food
[10].
Every solution in PSO algorithm which is called a
particle corresponds to a bird in their pattern of social
movement. Each particle has a value of fitness calculated by
a fitness function. A particle bears greater fitness once it is
located in a closer position to the target (food in the model of
moving birds) within search space. Moreover, any particle
represents a speed which is responsible to direct the particle.
A particle will keep going through the problem space by
following the optimum particle at current state [16].
A group of particles (solutions) are created randomly at
the beginning of particle swarm optimization algorithm and
they try to find the optimum solution through being updated
among generations. A particle is updated in each step using
the best local and global solution. The best position a particle
has ever succeeded to reach is called pbest and saved while
the best position achieved by the population of particles is
named gbest. Velocity and location of each particle will be
updated using Equations (4) and (5) in each step of
implementing the algorithm after finding the best local and
global values.
(
)
(
= wv + c r pbest - x + c r gbest - x
t
t
t
t
2 2
1 1
i
i
i
i
)
t
i
(4)
t +1
v
i
(5)
i = 1, ..., m
x
= x + v
t
t
t +1
i
i
i
Where, vi is the velocity of ith particle and xi is the current
position of it. r1 and r2 are random values in the range of
(0,1). c1 and c2 are learning parameters usually assumed
equal (c1=c2). w is inertia weight which is considered as a
constant or variable coefficient as random, linear, nonlinear
and adaptive [11]. PSO has been used in various applications
and
this research utilizes
it
to
improve amount of
pheromones.
IV. PROPOSED ALGORITHM
High complexity was a major drawback of the previous
heuristic methods for solving the clique problem since it
significantly adds to the volume of calculations. All methods
provided so far apply the following relation to calculate Δτ
although the proposed algorithm take the advantage of PSO
algorithm to improve results and reduce complexity.
1
τ+Δ
=
t
1
(6)
+
G
- best-tour )
-best
(1
This algorithm has used the hybrid of ACO and PSO
algorithms in order to find the maximal clique in a graph. For
this purpose, some ants are placed initially on the graph and
follow paths to find the maximal clique. After evaporation of
existing pheromones, proper path is updated by its amount
on the edges using particle swarm optimization algorithm.
This procedure is repeated until the optimum clique is
obtained on the desired graph. Determining the amount of
pheromone through PSO is such that the total pheromone
measured at this step and the total pheromone associated
with the best answer up to present step will be calculated
taking into account the amount of pheromones at current
step. Now, Δτ for the reinforced pheromone of the desired
clique will be calculated with PSO algorithm using the
following equation:
1τ
= Δ +
τ
+Δ
tV
t
t
t is amount of reinforcement for current
Where, Δτij
t+1 is amount of reinforcement for new
pheromone and Δτij
pheromone, while Vt gives the amount of change which can
be achieved from this equation:
V = c r (pτ - Δτ) + c r (gτ - Δτ) + c V
t +1
3
2 2
1 1
Where, Vt+1 is the new value of Vt. r1 and r2 are two
random values within range of (0,1), while c1, c2 and c3 are
learning parameters (c1=c2=c3). pτ and gτ are considered as
the pheromone correspondent with the best current clique
and the best clique found so far, respectively. In this case,
(7)
(8)
t
discovering the changed amount of pheromone will be
implemented much more intelligent.
Taking into consideration the mentioned items, general
routine of proposed the algorithm can be summarized as
below:
1.
Initialize the parameters
2. Repeat steps 3 to 5 until reaching conditions of
termination
3. Traverse the graph by ants and create sub-graphs as
clique
4. Evaluate the obtained cliques
5. Update pheromones by PSO according to equation
(8)
6. End.
V. SIMULATION RESULTS
For evaluation of the proposed method, experiments applied
on some popular social network datasets. The description of
popular social networks is listed in the table 1.
the
297
62
V
VI
III
IV
8479
I
II
TABLE I.
SOCIAL NETWORKS DESCRIPTIONS
Dataset
Nodes
Edges
78
34
Zachary's karate club
Common adjective and nouns
112
425
in "David Copperfield"
Neural
network
of
nematode C. Elegans
social network of dolphins,
Doubtful Sound, New Zealand
Pajek
network:
Erdos
collaboration network 971
Pajek
network:
Erdos
collaboration network 991
Pajek network: World Soccer,
VII
Paris 1998
VIII Pajek network: graph and
digraph glossary
Pajek
network:
Slovenian
journals 1999-2000
co-authoship of scientists in
network theory & experiments
Pajek
network:
SmaGri
citation network
interchange network,
email
Univ. of Rovira
i Virgili,
Tarragona
4919
1314
35
72
472
492
295
118
1589
IX
X
XI
1059
1133
5451
159
1417
124
823168
1190
XII
Topology of zachary’s karate club and social network of
dolphins are presented in figure 2 and 3 respectively as the
most popular of the social network datasets.
Figure 2. Zachary's karate club social network
Figure 3. Dolphins social network
The setting of parameters for experiment is listed in
below. It is noted that choosing different values for
improving the results is also possible.
In this paper has used 30 ants with ρ=0.95, Φ=0.0002,
Δτinitial=0, τmin=0.01, τmax=6.
Meanwhile, parameters of PSO were initialized as V=0,
c1=c3=0.3, and c2=1-c1. α and ρ were given the following
values based on the experiments done and t is the number of
iterations.
α
t
( )
1
⎧
⎪
2
⎪
= ⎨
3
⎪
⎪
4
⎩
≤
t
100
< ≤
t
100
< ≤
t
400
>
t
800
400
800
⎫
⎪
⎪
⎬
⎪
⎪
⎭
(9)
+
ρ
(t 1)
ϕρ
(1- ) (t)
⎧
= ⎨
ρ
(t)>0.95
0.95
if
⎩
Average of 10 independent runs with 1000 iterations for
each implementation have been listed in table 2 and table 3
for proposed method (ACO-PSO) and ACO algorithm
respectively, including the maximum (Best), average (Avg),
(10)
standard deviation (Std) and run-time of algorithm for
finding a maximum clique in each graph datasets.
TABLE II.
SIMULATION RESULTS OF ACO-PSO FOR FINDING A
MAXIMUM CLIQUE
Std
Avg
4.995
0.070
4.783
0.412
5.543
1.482
4.998
0.044
0.6673
5.848
6.011
0.819
4.118
0.322
3.985
0.121
3.185
0.299
0.371
2.253
6.409
0.765
2.241
7.997
Run-time
11.84
23.37
49.47
15.69
105.11
111.89
10.742
12.94
22.07
118.59
481.34
529.04
Best
5
5
7
5
7
7
5
4
4
3
8
12
SIMULATION RESULTS OF ACO FOR FINDING A
MAXIMUM CLIQUE
Avg
Std
4.991
0.082
4.709
0.495
5.521
1.568
0.094
4.991
8.753
0.861
5.961
0.924
3.910
0.293
3.943
0.232
0.316
3.017
2.175
0.434
6.025
0.815
2.374
7.562
Run-time
64.03
355.81
1121.71
132.12
5853.59
6281.35
55.15
153.66
438.87
2142.03
9153.65
11109.17
Best
5
5
7
5
7
7
5
4
4
3
8
12
Graph
I
II
III
IV
V
VI
VII
VIII
IX
X
XI
XII
Graph
I
II
III
IV
V
VI
VII
VIII
IX
X
XI
XII
TABLE III.
Table 2 and table 3 indicate that the proposed method
(ACO-PSO) produces better results in comparison with ACO
method since the proposed approach is an appropriate
method to update pheromones of the traversed paths for ants
in calculating the optimum clique.
VI. CONCLUSION
A new hybrid algorithm has been presented in this paper
using ACO and PSO (ACO-PSO) for finding a maximum
clique in social networks. Traditional algorithms suffered
high complexity while the hybrid proposed algorithm just
change the process of update pheromone. It has been shown
that the new algorithm was able to improve the basic ACO
algorithm as simply and quickly. Simulation results on
popular social networks datasets indicate the improved
results for proposed algorithm in comparison with the ACO
algorithm.
[4]
REFERENCES
[1] D. Easley, and J. Kleinberg, Networks, Crowds, and Markets:
Reasoning About a Highly Connected World. Cambridge University
Press, 2010.
[2] S. Sadi, S. O(cid:31)g(cid:31)u(cid:31)du(cid:31)cu(cid:31), and A. Uyar, “An efficient community
detection method using parallel clique-finding ants,” Proc. 2010 IEEE
Congress on Evolutionary Computation (CEC 2010), IEEE Press,
July 2010, pp. 1-7, doi: 10.1109/CEC.2010.5586496.
[3] Q. Yang, P. Zhou, H. Zhang, and J. Zhang, “Clique Discovery Based
on User Similarity
for Online Shopping Recommendation,”
Information Technology Journal, vol. 10, pp. 1587-1593, 2011.
J. Kleinberg, and E. Tardos, Algorithm Design. Addison Wesley,
2005.
[5] S. Fenet, and C.Solnon, “Searching for Maximum Cliques with Ant
Colony Optimization,” Applications of Evolutionary Computing,
LNCS 2611, pp. 236-245, 2003.
[6] X.Xu, J.Ma, and J. Lei, “An Improved Ant Colony Optimization for
the Maximum Clique Problem,” Proc. Third International Conference
on Natural Computation (ICNC 2007), IEEE Press, Aug. 2007, pp.
766-770, doi: 10.1109/ICNC.2007.205.
[7] M.Al-Fayoumi, S.Banerjee, and P. K. Mahanti, “Analysis of Social
Network Using Clever Ant Colony Metaphor,” World Academy of
Science, Engineering and Technology, vol. 5, pp. 970-974, 2009.
[8] E. Bonabeau, M. Dorigo, and G. Theraulaz, Swarm intelligence.
Oxford University Press, 1999.
[9] K. Socha, and M. Dorigo, “Ant colony optimization for continuous
domains,” European Journal of Operational Research, vol. 185, no. 3,
pp. 1155-1173, 2008.
[10] J. Kennedy, and R.C. Eberhart, “Particle Swarm Optimization,” Proc.
IEEE International Conference on Neural Networks (ICNN 1995),
IEEE
Press, Nov/Dec.
1995,
pp.
1942-1948,
doi:
10.1109/ICNN.1995.488968.
[11] S. Nabizadeh, K. Faez, S. Tavassoli, and A. Rezvanian, “A novel
method for multi-level image thresholding using particle swarm
Optimization algorithms,” Proc. 2010 2nd International Conference
on Computer Engineering and Technology (ICCET 2010), IEEE
Press,
Apr.
2010,
pp.
V4-271-V4-275,
doi:
10.1109/ICCET.2010.5485600.
[12] F. Yan, S. Cai, M. Zhang, G. Liu, and Z. Deng, “A clique-
superposition model for social networks,” Science China Information
Sciences, pp. 1-19, 2012. doi: 10.1007/s11432-011-4526-y, In press.
[13] A. Rezvanian, and M. R. Meybodi, “An adaptive mutation operator
for artificial immune network using learning automata in dynamic
environments,” 2010 Second World Congress on Nature and
Biologically Inspired Computing (NaBIC 2010), Dec. 2010, pp. 479-
483, doi: 10.1109/NABIC.2010.5716360.
[14] A. Rezvanian, and M. R. Meybodi, “Tracking Extrema in Dynamic
Environments Using
Immune
a Learning Automata-Based
Algorithm,” Grid and Distributed Computing, Control And
Automation, Communications in Computer and Information Science,
2010, vol. 121, pp. 216-225, doi: 10.1007/978-3-642-17625-8_22.
[15] A. Rezvanian, and M. R. Meybodi, “LACAIS: Learning Automata
Based Cooperative Artificial
Immune System
for Function
Optimization,” Contemporary Computing, Communications
in
Computer and Information Science, 2010, vol. 94, pp. 64-75, doi:
10.1007/978-3-642-14834-7_7.
[16] A. B. Hashemi, and M. R. Meybodi, “A note on the learning automata
based algorithms for adaptive parameter selection in PSO,” Applied
Soft Computing, vol. 11, no. 1, pp. 689-705, 2011.
|
1705.10122 | 1 | 1705 | 2017-05-29T11:16:50 | Reciprocity-driven Sparse Network Formation | [
"cs.SI",
"cs.GT"
] | A resource exchange network is considered, where exchanges among nodes are based on reciprocity. Peers receive from the network an amount of resources commensurate with their contribution. We assume the network is fully connected, and impose sparsity constraints on peer interactions. Finding the sparsest exchanges that achieve a desired level of reciprocity is in general NP-hard. To capture near-optimal allocations, we introduce variants of the Eisenberg-Gale convex program with sparsity penalties. We derive decentralized algorithms, whereby peers approximately compute the sparsest allocations, by reweighted l1 minimization. The algorithms implement new proportional-response dynamics, with nonlinear pricing. The trade-off between sparsity and reciprocity and the properties of graphs induced by sparse exchanges are examined. | cs.SI | cs |
Reciprocity -- driven Sparse Network Formation
1
Konstantinos P. Tsoukatos
Department of Computer Science and Engineering
Technological Education Institute of Thessaly, Greece
Abstract
A resource exchange network is considered, where exchanges among nodes are based on reciprocity.
Peers receive from the network an amount of resources commensurate with their contribution. We
assume the network is fully connected, and impose sparsity constraints on peer interactions. Finding the
sparsest exchanges that achieve a desired level of reciprocity is in general NP-hard. To capture near --
optimal allocations, we introduce variants of the Eisenberg -- Gale convex program with sparsity penalties.
We derive decentralized algorithms, whereby peers approximately compute the sparsest allocations,
by reweighted ℓ1 minimization. The algorithms implement new proportional-response dynamics, with
nonlinear pricing. The trade-off between sparsity and reciprocity and the properties of graphs induced
by sparse exchanges are examined.
Network formation, proportional-response, nonlinear pricing, sparse interactions.
Index Terms
I. INTRODUCTION
The unprecedented increase in wireless traffic poses significant challenges for mobile operators,
who face extensive infrastructure upgrades to accommodate the rising demand for data. To ease
strain on networks, a viable alternative seeks to take advantage of already deployed resources,
that presently remain underutilized. For example, in device-to-device communications, devices in
close proximity may establish either direct links, or indirect communication via wireless relays,
altogether bypassing the cellular infrastructure. In recently launched Wi-Fi internet services,
e.g., FON (fon.com), Open Garden (opengarden.com), Karma (yourkarma.com), sharing wireless
access is a prominent feature, and subscribers are rewarded for relaying each other's traffic. In
all these scenarios, it is important to design mechanisms which foster cooperation and encourage
user contribution, in ways that realize fair and efficient use of pooled resources.
September 22, 2018
DRAFT
2
In this paper, we study a network exchange model, where collaborative resource consumption
is based on reciprocation. Incentive mechanisms based on reciprocation have been proposed in
the context of peer-to-peer and user-provided networks [1], [2]. Participant nodes earn credits (or
virtual currency) for assisting other nodes in transmitting their data to the destination. Ideally,
reciprocation implies that each peer receives back from the network an amount of resources
or utility equal to what he contributed to other users. However, such perfect reciprocation may
in general not be feasible, due to constraints arising from network structure/connectivity, and
differing resource endowments possessed by nodes, also depending on their position in the
network graph. Moreover, peers can typically maintain a limited number of connections (in the
popular BitTorrent peer-to-peer protocol users upload to at most four peers). Hence, it seems
reasonable to explore situations where graphs representing exchanges of resources among peers
are in some sense sparse.
The exchange model considered in this paper builds upon the so-called linear Fisher market
in economics (see [3], [4], [2] and references), where each participant aims to receive as much
resources as possible from the market. In this model, the optimal resource allocations are captured
by a classic convex program discovered by Eisenberg and Gale in 1959 [5]. In the context
of peer-to-peer bandwidth trading, the authors in [3] proposed a simple distributed algorithm
called proportional -- response, that computes solutions to the Eisenberg -- Gale program, hence
also equilibrium allocations in the resource exchange model: At every time slot, each peer
distributes his available resource to other peers in proportion to the resources it received from
them in the previous time slot.
Here, we formulate an optimization problem that balances benefits from reciprocation with
fixed per-link costs, therefore induces peers to maintain only a few active connections. Clearly,
rational peers will not engage in an exchange if costs out-weight potential benefits. We impose
sparsity penalties on peer interactions, to reflect the fact that peers often cannot afford the cost
of establishing and maintaining a link, the associated communication overhead, etc. fixed costs,
or are simply limited by physical constraints, such as limited range of wireless devices. This
reciprocity versus sparsity optimization is solved by decentralized tit-for-tat algorithms, whereby
peers communicate bids for each other's resource, so as to approximately compute the sparsest
allocations, achieving close-to-perfect reciprocation. Our algorithms implement nonlinear pricing,
and extend the proportional -- response dynamics of [3] to reinforce interactions where large
amounts of resources are exchanged. Starting from a complete graph, the algorithms prescribe
September 22, 2018
DRAFT
3
how nodes can gradually form a network of exchanges, that progressively gets sparser. As a result,
the proposed schemes suggest a network formation model where directed graphs, representing
sparsity-constrained resource exchanges, are constructed. The graphs may manifest either direct
reciprocation between peers, i.e., both edges (i, j) and (j, i) are typically present in the network
graph, or indirect reciprocation, in which case most of the edges do not have their reverse in the
graph. We illustrate the formation of resource exchange networks by peers who achieve almost
perfect reciprocation with only a small number of connections, and discuss the properties of the
sparse graphs in several numerical examples.
From a mathematical standpoint, the sparse exchange algorithms are derived by applying
majorization-minimization [6], [7] and reweighted ℓ1 minimization [8] to a combinatorial prob-
lem, and optimize the trade-off between reciprocation and sparsity up to a local optimum. Starting
from different initial conditions, different local optima arise, corresponding to different resource
allocations and sparse exchange graphs.
II. SYSTEM MODEL AND BACKGROUND
Consider a network of N peers who exchange resources over a graph G describing connectivity.
Exchanges take place only between peers that are neighbours in the graph G. Each peer allocates
spare resources to other peers, in exchange for their resources (in the future). There exists a
single resource/commodity in the network. Peers spend their own spare resource for acquiring
resources, i.e., there is no monetary budget. Let ai be the resource endowment of peer i. Let
xij(t) be the amount of resource allocated from user j to user i at time t = 0, 1, . . .. Vector
xi denotes the allocations of peer i, and x−i denotes the allocations of all others. Each peer i
allocates the entire budget ai to his neighbours, ai = Pj6=i xji, and receives in return a total
amount ri(x−i) := Pj6=i xij of resource. We assume peers value only the resource received from
others (not their own spare resource). That is, utility is linear in the amount of received resources
Ui(ri) = ri, and each peer i = 1, . . . , N , allocates resources to solve
(PEER) max
xi≥0
ri(x−i)
subject to Xj6=i
xji = ai.
These N (PEER) problems are intertwined, because each peer's utility depends on resources
received from other peers.
Notation: Subscript in allocation xij is understood as given from j to i, similarly bij is the
bid of peer j for resource of peer i, and µij the price peer j charges to i.
September 22, 2018
DRAFT
4
a:1
d:1
a:1
d:1
a:1
d:1
b:1
c:1
b:1
c:1
b:1
c:1
complete graph
ring (cycle)
pairs
Fig. 1. Exchange network with 4 nodes. Left: Complete graph. Middle, right: Graphs with minimum number of links.
Motivation. In this paper, we consider an exchange network where the connectivity graph G
is complete. Every node can, in principle, engage in exchanges with everybody else. However,
we assume that establishing and maintaining exchange links carries a cost, so that peers tend
to limit the number of their active connections. This is often the case in practice, where peers
choose a few trading partners and avoid spreading themselves thin, so as to reduce overhead,
friction etc. costs associated with exchanges. Limits on the number of connections may also arise
due to physical or protocol constraints (e.g., in the BitTorrent peer-to-peer protocol). In a slightly
different context, reducing transaction costs is a motivation for sparse portfolio selection [9].
Here, in a similar spirit, we use a penalty term that encourages peers to form sparse connections.
Our goal is to develop a quantitative model for dynamic formation of exchange networks driven
by reciprocation, where the directed graphs representing exchanges are sparse.
Example. The example network of Figure 1 illustrates the graphs implementing sparse
exchanges. All four nodes a, b, c, d have resource endowment equal to 1. Perfect reciprocation
can be realized in infinitely many ways, across the 12 links of the complete graph (left). The
sparsest exchange graphs, where each peer gives to exactly one peer 1 unit of resource, consist
of only 4 links, arranged either in ring (middle) or pairs (right), whence we also see the sparsest
solution need not be unique. In addition, the pairs configuration of Figure 1 shows that the
sparsest solution may partition the (initially complete) graph into disconnected components.
Previous work. We recap several useful results from a large literature. Exchange network is
an instance of a linear Fisher market, for which an equivalent convex formulation was given by
Eisenberg and Gale (1959) [5]:
max
x Xi
ai log ri
subject to Xj6=i
xji = ai,
∀i.
(1)
The objective in (1) resembles the familiar proportionally-fair allocation, where each peer i
September 22, 2018
DRAFT
5
receives an amount of resources ri proportional to his contribution ai. It is also similar to
Kelly's NETWORK problem [10], if the contributions ai are viewed as payments. The receive
vector r achieving optimality in (1) is unique, however the optimal allocation x is not unique,
because the objective in (1) is not strictly concave in x. That is, the same optimal receive
vector may be realized with different allocations. The equivalence between (PEER) and (1) can
be established as follows. Let ρj be the price at which peer j "sells" its resource (although
no actual monetary payments mediate the exchange). User i, by allocating amount xji to j,
"purchases" back xij = xji/ρj. Hence, the total resource received by user i is ri = Pj6=i xji/ρj.
Therefore, to maximize utility in (PEER) user i allocates resources to (and consequently receives
resources xij > 0 from) only peers with the largest 1/ρj, i.e., the cheapest neighbors,
xij > 0
if and only if ρj = min
k∈Ni
ρk,
(2)
where Ni is the set of neighbors of i. Now, to find the prices ρ, consider the convex program
(1), relax the constraints and write the Lagrangian
L(x, ρ) = Xi
ai log ri +Xi
ρi(ai −Xj6=i
xji).
The KKT conditions at the saddle point of the Lagrangian imply that either
or
xij = 0
and
xij > 0
and
∂L
∂xij
∂L
∂xij
< 0 in which case
= 0 in which case
ai
ri
ai
ri
< ρj,
= ρj.
From the equations above we deduce that xij > 0 if and only if ρj = mink∈Ni ρk, which is
precisely condition (2). Therefore, allocations x and prices ρ solving (PEER) can be computed
through the Eisenberg -- Gale program (1).
Define the exchange ratio for each peer i as the ratio of the resources ri peer i receives, over
the ai he allocates to others. Since xij = xji/ρj, by summing over i we get aj = rj/ρj, that is
ρj =
rj
aj
,
∀j.
Hence, the exchange ratio coincides with the Lagrange multiplier/price ρ in the Eisenberg -- Gale
program (1). May use the term price and exchange ratio interchangeably.
When network connectivity is given, we summarize the following facts from [2], [3], [4], [11]:
Network graph decomposes into components, and resource exchanges take place only within each
September 22, 2018
DRAFT
6
component. Since the exchange ratio is also the price (Lagrange multiplier) at which each node
sells its resource, peers with high exchange ratio are expensive and more constrained, i.e., "poor"
and struggle to contribute more resources. At equilibrium, rational peers exchange resource only
with their minimum price (cheapest/most generous) neighbours. Exchange can be viewed as a
reverse auction: Acting as sellers, peers compete to sell their resource by lowering their prices
(raising their bids), whereas, in the role of buyers, they purchase resource from the cheapest
(highest "bang-per-buck") neighbor. Moreover, the prices of peers who exchange resources with
each other are inversely proportional. That is, the price at which a node buys resources from
peers is equal to the inverse of the price at which he sells his own resource. The upshot is that,
by measuring his own price, each peer can infer the price of the peers he exchange resources
with. In particular, inexpensive nodes (with prices smaller than one) know they interact with
expensive nodes (with price larger than one).
New connections. Previous work typically analysed exchanges in networks where connectivity
and resource endowments were a priori fixed and immutable. Then, due to the existing connec-
tivity and neighbouring node endowments, certain nodes may end up receiving significantly less
resources than what they contribute to their peers. Unless it is possible to alter either connectivity,
or node resource endowments, rational peers with exchange ratio much lower than one have little
incentive to engage in exchanges and contribute. Lack of participation will decrease the total
amount of resources contributed to the network, i.e., is detrimental to social welfare.
Rational nodes with low prices are motivated to seek out new peers, who are less expensive
than the ones they presently interact with. Neighbor selection by a Gibbs sampling algorithm
was proposed in [2]. By connecting with richer peers, inexpensive nodes receive more resources,
hence their exchange ratio (which is also their price) increases. Along the way, inexpensive peers
become more expensive, thereby also less attractive as candidates for resource exchange. In a
fully connected network, whenever perfect reciprocity is possible, this balancing act may drive
all exchange ratios (prices) to one, i.e. all nodes receive from the network an amount of resources
equal to what they contribute -- perfect reciprocation.
III. NETWORK FORMATION PROBLEMS
Starting from a complete network, we allow peers to gradually form an exchange graph
that progressively gets sparser. First, we discuss centralized optimization problems, that aim
to identify the sparsest interactions that guarantee a desired level of reciprocation. Then, we
September 22, 2018
DRAFT
7
introduce variants of the Eisenberg -- Gale program (1), where the objective is to balance benefits
from equitable allocations with fixed per-link costs, hence form only a few connections. These
formulations lead to distributed algorithms that enable peers to compute sparse exchanges in
a decentralized manner, by communicating bids for each other's resource. The algorithms are
simple and natural to understand.
A. Sparse Exchanges with Reciprocation Guarantees
Let x0 denote the pseudo-norm that counts the number of nonzero entries in x.
Problem P0. The objective is to find sparsest allocations that achieve a minimum exchange
ratio at least θ, where θ ≤ 1:
(P 0) min
x
x0
s. t. Xj6=i
xji = ai,
ri
ai
≥ θ ∀i.
(3)
This is a combinatorial problem (assuming the minimum desired level θ of reciprocity is feasible),
hence intractable. To find an approximate solution, we may replace the nonsmooth x0 norm
by a smooth proxy. A typical choice, justified by the limit
1 {x 6= 0} = lim
ǫ↓0
log(1 + x/ǫ)
log(1 + 1/ǫ)
,
is given by the logarithmic approximation ℓ(x) := Pi,j log(ǫ + xi,j), leading to the problem
min
ℓ(x)
x
s. t. Xj6=i
xji = ai,
≥ θ ∀i.
(4)
ri
ai
Hence, the combinatorial objective in (3) has been substituted by a minimization of a concave
function (4). This is again hard, and can be tackled as follows.
Problem P1. Successively minimize a linear upper bound to the logarithm in (4), given by
min
x
T ∇ℓ(x(t))
x
s. t. Xj6=i
xji = ai,
ri
ai
≥ θ ∀i,
(5)
formed around the previous solution x(t), for t = 0, 1, . . .. This amounts to solving a series of
linear programs to find a local minimum, hence can be computed efficiently. Moreover, to avoid
getting trapped in local minima, a small random perturbation may be employed.
Problem P2. Instead of bounding the logarithm in (4) with a linear upper bound, we bound
with a quadratic. More specifically, it holds that log(ǫ + x) ≤ q(x, ¯x) + k, where
q(x, ¯x) :=
x2/(2δ(ǫ + δ)),
0 ≤ x ≤ δ
x2/(2¯x(ǫ + ¯x)), x > δ,
(6)
DRAFT
September 22, 2018
8
for appropriate constant k and small δ > 0. Starting from an iterate x(t), we use (6) to bound
(4) and get a quadratic program in x:
min
x Xi,j
q(xij, xij(t)) s. t. Xj6=i
xji = ai,
ri
ai
≥ θ ∀i.
(7)
Problem (7) subsequently reduces to a linear system computing 2N multipliers from 2N linear
equations. As in (5), we apply the majorization-minimization procedure [8], hence solve a
sequence of quadratic programs to obtain the final solution (IRLS algorithm). Instead of solving
each quadratic program completely, we may run one (or a few) iterations towards solution (e.g.
fixed-point iteration) of linear system. We anchor a new upper bound to the computed allocations,
and resume iterations for the updated linear equations.
The solutions discussed above are centralized. In the following, we focus on distributed
algorithms, obtained by balancing reciprocation with a penalty that encourages sparse exchanges.
B. Eisenberg -- Gale Program with Sparsity Penalty
We consider an Eisenberg -- Gale program (1) augmented with a sparsity promoting term
(EG) max
log(ǫ + xij)
x Xi
ai log ri − cXi,j
subject to Xj6=i
xji = ai,
∀i.
(8)
Optimization (8) is nonconvex because the objective is a difference of two concave functions.
We will derive a distributed algorithm that computes an approximate solution. First, relax the
constraints, introduce the multipliers λ and write the Lagrangian
L(x, λ) = Xi
ai log ri − cXi,j
log(ǫ + xij) +Xi
λi(ai −Xj6=i
xji).
The dual optimization requires solving the relaxed primal
max
L(x, λ).
x
(9)
A local maximum for (9) can be determined in a iterative fashion using majorization-minorization.
To that end, we bound the logarithms log(ǫ + xij) using
log y ≤ log y0 +
y − y0
y0
.
(10)
DRAFT
September 22, 2018
9
Next, with a logarithmic change of variables xij := log xij, define the function
φ(x) := Xi
ai log(Xj6=i
exij ),
so that φ(x) = Pi ai log ri(x). The convexity of the log-sum-exp function [12, page 74] implies
that φ is convex in x, therefore it holds that
φ(x) ≥ φ(x(t)) + (x − x(t))T ∇φ(x(t)).
(11)
Making use of inequalities (10) and (11), we lower bound the Lagrangian L by a surrogate
function g anchored at x(t),
constructed as
L(x, λ) ≥ g(xx(t)),
g(xx(t))
:= φ(x(t)) + (x − x(t))T ∇φ(x(t))
(log(ǫ + exi,j (t)) − 1)
−cXi,j
−Xj (cid:0)λj + w(exij(t))(cid:1) exij .
The weights w above are defined as in [8] by
w(x) :=
c
ǫ + x
.
(12)
(13)
Function g(xx(t)) in (12) is concave in the transformed allocations x and easy to maximize.
Successive maximization of the lower bound (12) yields the iteration
x(t + 1) = arg max
x
g(xx(t)),
where, at each time t = 0, 1, . . ., multipliers λ are also updated to satisfy the node endowment
constraints in (8). We differentiate (12) with respect to x, transform back to the x domain, and,
after some algebra, arrive at the following solution:
Each peer i communicates at time t = 0, 1, . . . its exchange ratio
ρi(t) :=
ri(t)
ai
to other peers.
Let the bids of peer j for peer i's resource be
bij(x(t), λi) :=
xji(t)
ρj(t)
1
λi + w(xji(t))
,
September 22, 2018
(14)
(15)
DRAFT
10
where the weights w are defined in (13) and λi is the multiplier associated with the budget
constraint for peer i. In market terms, bij is the amount of resource peer i can purchase from j
at price (per unit) ρj(t)(λi + w(xji(t))) by paying xji(t). Note that pricing is nonlinear; price
per unit decreases as payment xji(t) increases, and asymptotically drops to λiρj(t) as payment
xji(t) goes to infinity.
Each peer i selects λi to exhaust the entire budget
ai = Xj6=i
bij(x(t), λi),
(16)
this can be computed by bisection search. Check that if endowment ai of peer i is large, then,
all other quantities in (16) remaining fixed, multiplier λi (which is also the price associated with
i's endowment) will be small, i.e., peer i will be less resource constrained, as expected.
Finally, peer i allocates resources to j proportionally to bids
xji(t + 1) = bij(x(t), λi)
(17)
where the bids bij are defined by (15) and multipliers λi solve (16). This is a proportional-
response with nonlinear price discrimination. We call the algorithm an EG-sparse proportional-
response (EGsPaRse).
Algorithm 1 Eisenberg-Gale Sparse Proportional Response (EGSPARSE)
1: Initialization (time t = 0): Peers allocate resources x(0) either equally or randomly.
2: repeat
3:
4:
5:
6:
Each peer i computes its exchange ratio ρi(t) (14) and communicates it to the network.
Each peer i determines the bids bij(t) for its resource from (15), where the multiplier λi
solves (16).
Each peer i allocates resources xji(t + 1) according to (17)
t ← t + 1
7: until Convergence
When there is no sparsity-promoting penalty c = 0, the recursion becomes
xij(t + 1) = aj xij(t)
ai
ri(t)(cid:30)Xk6=j
xkj(t)
ak
rk(t)
.
(18)
Updates (18) coincide with the standard proportional-response dynamics of [3]. To verify this,
observe that iteration (18) corresponds to two steps of proportional-response: In the numerator,
September 22, 2018
DRAFT
11
peer i reciprocates j by charging a constant per-unit price ri(t)/ai (linear pricing), likewise each
peer k in the denominator, and for peer j reciprocating i in the entire fraction.
In the general case c > 0, peers are required to communicate either their exchange ratio,
or the multiplier λ (which is also related to the exchange ratio). This implicitly assumes peers
declare their true ratio. In practice, peers may be unwilling to disclose their exchange ratio (due
e.g. to privacy) or strategically misreport it, to extract additional resources. Such strategic/non-
cooperative behaviour by peers who anticipate the effect of reporting their ratio may result in
loss of optimality.
C. An Alternative Formulation: SPaRse Algorithm
We next turn to an alternative formulation, which leads to an intuitively appealing algorithm.
Recall the definition of the Kullback -- Leibler divergence between two vectors,
D(u, v) := Xi
ui log
ui
vi
−Xi
(ui − vi), u, v ≥ 0.
Inspection of the Eisenberg -- Gale program (1) shows it is equivalent to minimizing the divergence
D(a, r) between allocated a and received r resources (subject to constraints). It is natural to
wonder whether we may seek to minimize D(r, a) instead of D(a, r); although divergence is
in general not symmetric. It turns out that the former optimization also captures the optimal
allocations, a result due to Shmyrev [13] (see also discussion in [4]). The key advantage of
this alternative formulation is that it nicely fits the proportional-response dynamics. Hence, we
consider a convex program equivalent to (1), obtained from minx D(r, a), together with a sparsity
penalty:
(S) min
log(ǫ + xij)
x
D(r, a) + cXi,j
subject to Xj6=i
xji = ai,
∀i.
(19)
Optimization problem (19) is nonconvex; we will derive an algorithm that computes a local
minimum using the minorization-majorization procedure [7]. The updates can be expressed in
terms of a Bregman divergence Bh, associated with the convex negative entropy function h.
Definition 1: Let ψ : X → IR be a strongly convex function on a convex set X. The Bregman
divergence Bψ : X × X → IR associated with the strongly convex function ψ is defined by
Bψ(u, v) := ψ(u) − ψ(v) − (u − v)T ∇ψ(v).
(20)
DRAFT
September 22, 2018
12
The Bregman divergence is a distance -- like function, as it satisfies Bψ(u, v) ≥ 0 for all u, v,
thanks to the convexity of ψ. For example, ψ(u) = 1
2u2 induces the usual Euclidean distance
2 u − v2, however the Bregman divergence is in general not symmetric (for more
Bψ(u, v) = 1
properties see e.g. [14]). The Bregman distance generated by the negative entropy
is the Kullback -- Leibler divergence:
h(r) := Xi
ri log ri,
r ≥ 0,
Bh(u, v) = D(u, v), u, v ≥ 0.
(21)
(22)
This particular choice of Bregman function (instead of usual Euclidean distance) is motivated
by the fact that entropy better reflects the geometry of the simplex constraints [14], [4] (so that
the latter are easily eliminated).
Let f (x) be the objective function in (19). In the majorization step, a point x(t) is used to
anchor a surrogate function g(xx(t)) which upper bounds f ,
f (x) ≤ g(xx(t)), x ≥ 0,
and is easy to minimize. Function g is chosen to be tight at x(t), i.e., f (x(t)) = g(x(t)x(t)).
In the minorization step, the upper bound is minimized with respect to x, generating a sequence
for each t = 0, 1, . . . . We form the surrogate g(xx(t)) as follows: Write the divergence D(r, a)
x(t + 1) = arg min
g(xx(t)),
x
(23)
as
D(r, a) = h(r) −Xi
ri log ai − (ri − ai).
Because of (22), negative entropy (21) satisfies
h(r) = h(r(t)) + (r − r(t))T ∇h(r(t)) + D(r, r(t)).
(24)
(25)
The divergence D(r, r(t)) in (25) is bounded using Lemma 1 (end of Section III). The logarithm
in (19) is bounded by the first-order Taylor expansion
log y ≤ log y0 +
y − y0
y0
,
(26)
DRAFT
September 22, 2018
as is customary in the reweighted ℓ1 minimization [8] framework. Inserting (24) and (25) in the
objective (19) and taking into account inequalities (26) and (32) gives
g(xx(t)) = D(x, x(t)) + h(r(t)) + (r − r(t))T ∇h(r(t))
13
log(ǫ + xij(t)) +
xij − xij(t)
ǫ + xij(t)
+cXi,j
−Xi
ri log ai − (ri − ai).
(27)
The updated allocations x(t + 1) are computed by minimizing the surrogate (27) in (23). After
some algebra, also making use of ∂D(x, x(t))/∂xij = log xij − log xij(t), we get
xij(t + 1) = xij(t)
ai
ri(t)
exp(cid:18)−
c
ǫ + xij(t)(cid:19) .
(28)
Finally, allocations (28) are normalized to satisfy the endowment constraint Pi6=j xij = aj
for each peer j. We thus arrive at a second algorithm for sparse proportional-response, where
nonlinear prices (with an exponential factor) are charged to users:
Each peer i computes the price µji(t) (per unit resource) charged to peer j 6= i at time
t = 0, 1, . . . as
µji(t) :=
ri(t)
ai
exp(cid:18)
c
ǫ + xij(t)(cid:19) .
(29)
Pricing above is nonlinear, because µji(t) depends on the amount of resource xij(t) (payment)
offered to i, inside the exponential. The higher the resource xij(t) (payment) offered by peer
j to peer i, the lower the price µij(t) (per unit resource) charged to i, and the price converges
to the exchange ratio ri(t)/ai as payment xij(t) goes to infinity. Hence, the proposed dynamics
reinforce exchanges that involve large amounts of resources.
Next, each peer i communicates to other peers j the price µji(t). Peer i computes the bids of
other peers j for i's resource as
bij(x(t)) :=
xji(t)
µij(t)
,
j 6= i.
(30)
This corresponds to the amount of resource with which j intends to reciprocate i. Alternatively,
peers can communicate directly the bids instead of prices. Bid bij is also the number of resource
units that peer i can purchase from j with total payment xji(t), at price µij(t).
Subsequently, peer i allocates his resource to peer j proportionally to the received bids,
xji(t + 1) = ai
bij(x(t))
bik(x(t))
Xk6=i
,
j 6= i.
(31)
DRAFT
September 22, 2018
14
This is a proportional-response with nonlinear price discrimination, where larger amounts of
resource are "sold" at lower per-unit price (discount). We call this algorithm a Shmyrev-sparse
proportional-response (SPaRse).
Algorithm 2 Shmyrev Sparse Proportional Response (SPARSE)
1: Initialization (time t = 0): Peers allocate resources x(0) either equally or randomly.
2: repeat
3:
4:
5:
6:
Each peer i computes the nonlinear price µji(t) (29) (per unit resource) he charges to
each peer j, and communicates µji(t) to peer j.
Each peer i determines the bids bij(t) for its resource by peer j using (30).
Each peer i allocates resources xji(t + 1) proportionally to bids (31).
t ← t + 1
7: until Convergence
Each round of SPaRse has O(N 2) computation and communication complexity. If there is no
sparsity penalty (set c = 0) we recover again recursion (18), which is the standard proportional-
response [3]. As will be seen in the numerical results of Section IV, the variant with Equal first
round allocation x(0) tends to generate graphs with mostly direct reciprocation, while Random
first round leads to indirect reciprocation, This is likely due to the fact that a random initial
allocation adds uncertainty and erases symmetry, so that it gets impossible to recover the more
orderly direct reciprocation.
The analysis above can be extended to address a slightly different model, where each peer is
constrained by the maximum number of active connections it can maintain at all time slots.
Lemma 1: For all x, y ≥ 0 it holds that
D(r(x), r(y)) ≤ D(x, y).
(32)
Proof: Inequality (32) follows from the joint convexity of the function d(x, y) = x log(x/y)
in (x, y) and Jensen's inequality [4].
IV. NUMERICAL RESULTS
We evaluate the performance of the SPaRse proportional-response algorithm in several numer-
ical examples; EGsPaRse is omitted for brevity. The examples showcase the formation of sparse
exchange graphs by peers who communicate bids/prices in a distributed manner, and compute
September 22, 2018
DRAFT
15
1: 155.81
108.9
30.31
29.93
16.98
6: 107.07
122.58
8: 86.49
107.07
56.18
57.81
5: 122.58
4: 278.09
76.46
75.33
53.52
52.76
31.78
31.37
58.51
57.66
2: 75.33
3: 52.76
7: 31.37
9: 57.66
Fig. 2. SPaRse-Equal: Exchange graph in a N = 9 node network, T = 10, 000 iterations.
allocations that achieve close to perfect reciprocation (minimum exchange ratio near one). We
discuss the influence of the initial split (SPaRse-Equal versus SPaRse-Random variants) on the
properties of the induced graphs in terms of direct/indirect reciprocation, the role of the link
cost parameter c, and the temporal effects (number of iterations T ) on the sparsity and fairness
of the resulting allocations.
The SPaRse algorithm is applied to a 9-node network, where node endowments are shown in
the circles, i.e., node 1 endowment is 155.81. After 10, 000 iterations of SPaRse-Equal (with c =
0.1, ǫ = 0.01), a graph with 16 links is generated, shown in Figure 2, together with the computed
allocations xij. The minimum exchange ratio is 0.981, and the divergence between received and
allocated resources is D(r, a) = 0.125. We see the majority of links are bidirectional: Only links
1 → 6, and 6 → 5 do not have their reverse in the graph, so among these three nodes indirect
reciprocation takes place.
We next consider a 25-node network, with sample mean node endowment ¯a = 106.22 and
standard deviation std(a) = 53.48, drawn from a lognormal log ai ∼ N (4.5, 0.25) distribution.
We compare influence on the resulting allocations of the Random and Equal initial splits.
Figure 3 shows six sample paths of the SPaRse algorithm (with c = 0.2, ǫ = 0.01); solid
red line corresponds to Equal initial split of resources, and dashed blue lines correspond to
five Random initial splits. It appears that starting with Equal allocation requires more time to
converge. We see that, in general, convergence takes place to different allocations, and slightly
different minimum exchange ratios, which are larger than 0.9, not too far from 1. The top left
plot shows that the cardinality of the final allocation is roughly the same under both Random
September 22, 2018
DRAFT
100
80
60
40
100
50
0
s
k
n
i
l
f
o
.
m
u
N
s
k
n
i
l
l
a
c
o
r
p
c
e
r
f
o
.
i
m
u
N
Equal
Random
1000
2000
iterations
1.5
1
0.5
e
c
n
e
g
r
e
v
d
L
−
K
i
3000
0
0
1
o
i
t
a
r
0.95
m
u
m
n
M
i
i
0.9
1000
2000
iterations
3000
0.85
0
1000
2000
iterations
1000
2000
iterations
16
3000
3000
Fig. 3. SPaRse convergence in a N = 25 node network: Equal (solid) vs. Random (dashed) initial allocation.
and Equal, i.e., regardless of initial conditions. More interestingly, the bottom left plot in Figure
3 suggests qualitatively different behavior of the two variants: (a) SPaRse-Equal forms a graph
that implements direct reciprocation (number of reciprocal links is almost equal to total number
of links, at about 45); while (b) SPaRse-Random generates graphs that implement indirect
reciprocation, as there are very few reciprocal links.
The impact of different random initial allocations is quantified in the the same 25-node
network, and node endowments as Figure 3. We run SPaRse-Random 1, 000 times (with c = 0.1,
ǫ = 0.01), each time with a different random split of resources in the first round. Runs are 5, 000
iterations long, by then allocations have converged. We record four performance metrics: (i)
the cardinality of the final allocation (the number of directional links in the resulting exchange
network), (ii) the reciprocity (i.e., the number of links for which their reciprocal is also in the
graph), (iii) the minimum exchange ratio over the 25 nodes, and (iv) the divergence D(r, a)
between received r and allocated a resources. Figure 4 shows histograms and mean values
(vertical black line) for all 4 metrics. We see that SPaRse-Random usually achieves a minimum
exchange ratio larger than 0.92, with sparse graphs consisting of less than 50 edges, out of
25 × 24 = 600 totally in a complete graph with 25 nodes. The top histograms (cardinality of
x, reciprocity) once more indicate that graphs generated by SPaRse-Random manifest mostly
indirect reciprocation, since (on the average) only about 4 out of the 46 links are reciprocal.
September 22, 2018
DRAFT
17
y
c
n
e
u
q
e
r
f
e
v
i
t
l
a
e
R
0.4
0.3
0.2
0.1
0
0.2
0.15
0.1
0.05
y
c
n
e
u
q
e
r
f
e
v
i
t
l
a
e
R
40
Num. of links
45
50
0
0.9 0.92 0.94 0.96 0.98
Minimum ratio
0.4
0.3
0.2
0.1
0
0
0.2
0.15
0.1
0.05
0
5
15
Num. of reciprocal links
10
0.2 0.4 0.6 0.8
1
Divergence D(ra)
1.2
Fig. 4. SPaRse-Random in N = 25 node network. Histogram of metrics over 1000 runs with random initial splits.
50
40
30
20
s
k
n
i
l
f
o
.
m
u
N
10
0
0.05
0.1
Sparsity cost c
0.4
0.3
0.2
0.1
e
c
n
e
g
r
e
v
d
i
L
−
K
0
0
0.05
0.1
Sparsity cost c
0.15
Fig. 5. SPaRse-Equal: Performance under different sparsity parameters c (N = 11 node network).
The role of sparsity parameter c is examined in Figure 5. In a N = 11 node network, five
endowment vectors are randomly drawn from the same lognormal distribution as before. For
each endowment vector we run SPaRse-Equal with different sparsity parameters c and record
the cardinality of the resulting allocation, and the divergence D(r, a), to get five cardinality
and divergence curves. The duration of each run is 104 iterations. As c decreases, the algorithm
computes more fair allocations (smaller divergence, larger minimum exchange ratio), but takes
longer to converge. Decreasing c below 0.05 (while average endowment is about 100) yields
close to zero divergence, i.e., perfect reciprocation (Figure 5, right). However, for c smaller than
0.05, and when computations stop after 104 iterations, we see that almost zero divergence is
accompanied by an increase in number of links in the graph (Figure 5, left).
The discussion above suggests that, by tuning the parameters c and ǫ, our model can generate
September 22, 2018
DRAFT
18
28.36
28.37
1: 155.81
36.72
36.72
5: 122.58
19.11
19.12
3.18
3.08
31.51
31.5
38.22
38.20
39.32
39.29
8: 86.49
0.1
0.07
2: 75.33
8.68
8.86
12.32
12.14
24.34
0.02
24.18
35.75
35.66
6: 107.07
9: 57.66
43.77
43.76
48.8
48.90
4: 278.09
31.32
31.36
7: 31.37
52.75
52.74
29.38
29.51
3: 52.76
Fig. 6. SPaRse-Equal: Exchange graph in a N = 9 node network, T = 500 iterations.
graphs with various levels of sparsity and reciprocation, which also evolve temporally as the
allocation of resources changes over the course of time. Apart from the static graphs that arise
after SPaRse converges, one may also take a snapshot of the network at some finite time, during
the transient. For example, at time t = 0 let us start with the 9-node endowments of Figure 2
and apply SPaRse in a complete graph, which sparsifies as time elapses. By stopping early after
500 iterations, we obtain the graph shown in Figure 6. This consists of 35 links (as compared
to 16 links in Figure 2), where only link 3 → 1 is not directly reciprocated (but has small
allocation 0.02). The minimum exchange ratio is 0.998, and divergence D(r, a) = 0.001, while
the respective values in Figure 2 were 0.981 and 0.125. Therefore, graph in Figure 6 is less
sparse than Figure 2, but realizes more fair exchanges. A common feature of the allocations in
both Figures 2 and 6 is that low endowment nodes apparently never exchange resources with
each other.
V. CONCLUSION
We studied a resource exchange network where exchanges among nodes are based on reci-
procity. To incorporate costs of establishing and maintaining active connections, we imposed
sparsity penalties on peer interactions. Finding the sparsest graphs that achieve a certain level of
reciprocation is in general NP-hard. We proposed decentralized algorithms, that enable peers to
approximately compute the sparsest allocations, by generalized proportional-response dynamics,
with nonlinear pricing. Numerical results illustrate the performance of the SPaRse algorithms and
September 22, 2018
DRAFT
19
the formation of exchange graphs by peers who achieve close-to-perfect reciprocation (minimum
exchange ratio near one), in a network with a limited number of active connections.
REFERENCES
[1] G. Iosifidis, L. Gao, J. Huang, and L. Tassiulas, "Incentive mechanisms for user-provided networks," IEEE Communications
Magazine, vol. 52, no. 9, pp. 20 -- 27, 2014.
[2] M. Zubeldia, A. Ferragut, and F. Paganini, "Neighbor selection for proportional fairness in P2P networks," Computer
Networks, vol. 83, no. 4, pp. 249 -- 264, 2015.
[3] F. Wu and L. Zhang, "Proportional response dynamics leads to market equilibrium," in Proceedings of the Thirty-ninth
Annual ACM Symposium on Theory of Computing, ser. STOC '07, 2007, pp. 354 -- 363.
[4] B. Birnbaum, N. R. Devanur, and L. Xiao, "Distributed algorithms via gradient descent for Fisher markets," in Proceedings
of the 12th ACM Conference on Electronic Commerce, ser. EC '11, 2011, pp. 127 -- 136.
[5] E. Eisenberg and D. Gale, "Consensus of subjective probabilities: The pari-mutuel method," Annals of Mathematical
Statistics, vol. 30, no. 1, pp. 165 -- 168, 1959.
[6] D. R. Hunter and K. Lang, "A tutorial on MM algorithms," The American Statistician, vol. 58, no. 1, pp. 30 -- 37, January
2004.
[7] Y. Sun, P. Babu, and D. P. Palomar, "Majorization-minimization algorithms in signal processing, communications, and
machine learning," IEEE Transactions on Signal Processing, vol. 65, no. 3, pp. 794 -- 816, February 2017.
[8] E. J. Cand`es, M. B. Wakin, and S. P. Boyd, "Enhancing sparsity by reweighted ℓ1 minimization," Journal of Fourier
Analysis and Applications, vol. 14, no. 5, pp. 877 -- 905, 2008.
[9] J. Brodie, I. Daubechies, C. De Mol, D. Giannone, and I. Loris, "Sparse and stable Markowitz portfolios," Proceedings of
the National Academy of Sciences, vol. 106, no. 30, pp. 12 267 -- 12 272, 2009.
[10] F. Kelly, "Charging and rate control for elastic traffic," European Transactions on Telecommunications, vol. 8, no. 1, pp.
33 -- 37, 1997.
[11] L. Georgiadis, G. Iosifidis, and L. Tassiulas, "Exchange of services in networks: Competition, cooperation, and fairness,"
in Proceedings of the 2015 ACM SIGMETRICS, ser. SIGMETRICS '15, 2015, pp. 43 -- 56.
[12] S. Boyd and L. Vandenberghe, Convex Optimization. New York, NY, USA: Cambridge University Press, 2004.
[13] V. I. Shmyrev, "An algorithm for finding equilibrium in the linear exchange model with fixed budgets," Journal of Applied
and Industrial Mathematics, vol. 3, no. 4, pp. 505 -- 518, 2009.
[14] A. Beck and M. Teboulle, "Mirror descent and nonlinear projected subgradient methods for convex optimization,"
Operations Research Letters, vol. 31, no. 3, pp. 167 -- 175, May 2003.
September 22, 2018
DRAFT
|
1411.3675 | 3 | 1411 | 2016-07-23T22:37:22 | Scalable Link Prediction in Dynamic Networks via Non-Negative Matrix Factorization | [
"cs.SI",
"cs.AI",
"cs.IR"
] | We propose a scalable temporal latent space model for link prediction in dynamic social networks, where the goal is to predict links over time based on a sequence of previous graph snapshots. The model assumes that each user lies in an unobserved latent space and interactions are more likely to form between similar users in the latent space representation. In addition, the model allows each user to gradually move its position in the latent space as the network structure evolves over time. We present a global optimization algorithm to effectively infer the temporal latent space, with a quadratic convergence rate. Two alternative optimization algorithms with local and incremental updates are also proposed, allowing the model to scale to larger networks without compromising prediction accuracy. Empirically, we demonstrate that our model, when evaluated on a number of real-world dynamic networks, significantly outperforms existing approaches for temporal link prediction in terms of both scalability and predictive power. | cs.SI | cs |
Scalable Temporal Latent Space Inference for
Link Prediction in Dynamic Social Networks
Linhong Zhu, Dong Guo, Junming Yin, Greg Ver Steeg, Aram Galstyan
1
Abstract-We propose a temporal latent space model for link prediction in dynamic social networks, where the goal is to predict
links over time based on a sequence of previous graph snapshots. The model assumes that each user lies in an unobserved
latent space, and interactions are more likely to occur between similar users in the latent space representation. In addition, the
model allows each user to gradually move its position in the latent space as the network structure evolves over time. We present
a global optimization algorithm to effectively infer the temporal latent space. Two alternative optimization algorithms with local
and incremental updates are also proposed, allowing the model to scale to larger networks without compromising prediction
accuracy. Empirically, we demonstrate that our model, when evaluated on a number of real-world dynamic networks, significantly
outperforms existing approaches for temporal link prediction in terms of both scalability and predictive power.
Index Terms-Latent Space Model, Link Prediction, Non-negative Matrix Factorization, Social Network Analysis
!
1 INTRODUCTION
Understanding and characterizing the processes driv-
ing social interactions is one of the fundamental prob-
lems in social network research. A particular instance
of this problem, known as link prediction, has recently
attracted considerable attention in various research
communities. Besides academic interest (see [15], [24]
for a survey of different methods), link prediction
has many important commercial applications, e.g.,
recommending friends in an online social network
such as Facebook and suggesting potential hires in
a professional network such as LinkedIn.
In this work we focus on the temporal link predic-
tion problem: Given a sequence of graph snapshots
··· , Gt from time 1 to t, how do we predict
G1,
links in future time t + 1? To perform link predic-
tion in a network, one needs to construct models
for link probabilities between pairs of nodes. Recent
research interests in link prediction have focused on
latent space modeling of networks. That is, given
the observed interactions between nodes, the goal
is to infer the position of each node in some latent
space, so that the probability of a link between two
nodes depends on their positions in that space. Latent
space modeling allows us to naturally incorporate the
well-known homophily effect [25] (birds of a feather
flock together). Namely, each dimension of the latent
space characterizes an unobservable homogeneous
attribute, and shared attributes tend to create a link in
a network. We illustrate this concept with an example
Linhong Zhu, Greg Ver Steeg and Aram Galstyan are with Information
Sciences Institute, University of Southern California, email: {linhong,
gregv, galstyan}@isi.edu.
Dong Guo is with the Department of Computer Science, University of
Southern California, email: [email protected].
Junming Yin is with the Department of Management Information Sys-
tems, University of Arizona, email: [email protected].
Fig. 1. An example of observed interactions among Alice,
Bob and Kevin, and their positions in a simplified one-
dimension latent space. Alice is very liberal, Bob is biased to-
wards being liberal, and Kevin is very conservative. However,
all their profile information as well as the dimension label are
unobservable.
shown in Figure 1.
Various approaches,
Example 1: Assume that we have observed some
interactions during a political campaign. An exam-
ple of a latent space is shown in Figure 1, where
most observed links were formed between users with
similar political attitudes. Based on the learned latent
space, we could then predict that Bob is more likely to
interact with Alice than Kevin in a political campaign.
including Bayesian infer-
ence [16], [45], multidimensional scaling (MDS) [32],
matrix factorization [26], [29], [11], [44], [47], [9], and
mixed-membership model [3], have been proposed
to infer the static latent space representation of the
observed network. Nevertheless, most of these studies
were focusing on static graphs, where the latent posi-
tions of the nodes are fixed. In social networks, "There
is nothing permanent except change"; the network
itself is dynamic and changing with time [14] [36]. In
addition, the latent position of each node might also
be evolving over time [32], [34], [8], [48], [46]. A naive
approach to extend static latent space modeling for
dynamic networks is to model each node as a single
latent representation and then update its position
whenever the network evolves. Unfortunately, this
approach tends to overfit on the current time step,
AliceBobKevinconservativeliberal??2
problem with latent space models, a significant gap
remains between theoretical capabilities and practi-
cal applications. Towards this end, in this work we
further introduce two new variants of BCGD: a local
BCGD algorithm and an incremental BCGD algo-
rithm. In a local BCGD algorithm, instead of using
all historical graph snapshots to jointly infer temporal
latent space at all timestamps, it sequentially infers
the temporal latent space at each time position with
a single graph snapshot and previous temporal la-
tent space-thus significantly reducing computational
cost. In addition, as we stated earlier, the latent po-
sitions of nodes are changing smoothly over time,
not suddenly. To make use of this temporal smooth-
ness, we develop an incremental BCGD algorithm
to adaptively infer changes in latent positions based
only on the changes in interactions. As shown in
Figure 2, when Bob receives new interactions, his
latent position in time t = 2 requires an update which,
however, can be performed efficiently leveraging his
previous latent position in time t = 1.
In summary, the contributions of this work are:
1) We propose a temporal latent space model for
dynamic networks to model the temporal link
probability of node pairs, which can be further
used to accurately recover or predict the forma-
tion of links.
2) We address algorithmic issues in learning the
temporal latent space representation of nodes
by developing the standard global BCGD algo-
rithm. We also provide a set of theoretical results
for the standard global BCGD algorithm.
3) We develop two fast BCGD algorithms: a lo-
cal BCGD algorithm and an incremental BCGD
algorithm. Furthermore, we illustrate that the
proposed incremental BCGD algorithm only re-
quires a conditional update on a small set of af-
fected nodes, and is therefore significantly faster
than all existing approaches.
4) We conduct experiments over large real-life
graphs. The experimental results show that
the proposed approaches-global BCGD, local
BCGD, and incremental BCGD-achieve good
predictive quality in both sparse and dense net-
works with average AUC scores of 0.81, 0.79
and 0.78 respectively. In addition, it takes only
less than half an hour for the incremental BCGD
algorithm to learn the temporal latent spaces of
massive networks with millions of nodes and
links.
The remainder of the paper is organized as follows:
We first introduce our problem formulation in Sec-
tion 2, and then present the proposed global BCGD
algorithm and two fast BCGD algorithms in Section 3
and Section 4 respectively. In Section 5, we conduct an
experimental study to evaluate the effectiveness and
efficiency of our approach. Related work is discussed
Fig. 2. An example of temporal
latent positions of user
Bob. With the temporal smoothness assumption, Bob is more
likely to be in the blue position than the white position in time
t = 2.
leading to abrupt transitions and poor incorporation
of historical information. Therefore, we are interested
in inferring temporal latent positions for all the nodes
in a dynamic network. The underlying problem can
be stated as follows: Given a sequence of graph snapshots
G1, ··· , Gt, how can we infer the temporal latent space so
that at each time point links are more likely to be formed
between nodes that are closer in the temporal latent space?
With the inferred temporal latent space, links can be
accurately predicted at future times.
Unfortunately, we still have a limited understand-
ing of how the latent space is evolving for temporal
social networks. In this work we propose a Temporal
Latent Space Model for Dynamic Link Prediction. Our
model is based on the intuition that nodes can move
smoothly in the latent space over time, and that
large moves are less likely [32], [46]. As illustrated in
Figure 2, in time t = 1, Bob is biased towards liberal;
it is unlikely that Bob will suddenly move to very
conservative in time t = 2. In addition to temporal
smoothness, our model imposes a constraint on the
dimensionality of the latent space and assumes that
the dimension of latent space is much smaller than the
number of nodes. With the dimensionality constraint,
the online link prediction using our model is efficient
in both computational time and storage cost (see
related work for more details). In addition, varying
the dimension of latent space offers an opportunity
to fine-tune the compromise between computational
cost and solution quality. The higher dimension leads
to a more accurate latent space representation of each
node, but also yields higher online computational
cost.
One of the most widely used methods for infer-
ring low-rank latent space in networks is via matrix
factorization with the "block-coordinate gradient de-
scent (BCGD)" algorithm [6], [38], which has been
successfully applied in community detection for static
networks [42]. However, the introduced additional
temporal smoothness term in the objective function
creates new challenges for the BCGD approach. More-
over, while there is a lot of work on studying con-
vergence of BCGD, it is unknown whether the new
objective function satisfies these criteria. We prove
that the global BCGD algorithm proposed in this work
has a quadratic convergence rate.
The global BCGD algorithm is computationally
expensive and not applicable for truly large-scale
problems. Therefore, for the temporal link prediction
Bobconservativeliberalt=1Bobt=2Bob t=1Bob t=2?Bob t=2?ObservationLatent spacein Section 6. We conclude this work and present future
work in Section 7.
2 PROBLEM FORMULATION
A graph G is denoted as (V , E), where V is the set
of nodes and E ⊆ V × V is the set of (directed or
undirected) interactions. In this work we first focus
on undirected graphs, in which case its matrix rep-
resentation is symmetric. We use u and v to denote
individual nodes, and t and τ to denote timestamps.
Let Gτ = (Vτ , Eτ ) be a time-dependent network
snapshot recorded at time τ, where Vτ is the set of
nodes and Eτ ⊆ Vτ × Vτ is the set of interactions. In
addition, denote by ∆Vτ and ∆Eτ the sets of vertices
and interactions to be introduced (or removed) at time
τ, and let ∆Gτ = (∆Vτ , ∆Eτ ) denote the change in the
whole network.
Dynamic social network. A dynamic network G is a
sequence of network snapshots within a time interval
and evolving over time: G = (G1, . . . , Gt).
Temporal latent space and its model. Let Zτ be the
low-rank k-dimension temporal latent space represen-
tation for node set Vτ at time τ. For each individual u
at time τ, we use a row vector Zτ (u) to denote its tem-
poral latent space representation and a scalar Z(u, c)
to denote its position in cth dimension. Inspired by the
dynamic community model [36], [37], we impose the
following assumptions on the temporal latent space:
1) Temporal smoothness: Individuals change their
latent positions gradually over time.
2) Network embedding: Two nodes that are close
to each other in the interaction network, in terms
of the network distance, are also close to each
other in the temporal latent space in terms of
latent space distance.
3) Latent Homophily: Two members who are close
to each other in latent space interact with one
another more frequently than two faraway mem-
bers.
Within our model, we assume that the probability
of a link between two nodes depends only on their
latent positions. In principle, given a dynamic graph
G = (G1,
. . . , Gt), we need Zt+1 to predict future
graph Gt+1. However, since Zt+1 is not available, in
our model we assume it can be approximated by
Z1,··· , Zt. Therefore, given a dynamic graph G =
(G1, . . . , Gt), we infer Z1, ··· , Zt based on G1, ··· ,
Gt, use Z1, ··· , Zt to approximate Zt+1, and finally
predict Gt+1.
With the above definitions, we focus on the follow-
ing problem:
Problem 1: (Temporal Latent Space Inference.) Giv-
en a dynamic social network G = (G1, G2, . . . , Gt), we
aim to find a k-dimension latent space representation
at each timestamp Zτ that minimizes the quadratic
3
loss with temporal regularization:
t(cid:88)
(cid:88)
t(cid:88)
(cid:107)Gτ − Zτ Z T
τ (cid:107)2
arg min
Z1,··· ,Zt
subject to: ∀ u, τ, Zτ ≥ 0, Zτ (u)Zτ (u)T = 1
F + λ
τ =1
τ =1
u
(1 − Zτ (u)Zτ−1(u)T )
(1)
where λ is a regularization parameter, and the term
(1 − Zτ (u)Zτ +1(u)T ) penalizes node u for suddenly
changing its latent position. Note that when comput-
ing the quadratic loss (cid:107)Gτ − Zτ Z T
F , we ignore all of
the diagonal entries.
τ (cid:107)2
In the above model, the latent representation of each
node corresponds to a point on the surface of a unit
hypersphere. Note that this is different from mixed
membership stochastic block models [3] where nodes
are mapped onto simplex. In practice, we find that
sphere modeling gives us a clearer boundary between
linked pairs and non-linked pairs when we project
all pairs of nodes into the latent space. In addition,
we impose the constraints Zτ ≥ 0, not only because
the non-negativity establishes the duality between
our modeling and non-negative matrix factorization,
but also because it gives latent space an intuitive
parts-based interpretation, as suggested by Lee and
Seung [22]. In the facial image example [22], with
non-negative constraints, each dimension of latent
space corresponds to a part of the face, such as nose,
eye and ear; while without non-negative constraints,
each dimension of latent space corresponds to a blur
representation of the entire face, of which it is very
difficult to interpret. Similarly, in the social network
domain, with the non-negative constraints, each di-
mension of latent space corresponds to a part of users'
attributes such as current city, hometown, personality
and so on. It is more intuitive to represent each user
as an additive mixture of attributes (current city: A,
hometown: B, personality: openness to experience),
rather than represent each user as a combination of
different representatives.
Link prediction. Given that we have inferred
Z1, . . . , Zt by optimizing Eq. 1, our goal is to predict
the adjacency matrix Gt+1 at the next timestamp
t + 1. The most natural estimator is the conditional
expectation: Yt+1 = E[Gt+1 Z1,··· , Zt]. By assuming
that the temporal dynamics of latent positions is
Markovian and satisfies E[Zt+1 Z1,··· , Zt] = Zt and
t+1 Z1,··· , Zt] = Dt (a diagonal matrix), as well
cov[Z T
as Zt+1Z T
t+1 an unbiased estimate of Gt+1, we obtain
Yt+1 = E[Gt+1 Z1,··· , Zt]
t+1 Z1,··· , Zt]
= E[E[Gt+1 Z1,··· Zt, Zt+1] Z1,··· , Zt]
= E[Zt+1Z T
= cov[Z T
+ E[Zt+1 Z1 ··· Zt]E[Zt+1 Z1 ··· Zt]T
= Dt + ZtZ T
t .
t+1 Z1 ··· Zt]
However, as we ignore the diagonal entries of the
adjacency matrix (the graph does not contain self-
t
t
τ
to predict Gt+1.
loops) and because the conditional covariance matrix
Dt is assumed to be diagonal, we will use the off-
diagonal of ZtZ T
Generalization. Although in this work, we use ZtZ T
to predict Gt+1, without losing generality, the pre-
dicted graph at t + 1 can be formulated as: Yt+1 =
Φ(f (Z1,··· , Zt)), where Φ is the link function and f is
the temporal function. Learning or selecting the best
link function Φ and temporal function f is beyond
the scope of this work. For example, we could apply
nonparametric approaches [31] to automatically learn
the link function Φ. Additionally, though this work
focuses on undirected graphs, our model can be gen-
eralized to directed and weighted graphs. Specifically,
this can be done by introducing another matrix B,
which represents the weighted mapping from one
dimension to another dimension in the latent space.
With the matrix B, the term Gτ − Zτ Z T
in Eq. 1 is
now generalized to Gτ − Zτ BZ T
τ . If B is symmetric,
the underlying graph is undirected; otherwise, it is
directed.
Problem complexity. Vavasis recently proved that
non-negative matrix factorization (NMF)
is NP-
hard [39]. In addition, with the separability condition,
that is, for each dimension c in the latent space Z,
there is a node u such that Z(u, c) ≥ p and Z(u, c(cid:48)) = 0
for c(cid:48) (cid:54)= c, there exists a polynomial time exact algo-
rithm to solve the non-negative matrix factorization
problem [4]. Unfortunately, in our modeling, there is
no guarantee that the latent space Z satisfies the sep-
arability condition. In addition, even if there exists a
latent space Z that satisfies the separability condition,
Recht et al. [30] pointed out that an exact algorithm
is still too computationally expensive for large-scale
data. Therefore, in the following we focus on the
block coordinate gradient descent (BCGD) approach
to obtain an approximate solution to Problem 1.
3 A STANDARD BCGD ALGORITHM
In this section we present the details of the standard
BCGD algorithm that provide a local optimal solution
to Problem 1.
With a partial observed graph structure, the objec-
tive function in Eq. 1 can be decomposed into a linked
part and a non-linked part. That is,
(Gτ (u, v) − Zτ (u)Zτ (v)T )2
(cid:88)
u,v∈Eτ
τ =1
t(cid:88)
(cid:88)
(cid:88)
u,v(cid:54)∈Eτ
arg min
Z1,··· ,Zt
t(cid:88)
t(cid:88)
τ =1
+
(Zτ (u)Zτ (v)T )2
(2)
(1 − Zτ (u)Zτ−1(u)T )
+ λ
subject to: ∀ u, τ, Zτ ≥ 0, Zτ (u)Zτ (u)T = 1
τ =1
u
Unfortunately, the decomposed objective function
in Eq. 2 for Problem 1 is still a fourth-order poly-
nomial and non-convex. Therefore, we then adopt a
4
block coordinate descent approach to solve Eq. 2. We
update Zτ (u) for each node u at time τ by fixing both
latent positions Zτ (v) of all other nodes v at time τ
as well as all the temporal latent positions other than
at time τ. Proceeding in this way, each step of block
coordinate descent is solving a convex problem.
For each node u at time τ, we focus on optimizing
the following problem:
arg min
Zτ (u)≥0
(cid:88)
J(Zτ (u)), where J(Zτ (u)) =
(Gτ (u, v) − Zτ (u)Zτ (v)T )2 +
(cid:88)
(Zτ (u)Zτ (v)T )2
v∈N (u)
+ λ(1 − Zτ +1(u)Zτ (u)T ) + λ(1 − Zτ (u)Zτ−1(u)T )}
v(cid:54)∈N (u)
(3)
In the following, we use the projected gradient
descent algorithm to find the approximation solution
with a non-negativity constraint. With the gradient
descent optimization algorithm, for each node u at
timepoint τ, we could iteratively update Zτ (u) in each
iteration r + 1 with the following rule:
Z (r+1)
τ
(u) = Z (r)
τ (u) − η∇Zτ (u)J(Z (r)
τ (u))
√
where η is the step size.
Step size. Nesterov's gradient method [28], [13], [5]
iteratively updates the step size using the Lipschitz
constant. According to the following lemma, we show
that our step size can also be iteratively updated using
the Lipschitz constant.
Lemma 1: The gradient of the objective function
J(Zτ (u)) is Lipschitz continuous, and the Lipschitz
n2 − 2n + k, where n is the
constant L is equal to 2
number of nodes in a graph, and k is the number of
dimensions.
Proof: A detailed proof is in Supplement A. (cid:3)
With the Lipschitz constant and ∇Zτ (u)J(Z (r)
τ (u))
shown in Eq. 12 in Supplement A, each node u at
timepoint τ can be computed via the update rule
stated in the following Lemma.
Lemma 2: The latent position of each node u at
timepoint τ can be iteratively computed with the
following update rule:
Z (r+1)
τ
(u) = max((1 + 2α)Z (r)
+ 2α
Gτ (u, v)Z (r)
τ (u) + αλ(Z (r)
τ (u)Z (r)
τ (v) − 2αZ (r)
τ
T
Z (r)
τ
, 0)
τ−1(u) + Z (r)
τ +1(u))
(cid:88)
v∈N (u)
(4)
where α = ar+1+ar−1
ar+1L , N (u) denotes the set of u's
neighbors, L is the Lipschitz constant, d(u) is the
degree of node u, and
√
(cid:40)1
(5)
ar =
1+
4a2
r−1+1
2
if r = 0,
if r > 0.
Proof: A detailed proof is in Supplement B. (cid:3)
Note that when updating Zτ (u) according to
Lemma 2, it requires the latent positions of all the
neighbors of u. For nodes with extra-large degrees,
the above update will become time-consuming. One
dimension k
Algorithm 1 The global BCGD algorithm for jointly
inferring temporal latent space
Input: Graphs {G1,··· , Gt} and latent space
Output: latent space {Z1,··· , Zt} and prediction Yt+1
1: Nonnegative initial guess for {Z1,··· , Zt}
2: Repeat
3:
4:
5:
update Zτ (u) by Eq. 4
6:
normalize Zτ (u)
7: until {Z1,··· , Zt} converges.
8: return Yt+1 = Φ([Z1,··· , Zt]) and {Z1,··· , Zt}
for each time τ from 1 to t
for each u in graph
interesting direction in the future is to apply stochastic
gradient descent update rules to nodes with large
degrees. That is, instead of using the latent positions
of all of u's neighbors, each iteration randomly selects
one of u's neighbors v, and leverages v's latent posi-
tions to update the latent position of u.
We summarize our global block coordinate descent
approach to solve Eq. 2 in Algorithm 1. In the follow-
ing, we provide additional theoretical properties of
the proposed BCGD algorithm, including convergence
analysis and complexity analysis.
τ (u)(cid:107)2
F
3.1 Theoretical Analysis
Convergence rate. Since our algorithm uses Nes-
terov's gradient method to determine the step size
(see Lemma 2), we can conclude that our algorithm
achieves the convergence rate O( 1
r2 ) as stated in the
following theorem.
τ (u)−Z∗
(r+2)2
τ (u))−J(Z∗
for each node u at
τ (u)) ≤ 2L(cid:107)ZI
Theorem 1: Given the sequence generated by Al-
timepoint τ, we
gorithm 1,
have J(Z (r)
, where
Z∗
τ (u) is the optimum solution for Zτ (u) with respect
to the subproblem in Eq. 3, Zτ (u)I is the initialization
for Zτ (u), L is the Lipschitz constant in Lemma 1,
and r is the iteration number (not the total number of
iterations).
Proof: The proof is shown in Supplement C. (cid:3)
Local error bound. The solution returned by Al-
gorithm 1 is a local optimum of the objective in
Eq. 2. Unfortunately, it is not trivial to assess how
this locally optimal solution compares to the global
optimum of the objective in Eq. 2. This is because the
objective function in Eq. 2 is non-convex, and thus
arriving at the global optimum via local iterations
is not guaranteed. Only if the input matrix G is
separable or near-separable [4], [30], we are able to
achieve the global optimum or a global error bound.
Computational complexity. Table 1 summarizes the
cost of each operation in an iteration for both sparse
and dense graphs. Fortunately, Gibson et al. [12]
concluded that real-world networks are generally
globally very sparse, where most of nodes have a
relatively small number of neighbors. Therefore, for
5
TABLE 1
Time complexity analysis for Algorithm 1, n is the number of
nodes, mτ is the number of edges in graph Gτ , d(u) is the
degree of node u, k is the number of dimensions, and T is
the number of timestamps.
O((cid:80)
O((cid:80)
Sparse
Dense
τ (n + mτ )k) O(n2T k)
O(d(u)k)
O(nk)
τ (n + mτ k)
O(n2T k)
Initialize
Update Zτ (u)
Convergence
(a) BCGD
(b) Local BCGD
Fig. 3. BCGD versus local BCGD.
single iteration of BCGD should be O((cid:80)
complexity is bounded by O(Rk(cid:80)
storage complexity is bounded by O((cid:80)
such real-world sparse networks, the total cost of a
τ (n + mτ )k),
which is linear in the number of edges and nodes. Assume
that the total number of iterations is R, then the time
τ (n + mτ )). Since
in Algorithm 1, we need to store all the input matrices
and the output temporal latent space matrices, the
τ (nk + mτ )).
4 FAST BCGD ALGORITHMS
Unfortunately, the standard BCGD is very expensive
in both computation and storage since it requires all
historical graph snapshots {G1,··· , Gt} to jointly and
cyclicly update all temporal latent space {Z1, ··· , Zt}.
In this section we aim to further reduce the time
complexity of the BCGD algorithm so that it scales
with big data. In contrast to the joint inference in
BCGD, we propose a sequential inference algorithm
and an incremental inference algorithm, both of which
utilize the locality and temporal
information. The
proposed two faster BCGD algorithms are as efficient
as the fast independent inference (i.e., infer Zτ from
Gτ only) and as effective as the global joint inference
(BCGD).
As illustrated in Figure 3, we first introduce the
local BCGD algorithm, which sequentially infers each
temporal latent space Zτ from a single graph snapshot
Gτ and partial prior knowledge Zτ−1.
4.1 Local BCGD Algorithm
Specifically, at each timestamp τ, we aim to optimize
the following local objective function to compute Zτ :
(Gτ (u, v) − Zτ (u)Zτ (v)T )2
(cid:88)
arg min
Zτ
+
+ λ
(cid:88)
(cid:88)
u∈Vτ
u,v(cid:54)∈Eτ
u,v∈Eτ
(Zτ (u)Zτ (v)T )2
(1 − Zτ (u)Zτ−1(u)T )
(6)
G1G2GtZ1Z2ZtGraphLatent space......G1G2GtZ1Z2ZtGraphLatent space......dimension k
Algorithm 2 The local BCGD algorithm for sequen-
tially inferring temporal latent space
Input: Graphs {G1,··· , Gt} and latent space
Output: Yt+1 and latent space {Z1,··· , Zt}
1: Nonnegative initial guess for Z1
2: for each τ from 1 to t
3:
4:
5:
6:
7:
8: return Yt+1 = Φ([Z1,··· , Zt]) and {Z1,··· , Zt}
Initial Zτ based on Zτ−1
repeat
update Zτ (u) by Eq. 7 and normalize it
for each u in graph Gτ
until Zτ converges.
Using the same BCGD approach, we iteratively
update the latent position Zτ (u) of each node u by
fixing the latent positions of all the other nodes. This
leads to the following update rules for Zτ (u) in the
(r + 1)th iteration:
Z (r+1)
τ
(u) = max((1 + 2α)Z (r)
τ (u) + αλZτ−1(u) + 2α
(cid:88)
v∈N (u)
τ (v) − 2αZ (r)
τ (u)Z (r)
τ
T
Z (r)
τ
, 0)
Gτ (u, v)Z (r)
where α = ar+1+ar−1
ar is defined in Lemma 2.
(7)
ar+1L , L is the Lipschitz constant, and
We summarize the proposed local BCGD algorithm
in Algorithm 2. Note that in the global BCGD algo-
rithm, for each iteration we jointly update Z1, Z2 until
Zt and then iterate back to Z1 in the next iteration.
This cyclic update schema is very expensive; while in
the local BCGD algorithm, as shown in Lines 4–7, we
sequentially compute Zτ by a single inner iteration.
That is, we iteratively update Zτ until Zτ converges
and then move to the computation of temporal la-
tent space Zτ +1. This local sequential update schema
greatly reduces the computational cost in practice, as
we analytically show in the following.
Complexity analysis. The cost of each operation in
Algorithm 2 remains the same as that of Algorithm 1,
as reported in Table 1. Thus, the total computational
τ (n + mτ )Rτ k). In practice, since we
leverage prior knowledge Zτ−1 to locally update Zτ ,
it converges much faster than the global BCGD algo-
rithm, and thus the local BCGD algorithm is more
efficient than the global BCGD algorithm, as also
verified in our experiments. In addition, in the in-
memory algorithm where we put all the data into
memory, the global BCGD algorithm requires at least
τ (nk + mτ )) memory cost; while the local BCGD
only requires storage of a single graph snapshot and
two latent space matrices representation. Therefore,
the memory cost of the local BCGD algorithm is
bounded by O(nk + maxτ mτ ).
cost is O((cid:80)
O((cid:80)
4.2 Incremental BCGD Algorithm
In this section we further study how to infer or main-
tain temporal latent space incrementally with graph
6
dimension k
for each u in graph Gτ
Algorithm 3 The incremental BCGD algorithm for
inferring temporal latent space
Input: Graphs {G1,··· , Gt} and latent space
Output: Yt+1 and latent space {Z1,··· , Zt}
01: Nonnegative initial guess for Z1
02: for each time stamp τ from 1 to t
03:
04:
05:
06:
07:
08:
09:
10:
11:
12:
update affected node set S with Alg. 4
13:
14: return Yt+1 = Φ([Z1,··· , Zt]) and {Z1,··· , Zt}
affected node set S=∆Vτ
repeat
update Zτ (u) by Eq. 7 and normalize it
until Zτ converges or S is empty.
Initialize Zτ (u) using Eq. 8
if Gτ (u) is not updated
Zτ (u) = Zτ−1(u)
for each u in S
else
changes (nodes and edges insertion and deletion).
Instead of recomputing the temporal latent space Zτ
with the entire graph snapshot Gτ and the prior
knowledge Zτ−1, our dynamic update strategy is to
adjust Zτ incrementally from Zτ−1 as the network
structure changes. Specifically, we take advantage of
what we already learned in previous snapshots, as
well as the temporal transition for inferring the dy-
namics in the current timestamp.
Overview of incremental BCGD. The overview of
this algorithm is as follows: First, we identify nodes
whose local neighborhood has changed between two
consecutive snapshots, including cases where an exist-
ing node adds or deletes links, or a node is added to or
removed from the network. With the matrix represen-
tation, we model all the four updates towards Gt in
terms of row-wise updates on matrix representation.
For example, a newly added node with degree d is
modeled as an update from a row with all-zero entries
to a row with d non-zero entries. For nodes whose
local neighborhood has not changed, we assume that
their initial temporal latent positions do not change
either. For nodes whose neighborhood has changed,
we initialize their new temporal latent positions based
on their new neighbors' latent space positions. Next,
we iteratively perform a conditioned latent position
update for each affected node (i.e., a candidate set
of nodes whose latent position might change) and an
update for the affected node set until there are no
more changes in the temporal latent position of each
node. The entire process is outlined in Algorithm 3.
Initialize updated nodes. In our algorithm, the four
update operations are handled simply by comparing
whether Gτ (u) is identical to Gτ−1(u). For each up-
dated node u, we initialize its latent position based
on the probability of seeing its updated neighbors'
latent positions. Specifically, for each node u and the
dimension c of the latent space at time τ, the position
of u in dimension c is computed using the following
equation:
Zτ (u, c) =
(cid:80)
(cid:80)
v∈N (u) Gτ (u, v)Zτ (v, c)
q∈N (u) Gτ (u, q)
(8)
The initialization of latent position for an updated
node u follows the notion of "latent homophily"
introduced earlier: The latent position of the node u is
as close as possible to those of its network neighbors.
Identifying affected nodes. Our dynamic update
strategy can be viewed as an extra conditional update
by which only nodes affected accept a new latent posi-
tion. Unfortunately, the set of affected nodes for which
the latent positions need to be updated is not limited
to only the set of recently changed nodes and/or their
network neighbors. Therefore, how could we identify
the set of affected nodes?
The overall idea of our affected nodes identification
is outlined as follows. Initially, the set of affected
nodes is identical to the set of updated nodes (Line 8
in Algorithm 3). Next, after performing each iteration
of a conditional update with Eq. 7 in Line 11 in
Algorithm 3, some old affected nodes are no longer
required to be updated since their latent positions
have converged. On the other hand, the effects of
the update could be further propagated from old
affected nodes to their neighborhood. The details of
our affected nodes update procedure are presented in
Algorithm 4.
Algorithm 4 Updating affected nodes
Input: Zτ−1, Zτ , Sold
Output: A set of affected nodes S
1: S = Sold
2: for each u in Sold
3:
S = S \ {u}
4:
5:
if Zτ (u)Zτ (w)T − Zτ−1(u)Zτ−1(w)T ≥ ζ
6:
7:
8: return S
if ∀c, Zτ (u, c) − Zτ−1(u, c) < δ
for each w ∈ N (u)
S = S ∪ {w}
τ
of Algorithm 3 is O(k(cid:80)
(cid:80)
Complexity analysis. The total computational cost
r Sr + N (Sr)), where
r denotes the iteration number of the conditional
update process outlined in Lines 9–13 in Alg. 3, Sr
denotes the set of affected nodes and N (Sr) denotes
the neighborhood of affected nodes. When τ=1, Sr is
equal to the number of nodes n, and N (Sr) is equal
to the number of edges in the first graph snapshot
m1. For the in-memory storage cost, compared with
Algorithm 2, Algorithm 3 requires additional storage
cost about ∆Gτ . Therefore, the in-memory storage
cost of Algorithm 3 is O(nk + maxτ (mτ + ∆mτ )).
5 EXPERIMENTS
5.1 Dataset and Evaluation
We use five real temporal datasets in our experiments,
which are obtained from the Koblenz Large Network
7
TABLE 2
Statistics of data sets, where volume denotes the total
number of interactions, and the number of edges denotes
the number of distinct interactions.
# nodes
# edges
volume
410
63,731
28,093
17,298
2,765
817,035
183,412
4,596,803
3,148,447
1,314,050
3,223,589
18,986,618
9,375,374
10,724,828
9,375,374
# snap-
shots
8
5
9
11
7
Data
Infection
[18]
Facebook
[40]
HepPh
[23]
DBLP [1]
YouTube
[27]
Collection [21]. The statistics of each data set are
reported in Table 2. Note that in our experimental
setting, each graph snapshot Gτ consists of all the
nodes and the interactions that appear within the time
interval [τ − 1, τ ].
Evaluation metrics. We evaluate the performance
of the proposed approaches from three aspects: the
effect of parameters, the efficiency of both offline
latent space inference and online link prediction, and
the accuracy of online link prediction. We use total
running time and memory consumption to evaluate
the efficiency of both offline latent space inference
and online link prediction. We use prediction error
to evaluate the inference accuracy. Given the train-
··· , Gt, prediction error is defined
ing graph G1,
τ−1(cid:107)F . Therefore, a smaller
as
prediction error indicates better inference accuracy.
(cid:80)t
τ =2 (cid:107)Gτ − Zτ−1Z T
1
t−1
For link prediction accuracy, we use Area Under
Curves (both Receiver Operating Characteristic (ROC)
and Precision-Recall (PR) curves), termed as AUCROC
and AUCPR. The ROC curve is created by plotting the
true positive rate vs. false positive rate; while the
PR curve is created by plotting precision vs. recall at
various threshold settings. Thus, AUC score evaluates
the overall ranking yielded by the algorithms with a
larger AUC indicating better link prediction perfor-
mance. In the following we only report the experiment
results based on AUCROC; the experiment results based
on AUCPR are reported in the Supplement.
Test pair generation. Given the training graph G1,
··· , Gt, we perform link prediction for the test graph
Gt+1. We provide two different setups to generate
test pairs: (1) all
links: In this setup, we focus on
how well the methods predict links in the test graph,
no matter whether those links are repeated links or
new links. Toward this goal, we randomly generate
100,000 linked and an equal number of non-linked
pairs from Gt+1 as test pairs. (2) new links: In this
setup, we focus on how well the methods predict the
emergence of new links and deletion of existing links.
Again, we randomly generate 10,000 linked and an
equal number of non-linked pairs from ∆Gt+1.
TABLE 4
Effect of the smoothing parameter λ
8
Prediction error by BCGDG
0
228
3436
2043
80566
195023
[0.0001, 1]
225±1.26
3312±16
1697±7.9
65878±429
161239±726
Prediction error by BCGDL
λ
Infection
Facebook
Hepph
DBLP
Youtube
λ
Infection
Facebook
Hepph
DBLP
Youtube
0
250
3659
2566
81633
198646
[0.0001, 1]
243±3.5
3485±36
2106±51
65957±18
162287±357
10
288
3410
1769
65926
162282
10
249
3525
2172
66471
163675
(a) Inferring time (s)
(b) Prediction errors
Fig. 4. Effect of dimensionality k to proposed approaches.
Comparable approaches. We compare our approaches
(standard BCGD BCGDG, local BCGD BCGDL and in-
cremental BCGD BCGDI) with a set of state-of-the-
art approaches, which are summarized in Table 3
and Section 6. For the offline latent space inference
time comparison, we compare our approaches with
global optimization approach DMMSB [10], local opti-
mization approaches NMFR [43], Hott [30], BIGCLAM
[42], PTM [45] and incremental optimization approach
LabelRT [41]. We compare online link prediction times
of our approaches to that of high-dimension latent
space approaches BIGCLAM and LabelRT, and pop-
ular graph heuristic AA [2]. For the Hott, NMFR and
DMMSB, the total running time for their approaches
is the same as that of our BCGD approaches. This is
because the online prediction time cost is proportional
to the number of dimensions k, and k is set to 20 for all
the low-dimension constraint latent space approaches
including our BCGD approaches, Hott, NMFR, PTM
and DMMSB.
Configurations. The results are reported as an average
over 10 runs. If the maximum number of iterations is
required as an input; we set it to 100. All experiments
are conducted on a single machine with 8G memory
and i7 2.7 GHZ CPU.
5.2 Effect of Parameters
This set of experiments aims to determine the impact
of parameters on the performance of the proposed
approaches and/or the comparable approaches.
The effect of temporal smootheness. While fixing
all the other parameters (e.g., k=20), we first study
the effect of the smoothing parameter λ. The effect
of parameter λ might be related to the inference
algorithms, thus we evaluate the performance of both
global BCGD and local BCGD when varying λ. We
do not plot the running time since we notice that the
running time is insensitive to the parameter λ. We
vary λ from 0.0001 to 10 with logarithmic scale and
report the prediction errors shown in Table 4. We also
report the prediction errors for λ=0. Note that when
(a) Inferring time (s)
(b) Prediction accuracy
Fig. 5. Effect of dimensionality k to other approaches on
Facebook dataset.
λ is 0, the update rules stated in Eq. 4 and Eq. 7
become identical. BCGDG differs from BCGDL since
they have different ways to proceed with initialization
and convergence, see Lines 2–7 in Algorithm 1 and 2.
Clearly, either absence of temporal smoothness (λ=0)
or strong temporal smoothness (λ=10) leads to higher
prediction errors. While λ varies from 0.0001 to 1,
there are no significant differences in terms of predic-
tion errors. Therefore, in the following experiments,
we simply fix λ as 0.0001 for BCGDG and 0.01 for
BCGDL.
The effect of dimensionality. Next, we fix all the
other parameters and analyze the effect of k. Since
the effect of number of dimensions k is lightly cor-
related with inference algorithms, here we choose
the representative local BCGD algorithm. We vary k
from 5 to 30, and report both the running time of
temporal latent space inference and prediction error in
Figure 5. The overall trends indicate that the running
time increases with number of dimensions k, while
prediction error decreases with number of dimensions
k. However, increasing number of dimensions does
not necessarily lead to the decrease of prediction
error. For example, for a Facebook dataset, when the
number of dimensions k is increased from 25 to 30,
the prediction error is increased. In order to balance
the efficiency and effectiveness, we opt to fix k=20 for
the proposed approach in all of the following experi-
ments. A nonparametric approach that automatically
selects the best dimension k will be an interesting
future direction.
In order to perform a fair comparison, we also ex-
amine the effect of k to other comparable approaches
InfectionFacebookHepPhDBLPYoutube 1101102103 5 10 15 20 25 30Running time (S)Number of dimensions k103104105 5 10 15 20 25 30Prediction errorNumber of dimensions kBCGDLPTMDMMSBNMFRHott101102103104 5 10 15 20 25 30Running time (S)Number of dimensions k 0.4 0.5 0.6 0.7 5 10 15 20 25 30AUCROCNumber of dimensions kA summary of state-of-the-art approaches, where time series denotes using a sequence of graph snapshots as
inputs, aggregated denotes using a single aggregated static graph snapshot as an input, low denotes low
dimensional latent space and high denotes without dimensionality constraint.
TABLE 3
aggregated
time-series
inference
Scalability
√
√
prediction
√
√
Accuracy
all links
new links
Latent space dimension
√
low high
√
NA
√
√
√
PTM [45], NMFR [43]
Hott [30]
LabelRT [41]
BIGCLAM [42]
AA [2]
BCGDG, DMMSB [10]
BCGDL, BCGDI
√
√
Input graph
√
√
√
√
√
√
√
√
√
√
√
NA
√
√
√
√
√
√
9
√
√
√
(a) Inferring time (s)
(b) Prediction accuracy
Fig. 6. Effect of number of snapshots to proposed and other
approaches on Facebook dataset.
(a) Inferring time (s)
(b) Prediction errors
Fig. 7. Effect of parameters ζ and δ on Facebook dataset
(Best viewed in color).
including DMMSB, PTM, NMFR, and Hott. LabelRT
and BIGCLAM are not included because their best
dimension k is automatically computed. Furthermore,
since several baselines DMMSB, PTM, NMFR are not
scalable and can not support running on the two large
datasets DBLP and YouTube, we simply choose the
relatively largest dataset, Facebook, on which all of
the approaches are able to be tested. The comparison
of running time and AUCROC on new links is reported
in Figure 5(a) and Figure 5(b) respectively. Clearly, the
overall trends of other approaches are very similar
to those of BCGDL: The inference time is growing
linearly or even quadratically with the dimensionality
k, while the prediction accuracy also improves with
k. Therefore, we use the same value of k=20 for other
comparable approaches as well.
The effect of time intervals.
In order to understand
the proposed model more deeply, we also study how
the value of time interval τ impacts prediction perfor-
mance. Specifically, we choose the Facebook dataset,
vary the value of time interval τ, and create five
different sequences of graph snapshots. As reported
in Figure 6(a) and Figure 6(b), both the inference
time and prediction accuracy increase with number
of snapshots. The inference time increases because
a larger number of snapshots mean more frequent
model updates per shorter time interval. Meanwhile,
shorter time interval leads to less change of graphs,
which indicates that it is more reliable to forecast links
at time t+1 based on the current observation at time t.
Therefore, the prediction accuracy also improves with
number of snapshots. Again, the overall trends hold
for both proposed and other approaches. Therefore,
we simply fix the number of snapshots as reported in
Table 2.
The effect of lazy update. Finally, we evaluate the
effect of two parameters ζ and δ that are related to the
incremental BCGD algorithm. Since parameters ζ and
δ are correlated with each other, we vary both of them
and report the total inference time and prediction
error on the Facebook dataset in Figure 7. The results
verify that when setting both ζ and δ to smaller
values, the predictive accuracy is improved, while
the total running time is also increased. However,
Figure 7(a) shows that when we reduce ζ and δ from
10−2 to 10−4, the running time almost remains the
same. The results verified that we can safely set ζ and
δ to relatively small values without losing too much
efficiency. We repeated this set of experiments on all
the other datasets. Then, using curve fitting to capture
how the best value of ζ and δ can be approximated
by parameters such as n, m, T , and k, we noticed
that a good value for ζ and δ can be achieved around
(cid:112)− log(1 − 1/n) and 2ζ/k. Therefore, in the follow-
(cid:112)− log(1 − 1/n) and δ as 2ζ/k.
ing experiments, without specification, we set ζ as
5.3 Evaluation of Efficiency
In this section we first compare the proposed global
BCGD BCGDG,
local BCGD BCGDL, and incremen-
tal BCGD BCGDI with other latent space inferring
BCGDGBCGDLBCGDIlabelRTDMMSB101102103104 6 12 18 24 30Inferring time (s)Number of snapshots 0.5 0.6 0.7 0.8 6 12 18 24 30AUCROCNumber of snapshots10-510-410-310-2ζ10-410-310-2δ 9.3 9.6 9.9 10.2Running time (S) 9.3 9.6 9.9 10.210-510-410-310-2ζ10-410-310-2δ 3480 3490 3500 3510 3520Prediction error 3480 3490 3500 3510 3520(a) Inferring time (s)
(b) Memory usage (MB)
Fig. 8. Inference efficiency of BCGD algorithms
approaches in terms of inference time and mem-
ory consumption. We then subsequently compare
BCGD approaches with two auto-dimensionality la-
tent space approaches BIGCLAIM and LabelRT and
graph heuristic AA in terms of online link prediction
time and memory consumption.
Offline inference efficiency. We first report the total
running time and memory consumption of our BCGD
approaches in Figure 8. Clearly, BCGDG is neither
memory efficient nor time efficient. Both BCGDI and
BCGDL are very time and memory efficient: BCGDI is
more efficient in running time, while BCGDL is more
efficient in memory usage. This is because BCGDI
requires additional storage for graph changes ∆G;
but it adaptively updates latent space with the graph
changes and thus is very time efficient.
10
(cid:29)t PTM (cid:29)t {NMFR, BCGDG} (cid:29)t DMMSB, where
A (cid:29)t B denotes that A is faster than B on average. On
HepPh data, {NMFR, BCGDG} (cid:29)t {LabelRT, PTM} (cid:29)t
DMMSB. Clearly, our global optimization algorithm
BCGDG is at least five times faster than the other global
approach, DMMSB, and is comparable to inefficient
local approach NMFR. For small graphs, it is not
surprising that the most efficient algorithm is the
incremental approach LabelRT since it incrementally
maintains and updates latent spaces. Unfortunately,
it consumes large amounts of memory, and becomes
much slower than our approach BCGDG for graph
HepPh. In addition, all of these approaches are much
slower than our fast BCGD algorithms BCGDL and
BCGDI, each of which takes less than 400 seconds to
finish learning temporal latent space for HepPh.
(a) Inferring time (s)
(b) Memory usage (MB)
Fig. 10.
baselines Hott and BIGCLAM.
Inference efficiency comparison with scalable
We further compare our fast BCGD algorithms with
state-of-the-arts scalable approaches Hott and Big-
CLAM. BCGDL is comparable to Hott and BigCLAM.
In addition, the incremental approach BCGDI is consis-
tently more efficient than alternative approaches Hott
and BigCLAM. Because we noticed from Figure 10(b)
that the memory usage of these four approaches is
similar, we conclude that our two fast BCGD algo-
rithms are both memory- and time-efficient.
(a) Inferring time (s)
(b) Memory usage (MB)
Fig. 9. Inference efficiency comparison with DMMSB, PTM,
LabelRT and NMFR.
In the following we group other baselines into two
classes to facilitate results visualization. We first com-
pare those memory- or time-inefficient approaches
DMMSB, PTM, LabelRT and NMFR with our BCGDG
and report the results in Figure 9. Among them, PTM
and LabelRT require much larger memory consump-
tion and thus fail to process the two large graph DBLP
and YouTube due to their memory bottlenecks. NMFR
is more memory efficient than PTM and LabelRT, but
it still can not handle the two large graphs. In ad-
dition, global optimization algorithm DMMSB takes
too long to process the two large graph DBLP and
Youtube due to running time bottleneck. Figure 9(a)
shows that on Infection and Facebook data, LabelRT
(a) Prediction time (s)
(b) Memory usage (MB)
Fig. 11. Online prediction time and memory comparison for
20 thousand node pairs. Note that BCGD represents all of
the three proposed algorithms (BCGDG, BCGDL, and BCGDI)
since the online prediction time and memory consumption of
these three are the same.
Online Prediction Efficiency. We now verify that the
low-dimension latent space approach is very efficient
for online link prediction. Here we choose AA as
BCGDGBCGDLBCGDI10-1 1 10102103104InfectionFacebookHepPhDBLPYoutubeInferring time (s) 1 10102103InfectionFacebookHepPhDBLPYoutubeMemory usage (MB)BCGDGDMMSBNMFRLabelRTPTM10-1100101102103104InfectionFacebookHepPhInferring time (s) 1 10102103104InfectionFacebookHepPhMemory usage (MB)BCGDLBCGDIHottBIGCLAM10-1 1 10102103104InfectionFacebookHepPhDBLPYoutubeInferring time (s) 1 10102103InfectionFacebookHepPhDBLPYoutubeMemory usage (MB)BCGDBIGCLAMLabelRTAA10-1 1 10102103104InfectionFacebookHepPhDBLPYoutubePrediction time (s) 1 10102103InfectionFacebookHepPhDBLPYoutubeMemory usage (MB)11
Fig. 12. All links prediction accuracy comparison.
Fig. 13. New links prediction accuracy comparison.
a representative graph heuristic approach for link
predication, not only because it achieves good accu-
racy [31], but also because it is fast to compute com-
pared to other graph heuristics [7]. However, AA is
still much slower than latent space-based approaches
in online link probability computation. As shown in
Figure 11, on the HepPh dataset, for 20,000 node pairs,
it takes more than 150 seconds to compute the AA
scores; while all the low-dimension latent space-based
approaches are able to finish online link probability
computation in less than one second. In addition,
latent space-based link prediction approaches are also
more efficient than AA in terms of memory con-
sumption, see Figure 11(b). To predict whether two
nodes are linked, latent space-based approaches only
need to read the latent positions of two nodes; while
AA requires the neighborhood information of two
nodes. Finally, Figure 11(a) also intuitively supports
the reason why we use low-dimension constraint.
With low-dimension constraint (k=20), our BCGD ap-
proach obtains at least four times speed-up than auto-
dimensionality approaches LabelRT and BigCLAM
(sometimes k can be more than two hundred) in
online link prediction.
5.4 Evaluation of Link Prediction Accuracy
In this section we quantitatively evaluate the quality
of learned latent spaces in terms of their predictive
power. We give an overall comparison of all the ap-
proaches in terms of AU CROC on predicting all links
and report the results in Figure 12. Here, Gpre denotes
the simple baseline using Gt to predict Gt+1. Clearly,
link prediction accuracy, we have {BCGDG,
for all
BCGDL, BCGDI, PTM, DMMSB} (cid:29)a {Hott, NMFR}
(cid:29)a {BIGCLAM, LabelRT, AA, Gpre}, where A (cid:29)a B
denotes that on average, A is more accurate than B
in terms of predictive power. BigCLAM and LabelRT
have poor AUC scores because they only output a
single, hard assignment of nodes to each dimension,
which provides no means to control the trade-off
between true and false positive rates. AA did not
perform well on Facebook and YouTube because it
can not capture the deleted links prediction; AA still
gives each unlinked node pairs a high score based
on their topological similarity on aggregated graph
from G1 to Gt. Our methods perform much better
than Gpre due to: 1) Zt encodes not only the link
information of Gt, but also the temporal information
from G1 to Gt; 2) Zt is a good estimate for Zt+1; 3) the
reconstruction error between ZtZ T
t and Gt reflects the
possible future changes. Given any pair (u, v), if the
reconstruction error between Zt(u)Zt(v)T and Gt(u, v)
is large, then it indicates that the proximity of the pair
(u, v) is changing over time.
We next evaluate the link prediction performance
of all the approaches on new links. The results are
plotted in Figure 13. As expected, the AUC values
are much lower for the new links. For the new links
prediction, we have {BCGDG, BCGDL, BCGDI, LabelRT,
DMMSB} (cid:29)a {Hott, NMFR} (cid:29)a {AA, BIGCLAM}. It
is not surprising that all the temporal link prediction
approaches perform better than static link prediction
approaches.
Figure 13 also reflects an interesting phenomenon:
our fast BCGD algorithms BCGDL and BCGDI not only
improve the efficiency bottleneck of latent space infer-
ence, but also achieve comparable prediction accuracy
with the global optimization approach BCGDG. For the
new links prediction, they even outperform global
approaches on both dataset Infection and YouTube.
This is because both BCGDL and BCGDI utilize local
structures and local invariance, which significantly
enhances local and temporal information encoding
in the temporal latent space. In addition, we notice
that on average, the incremental approach BCGDI is
able to obtain higher accuracy than the local approach
BCGDL. Although both BCGDL and BCGDI utilize local
invariance, BCGDI is able to exploit the local structure
and local invariance in an adaptive way with graph
changes, which leads to a better performance. Because
0.2 0.4 0.6 0.8 1InfectionFacebookHepPhAUCROCBCGDGBCGDLBCGDIPTMDMMSBNMFRHottAABIGCLAMLabelRTGpre 0.2 0.4 0.6 0.8 1DBLPYoutubeAUCROCBCGDGBCGDLBCGDIHottGpreAABIGCLAM 0.2 0.4 0.6 0.8 1InfectionFacebookHepPhAUCROCBCGDGBCGDLBCGDIDMMSBLabelRTHottNMFRPTMAABIGCLAM 0.2 0.4 0.6 0.8 1DBLPYoutubeAUCROCBCGDGBCGDLBCGDIHottAABIGCLAMBCGDI is more scalable than all the other alternative
approaches (as shown in Figure 10(a)). We conclude
that BCGDI is a practical solution for link prediction
on large-scale dynamic networks.
6 RELATED WORK
Recently, link prediction has attracted significant at-
tention, and various methods have been proposed for
different types of networks. In the following, we first
give a brief overview of related work in link predic-
tion. Particularly, we focus on two categories: graph-
based heuristics and latent space-based approaches.
Next, we present some related work in inferring latent
positions of nodes in a latent space.
6.1 Link Prediction
The link prediction problem in static networks has
been extensively studied. We refer readers to two
recent survey papers [24], [15] and the related work
section of the paper [49] for an exhaustive intro-
duction to this thriving field. Among these existing
works, one of the most popular categories of methods
is graph-based heuristics. Graph-based heuristics [24],
[2], [35], [20], [19] model the link probability be-
tween two nodes as a function of their topological
similarity. The topological similarity can be defined
based on local proximity such as common neigh-
bors [2], triad closures [35], or global proximity such
as weighted shortest-paths [20]. Here we highlight
Adamic and Adar (AA) [2] who proposed a degree-
weighted common-neighbor heuristic that works well
in collaboration networks.
Unfortunately, in online link prediction, the compu-
tation of topological similarity metrics, especially for
those metrics that require path computation or ran-
dom walk over the entire network, is time-consuming
if computed on-the-fly [7]. On the other hand, one can
precompute all pairs of topological similarity scores in
advance, leading to a quadratic storage cost. To strike
a balance between online computation cost and offline
storage cost, recent research interests in link predic-
tion have been directed towards temporal link pre-
diction with latent space modeling [16]. For example,
Fu et al. [10] extended the mixed membership block
model to allow a linear Gaussian trend in the model
parameters (DMMSB). Sewell and Chen [33] proposed
a model which embeds longitudinal network data as
trajectories in a latent Euclidean space, and the prob-
ability of link formation between two nodes depends
on their Euclidean distance and popularity. In this
work we do not take the popularity of each node into
consideration since we assume that the popularity
of each node is automatically captured by the latent
space modeling: a popular node is surrounded by
many other nodes in the latent space. Furthermore,
our model penalizes sudden and large changes in the
latent positions.
12
Dunlavy et al. [8] developed a tensor-based latent
space modeling to predict temporal links. Unfortu-
nately, in online prediction, it requires the tensor prod-
uct of vectors, which is much more computationally
expensive than the dot product of vectors in the pro-
posed approach. In addition, their approaches require
very large storage costs since they need to put the
entire tensor into memory. Recently, there have been
several more efficient approaches to conduct tensor
decomposition. For instance, Huang et al. [17] pro-
posed to conduct tensor decomposition with singular
value decomposition to find temporal communities in
a GPGPU setting.
6.2 Inferring Latent Space
Recent work has explored static latent space model-
ing for social network analysis. For example, Hoff
et al. [16] developed a class of models where the
probability of a relation between actors depends on
the positions of individuals in an unobserved social
space. They make inference for the latent space with
the maximum likelihood estimation and Bayesian pos-
terior inference. Obtaining this posterior is, however,
often infeasible in large-scale graphs. Yin et al. [45]
proposed an efficient stochastic variational inference
algorithm and a parsimonious triangular model to
infer the latent spaces of large networks (PTM). Sarkar
and Moore [32] first generalized the classical mul-
tidimensional scaling to get an initial estimate of
the positions in the latent space, and then applied
nonlinear optimization directly to obtain the latent
space representation.
Matrix factorization approaches are also applied
to observed networks to learn the low-dimension
latent space representation. Yang et al. [43] propose
a multiplicative algorithm with graph random walk
to solve the symmetric graph factorization problem
(NMFR). However,
their approach does not scale
well due to the high computation cost in each it-
eration. Additionally, the effectiveness of their ap-
proach decreases as the density of the input graph
increases. Yang and Leskovec [42] proposed a matrix
factorization approach over networks to learn the
static latent space representation by maximizing the
link likelihood (BIGCLAM). Their approach is very
scalable; nevertheless, the learned latent space is of
high dimension, which leads to expensive online link
prediction computation. HottTopixx (Hott [30]) uses
a new approach for NMF with low-rank constraint
which is highly parallel and allows it to run on
very large datasets. Unfortunately, their approach is
designed to factorize the traditional rectangle ma-
trices, and scalable approaches in symmetric graph
factorization are much less studied than rectangle
matrix factorization such as Hott. In this work we
apply symmetric matrix factorization approaches di-
rectly on the observed networks to infer low-rank
latent spaces. We propose a block coordinate gradient
descent algorithm, which is more scalable than NMFR
and performs well, regardless of the topology of input
graphs.
In addition to matrix factorization approaches, re-
cently Xie et al. [41] (LabelRT) proposed a label
propagation-based approach that incrementally de-
tects communities in dynamic networks. In this work
we propose an incremental BCGD algorithm to incre-
mentally detect latent positions at each time step with
conditional updates on a set of affected nodes.
7 CONCLUSION AND FUTURE WORK
In this work we propose a scalable approach for link
prediction with a temporal latent space model, which
assumes two nodes are more likely to be linked if
they are close to each other in their latent space.
In addition, our temporal latent space model prefers
smoothly evolving by penalizing frequent changes in
latent positions for each node. With respect to the
proposed model, we developed three different infer-
ence algorithms, BCGDG, BCGDL and BCGDI to learn
the temporal
latent space via non-negative matrix
factorization approaches. We also provide a set of
theoretical analyses characterizing their performance
guarantees. We conducted a set of experiments on
large networks with millions of nodes and links to
verify both the efficiency and predictive quality of all
the proposed approaches.
Our model still has limitations. First, the temporal
smoothness assumption may not hold in some cir-
cumstance. For example, in a road network, the latent
position of each node changes significantly from rush
hour to a non-rush hour. And even in social networks,
where temporal smoothness assumptions typically
hold, external events may cause significant shifts to
the network that reflect abrupt changes in latent node
positions. We plan to extend the proposed model to
support temporal nonlinear transitions. Second, we
plan to propose a new continuous time model that
supports continuous inputs rather than discretized
graph snapshots. Moreover, we plan to extend our
approach to generalized cases including directed and
weighted graphs. In addition to model improvement,
another interesting direction is to further improve the
efficiency. Note that in our block coordinate gradient
descent approach, the latent position update for a
node u can be conducted simultaneously with another
node v if they do not share the same neighborhood.
This property can be leveraged for very good paral-
lelization in the future.
ACKNOWLEDGMENT
We are very grateful to Prof. Dacheng Tao, Prof. Kun
Zhang, Prof. Rong Ge, Li Han and Dingxiong Deng
for their insightful discussions. This research was sup-
ported in part by DARPA grant No. W911NF1210034.
REFERENCES
13
[1]
network
2015.
"Dblp
[Online]. Available: http://konect.uni-koblenz.de/networks/
dblp coauthor
– KONECT," May
dataset
[2] L. A. Adamic and E. Adar, "Friends and neighbors on the
web," SOCIAL NETWORKS, vol. 25, pp. 211–230, 2001.
[4]
[3] E. M. Airoldi, D. M. Blei, S. E. Fienberg, and E. P. Xing,
"Mixed membership stochastic blockmodels," J. Mach. Learn.
Res., vol. 9, pp. 1981–2014, 2008.
S. Arora, R. Ge, R. Kannan, and A. Moitra, "Computing a non-
negative matrix factorization – provably," in STOC Conference,
2012, pp. 145–162.
[5] A. Beck and M. Teboulle, "A fast
iterative shrinkage-
thresholding algorithm for linear inverse problems," SIAM
journal on imaging sciences, vol. 2, no. 1, pp. 183–202, 2009.
[6] M. W. Berry, M. Browne, A. N. Langville, V. P. Pauca, and
R. J. Plemmons, "Algorithms and applications for approximate
nonnegative matrix factorization," Comp. Stat. & Data Analysis,
vol. 52, no. 1, pp. 155–173, 2007.
S. Cohen and N. Cohen-Tzemach, "Implementing link-
prediction for social networks in a database system," in SIG-
MOD DBSocial Workshop, 2013, pp. 37–42.
[8] D. M. Dunlavy, T. G. Kolda, and E. Acar, "Temporal link
prediction using matrix and tensor factorizations," ACM Trans.
Knowl. Discov. Data, vol. 5, no. 2, pp. 10:1–10:27, 2011.
[9] D. Erdos, R. Gemulla, and E. Terzi, "Reconstructing graphs
from neighborhood data," ACM Trans. Knowl. Discov. Data,
vol. 8, no. 4, pp. 23:1–23:22, 2014.
[7]
[10] W. Fu, L. Song, and E. P. Xing, "Dynamic mixed membership
blockmodel for evolving networks," in ICML Conference, 2009,
pp. 329–336.
[11] S. Gao, L. Denoyer, and P. Gallinari, "Temporal link prediction
by integrating content and structure information," in CIKM
Conference, 2011, pp. 1169–1174.
[12] D. Gibson, R. Kumar, and A. Tomkins, "Discovering large
dense subgraphs in massive graphs," in VLDB Conference,
2005, pp. 721–732.
[13] N. Guan, D. Tao, Z. Luo, and B. Yuan, "Nenmf: An optimal
gradient method for nonnegative matrix factorization." IEEE
Trans. on Signal Processing, pp. 2882–2898, 2012.
[14] P. Gupta, V. Satuluri, A. Grewal, S. Gurumurthy, V. Zhabiuk,
Q. Li, and J. Lin, "Real-time twitter recommendation: Online
motif detection in large dynamic graphs," Proc. VLDB Endow.,
vol. 7, no. 13, pp. 1379–1380, 2014.
[15] M. A. Hasan and M. J. Zaki, "A survey of link prediction in
Springer
social networks," in Social Network Data Analytics.
US, 2011, pp. 243–275.
[16] P. D. Hoff, A. E. Raftery, and M. S. Handcock, "Latent space
approaches to social network analysis," Journal of the American
Statistical Association, vol. 97, 2002.
[17] F. Huang, N. U. N, M. U. Hakeem, P. Verma, and A. Anand-
kumar, "Fast detection of overlapping communities via online
tensor methods on gpus." CoRR, vol. abs/1309.0787, 2013.
[18] L. Isella, J. Stehl´e, A. Barrat, C. Cattuto, J.-F. Pinton, and
W. V. den Broeck, "What's in a crowd? analysis of face-to-face
behavioral networks," J. of Theoretical Biology, vol. 271, no. 1,
pp. 166–180, 2011.
[19] G. Jeh and J. Widom, "Simrank: a measure of structural-
context similarity," in SIGKDD Conference, 2002, pp. 538–543.
[20] L. Katz, "A new status index derived from sociometric analy-
sis," Psychometrika, vol. 18, no. 1, pp. 39–43, March 1953.
[21] J. Kunegis, "KONECT - The Koblenz Network Collection," in
Proc. Int. Web Observatory Workshop, 2013.
[22] D. D. Lee and H. S. Seung, "Learning the parts of objects by
nonnegative matrix factorization," Nature, vol. 401, no. 6755,
pp. 788–791, 1999.
[23] J. Leskovec, J. Kleinberg, and C. Faloutsos, "Graph evolution:
Densification and shrinking diameters," ACM Trans. Knowledge
Discovery from Data, vol. 1, no. 1, pp. 1–40, 2007.
[24] D. Liben-Nowell and J. Kleinberg, "The link prediction prob-
lem for social networks," in CIKM Conference, 2003, pp. 556–
559.
[25] M. Mcpherson, L. Smith-Lovin, and J. M. Cook, "Birds of
a feather: Homophily in social networks," Annual Review of
Sociology, vol. 27, pp. 415–444, 2001.
[26] A. K. Menon and C. Elkan, "Link prediction via matrix fac-
torization," in ECML/PKDD Conference, 2011, pp. 437–452.
[27] A. Mislove, "Online social networks: Measurement, analysis,
and applications to distributed information systems," Ph.D.
dissertation, Department of Computer Science, Rice Univer-
sity, 2009.
[28] Y. Nesterov, Introductory lectures on convex optimization : a basic
course. Kluwer Academic Publ., 2004.
[29] G.-J. Qi, C. C. Aggarwal, and T. Huang, "Link prediction
across networks by biased cross-network sampling," in ICDE
Conference, 2013, pp. 793–804.
[30] B. Recht, C. Re, J. A. Tropp, and V. Bittorf, "Factoring non-
negative matrices with linear programs," in NIPS Conference,
2012, pp. 1223–1231.
[31] P. Sarkar, D. Chakrabarti, and M. I. Jordan, "Nonparametric
link prediction in dynamic networks," in ICML Conference,
2012, pp. 1687–1694.
[32] P. Sarkar and A. W. Moore, "Dynamic social network analysis
using latent space models," SIGKDD Explor. Newsl., vol. 7,
no. 2, pp. 31–40, 2005.
[33] D. K. Sewell and Y. Chen, "Latent space models for dynamic
networks," Journal of the American Statistical Association, vol.
110, no. 512, pp. 1646–1657, 2015.
[34] J. Sun, C. Faloutsos, S. Papadimitriou, and P. S. Yu, "Graph-
scope: Parameter-free mining of large time-evolving graphs,"
in SIGKDD Conference, 2007, pp. 687–696.
[35] P. Symeonidis, E. Tiakas, and Y. Manolopoulos, "Transitive
node similarity for link prediction in social networks with
positive and negative links," in Proceedings of the 4th ACM
conference on Recommender systems, 2010, pp. 183–190.
[36] C. Tantipathananandh, T. Berger-Wolf, and D. Kempe, "A
framework for community identification in dynamic social
networks," in SIGKDD Conference, 2007, pp. 717–726.
[37] C. Tantipathananandh and T. Y. Berger-Wolf, "Finding com-
munities in dynamic social networks," in ICDM Conference,
2011, pp. 1236–1241.
[38] P. Tseng and S. Yun, "A coordinate gradient descent method
for nonsmooth separable minimization," Math. Program., vol.
117, no. 1-2, pp. 387–423, 2009.
[39] S. A. Vavasis, "On the complexity of nonnegative matrix
factorization," J. on Optimization, vol. 20, no. 3, pp. 1364–1377,
2009.
[40] B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi,
"On the evolution of user interaction in Facebook," in Proc.
Workshop on Online Social Networks, 2009, pp. 37–42.
[41] J. Xie, M. Chen, and B. K. Szymanski, "Labelrankt: Incremental
community detection in dynamic networks via label propaga-
tion," CoRR, vol. abs/1305.2006, 2013.
[42] J. Yang and J. Leskovec, "Overlapping community detection
at scale: A nonnegative matrix factorization approach," in
WSDM Conference, 2013, pp. 587–596.
[43] Z. Yang, T. Hao, O. Dikmen, X. Chen, and E. Oja, "Cluster-
ing by nonnegative matrix factorization using graph random
walk," in NIPS Conference, 2012, pp. 1088–1096.
[44] J. Ye, H. Cheng, Z. Zhu, and M. Chen, "Predicting positive and
negative links in signed social networks by transfer learning,"
in WWW Conference, 2013, pp. 1477–1488.
[45] J. Yin, Q. Ho, and E. P. Xing, "A scalable approach to proba-
bilistic latent space inference of large-scale networks," in NIPS
Conference, 2013, pp. 422–430.
[46] J. Zhang, C. Wang, J. Wang, and J. X. Yu, "Inferring continuous
dynamic social influence and personal preference for temporal
behavior prediction," Proc. VLDB Endow., vol. 8, no. 3, pp. 269–
280, 2014.
[47] Y. Zhang, M. Zhang, Y. Liu, S. Ma, and S. Feng, "Localized
matrix factorization for recommendation based on matrix
block diagonal forms," in WWW Conference, 2013, pp. 1511–
1520.
[48] L. Zhu, A. Galstyan, J. Cheng, and K. Lerman, "Tripartite
graph clustering for dynamic sentiment analysis on social
media," in SIGMOD Conference, 2014, pp. 1531–1542.
[49] L. Zhu and K. Lerman, "A visibility-based model for link
prediction in social media," in ASE SocialCom Conference, 2014.
14
Linhong Zhu is a computer scientist at
USC's Information Sciences Institute. Prior to
that she worked as a Scientist-I in the data
analytics department at the Institute for In-
focomm Research, Singapore. She obtained
her Ph.D. degree in computer engineering
from Nanyang Technological University, Sin-
gapore in 2011 and the BS degree from
the University of Science and Technology of
China in 2006. Her research interests are in
large-scale graph analytics with applications
to social network analysis, social media analysis, and predictive
modeling. She is a member of IEEE and ACM.
Dong Guo received the BS degree in
physics from the University of Science and
Technology of China, Hefei, China, in 2007,
and entered the Ph.D. program in computer
science at the University of Southern Califor-
nia in 2011. His doctoral projects consisted
of studying the data-driven representation
learning algorithms and applying machine
pipeline in industrial data analysis.
Junming Yin is an assistant professor in
the Department of Management Information
Systems at the University of Arizona. Prior to
that he was a Lane Fellow in the Lane Center
of Computational Biology at Carnegie Mellon
University. He received his Ph.D. from UC
Berkeley in Computer Science. His research
focus is on statistical machine learning and
its applications in business intelligence, digi-
tal marketing, healthcare systems, and com-
putational biology.
Greg Ver Steeg is a research assistant pro-
fessor in computer science at USC's Infor-
mation Sciences Institute. He received his
Ph.D. in physics from Caltech in 2009 and
since then has focused on using ideas from
information theory to understand complex
systems like human behavior, biology, and
language. His work has been recognized with
an AFOSR Young Investigator Award.
Aram Galstyan is a research director for
data science and machine learning at USC's
Information Sciences Institute and a re-
search associate professor
in the USC
Viterbi School of Engineering's Computer
Science Department. His current research
focuses on different aspects of machine
learning, with applications in computational
social sciences, forecasting, and bioinformat-
ics.
Supplemental Materials to "Scalable Temporal Latent Space
Inference for Link Prediction in Dynamic Social Networks"
A PROOF OF LEMMA 1
According to Eq. 3, we can obtain the gradient of
J(Zτ (u)) at time stamp τ
∇J(Zτ (u)) = − λ(Zτ−1(u) + Zτ +1(u))
(cid:88)
Zτ (v)T Zτ (v)
v(cid:54)∈N (u)
(Gτ (u, v) − Zτ (u)Zτ (v)T )Zτ (v)
− 2
v∈N (u)
+ 2Zτ (u)
(cid:88)
We rewrite the term(cid:80)
(cid:88)
Zτ (v)T Zτ (v) − (cid:88)
τ Zτ − (cid:88)
v∈V
=Z T
=
v∈N (u)
v∈N (u)
v(cid:54)∈N (u) Zτ (v)T Zτ (v) as:
Zτ (v)T Zτ (v) − Zτ (u)T Zτ (u)
Zτ (v)T Zτ (v) − Zτ (u)T Zτ (u)
(9)
(10)
By combining Eq. 9 and Eq. 10, we have:
∇J(Zτ (u)) = − λ(Zτ−1(u) + Zτ +1(u)) + 2Zτ (u)Z T
τ Zτ
− 2Zτ (u)Zτ (u)T Zτ (u) − 2
Gτ (u, v)Zτ (v)
(cid:88)
v∈N (u)
(11)
Since for each u ∈ V , Zτ (u)Zτ (u)T = 1, the gradient
of J(Zτ (u)) can be simplified as
∇J(Zτ (u)) = − λ(Zτ−1(u) + Zτ +1(u)) + 2Zτ (u)Z T
τ Zτ
− 2Zτ (u) − 2
Gτ (u, v)Zτ (v)
(cid:88)
v∈N (u)
(12)
For any two matrices Z1, Z2 ∈ R1×k, we replace
Zτ (u) in Eq. 12 with Z1 and Z2, we then have
2
(cid:107)∇J(Z1) − ∇J(Z2)(cid:107)2
=(cid:107)2(Z1 − Z2)Z T
=(cid:107)2(Z1 − Z2)(Z T
=4tr(((Z1 − Z2)(Z T
=4tr((Z1 − Z2)T (Z1 − Z2)(Z T
τ Zτ − (Z1 − Z2)(cid:107)2
τ Zτ − I)(cid:107)2
2,
2
τ Zτ − I))T (Z1 − Z2)(Z T
τ Zτ − I)(Z T
τ Zτ − I)),
τ Zτ − I)T ),
Since for any two positive semi-definite matrices A
and B, we have tr(AB) ≤ tr(A)tr(B). By substitut-
ing A = (Z1− Z2)T (Z1− Z2), B = (Z T
τ Zτ −
I)T , we have
τ Zτ − I)(Z T
2
(cid:107)∇J(Z1) − ∇J(Z2)(cid:107)2
=4tr((Z1 − Z2)T (Z1 − Z2)(Z T
≤4tr((Z T
=4tr((Z T
τ Zτ − I)(Z T
τ Zτ − I)(Z T
τ Zτ − I)(Z T
τ Zτ − I))T ),
τ Zτ − I)T )tr((Z1 − Z2)T (Z1 − Z2)),
τ Zτ − I)T )(cid:107)Z1 − Z2(cid:107)2
2
Let us apply the above trace inequality again and
using tr(Z T
τ Zτ ) = n, tr(I) = k, we then have
Thus, we
2(cid:112)(n2 − 2n + k)(cid:107)Z1 − Z2(cid:107)2. Therefore, ∇J(Zτ (u)) is
2(cid:112)(n2 − 2n + k). This completes the proof.
Lipschitz continuous and the Lipschitz constant is
(cid:107)∇J(Z1) − ∇J(Z2)(cid:107)2
have
≤
B PROOF OF LEMMA 2
Based on [28], [13], [5], for each node u, at time point
τ, we could iteratively update Zτ (u) in each iteration
r + 1 with the following rule:
Y (r+1) = Y (r) − η∇Zτ (u)J(Y (r))
Z (r+1)
(u) = PL(Y ) = max(Y (r+1), 0)
τ
Y (r+1) = Z (r+1)
τ
(u) +
(Z (r+1)
τ
(u) − Z (r)
τ (u))
ar − 1
ar+1
5, PL(Y )
=
non-negative
is
τ (u) (Zτ (u)I
ar
is defined in Eq.
where
the
arg minX≥0 φ(Y, X)
projection of Y , and Y (0) = Z I
the initialization for Zτ (u)).
denotes
Let us replace the ∇Zτ (u)J(Z (r)
the step size η with 1
which leads to the expression in Lemma 2.
τ (u)) with Eq. 12 and
L (L is the Lipschitz constant),
Therefore, the update rule in Lemma 2 is correct.
C PROOF OF THEOREM 1
(cid:107)Y − PL(Y )(cid:107)2
F
L
2
According to Theorem 2.2.2 in [28] or Lemma 2.3 [5],
for any matrix X ∈ R1×k
and matrix Y ∈ R1×k, we
have
J(X) ≥ J(PL(Y )) + L < PL(Y ) − Y, Y − X > +
+
Now let Y (r+1) = Z (r)(u) + ar−1
(13)
where PL(Y ) = arg minX≥0 φ(Y, X) denotes the non-
negative projection of Y , and (cid:104),(cid:105) denotes the matrix
inner product operator.
(Z (r)(u) −
Z (r−1)(u)) and PL(Y (r)) = Z (r)(u). Note that we omit-
ted the subscript τ that denotes the time to simplify
notations. By substituting X = Z (r)(u), Y = Y (r+1),
we have
J(Z (r)(u)) ≥J(Z (r+1)(u)) +
(cid:107)Y (r+1) − Z (r+1)(u)(cid:107)2
ar+1
F
+ L(cid:104)Z (r+1)(u) − Y (r+1)(u), Y (r+1) − Z (r)(u)(cid:105)
(14)
Similarly, by substituting X = Z∗(u), Y = Y (r+1), we
have
L
2
(cid:107)∇J(Z1) − ∇J(Z2)(cid:107)2
≤4tr((Z T
τ Zτ − I)(Z T
≤4(n2 − 2n + k)(cid:107)Z1 − Z2(cid:107)2
2
2
τ Zτ − I)T )(cid:107)Z1 − Z2(cid:107)2
2
∗
J(Z
(u)) ≥J(Z (r+1)(u)) +
(cid:107)Y (r+1) − Z (r+1)(u)(cid:107)2
F
+ L(cid:104)Z (r+1)(u) − Y (r+1)(u), Y (r+1) − Z
∗
L
2
(u)(cid:105)
(15)
(u)))
2
since ar+1 > 1, by multiplying both sides of Eq. 14 by
ar+1 − 1 and adding it to Eq. 15, we have
(ar+1 − 1)J(Z (r)(u)) + J(Z
, ar+1Y (r+1) − (ar+1 − 1)Z (r)(u) − Z
+ ar+1J(Z (r+1)(u)) +
(u)) ≥ L(cid:104)Z (r+1)(u) − Y (r+1),
(cid:107)Y (r+1) − Z (r+1)(u)(cid:107)2
(u)(cid:105)
Lar+1
∗
∗
F
∗
∗
r = a2
(u))) − a2
r+1(J(Z (r+1)(u)) − J(Z
F . That is, (cid:107)A− B(cid:107)2
((cid:107)ar+1Z (r+1)(u) − ar+1Y (r+1)(cid:107)2
F +(cid:107)B−C(cid:107)2
F − (cid:107)B − C(cid:107)2
F +2(cid:104)A−B, B−C(cid:105) = (cid:107)A−B+B−C(cid:107)2
(16)
r+1 − ar+1.
From Line 3 in Algorithm 1, we get a2
By using this equality and multiplying both sides of
Eq. 16, we have
r(J(Z (r)(u)) − J(Z
∗
a2
F + 2(cid:104)ar+1Z (r+1)(u)
≥ L
2
− ar+1Y (r+1), ar+1Y (r+1) − (ar+1 − 1)Z (r)(u) − Z
(u)(cid:105))
(17)
Since for any matrices A, B and C, we have (cid:107)A −
B(cid:107)2
F =
F + 2(cid:104)A− B, B− C(cid:105) = (cid:107)A−
(cid:107)A− C(cid:107)2
C(cid:107)2
F . By replacing A with ar+1Z (r+1)(u),
B with ar+1Y (r+1), C with (ar+1 − 1)Z (r)(u) + Z∗(u),
we simplify Eq. 17 as
r(J(Z (r)(u)) − J(Z
a2
≥ L
2
− (cid:107)ar+1Y (r+1) − (ar+1 − 1)Z (r)(u) − Z
((cid:107)ar+1Z (r+1)(u) − (ar+1 − 1)Z (r)(u) − Z
(u)(cid:107)2
F )
((cid:107)ar+1Z (r+1)(u) − (ar+1 − 1)Z (r)(u) − Z
∗
(u)(cid:107)2
=
− (cid:107)arZ (r)(u) − (ar − 1)Z (r−1)(u) − Z
(18)
The last equality holds due to Y (r+1) = Z (r)(u) + ar−1
(Z (r)(u) − Z (r−1)(u)).
By varying r=0 to r − 1 and summing up all these
r+1(J(Z (r+1)(u)) − J(Z
(u)(cid:107)2
(u))) − a2
(u)(cid:107)2
L
2
ar+1
∗
∗
∗
F
F
∗
∗
F
(u)))
expressions in Eq. 18, we get
(u)) − a2
(u)(cid:107)2
∗
J(Z (0)(u)) − J(Z
∗
≥ − L
(cid:107)Z (0)(u) − Z
2
F
r(J(Z (r)(u)) − J(Z
∗
(u)))
(19)
On another hand, we substitute X and Y in Eq. 13 by
X = Z∗(u) and Y = Y (0), we have
J(Z (0)(u)) − J(Z
L
2
((cid:107)Y (0) − Z
(u)) ≤
∗
F − (cid:107)Z (0)(u) − Z
(u)(cid:107)2
∗
∗
(u)(cid:107)2
F )
(20)
By combining Eq. 19 and Eq. 20, we have
r(J(Z (r)(u)) − J(Z
a2
∗
(u))) ≤ L
2
(cid:107)Y (0) − Z
∗
(u)(cid:107)2
F
(21)
By substituting Y (0) as Z I (u) and using ar ≥ (1 +
r/2(cid:112)α0/L) = (1+r/2) in Lemma 2.2.4 in [28], we get:
J(Z (r)(u)) − J(Z∗(u)) ≤ 2L(cid:107)Z I (u) − Z∗(u)(cid:107)2
F
(r + 2)2
This completes the proof for Theorem. 1.
Fig. 14. All links prediction accuracy comparison in terms
of AUC under PR curves.
D EXTRA RESULTS BASED ON AUCPR
In this set of experiments, we evaluate the link predic-
tion accuracy according to the measurement of AUCPR.
Figure 14 gives the overall comparison of different
approaches in terms of AUC under PR curves. The
results based on AUCPR are similar with those based
on AUCROC: the proposed approaches are consistently
better than other state-of-the-art approaches. We also
observed that the performance of AA based on AUCPR
is improved, possibly because AA gives high score
for node pairs that have common neighbors and zero
scores otherwise, which leads to high precision and
relatively lower recall. To the contrary, the perfor-
mance of DMMSB based on AUCPR is getting worse.
All the results indicate that the proposed approach,
especially the incremental algorithm BCGDI, performs
well in terms of link prediction task.
0.2 0.4 0.6 0.8 1InfectionFacebookHepPhAUCPRBCGDGBCGDLBCGDIPTMDMMSBNMFRHottAABIGCLAMLabelRTGpre 0.2 0.4 0.6 0.8 1DBLPYoutubeAUCPRBCGDGBCGDLBCGDIHottGpreAABIGCLAM |
1804.01576 | 1 | 1804 | 2018-03-13T22:32:16 | A Bayesian Model for False Information Belief Impact, Optimal Design, and Fake News Containment | [
"cs.SI"
] | This work is a technical approach to modeling false information nature, design, belief impact and containment in multi-agent networks. We present a Bayesian mathematical model for source information and viewer's belief, and how the former impacts the latter in a media (network) of broadcasters and viewers. Given the proposed model, we study how a particular information (true or false) can be optimally designed into a report, so that on average it conveys the most amount of the original intended information to the viewers of the network. Consequently, the model allows us to study susceptibility of a particular group of viewers to false information, as a function of statistical metrics of the their prior beliefs (e.g. bias, hesitation, open-mindedness, credibility assessment etc.). In addition, based on the same model we can study false information "containment" strategies imposed by network administrators. Specifically, we study a credibility assessment strategy, where every disseminated report must be within a certain distance of the truth. We study the trade-off between false and true information-belief convergence using this scheme which leads to ways for optimally deciding how truth sensitive an information dissemination network should operate. | cs.SI | cs | A Bayesian Model for False Information Belief
Impact, Optimal Design, and Fake News
Containment
Amin Khajehnejad
3Red Trading Group LLC., University of Michigan Ann Arbor
Email: [email protected], [email protected]
Shima Hajimirza
Texas A&M University
Email: [email protected]
8
1
0
2
r
a
M
3
1
]
I
S
.
s
c
[
1
v
6
7
5
1
0
.
4
0
8
1
:
v
i
X
r
a
Abstract-This work is a technical approach to modeling
false information nature, design, belief impact and containment
in multi-agent networks. We present a Bayesian mathematical
model for source information and viewer's belief, and how the
former impacts the latter in a media (network) of broadcast-
ers and viewers. Given the proposed model, we study how a
particular information (true or false) can be optimally designed
into a report, so that on average it conveys the most amount of
the original intended information to the viewers of the network.
Consequently, the model allows us to study susceptibility of a
particular group of viewers to false information, as a function of
statistical metrics of the their prior beliefs (e.g. bias, hesitation,
open-mindedness, credibility assessment etc.). In addition, based
on the same model we can study false information "containment"
strategies imposed by network administrators. Specifically, we
study a credibility assessment strategy, where every disseminated
report must be within a certain distance of the truth. We study the
trade-off between false and true information-belief convergence
using this scheme which leads to ways for optimally deciding
how truth sensitive an information dissemination network should
operate.
I. INTRODUCTION
Adversarial spread of false information based on exploita-
tion of viewer's naivety, gullibility and bias has been remarked
numerously over social media and news networks, most no-
tably in the midst of the most recent US presidential election
and Brexit [1]–[5]. The notion is familiarly referred to as
fake news. However, manipulative demonstration and spread of
false information is not limited to news, and indisputably exists
in other domains such as advertising [6]–[9], financial markets
(electronic trading) [10], [11], cyber-security [12], adversarial
machine learning [13], [14] and more, often referred to by
terms such as misinformation or disinformation.
When it comes to studying false information spread,
the
goals are multifaceted and significantly vague. This is due
to various reasons. Firstly, The nature of false information
is highly context-dependent and debatable. The notion of
fake news for instance is not fully resolved and well-defined
for many [15]–[17]. The practice of fake news fabrication
and broadcasting can take various forms, from an individual
creating and promoting fake social media posts, news websites
etc. [18], to manipulative journalism of well-established news
organizations doing so with the intention of appealing to a
certain group of audience [19]. False news creation and spread
false
how is
it
it
from the
is also not necessarily bound to malicious intention, and can
be a mere reflection of erroneous, exaggerative or neglectful
quoting of absorbed facts, rumors, panic epidemics and similar
phenomena. Furthermore, false information spread can affect
different systems in different ways, and consequently, admin-
istrators decide to handle it in various forms: identification,
detection, prediction, regulation, education or even ignorance
are common mechanism that are usually adopted to combat
false information [20]. Nevertheless, one needs to identify
and study the following aspects of false information in their
corresponding contexts:
1. Nature. What
information,
is
originated/designed, and what distinguishes
truth?
2. Impact. How does false information or fake news impact
beliefs of the users/viewers of a system/network, and how
does that in turn affect the dynamics of information flow and
system operation?
3. Detection. What methodologies can be used to identify
false information accurately and efficiently?
4. Spread (epidemic).
In an interactive network where
information is propagated in a distributed way by users and
outside feeds, what are the chances of epidemic false news
spread as a function of network parameters?
5. Containment and mitigation. What mechanisms can
prevent false information dissemination, or offset
it with
truth? At what costs can those strategies be implemented and,
what are the expected outcomes and damages?
Mathematical modeling of
false information is far more
challenging than semantic and social analysis, due to lack
of basic fundamentals. Yet
there are a handful of recent
works that have modeled various aspects of false information
nature and spread using technical methods. Most notably,
the majority of works have investigated fraudulent accounts
and credibility of news in online social networks such as
twitter [21]–[26]. A few other works have proposed models
for disseminating good information in social networks to
mitigate the effect of misinformation,
thereby improving
reliability [27]–[31]. Misinformation and manipulation in
financial limit order markets are probably studied far more
in-depth, especially using game-theoretic approaches (see
e.g. [32]–[35]), due to much simpler and readily available
numerical representations of information and beliefs. There
are recent works that have tried to adopt those approaches
in the context of social networks. For example, the study
of [30] offers a game-theoretic approach to truth and fake
news dissemination based on a mixed-strategy formulation of
volunteer's dilemma in an adhoc social network. However,
those studies are still preliminary and immature compared
to areas where numerical representation of information is
available.
The current work is a technical (yet different) approach to false
information design, impact and containment in multi-agent
networks. We present a Bayesian mathematical model for
information, viewer's belief, and how the former impacts the
latter in a media (network) of broadcasters and viewers. Given
the proposed model, we study how a particular information
(true or false) can be optimally designed into a report, so
that on average it conveys the most amount of the original
intended information to the viewers of the network. The model
then allows one to study susceptibility of a particular group
of viewers to false information, as a function of statistical
metrics of the their prior beliefs (e.g., bias, hesitation, open-
mindedness, etc.). In addition, based on the same model we
can study false information "containment" strategies imposed
by network administrators. Specifically, we study a credibility
assessment strategy, where every disseminated report must be
within a certain distance of the truth. We study the trade-
off between false and true information containment using this
scheme which leads to ways for optimally deciding how truth
sensitive an information dissemination network should operate.
A. Proposed Model
an
consider
We
information
network
(medium) with an information source, a transmitter (reporter),
a network administrator and multiple viewers (audience). The
schematics of such a network are illustrated in Figure 1.
dissemination
report is not permitted to be broadcast if it is too distant
from the truth xt. Therefore, the reporter's optimal design
must fall in an acceptable neighborhood of the truth which
we denote by C(xt). We assume that xs, xt and y are all real
vectors of length n. For the present, work we use the simple
euclidean distance as the measure of deviation between facts:
d(x1, x2) = (cid:107)x1 − x2(cid:107). Therefore, the authenticity filter has
the following mathematical form:
y ∈ C(xt) = {x (cid:107)x − xt(cid:107) (cid:54) }
(1)
where is a positive constant. There are N >> 0 viewers,
and every viewer i has a prior distribution pi(x) about the
truth. When a viewer receives a report y, he/she forms a
posterior distribution given the prior belief and the observation,
and consequently adopts a new belief in a Bayesian manner,
which we denote by ζi(y). The details of the viewers belief
impact
is described in the next subsection. We make the
assumption of the well-informed reporter. This means that the
reporter is fully aware of the truth xs, and also of the network
administration policy . However, the reporter is not aware of
every individual's prior distribution. Instead, he only knows
average statistics such as mean of first and seconds moments
of the viewers' priors, as will be explained the next section.
The reporter's goal is to convey the source's information to as
many viewers as possible. For a single viewer i, information
conveyance can be measured by the distance of the original
information xs and the adopted belief ζi(y):
τi,s(y) = (cid:107)xs − ζi(y)(cid:107)
(2)
For simplicity of future reference, we call this quantity the
"reporter-viewer information convergence", or in short "con-
vergence". The smaller τi,s(y), the more successful the re-
porter has been for impacting that particular viewer. However,
the statistical notion of information throughput is obtained by
averaging τi,s(y) over all viewers:
τs(y) = E(cid:107)xs − ζi(y)(cid:107)
(3)
The reporter's goal is therefore to minimize average conver-
gence τs(y) for a valid report y which is permitted to pass
through the network, i.e.
τs(y)
argmin
s.t. y ∈ C(xt)
y
(4)
Fig. 1: Schematics of an information dissemination network
with source, reporter, administrator and viewer.
The transmitter intends to disseminate in the network a piece
of information xs from the source. However, he can modify
the information content and design a report y, in order for
the viewers to accept as much of the source information as
possible. There is an authenticity filter in the network that
verifies every input report by comparing it with the truth. The
B. Bayesian Viewer
We model the viewer of the news (audience) as an agent i
that has a prior belief about the truth at a particular point
in time. We denote the probability distribution of this prior
with pi(·). Upon receiving a piece of report y, the viewer'
instantaneous belief of the truth (his point of view) is the
Maximum A Posteriori fact:
ζi(y) = argmax
x
pi(xy),
(5)
where the posterior distribution of the true news is obtained
from the Bayes rule :
pi(xy) ∝ pi(x)pi(yx)
(6)
The likelihood distribution pi(yx) is a function of
the
uncertainty and credibility of the source of news in the
viewer's mind. This is essentially an estimation of the statistics
of truth manipulation (in the mind of the viewer) that an
information source performs on the facts before disseminating
them. If in the viewer's mind, the source of the news is
very noisy, exaggerative or inaccurate, then the likelihood
distribution pi(yx) is very wide and has a large variance. If
there is a reporting bias to the journalism which is known to
the viewer, then the distribution is nonzero mean. In summary,
the viewer blends his prior opinion with what he/she observes,
but takes into account the presumed credibility of the source
(which could in all likelihood be false).
In a perfectly Gaussian world, we can assume that the prior
and likelihood are both n-dimensional Gaussian distributions:
pi(x) ∼ N (µi, Σi),
pi(xy) ∼ N (y, Σs,i),
(7)
where Σi and Σs,i are covariance matrices of the viewer's prior
and the conditional likelihood distribution, respectively. Intu-
itively, Σi is a multi-dimensional measure of viewer's intrinsic
hesitation about the state of truth at the time being, while Σs,i
measures suspicion of noisy/false reporting against the news
source. The well-informed reporter assumption means that
the reporter is not aware of individual viewer characteristics
µi, Σi, Σs,i, but has perfect knowledge of the joint distribution
of these quantities. Combining equations (5),(6),(7), we get:
s,i (x − y)
log pi(xy) ∝ −(x − µi)T Σ−1
and by maximizing this, we get that the viewers post report
belief becomes:
(x − µi) − (x − y)Σ−1
i
where
ζi(y) = Aiy + Biµi ,
Ai =(cid:0)Σ−1
Bi =(cid:0)Σ−1
(cid:1)−1
(cid:1)−1
i + Σ−1
i + Σ−1
s,i
s,i
Σ−1
s,i ,
Σ−1
i
(9)
(10)
Therefore, in the world of Gaussian news and beliefs, a viewer
adopts a linear combination of his prior belief and the viewed
report as his/her new belief.
C. Optimal Reporter
Combining equations (3),(4) and (9) together, the optimal
report y∗ is revealed to be the solution of the following
optimization:
E(cid:107)Aiy + Biµi − xs(cid:107),
y
min
s.t. (cid:107)y − xt(cid:107) (cid:54) .
(11)
(11) is a convex optimization. Therefore, using the method of
Lagrange multipliers (see e.g., [36]), y∗ is the minimizer of
the following utility function for some nonnegative λ (cid:62) 0:
L(y, λ) = E(cid:107)Aiy + Biµi − xs(cid:107)2 + λ(cid:107)y − xt(cid:107)2
Taking derivatives with respect to y, we get:
∂L(y, λ)
∂y
where:
= (A2 + λI)y + ABµ − Axs − λxt
A2 = EAT
i Ai, ABµ = EAT
i Biµ, A = EAi.
(12)
(13)
(14)
Finally, by setting (13) equal to zero, the optimal report is
obtained as:
y∗ = (A2 + λI)−1(cid:0)λxt + Axs − ABµ(cid:1) ,
(15)
where λ is the smallest nonnegative constant
that makes
(cid:107)y∗ − xt(cid:107) (cid:54) xt. The λ in (15) is a regularization factor that
forces the report to be closer to reality. Note that the well-
informed reporter assumption means that A2, A and ABµ are
computable for the reporter, hence so is the optimal report y∗.
D. Ergodic Covariances
For further simplicity of the analysis, we consider the
case of ergodic covariances, i.e., Σi = Σ and Σi,s = Σs
for all viewers, and only mean belief µi varies. Under this
assumption, it is easy to show that
y∗ = (A2 + λI)−1 (λxt + Axs − ABµ) .
(16)
When λ = 0, there is no authenticity requirement for the
report, thus the optimal report can be designed solely based on
the input source information and the viewers' belief statistics.
Specifically:
(8)
y∗ = A−1xs − A−1Bµ = xs + ΣsΣ−1 (xs − µ) .
(17)
In other words, the optimal report is the linear sum of the news
source and a skewed version of the average news surprise
(xs − µ), which can also be interpreted as exaggeration.
The optimal magnitude and rotation of such exaggeration is
determined by the relative ratio of the covariance matrices Σ
(hesitation) and Σs (source reliability). The more reliable a
source (smaller (cid:107)Σs(cid:107)∗) or the more open minded/less certain
the viewers (larger (cid:107)Σ(cid:107)∗), more exaggeration is allowed. (cid:107)X(cid:107)∗
denotes the nuclear norm of a matrix X which can be a
measure of the magnitude of a covariance matrix. However,
this also tells us that elements of the report (i.e. different
coordinates of y) can be exaggerated differently, according to
the certainty distribution. It should be noted that even in the
case of a perfectly truthful source xs = xt, the optimal report
is exaggerative and not completely honest. A credibility as-
sessment strategy or filtration policy should take that fact into
consideration. In other words, enforcing truthful reporting will
compensate the performance of an optimal reporter completely
based on the truth if (cid:107)ΣsΣ−1 (xt − µ)(cid:107) >> . The optimal
convergence metric τs(y∗) for λ = 0 in this case becomes:
τs(y∗) = E(µi − µ)T B2(µi − µ)
(18)
which is independent of the particular piece of news xs, and
only depends on the source credibility and viewers' belief
statistics.
E. Authentication Policy
Assuming that every reporter does the optimal action know-
ing the specified filter parameter , it is up to the network
administrator to set a value that promotes reporting based on
truthful sources and limits the unauthentic ones. This requires
definition of an appropriate truth dissemination utility function.
For a given source xs, policy parameter and optimal report
y∗, we denote the optimal convergence with c(xs, ), which
can be obtained from the derivations of the previous section
as:
c(xs, ) = E
(cid:107)Ay∗
+ Bµi − xs(cid:107)
i
(19)
The criteria for in filter design is intuitive: average conver-
gence for a source of false information must be significantly
smaller than that of the authentic source. In addition, should
not be not too small to limit the truthful optimal reporter.
These criteria can be represented by:
(cid:18)
(cid:12)(cid:12)(cid:12)(cid:12) (cid:107)xt − xs(cid:107) (cid:62) dmin
(cid:19)
U1() = E
xt,xs
c(xs, ) − c(xt, )
U2() =
c(xt,∞)
E
xt
E
c(xt, )
xt
(cid:62) α,
(cid:62) δ,
(20)
(21)
where δ and α are positive constants. The first equation
states that the average convergence distance for false news
information sources must be farther than that of the true
information source by a minimum margin δ. Note that the
expectation is over the distribution of all information sources,
and an information vector is considered false if it is at a
distance dmin from the truth. The second equation on the other
hand guarantees that the network is not too restrictive for the
optimal reporter of truth compared with a free network with no
authentication policy. Combining these metrics, we can define
a unified utility function, and choose the maximizer ∗:
∗ = argmax
U ()
(cid:18)
= E
xt,xs
c(xt,∞)
E
xt
E
c(xt, )
xt
+ β
c(xs, ) − c(xt, )
(cid:12)(cid:12)(cid:12)(cid:12) (cid:107)xt − xs(cid:107) (cid:62) dmin
(cid:19)
(22)
Fig. 2: Statistics of belief convergence of optimal report for
true information (blue) and random unauthentic information
(red).
II. NUMERICAL EVALUATIONS
We set up a basic numerical simulation to calculate and
illustrate the convergence metrics and utility functions of true
and unauthentic information sources based on the derivations
of the previous section. We consider a simple case of n =
2, with ergodic covariances Σ, Σs given below in (23). We
assume that the true information xt and source information xs
are both independently generated from a uniform distribution
of vectors on the unit 2-sphere, S2. The average viewers' belief
µ is also drawn from the same distribution.
(cid:20)1
0
(cid:21)
0
1
Σ =
, Σs =
(cid:20)0.5
0
(cid:21)
0
0.5
, µi ∼ N
µ, xt, xs ∼ S2,
(cid:18)
µ,
(cid:20)0.1
0
(cid:21)(cid:19)
0
0.1
(23)
t )−
In Figure 2, the average convergence for true source E(cid:107)ζ(y∗
xt(cid:107) is compared with the convergence of a random source
s) − xs(cid:107), as a function of network filter parameter .
E(cid:107)ζ(y∗
The standard deviations of the same quantities are displayed as
error areas. Since the mean belief is completely independent
of the source and truth, this figure is a representative of a
convergence trade-off in a network of indifferent audience.
Figure 3 shows convergence trade-off conditioned on the fact
that average belief is closer to the source (false) information
than the truth, i.e., (cid:107)¯µ− xs(cid:107) (cid:54) (cid:107)¯µ− xt(cid:107). We can think of this
scenario as "uneducated audience". Note that for larger , the
false source convergence error area is below the average con-
vergence of truth, meaning that the false information reporter
has a significant chance of conveying more information that
the truth.
III. CONCLUSION AND FUTURE WORK
A Bayesian model for information, viewer's belief and the
impact of the former on the latter was proposed in this work.
The model was studied from the point of an optimal reporter
intending to convey the message of a particular source to a
statistically large group of viewers, through a network that
implements a basic authentication policy. The simplifying
assumption of numerical information vectors and Gaussian
priors, posteriors and belief impact was made. The reporter
was also assumed to be well-informed, which means he has
the knowledge of truth, network policy and joint distribution
of viewers' belief statistics. Consequently, we derived the
formulation of the optimal reporter, and showed that it is a
linear combination of a portion of truth, source information
and exaggeration. In addition, knowing this optimal strategy,
we studied the optimal choice of the network authentication
policy parameter. If the policy is too restrictive, it hurdles
the performance of a well-intended reporter that only uses
exaggerative techniques to convey the truth to an uneducated
or biased audience. However, too loose of a policy grants a
large capacity for false information dissemination to false or
malicious sources. We proposed a computable utility function
that takes these factors into account, and can be optimized for
the best choice of authentication policy.
Given that this study is the first of its own kind, the proposed
model
is expected to be significantly more progressed in
the future work, in order to account for more practicalities.
First and foremost, our primary goal for a follow-up work
would be to validate the model with real-world data in various
contexts (social media, news websites and electronic trading
platforms). Secondly, we intend to incorporate less perfect
assumptions such partially informed reporters, and selective
or random authentication policies, and provide more analytical
and concrete derivations than those of the current work.
Another limitation of the current model is that it is very static.
In reality the source credibility parameters Σs,i is a function
of the long term reporting of a source, and varies through the
time. Furthermore, viewers have ways of cross-validating and
comparing information coming from different sources. Other
model parameters are also expected to be dynamic.
The present model is also passive, which means the viewers
do not spread the information, and are only receivers of it.
A very interesting study would be to adopt the current model
and study dynamics of belief evolution and propagation in
a network where viewers act as two-way agents passing and
receiving information.
Finally, the role of education can be explained and studied with
the current model to some extent. Education can be considered
as a meta-function that skews viewers beliefs towards the truth
over time. Given the importance of education in the age of
social media and abundance of information, we believe that it
is essential to provide modeling tools for studying its role in
prevention of misinformation.
Fig. 3: Statistics of belief convergence of optimal report for
true information (blue) and random unauthentic information
(red), for uneducated audience (cid:107)¯µ − xs(cid:107) (cid:54) (cid:107)¯µ − xt(cid:107).
Figure 4 shows convergence trade-off conditioned on the fact
that average belief is farther to the source (false) information
than the truth (cid:107)¯µ − xs(cid:107) (cid:62) (cid:107)¯µ − xt(cid:107).
Fig. 4: Statistics of belief convergence of optimal report for
true information (blue) and random unauthentic information
(red), for educated audience (cid:107)¯µ − xs(cid:107) (cid:62) (cid:107)¯µ − xt(cid:107).
.
Finally, an example of network utility function for β =
1.6, dmin = 1.1 as a function of is shown in Figure 5.
Fig. 5: Example of network utilities for β = 1.6, dmin = 1.1.
criminal ecosystem on twitter," in Proceedings of the 21st international
conference on World Wide Web. ACM, 2012, pp. 71–80.
[27] C. Budak, D. Agrawal, and A. El Abbadi, "Limiting the spread of mis-
information in social networks," in Proceedings of the 20th international
conference on World wide web. ACM, 2011, pp. 665–674.
[28] N. P. Nguyen, G. Yan, M. T. Thai, and S. Eidenbenz, "Containment of
misinformation spread in online social networks," in Proceedings of the
4th Annual ACM Web Science Conference. ACM, 2012, pp. 213–222.
[29] H. Zhang, M. A. Alim, X. Li, M. T. Thai, and H. T. Nguyen, "Misinfor-
mation in online social networks: Detect them all with a limited budget,"
ACM Transactions on Information Systems (TOIS), vol. 34, no. 3, p. 18,
2016.
[30] A. Ehsanfar and M. Mansouri, "Incentivizing the dissemination of truth
versus fake news in social networks," in System of Systems Engineering
Conference (SoSE), 2017 12th.
IEEE, 2017, pp. 1–6.
[31] N. A. Abdullah, D. Nishioka, Y. Tanaka, and Y. Murayama, "User's
action and decision making of retweet messages towards reducing mis-
information spread during disaster," Journal of Information Processing,
vol. 23, no. 1, pp. 31–40, 2015.
[32] A. Chakraborty and B. Yolmaz, "Manipulation in market order models,"
Journal of financial Markets, vol. 7, no. 2, pp. 187–206, 2004.
[33] Chatterjea, Arkadev, and R. A. Jarrow, "Market manipulation, price
bubbles, and a model of the us treasury securities auction market,"
Journal of Financial and Quantitative Analysis, vol. 33, no. 2, pp. 255–
289, 1998.
[34] J.-L. Vila, "Simple games of market manipulation," Economics Letters,
vol. 29, no. 1, pp. 21–26, 1989.
[35] B. Biais, P. Hillion, and C. Spatt, "Price discovery and learning during
the preopening period in the paris bourse," Journal of Political Economy,
vol. 107, no. 6, pp. 1218–1248, 1999.
[36] D. P. Bertsekas, "Constrained optimization and lagrange multiplier
methods," Academic press, 2014.
REFERENCES
[1] A. Benham, E. Edwards, B. Fractenberg, L. Gordon-Murnane, C. Het-
herington, D. A. Liptak, M. Smith, C. Thompson, and A. P. Mintz, "Web
of deceit: Misinformation and manipulation in the age of social media,"
Information Today, Inc., 2012.
[2] H. Allcott and M. Gentzkow, "Social media and fake news in the 2016
election," Journal of Economic Perspectives, vol. 31, no. 2, pp. 211–36,
2017.
[3] H. Rashkin, E. Choi, J. Y. Jang, S. Volkova, and Y. Choi, "Truth of
varying shades: Analyzing language in fake news and political fact-
checking," Proceedings of the 2017 Conference on Empirical Methods
in Natural Language Processing, pp. 2931–2937, 2017.
[4] A. Kucharski, "Post-truth: Study epidemiology of fake news," Nature,
vol. 540, no. 7634, p. 525, 2016.
[5] H. Rainie, J. Q. Anderson, and J. Albright, "The future of free speech,
trolls, anonymity and fake news online," Washington, DC: Pew Research
Center, 2017.
[6] J. C. Olson and P. A. Dover, "Cognitive effects of deceptive advertising,"
Journal of Marketing Research, pp. 29–38, 1978.
[7] G. M. Armstrong, M. N. Gurol, and F. A. Russ, "Detecting and
correcting deceptive advertising," Journal of Consumer Research, vol. 6,
no. 3, pp. 237–246, 1979.
[8] S. Romani, "Price misleading advertising: effects on trustworthiness
toward the source of information and willingness to buy," Product and
Brand Management, vol. 15, no. 2, pp. 130–138, 2006.
[9] J. Richards, Deceptive advertising: Behavioral study of a legal concept.
Routledge, 2013.
[10] E. J. Lee, K. S. Eom, and K. S. Park, "Microstructure-based manipula-
tion: Strategic behavior and performance of spoofing traders," Journal
of Financial Markets, vol. 16, no. 2, pp. 227–252, 2013.
[11] P. Kollock, "The production of trust in online markets," Advances in
group processes, vol. 16, no. 1, pp. 99–123, 1999.
[12] P. W. Singer and A. Friedman, Cybersecurity: What everyone needs to
know. Oxford University Press, 2014.
[13] L. Huang, A. D. Joseph, B. Nelson, B. I. Rubinstein, and J. D. Tygar,
"Adversarial machine learning," in 43-85. ACM, 2011.
[14] M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar.,
"Can machine learning be secure?" in Proceedings of the 2006 ACM
Symposium on Information, computer and communications security,
2006, pp. 16–25.
[15] S. R. Knowlton and B. Reader, "Moral reasoning for journalists. santa
barbara," CA: Praeger, 2009.
[16] A. Day and E. Thompson, "Live from new york, it's the fake news!
saturday night live and the (non) politics of parody," Popular Commu-
nication, vol. 10, no. 1-2, pp. 170–182, 2012.
[17] L. Feldman, "The news about comedy: Young audiences, the daily show,
and evolving notions of journalism," Journalism, vol. 8, no. 4, pp. 406–
427, 2007.
[18] L. Sydell, "We tracked down a fake-news creator in the suburbs. heres
what we learned," National Public Radio 23, 2016.
[19] S. L. Borden and C. Tew, "The role of journalist and the performance
of journalism: Ethical lessons from fake news (seriously)," Journal of
Mass Media Ethics, vol. 22, no. 4, pp. 300–314, 2007.
[20] B. R. Lindsay, "Social media and disasters: Current uses, future options,
and policy considerations," 2011.
[21] C. Castillo, M. Mendoza, and B. Poblete, "Information credibility on
twitter," in Proceedings of the 20th international conference on World
wide web. ACM, 2011, pp. 675–684.
[22] A. Gupta and P. Kumaraguru, "Credibility ranking of tweets during
high impact events," in Proceedings of the 1st workshop on privacy
and security in online social media. ACM, 2012, p. 2.
[23] M. Gupta, P. Zhao, and J. Han, "Evaluating event credibility on twitter,"
in Proceedings of the 2012 SIAM International Conference on Data
Mining. SIAM, 2012, pp. 153–164.
[24] S. M. Shariff, X. Zhang, and M. Sanderson, "User perception of
Springer, 2014,
information credibility of news on twitter." in ECIR.
pp. 513–518.
[25] K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson, "Trafficking
fraudulent accounts: The role of the underground market in twitter spam
and abuse." in USENIX Security Symposium, 2013, pp. 195–210.
[26] C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu, "Analyzing
spammers' social networks for fun and profit: a case study of cyber
|
1709.08348 | 2 | 1709 | 2019-01-08T08:24:42 | SCube: A Tool for Segregation Discovery | [
"cs.SI",
"physics.soc-ph"
] | Segregation is the separation of social groups in the physical or in the online world. Segregation discovery consists of finding contexts of segregation. In the modern digital society, discovering segregation is challenging, due to the large amount and the variety of social data. We present a tool in support of segregation discovery from relational and graph data. The SCube system builds on attributed graph clustering and frequent itemset mining. It offers to the analyst a multi-dimensional segregation data cube for exploratory data analysis. The demonstration first guides the audience through the relevant social science concepts. Then, it focuses on scenarios around case studies of gender occupational segregation. Two real and large datasets about the boards of directors of Italian and Estonian companies will be explored in search of segregation contexts. The architecture of the SCube system and its computational efficiency challenges and solutions are discussed. | cs.SI | cs | SCube: A Tool for Segregation Discovery
Salvatore Ruggieri
Alessandro Baroni
University of Pisa, Italy
University of Pisa, Italy
[email protected]
[email protected]
9
1
0
2
n
a
J
8
]
I
S
.
s
c
[
2
v
8
4
3
8
0
.
9
0
7
1
:
v
i
X
r
a
ABSTRACT
Segregation is the separation of social groups in the physical or
in the online world. Segregation discovery consists of finding
contexts of segregation. In the modern digital society, discov-
ering segregation is challenging, due to the large amount and
the variety of social data. We present a tool in support of seg-
regation discovery from relational and graph data. The SCube
system builds on attributed graph clustering and frequent itemset
mining. It offers to the analyst a multi-dimensional segregation
data cube for exploratory data analysis. The demonstration first
guides the audience through the relevant social science concepts.
Then, it focuses on scenarios around case studies of gender oc-
cupational segregation. Two real and large datasets about the
boards of directors of Italian and Estonian companies will be
explored in search of segregation contexts. The architecture of
the SCube system and its computational efficiency challenges
and solutions are discussed.
1 SOCIAL SEGREGATION
Ethical issues in data and knowledge management are gaining
momentum in the last few years. In addition to the traditional
field of privacy, techniques for data analysis are being designed
or enhanced to take into account moral values such as fairness,
transparency, accountability, and diversity1. We have recentely
developed a novel data-driven technique for addressing segre-
gation of social groups through multi-dimensional data analysis
[4]. The approach is implemented in the SCube system, which
we propose to demonstrate using real case studies.
Social segregation refers to the "separation of socially defined
groups" [11]. People are partitioned into two or more groups
on the grounds of personal or cultural traits that can foster dis-
crimination, such as gender, age, ethnicity, income, skin color,
language, religion, political opinion, membership to a national mi-
nority, etc. Contact, communication, or interaction among groups
are limited by their physical, working or socio-economic distance.
This can be observed when dissecting society in organizational
units (neighborhoods, schools, job types). Due to the ubiquitous
presence and pervasiveness of ICT, segregation is shifting from
ancient forms of well explored spatial segregation2 to novel forms
of digital segregation. For instance, it has been warned that the fil-
ter bubble generated by personalization of online social networks
may foster idelogical segregation [6], opinion polarization [10],
and informational segregation. A data-driven technology that
enables the assessment of the extent, nature, and trends of social
segregation in the offline or online world, is of extreme interest
for a wide audience: social scientistics, public policy makers, reg-
ulation and control authorities, professional associations, civil
rights societies, and investigative journalists. Business decision
1See e.g., the Toronto declaration at www.accessnow.org/toronto-declaration.
2See census stats, e.g., www.census.gov/topics/housing/housing-patterns/data.html
© 2019 Copyright held by the owner/author(s). Published in Proceedings of the
22nd International Conference on Extending Database Technology (EDBT), March
26-29, 2019, ISBN 978-3-89318-081-3. on OpenProceedings.org.
Distribution of this paper is permitted under the terms of the Creative Commons
license CC-by-nc-nd 4.0.
region(CA)
south
north
∗
sex (SA) male
female
0.50
0.71
0.78
young
∗
0.46
0.62
0.83
0.35
0.50
0.43
-
0.88
-
-
0.30
0.30
0.59
0.57
0.22
0.67
0.88
0.86
0.66
0.56
0.76
-
0.75
0.75
-
0.71
0.71
∗
-
0.75
-
0.83
0.63
0.63
middle
elder
age (SA)
Figure 1: A segregation data cube with dissimilarity index.
makers should also care of business practices, particularly auto-
mated decision making, that segregate customers and products
through stereotypes, because this limits diversity and reduces
opportunities of cross-selling. Finally, data scientists and pro-
fessionals should be aware of the unintended consequences of
their models (recommender systems, link suggestion systems,
classifiers) on the cohesion of society at large.
2 SEGREGATION DISCOVERY
From a data analysis perspective, the key problem of assessing
social segregation has been investigated so far by hypothesis
testing, i.e., by formulating one or more possible contexts of seg-
regation against a certain social group, and then in empirically
testing such hypotheses. Such an approach is currently supported
by statistical tools, such as the R packages OasisR3 and seg4 [9],
or by GIS tools such as the Geo-Segregation Analyzer5 [2]. The
formulation of an hypothesis, however, is not straightforward,
and it is potentially biased by the expectations of the data analyst
of finding segregation in a certain context. In addition, explo-
ration of multiple hypothesis can be time consuming, since data
have to be processed multiple times. Finally, this approach is
subject to erroneous conclusions if data is considered at wrong
granularity -- an instance of the Simpson's paradox.
Multi-dimensional segregation data cube. Our approach
consists of providing the analysts with a multi-dimensional data
cube that can be explored in search of candidate contexts of
segregation. An example segregation data cube is shown in Fig.1.
Dimensions of the data cube include two types of attributes:
• segregation attributes (SA), such as sex, age, and ethnicity,
which denote (minority/protected) groups potentially ex-
posed to segregation;
• context attributes (CA), such as region and job type, which
denote contexts where segregation may appear.
Metrics of the data cube are chosen among the social science
indexes proposed for measuring the degree of segregation of
social groups within a society [12]. Here, we recall only one
such index, but the SCube system is parametric to the indexes
3cran.r-project.org/package=OasisR
4cran.r-project.org/package=seg
5geoseganalyzer.ucs.inrs.ca
(cid:12)(cid:12)(cid:12)
− ti − mi
T − M
D = 1
2
(cid:12)(cid:12)(cid:12)mi
M
n
i =1
and it computes 6 of them: dissimilarity, Gini, Information index,
Isolation, Interaction, Atkinson. Also, we restrict to binary groups
(minority/majority). LetT be the size of the total population under
consideration, 0 < M < T be the size of a minority group, T − M
the size of the rest of society (or majority group) and P = M/T
be the overall fraction of the minority group. Assume that there
are n organizational units (or simply, units -- such as schools,
neighboorhoods, job types, etc.), and that for i ∈ [1, n], ti is the
size of the population in unit i, and mi is the size of the minority
group in unit i. The dissimilarity index D measures the absolute
distance between the fractions of minority and majority groups
over the units:
D ranges over [0, 1], with higher values denoting higher segre-
gation. Dissimilarity is minimum when for all i ∈ [1, n], mi/ti =
M/T , namely the distribution of the minority group is uniform
over units. It is maximum when for all i ∈ [1, n], either mi = ti
or mi = 0, namely every unit includes members of only one
group (complete segregation). Dissimilarity and other segrega-
tion indexes can be interpreted as metrics in a cell of a multi-
dimensional cube as follows: set the total population as those
individuals that satisfy the CA coordinates of the cell; and, set
the minority population as those individuals that satisfy the SA
coordinates. For instance, the cube cell in Fig.1 with SA coordi-
nates sex=female, age=young and CA coordinates region=north
contains the dissimilarity index for the population living in the
north region and for the minority group of young women. Notice
that the number n of organizational units here have to be deter-
mined a-priori, while the total population and minority groups in
each unit depend on the values of cell coordinates. As in standard
multi-dimensional modelling [7], the special value "⋆" allows for
considering different granularities of analysis.
Segregation analysis of tabular data. We assume in input
a relational table with a tuple for every individual in the popula-
tion, including SA and CA attributes, and with a further attribute
unitID which denotes the unit an individual belongs to. Unfor-
tunately, segregation indexes are not additive metrics (see [4]).
This gives rise to the problem of efficiently computing a data
cube for segregation analysis. Our approach is more specialized
than generic holistic aggregate computation in datacubes [13].
We resort to frequent closed itemset mining [8]. Data cube co-
ordinates are encoded into itemsets of the form A, B, where A
denotes a minority subgroup and B denotes a context. Recalling
the previous example, A =sex=female, age=young defines the SA
coordinates, and B =region=north defines the CA coordinates.
The SegregationDataCubeBuilder algorithm described in [4] fills
data cube cells with the value of a segregation index by scanning
frequent closed itemsets of the form above. Since relational data
is transformed into transaction database for itemset mining, we
obtain for free that CA or SA attributes can be multi-valued,
e.g., to denote that an individual owns both a house and a car we
admit a relation tuple σ such that σ[owns] = {house, car}.
Segregation analysis of graph data. While transaction data-
bases are able to cover typical analysis from traditional social
science, they are not enough powerful to deal with social net-
work data. We formalize such a case using attributed graphs,
where nodes are assigned values on a specified set of attributes.
However, in this scenario, there is no a-priori defined notion of
organizational unit, i.e., the unitID attribute assumed in input
Figure 2: SCube architecture.
so far. Some forms of community discovery using graph cluster-
ing become necessary in order to determine the organizational
units. Clustering attributed graphs consists of partitioning them
into disjoint communities of nodes that are both well connected
and similar with respect to their attributes [5]. In summary, at-
tributed graph clustering can be used first to partition a social
network into communities. At this stage, every node/individual
in a community is described by its attributes and the community
id, which will be our unitID attribute. We have thus reduced the
problem to the analysis of relational data, for which the Segrega-
tionDataCubeBuilder algorithm can be applied.
Segregation analysis of bipartite graphs. An even more
complex scenario is when individuals are not connected among
them, e.g., because they are friends, but through a connection
with another entity, e.g., because they work in the same company.
Here, a form of projection on unipartite graph is needed to reduce
to the previous case. For instance, in [4], we adopt a bipartite
projection of the bipartite graph of directors and companies to
obtain a graph of companies connected by shared directors. Using
projection, we have reduced the problem to the previous case,
where attributed graph clustering can be adopted to find com-
munities of companies, which then represent the organizational
units for segregation analysis.
3 SCUBE ARCHITECTURE
The architecture of SCube is shown in Fig. 2. The system is
developed in Java, and it relies on a few state-of-the-art libraries6.
Inputs. The user has to provide features for two entities: in-
dividuals and groups. In the reference case studies, individuals
are directors and groups are companies. The input individuals
(a CSV file or a JDBC query) provides for each individual an ID
and a number of attribute values, distinguished into segregation
attributes (e.g., gender, age, birthplace) and context attributes
(e.g., residence). A second input groups provides for each group
an ID and a number of context attributes values (e.g., industrial
sector of a company and its headquarter location). Notice that
individuals are subjects to possible segregation, while groups are
6EWAH for compressed bitmaps (github.com/lemire/javaewah), Apache
POI for OOXML docs (poi.apache.org), Borgelt's FPGrowth for frequent
itemset mining (www.borgelt.net), FastUtil for graph storage (fastu-
til.di.unimi.it).
indexescubeGraph ClusteringTable BuilderGraph BuildernodeUnitgroupsfinalTable edgesSegregationData CubeBuilderdatesINPUTSOUTPUTisolatedVisualizerdatesmembershipindividuals scube.xlsxsegregation atts
age
15-38
39-46
55-65
...
birthplace
foreign
south
north
...
gender
M
F
M
...
residence
north
south
south
...
context atts
sector
{electricity, transports}
{education}
{agriculture}
...
unitID
1
2
1
...
Figure 3: The process of segregation discovery supported by SCube (left, top), input to SegregationDataCubeBuilder (left,
bottom), and an output report on dissimilarity segregation index of the Italian provinces (right).
not. For this reasons, groups have no SA feature. A third input
is membership, which includes the edges of the bipartite graph of
individuals and groups, i.e., all pairs (individualID, groupID) for
which the individual is related to the group. In our case studies,
directors are related to companies they sit in the board of. We
also admit that the pairs are labeled with a time interval of valid-
ity, thus allowing for temporal analysis of segregation. We have
such an information for the Estonian dataset. A fourth input is
a list of snapshot dates at which to consider snapshots of the
membership relation.
Modules. SCube consists of five software modules. Graph-
Builder projects the bipartite graph of individuals and groups into
an unipartite attributed graph, where nodes are groups and an
edge connect two groups if they are related by at least one shared
individual. In the case studies, nodes are companies, and edges
connect companies that share at least one director in their boards.
Edges are weighted by the number of shared directors. Graph-
Builder outputs edges of the projection (edges), and nodes that
have zero degree (isolated). The GraphClustering module com-
putes then a clustering of nodes into organizational units (output
file nodeUnit). Methods for clustering available in SCube include:
extraction of connected components (Breadth-First Search), re-
moval of edges from the giant component with weight below
a threshold and then extraction of connected components (de-
signed in [4]), and an attributed graph clustering method for very
large graphs (SToC algorithm [3]). In our case studies, the result
of GraphClustering is a partitioning of companies into clusters
based on connections among companies determined by shared di-
rectors -- which can be readily considered a signal of relationships
(business, personal, or other) between companies. Clusters repre-
sent the organizational units needed for computing segregation
indexes. TableBuilder joins features of individuals with features of
the companies in an organizational unit. This yields a finalTable
with a row per individual and organizational unit she belongs
to. An example is shown in Fig. 3 (left, bottom). This is the input
for the SegregationDataCube builder module, implementing the
algorithm of [4]. Notice that if the data under analysis contains
already the assignment of individuals to units, i.e., it is already
in the form of finalTable, the pre-processing steps of bipartite
projection and graph clustering do not need to be performed. The
Visualizer module transforms the extended datacube in output
of SegregationDataCube into a standard OOXML format that
can be opened by Microsoft Excel, Libre Office, and other office
productivity tools (see Fig. 5). Segregation data cube exploration
can be easily interfaced with visualization tools, as in the map
overlay in Fig. 3 (right).
Process, Wizard, and GUI. The whole process of segrega-
tion discovery supported by SCube is shown in Fig. 3 (left, top).
To facilitate the adoption of SCube by non-technical users, we
have developed two interfaces (see Fig. 4). The first one is a
standalone wizard that guides the user throughout all the steps
of the process, asking for inputs and parameters when appro-
priate, and finish launching Microsoft Excel or Libre Office on
the output file. Using popular desktop tools as GUI's makes
the learning curve of approaching and effectively using SCube
more manageable. The second one is a cloud service offered
by the SoBigDataLab freely accessible research infrastructure
(www.sobigdata.eu/access/virtual), a web front-end comprising
a catalogue of data, services, and virtual research environments
for big data and social mining research.
4 DEMONSTRATION SCENARIO
The demonstration starts with a brief introduction on concepts
and methods of segregation measurement [12] and segregation
discovery [4]. This provides the audience with the basic defi-
nitions for understanding the SCube functionalities. The archi-
tecture of SCube is presented next. For interested participants,
computational efficiency, algorithmic solutions, and source code
internal aspects are discussed. Then, two running case studies in
the context of occupational segregation in the boards of company
directors [1] are introduced. They are based on a 2012 snaphost
of Italian companies (3.6M directors, 2.15M companies), and on a
20-year long dataset of Estonian companies (440K directors, 340K
companies). Such anonymized datasets are the largest ever con-
sidered in the literature of segregation analysis. We summarize
the data pre-processing activities to produce the inputs for SCube.
The demonstration then proceeds by presenting three analysis
scenarios based on input data of increasing complexity. In all
scenarios, gender, age, and birthplace are used as segregation
attributes. The first scenario considers tabular data, where com-
pany sector is used as organizational unitID, and it is intended
Data Pre - processed Data ETL individualGroup . csv group . csv individual . csv finalTable . csv cube . csv Mining SCube cube . xlsx patterns Analysis Knowledge Figure 4: SCube standalone wizard (left) and SCube method at the SoBigData research infrastructure (right).
5 CONCLUSION
This demonstration illustrates the SCube tool for interactive ex-
ploration of social segregation indexes in large and complex data.
The audience is made aware of social exclusion issues that can be
hidden in data and of the indexes that measure segregation. Real
case studies on scenarios of increasing complexity are discussed
and explored. Efficiency issues and algorithmic solutions adopted
for scaling to large datasets and graphs are detailed.
Acknowledgements. This work is partially supported by the
European H2020 Program under the funding scheme "INFRAIA-
1-2014-2015: Research Infrastructures" grant agreement 654024
"SoBigData" (http://www.sobigdata.eu).
REFERENCES
[1] M. Aluchna and G. Aras, editors. Women on Corporate Boards. Routledge,
2018.
[2] P. Apparicio, J. C. Martori, A. L. Pearson, E. Fournier, and D. Apparicio. An
open-source software for calculating indices of urban residential segregation.
Social Science Computer Review, 32(1):117 -- 128, 2014.
[3] A. Baroni, A. Conte, M. Patrignani, and S. Ruggieri. Efficiently clustering very
large attributed graphs. In ASONAM, pages 369 -- 376. ACM, 2017.
[4] A. Baroni and S. Ruggieri. Segregation discovery in a social network of
companies. J. Intell. Inf. Syst., 51(1):71 -- 96, 2018.
[5] C. Bothorel, J. D. Cruz, M. Magnani, and B. Micenková. Clustering attributed
graphs: models, measures and methods. Network Science, 3(03):408 -- 444, 2015.
[6] S. Flaxman, S. Goel, and J. M. Rao. Filter bubbles, echo chambers, and online
news consumption. Public Opinion Quarterly, 80:298 -- 320, 2016. Available at
SSRN: http://ssrn.com/abstract=2363701.
[7] J. Gray, S. Chaudhuri, A. Bosworth, A. Layman, D. Reichart, M. Venkatrao,
F. Pellow, and H. Pirahesh. Data cube: A relational aggregation operator
generalizing group-by, cross-tab, and sub totals. Data Min. Knowl. Discov.,
1(1):29 -- 53, 1997.
[8] J. Han, H. Cheng, D. Xin, and X. Yan. Frequent pattern mining: Current status
and future directions. Data Min. Knowl. Discov., 15(1):55 -- 86, 2007.
[9] S.-Y. Hong, D. O'Sullivan, and Y. Sadahiro. Implementing spatial segregation
measures in R. PLoS ONE, 9(11):e113767, 2014.
Will
[10] M. Maes and L. Bischofberger.
line social networks foster opinion polarization?
http://ssrn.com/abstract=2553436, 2015.
the personalization of on-
Available at SSRN:
[11] D. S. Massey. Segregation and the perpetuation of disadvantage. The Oxford
Handbook of the Social Science of Poverty, pages 369 -- 393, 2016.
[12] D. S. Massey and N. A. Denton. The dimensions of residential segregation.
Social Forces, 67(2):281 -- 315, 1988.
[13] A. Nandi, C. Yu, P. Bohannon, and R. Ramakrishnan. Data cube materialization
and mining over mapreduce. IEEE Trans. Knowl. Data Eng., 24(10):1747 -- 1759,
2012.
Figure 5: Top: sample multidimensional segregation cube.
Bottom: radial plot of segregation indexes for directors in
each of the 20 Italian company sectors.
to answer questions such as: how much are women segregated
in company sectors? The second scenario considers attributed
graph data, where nodes are directors, and edges connect two
directors if they belong to a same company board. Here, the
organizational units are determined through clustering over at-
tributed graphs. This scenario can answer questions such as: how
much are women segregated in communities of connected direc-
tors? Finally, the third scenario considers a bipartite attributed
graph of directors and companies, as presented throughout the
paper. An example of question it can answer is: how much are
women segregated in communities of connected companies? For
each scenario, the output of SCube is interactively explored using
pivot tables and charts. The audience is guided to the discovery
of a few actual cases of a-priori unknown segregation contexts
and to the understanding of which attributes contribute the most
to segregation. Moreover, a cross-comparison of the Italian vs
Estonian segregation findings will be discussed.
|
1710.02475 | 3 | 1710 | 2019-11-22T19:23:01 | Creating Full Individual-level Location Timelines from Sparse Social Media Data | [
"cs.SI",
"cs.CY"
] | In many domain applications, a continuous timeline of human locations is critical; for example for understanding possible locations where a disease may spread, or the flow of traffic. While data sources such as GPS trackers or Call Data Records are temporally-rich, they are expensive, often not publicly available or garnered only in select locations, restricting their wide use. Conversely, geo-located social media data are publicly and freely available, but present challenges especially for full timeline inference due to their sparse nature. We propose a stochastic framework, Intermediate Location Computing (ILC) which uses prior knowledge about human mobility patterns to predict every missing location from an individual's social media timeline. We compare ILC with a state-of-the-art RNN baseline as well as methods that are optimized for next-location prediction only. For three major cities, ILC predicts the top 1 location for all missing locations in a timeline, at 1 and 2-hour resolution, with up to 77.2% accuracy (up to 6% better accuracy than all compared methods). Specifically, ILC also outperforms the RNN in settings of low data; both cases of very small number of users (under 50), as well as settings with more users, but with sparser timelines. In general, the RNN model needs a higher number of users to achieve the same performance as ILC. Overall, this work illustrates the tradeoff between prior knowledge of heuristics and more data, for an important societal problem of filling in entire timelines using freely available, but sparse social media data. | cs.SI | cs | Creating Full Individual-level Location Timelines from Sparse
Social Media Data
Nabeel Abdur Rehman
New York University
[email protected]
Kunal Relia
New York University
[email protected]
Rumi Chunara
New York University
[email protected]
9
1
0
2
v
o
N
2
2
]
I
S
.
s
c
[
3
v
5
7
4
2
0
.
0
1
7
1
:
v
i
X
r
a
ABSTRACT
In many domain applications, a continuous timeline of human lo-
cations is critical; for example for understanding possible locations
where a disease may spread, or the flow of traffic. While data sources
such as GPS trackers or Call Data Records are temporally-rich, they
are expensive, often not publicly available or garnered only in select
locations, restricting their wide use. Conversely, geo-located social
media data are publicly and freely available, but present challenges
especially for full timeline inference due to their sparse nature. We
propose a stochastic framework, Intermediate Location Computing
(ILC) which uses prior knowledge about human mobility patterns
to predict every missing location from an individual's social media
timeline. We compare ILC with a state-of-the-art RNN baseline as
well as methods that are optimized for next-location prediction
only. For three major cities, ILC predicts the top 1 location for all
missing locations in a timeline, at 1 and 2-hour resolution, with
up to 77.2% accuracy (up to 6% better accuracy than all compared
methods). Specifically, ILC also outperforms the RNN in settings
of low data; both cases of very small number of users (under 50),
as well as settings with more users, but with sparser timelines. In
general, the RNN model needs a higher number of users to achieve
the same performance as ILC. Overall, this work illustrates the
tradeoff between prior knowledge of heuristics and more data, for
an important societal problem of filling in entire timelines using
freely available, but sparse social media data.
CCS CONCEPTS
• Social and professional topics → User characteristics; • Ap-
plied computing → Law, social and behavioral sciences;
KEYWORDS
Spatial Information and Society, social media, sparse data
ACM Reference Format:
Nabeel Abdur Rehman, Kunal Relia, and Rumi Chunara. 2018. Creating
Full Individual-level Location Timelines from Sparse Social Media Data. In
26th ACM SIGSPATIAL International Conference on Advances in Geographic
Information Systems (SIGSPATIAL '18), November 6 -- 9, 2018, Seattle, WA, USA.
ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3274895.3274982
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
SIGSPATIAL '18, November 6 -- 9, 2018, Seattle, WA, USA
© 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM.
ACM ISBN 978-1-4503-5889-7/18/11...$15.00
https://doi.org/10.1145/3274895.3274982
1 INTRODUCTION
Using full location timelines (all locations an individual has been
to) is essential to many societal applications including transporta-
tion management [22, 23], urban sensing [18], event detection [1]
and infectious disease dynamics [39]. Combined with additional
information about individuals, location timelines have been used to
predict depressive moods [6], point-of-interest and location recom-
mendation [3, 43], the spread of diseases [25], and contact tracing
for hot spots of infectious diseases [37].
Data sparsity can become a major challenge when predicting full
timelines using publically available data, and can take two forms.
First, the number of users with enough data (full-timelines) to train
the model can be low. Second, increasing the number of users re-
sults in inclusion of users with extremely sparse location timelines.
Therefore, this problem of inference of complete location timelines
is inherently different from mobility prediction, which must priori-
tize accuracy of the prediction for the next location. Accordingly,
mobility prediction models are often built on data sources such as
travel surveys, Call Data Records (CDRs) and Global Positioning
System (GPS) trackers which are high-resolution (provide location
every few seconds or minutes). However, it is not realistic to have
such data in a broad array of contexts; the cost of collecting such
datasets, limited attributes associated with individual records, and
lack of public availability makes them unsuitable for carrying out
large-scale studies for a target population where the impact of lo-
cation over time is to be studied in relation to various secondary
issues. Further, in several emerging real-world modeling applica-
tions such as infectious disease transmission models, knowing a
person's location at such a high temporal frequency is unnecessary.
Instead, locations of where they travel to over the course of a day at
a lower resolution (such as every few hours), provide the relevant
insight [15]. Therefore, we focus on the challenging problem of
constructing the entire mobility timeline of an individual at equal
intervals of time from the geo-location associated with social media
data, which is generated at-will and therefore can be very sparse.
The main challenge here is that the data used is truly sparse in
relation to entire timelines; for example, in six months of social me-
dia sourced from the Twitter Application Programming Interface,
only 5.4% (which is what we use in this study) have a Tweet with
linked-location at each of the daytime hours in a day (independent
of day of the week, over all weeks in the six months). Further, we do
not assume any specific information such as from the text/content
of posts, or network of users is available. To overcome these chal-
lenges, we use several known heuristics about location visitation
patterns of individuals. We also combine patterns both from an
individuals' history, as well as leverage the patterns of similar com-
munity members [19, 32, 42]. Further, we relax criteria about day
and week-specificity of location patterns which enables us to use
SIGSPATIAL '18, November 6 -- 9, 2018, Seattle, WA, USA
Nabeel Abdur Rehman, Kunal Relia, and Rumi Chunara
and predict timelines from thousands of social media users with
such sparse data -- our method does not require rich training data
to learn complex patterns of mobility, and works for a realistic
number of users. Finally, our work does not assume any additional
information about the demographics, social networks or content of
tweets of users, allowing for the adoption in situations where such
additional data sources are not available. In accordance with the
sparse nature of the data, these combined approaches enable us to
infer multiple consecutive missing locations from a user's timeline,
and construct a continuous location timeline for individuals using
only sparse geo-tags from their Tweets.
We compare the performance of our model with several models
which, although optimized for next-location prediction, are state-
of-the-art, and show that intermediate location computing (ILC)
has increased accuracy for inferring entire timelines from sparse
data. In particular, while deep learning models have good predic-
tive accuracy, we investigate the tradeoff in performance based on
amount of sparsity, both in terms of number of users or amount
of data per user. By using readily available data to estimate a full
mobility timeline at relevant resolutions, this work opens many
new opportunities to understand and predict human movement for
many domain areas. To the best of our knowledge, this work is the
first to use sparse social media data to infer full individual-level
location timelines. The specific contributions of this work are:
• Developing a framework for filling in entire location time-
lines at reasonable time steps, with personalized forward
and backward timeline prediction.
• Prediction of the timeline from truly sparse, but freely avail-
able and easily accessible data; with smart use of community
data to improve timeline prediction when applicable.
• First use of deep learning for inferring timelines from sparse
data and assessment of amount of data needed for a deep
learning approach to surpass other models.
2 RELATED WORK
Here we summarize related work in two main categories to clarify
differences in data and methodological approaches in other work.
Geo-location data types and sparsity. As the goal of predicting
next location is different than the goal here, the types of data used
in such studies include smartphone data including GPS tracking,
Wi-Fi, Bluetooth and phone usage [11], partial GPS tracks from
automobiles [21], and Foursquare check-in data [30]. These mod-
els are generally designed for temporally rich data-sets and thus
assume that the training data is abundant and collected at frequent
time intervals. Even in the case of Foursquare data, though it can be
sparse, only dense sequences of data (minimum sequence length of
5 locations) have been used in predictive efforts [12]. Hence, studies
have been concerned with data collected at such densities, or small
time intervals (e.g. every 1, 15 or 30 minutes), and individual records
below a threshold number of data points are discarded from the
study entirely [5, 12, 14, 30, 33]. While this restriction increases
confidence in the stay duration of individuals at a location, this
typically (appropriately) limits the problem of prediction to only
a single missing location in the future. Given the inconsistency
of intervals between location tags in an individual's social media
timeline and lack of stay duration information, such models can not
directly be applied in the context of sparse social media data [38].
A method to capture daily habits of individuals using sparse data
has been proposed in [28] (varying the amount of phone GPS data
"seen" by the algorithm). However, the method initially requires
training on users with abundant data histories and hence cannot
be replicated with data sources such as from Twitter, where both
the training and testing datasets are sparse.
Broadly, related social media efforts have been focused on pre-
dicting the location of a given social media post, and not missing
locations from a timeline [19]. Such studies have also included
users with sufficient data and with certain assumptions (e.g. only
on those Twitter users who both themselves and their friends are
extremely active on Twitter, with at least 100 geo-tagged Tweets
in 1 month and assumes that once a user Tweets from a location,
they remain at that location until they Tweet again) [32]. Other
research which use social media in the domain of mobility focus
on Point-of-Interest (POI) and location recommendation, and pro-
vide the insight that similar user behavior can be useful [42]. This
method uses behavior of similar individuals and distances between
pairs of locations to predict the next POI location for an individual.
Thus we incorporate this feature of user similarity into the ILC
approach to address sparsity issues, and also compare our method
to the proposed method for full timeline inference.
Mobility sequence prediction methods. There are many model and
pattern based methods that have been used to infer movement of
individuals. While the focus of these methods has mainly been
to predict the next sequence of locations, and cannot be directly
compared to our goal of filling in an entire timeline, they have still
provided important knowledge about human mobility that can be
used in the timeline problem.
Several variations of Markov models, LZ predictors and pre-
diction by partial matching (PPM), as well as a non-linear spatio-
temporal prediction framework, have been investigated [2, 13, 14,
34, 36]. These methods focus on modeling the probability of visita-
tion to a future location by probability or frequency of past visits
and popular sequences in existing trajectories, each evaluating it's
performance on prediction of a next location. Although that is not
our goal, we can still make use of such probabilities in our data
by incorporating components of the basic Markov model into the
ILC model, though in a manner that promotes filling in all missing
data, not just next location prediction. Besides, we also explicitly
assess performance of each of these these methods on sparse social
media data in comparison to our proposed approach where possible,
including NextPlace non-linear predictor [34], Markov Order-0 and
Markov Order-1 models [36].
More recently, recursive neural networks (RNNs) have been used
to predict individual level mobility timelines [12, 27, 40]. RNN ar-
chitectures have been used to predict where a user will check-in
next [27] and for next location recommendation [40]. Another RNN
architecture to predict next location in the timeline of an individual
has been proposed in [12]. The model is again focused on predict-
ing next location more accurately, and incorporates modules in the
architecture in order to capture more complex multi-scale patterns.
As well, despite the fact that this work aims to predict location value
in a user's timeline when data is sparse, the work only focuses on
predicting the locations in the subset of timelines of users where
Creating Full Individual-level Location Timelines from Sparse Social Media Data SIGSPATIAL '18, November 6 -- 9, 2018, Seattle, WA, USA
Figure 1: A: Number of included Tweets by day of the week
(pink: weekdays, blue: weekends). B: Number of Tweets by
hour of day (pink: daytime, blue: nighttime). C: Frequency
distribution of total data points per user before filling in the
timeline. All graphs include all data from all 3 cities.
Figure 2: A&B: Frequency distribution of number of as-
signed locations over all values of k (closest hour of week)
for all posts per user (A: resolution ri = 1 hour, B: ri = 2). C&D:
Frequency distribution of number of assigned locations per
user over all values of h (closest hour of day) (C: ri = 1, D:
ri = 2). All graphs include data from all 3 cities (excluding
users who had no tweet in daytime hours). Users fulfilling
inclusion criteria are highlighted in pink.
richer data is available (described in the previous section), and does
not address the challenge of inferring the complete timeline of a
user. While these new methods provide a fresh approach to address-
ing the problem of mobility prediction by allowing the model to
learn different behaviors on its own as opposed to previous meth-
ods where the behaviors of individuals were manually specified,
they are not specifically tailored for predicting complete timelines.
However, given the potential for high performance of deep learning
models, we do assess what the tradeoff would be, for performance
on our task, in terms of data availability (e.g. with what amount
of data would a standard deep model perform better than a model
incorporating known movement heuristics a priori).
3 METHODS
3.1 Datasets
In order to obtain enough data for training and testing, we used 6
months of publicly available geo-located data from the Twitter API
(1st January -- 30th June 2014) for the cities of New York, Washing-
ton, DC and San Francisco. We collected all the Tweets containing
a 'point' geo-location within defined bounding boxes for all three
cities. The resulting data set consisted of 18,164,503 Tweets by
443,945 users from New York City, 3,385,308 Tweets by 125,873
users from Washington, DC and 1,817,411 Tweets by 111,441 users
from San Francisco.
3.2 Filtering and Preprocessing
Spoofed locations. We identified and excluded any Twitter
3.2.1
accounts that represented impossible movements based on Tweet
locations and times. A threshold speed of 0.5 miles/minute was used
to filter out such Tweets, based on previous work outlining realistic
movement patterns [24], and all accounts with more than 5% of
their Tweets violating the above criteria were excluded. A total of
16,582, 3,342 and 2,750 accounts (from each city, respectively) who
were removed due to having more than 5% of their Tweets marked
as coming from a spoofed location.
3.2.2 Grids. We assessed three grid sizes; 1 × 1, 0.5 × 0.5 and 0.1
× 0.1 miles. For each, we assigned every geo-located Tweet in the
dataset to a grid. These grid sizes are based on previous research
which has identified perception of how large a neighborhood bound-
ary is for temporary movements such as walking (1 mile) [29, 31].
Multiple grid sizes were added to assess the impact of grid size
on the performance of the method. A total of 841, 143 and 736
grids(grid size= 1 × 1 miles), 3,364, 572 and 2,944 grids (grid size=
0.5 × 0.5 miles) and, 84,100, 14,300 and 73,600 grids (grid size= 0.1
× 0.1 miles) were created for NYC, DC and SF respectively.
3.2.3 Temporal Sampling. Tweet timestamps were adjusted for
time zone and daylight savings. Included Tweets were distributed
across all days of the week evenly (Fig. 1A). For each individual
present in the dataset we created separate timelines at resolutions
of ri = 1 and 2 hours. Given the time stamp t of a Tweet, and value
ri, kw := (h, d)w , is computed where k is the closest sampled hour
at an interval of i hours from the start of the week, h is the closest
sampled hour at an interval of ri from the start of the day, d is the
day of the week and w is the week number since the start of the
data. For example, for ri = 1, the time of a Tweet made at t = 19 : 05
on Tuesday would be assigned k = 43 i.e 24+19 and (h, d) = (19, 2)
(assuming week starts on Monday). For ri = 2, for the same Tweet,
k = 22 i.e. 12 + 10 and (h, d) = (10, 2).
Stay Duration. To estimate the stay duration, we interpolated
3.2.4
data points from users who made consecutive tweets from the same
location within a 6-hour or shorter time period. The maximum value
of 6 hours for the interpolation was a conservative estimate chosen
based on research showing how long people generally remain in
their most visited locations, and that an individual generally spends
most of their time in most visited locations [8, 16, 20].
3.2.5 Home Location. Individuals are more likely to stay at their
home location for longer periods and individuals generally don't
change locations at night time [17]. Consistent with previous stud-
ies and Fig. 1B, we consider a location x as the home location of
an individual on a day of week d, if the individual most frequently
tweets from location x between 10 pm of the day of the week d and
051015MonTueWedThuFriSatSunDay of the WeekNumber of Tweets (X 100,000)A024605101520Hour of the DayNumber of Tweets (X 100,000)B012340100020003000Number Of Data PointsLog10 (Number of Users)C0100020003000255075100Number of assigned locations per user over all values of k (ri=1)Number of UsersA01000200030001020304050Number of assigned locations per user over all values of k (ri=2)Number of UsersB0204051015Number of assigned locations over all values of h (ri=1)Number of Users (X 1000)C020402468Number of assigned locations over all values of h (ri=2)Number of Users (X 1000)DSIGSPATIAL '18, November 6 -- 9, 2018, Seattle, WA, USA
Nabeel Abdur Rehman, Kunal Relia, and Rumi Chunara
8 am of the day of the week d+1. Given the sparse nature of the data,
for days of the week wherein an individual had no Tweets between
10 pm and 8 am, the home location was assigned where they most
frequently Tweeted from between 10 pm and 8 am, irrespective of
day of the week. We refer to points in an individual's timeline with
location information, either originally from a user or interpolated
from a home or stay duration, as assigned locations.
3.2.6 Personal vs Non-personal accounts. A Twitter account, e.g.
@SearchAmerican, that belongs to an organization, as opposed to
an individual, is likely to be used by multiple individuals in the
organization and hence does not represent the movement patterns
of a single individual. To examine the distribution of personal vs.
non-personal accounts in our dataset, we used Amazon Mechanical
Turk (AMT) labelling on 7,000 randomly selected accounts. Each
account label was manually annotated twice by AMT workers as ei-
ther personal or non-personal accounts. Accounts with conflicting
labels were annotated a third time through AMT and the maxi-
mum vote used. 98% of the 7000 randomly selected accounts were
identified as personal accounts. Cohen's kappa score of the annota-
tors was 93.0% [9]. Given the overwhelming majority of accounts
were identified as personal, it was assumed that most non-personal
accounts must have been removed during the 'spoofed location'
filtering stage. The 2% non-personal accounts from the 7,000 set
were removed from the study but it was deemed unnecessary to
label the remaining accounts. After this stage, no information (e.g.
the Twitter handle) which could link back to an individual Twitter
account holder was retained.
3.2.7 Description of Included Users. We define a relaxed inclusion
criteria to ensure that the performance of all methods is being tested
on users with sparse timelines. From here onward we define two
notations: xkw (u) is the assigned location for a user u, at time kw ,
with kw as above. kw can also be interchangeably written as (h, d)w ,
with h, d and w as above, or as q, which represents the index of kw
in the sampled timeline. Inclusion criteria were defined as follows:
given the timeline of a user, the user must have at least 1 assigned
location for each h during daytime hours (8am-10pm;non-nighttime
hours as defined in the section "Home Location"), irrespective of d
and w. This means that at a resolution of ri = 1 hour, all users were
included in our analysis who, after interpolation of stay duration
had at least 15 assigned location data points (8am-10pm) in the
entire duration of the dataset over all distinct h. For ri = 2, the
number was 8 assigned location data points. This resulted in 29,491,
4,947 and 1,119 users (ri = 1) and 45,710, 8,083 and 2,395 users (ri =2)
from New York, Washington, DC and San Francisco respectively.
Defining a relaxed inclusion criteria based on distinct h instead of
distinct k enabled us to include orders of magnitude more users
(Fig. 2) and allowed us to include up to 45% user (in NYC) who made
a tweet during daytime hours. The above selected users had on
average 82.8% (ri = 1) and 72.0% (ri = 2) of their daytime timelines
with no assigned location.
3.3 Individual Timelines
In this section, we first discuss prediction of a missing location in
a user's timeline at time k, if location information of the user is
available at both k + 1 and k − 1. As described in earlier work, the
movement of individuals is not entirely random and certain features
can be extracted to predict an individual's location based on his
past behavior [35]. Moreover, people often move in groups, and
individuals with similar interests follow similar movement patterns
[26]. Accordingly, here we model the behavior of individuals as
a combination of: i) personal behavior represented as (subscript
I), and ii) community behavior (subscript C). Personal behavior is
further modeled using three behaviors: i) Next Location subscript
(I , a), ii) Previous Location subscript (I , b), and iii) Independent
Location subscript (I , c). Each of these three behaviors are further
treated as either i) day of the week and hour of the day specific
(superscriptW S), ii) workday (weekday) or non-workday (weekend)
and hour of the day specific (superscript RS), and iii) only hour of
the day specific (superscript HS). These three stratifications were
created because of the extremely sparse nature of the dataset in
which we rarely observe users who have at least 1 location value
present for all days of the week and hours of the day. For the
following section we define: any P represents a list of locations
and their corresponding probabilities for a given user at a given
== j) thus represents the probability corresponding to
time. P(xkw
location j at time kw , and P(xkw ) represents the list of all possible
locations and their corresponding probabilities at time kw .
(u) is missing, and
3.3.1 Next Location. Given the location x(k +1)w
given the location xkw (u) = i, we calculate the conditional proba-
bilities of all the possible locations of a user u at time (k + 1)w . This
probability is calculated by taking into account that people often
follow specific patterns of mobility. For example, in the evening at
7pm, given that an individual is at a grocery store, the next loca-
tion of an individual will likely be his home. Given that the same
individual is at home at 7pm, the individual could either choose
to stay home or to go out (e.g. to a restaurant or bar). Given that
the time period is assumed to be 1 week, as contended in previous
work, these conditional probabilities are specific for each sampling
time on a given day and day of the week, irrespective of the date
[5]. Then, for all possible locations j, PW S(I,a)(x(k +1)w′ = j) of a user,
given xkw′ = i, is defined as:
(x(k +1)w
== i)
w
w
== j xkw
(xkw
== i)
For RS we calculate similar proportions, but relax the conditions
by additionally accounting for days which are of the same type,
i.e workday or non-workday, when calculating the proportions.
P RS(I,a)(x(h+1,d′)w′ = j) is thus defined as:
w
w
d =DT(d′)
(x(h+1,d)w
== j x(h,d)w
== i)
(x(h,d)w
d =DT(d′)
== i)
where DT(d′) returns the list of type of days i.e weekdays or
weekends, as d′. P H S(I,a) completely removes the condition of the
proportion being specific to the day of the week (instead of d =
DT(d′), we consider all d).
3.3.2 Previous Location. As a reciprocal of Next Location predic-
tion wherein we used xkw to predict x(k +1)w , here we predict xkw
conditioning over the location value at x(k +1)w . P RS(I,b) and P H S(I,b)
Creating Full Individual-level Location Timelines from Sparse Social Media Data SIGSPATIAL '18, November 6 -- 9, 2018, Seattle, WA, USA
are calculated similarly using relaxed conditions of day of the week,
as defined for P RS(I,a) and P H S(I,a).
Independent Location. Several locations which an individual
3.3.3
visit are specific to the day and time regardless of where the indi-
vidual is coming from or where they plan to go next. For example,
for a weekly meeting or a class at 11am on Tuesday, an individual
will be in the location of the meeting or the class irrespective of
his previous or next location. To incorporate these patterns, we
calculate probabilities for "Independent Location": the probability
of a user being in any location j at time k := (h, d), PW S(I,c). This
is defined as the proportion of times the user was at location j at
time k, in the dataset. P RS(I,c) of a user being in any location j at
time k := (h, d) is defined as the proportion of times the user was
at location j during hour h and days of the week similar to d i.e
(weekday or weekend). And, P H S(I,c) is defined as the proportion of
times the user was at location j during hour h in the dataset.
Combining lists of all probabilities in the individual's (W S) be-
havior gives:
PW S
I
= (λa ∗ PW S(I ,a) + λb ∗ PW S(I ,b) + PW S(I ,c))/3
where λa and λb are information loss factors defined later in the
Intermediate Location Computing section. Probabilities of visit to
each location, from all behaviors, are summed to generate a single
list of locations and their corresponding probabilities:
PI = (PW S
I
+ P RS
I
+ P H S
I
)/3
3.4 Community Behavior
Individuals with similar interests, or those working or living in the
same demographic have a higher chance of visiting similar locations
[5]. Hence, we maximize the use of the data by also including
information about individuals who have shown to follow similar
mobility patterns. For each individual, we identify individuals who
have similar mobility patterns, via a similarity factor. This factor,
s(u1, u2), is defined as the probability that another individual u2
will be in the same location as the individual under consideration
u1 at any given time:
w
k(xkw (u1) == xkw (u2))
k(!N U LL(xkw (u1))&!N U LL(xkw (u2)))
w
Using the similarity factor defined above, we calculated community
behavior (probability list for locations at a time k) using the top m
users in the dataset with the highest similarity factor for a given
individual via:
PC(xkw
= j) =
s(u) ∗ (xkw (u) == j)
m
u =1
Combining individual and community behavior then gives:
= j)
= j) = (1 − βk) ∗ PI(xkw
= j) + βk ∗ PC(xkw
P(xkw
where βk defines the hour and day of week specific effect of com-
munity behavior on an individual. To account for varying behavior
of an individual during a week, we generated separate lists of simi-
lar users for weekdays and weekends. We also examined a range of
values for m (0, 1, 2, 5, 10, 20, 50), to identify the minimum number
of similar users for maximizing prediction accuracy.
3.5 Intermediate Location Computing
Given the sparse nature of social media, in most instances there are
multiple consecutive missing location data points in an individual's
timeline. Thus the issue of predicting location at kw if either or both
(k +1)w and (k −1)w are missing will arise. Hence we introduce the
concept of Intermediate Location Computing. For simplicity, we
will only define the procedure to identify the intermediate location
at sampled time (k − 1)w (which is used to calculate of PW S(I,a)). A
similar approach can be used to identify the location at time (k +1)w
(which is used to calculate PW S(I,b)).
Broadly, our problem is that a location exists at time (k − n)w
such that no location data for an individual is present between kw
and (k − n)w . To address this, we use location data at (k − n)w
to iteratively predict intermediate locations of the individual at
times (k − n + 1)w until we reach (k − 1)w . We define the function
Inter(L1, L2), which for a specific time point, takes in two lists L1
and L2, and returns the location which has the maximum proba-
bility in list L1, and if no location exists, returns the location with
maximum probability in list L2. Here L1 is P(I,a) and L2 is P(I,c).
In simple terms, at each step, we first identify the most probable
location using Next Location. If no location data exists, we resort to
identifying the most probable location using Independent Location.
Given that locations at (k + 1)w and (k − 1)w predicted using
this method are only probable locations and successive predictions
will decrease certainty, we multiply by an information loss factor
λ to account for loss in information in calculating intermediate
locations. This factor λ is defined as: λ = (1 − α)(n−1), where n is
the number of steps required to reach the nearest available point
with an available location, and α is a constant information loss on
each step.
This approach to identify loss in information in sequential predic-
tors has been used in the past, particularly in dynamic belief models
[41]. The basic idea is that at each sequential prediction there is a
probability of α that the prediction will be incorrect. Iterating this
for a data point present n steps away makes the overall probability
of correct prediction (1 − α)(n−1). In the example given in Fig. 3,
when finally calculating the location at kw , given that the value of
n for the left side is 3, PW S(I,a) is multiplied by (1 − α)(3−1). Similarly
given that n for the right side is 2, PW S(I,b) is multiplied by (1−α)(2−1).
The example in Fig. 3 demonstrates the steps performed to compute
the intermediate locations for (W S). We use the same method to
calculate intermediate locations for (RS) and (HS) probabilities.
The complete method to construct complete mobility timeline of
a given user is summarized algorithm 1. In the algorithm, as defined
above, we replace kw with q, to represent the index of each time
step in the timeline. Further given a timeline T of an individual, the
location xq is the q element in T , i.e T[q].
3.6 Training and Testing Data and
Optimization
To select the training data for the entire prediction we, randomly
and uniformly across all distinct values of k, sampled 70% of the
data from each user. It should be noted that the test set contains
the 30% location data of each user which was not used in calcu-
lating the conditional probabilities or training the model. Further,
SIGSPATIAL '18, November 6 -- 9, 2018, Seattle, WA, USA
Nabeel Abdur Rehman, Kunal Relia, and Rumi Chunara
if NU LL(T S
end for
a [q − 1]), PS
I,a(xq))
I,a(xqxq−1 = T S
end for
for q in lenдth(T S
a ← T S
T S
for q in 1 : lenдth(T S
b ← T
if NU LL(T S
a ) do
a [q]) then
a [q] ← inter(PS
T S
end if
b ) : 1 do
b [q]) then
b [q] ← inter(PS
T S
end if
Algorithm 1 Constructing complete mobility timeline using ILC
Input: Timeline T of user u, community behavior, PC, of similar
users at each time step, effect of community behavior β and λa and
λb for each q
Output: Complete timeline Tcomplete
1: Tcomplete ← T
2:
3: for each behaviour S in [W S, RS, HS] do
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15: end for
16:
17: for each xq in T do
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
if NU LL(xq−1) then
I,a(xq) ← PS
PS
I,a(xq) ← PS
PS
end if
if NU LL(xq+1) then
I,b(xq) ← PS
PS
I,b(xq) ← PS
PS
end if
I (xq) = (λa ∗ PS(I,a)(xq) + λb ∗ PS(I,b)(xq) +
PS
PS(I,c)(xq))/3
I,b(xqxq+1 = T S
b [q + 1])
I,b(xqxq+1 = T[q + 1])
I,a(xqxq−1 = T S
a [q − 1])
I,a(xqxq−1 = T[q − 1])
for each behaviour S in [W S, RS, HS] do
I,b(xqxq+1 = T S
b [q + 1]), PS
I,a(xq))
if NU LL(xq) then
else
else
end for
PI = (PW S
I
Tcomplete[q] ← arд.max((1−βq)∗PI(xq)+βq∗PC(xq))
(xq) + P H S
I
(xq) + P RS
I
(xq))/3
31:
32:
33:
34:
35: end for
end if
Return Tcomplete
the data spans only the daytime hours wherein an individual is
changing location most frequently. The performance of the model
was calculated only on this test data as not to bias the performance
of the method towards sampled times where an individual is static
(nighttime hours).
Using the training data, we calculated PI and PC lists for every
individual, at each time resolution. These probabilities are then
used to optimize the value of βk and α. For simplicity, we optimize
a fixed value independent of a user or a sampling time for α, but βk
is user, day of the week and hour of the day specific as we would
Figure 3: Intermediate Location Computing algorithm illus-
tration. A: Timeline of an individual for a week w, between
k − 3 and k + 2. Location data for the individual is missing
for k − 2 to k + 1. Shaded area shows the location to be pre-
dicted. B: Intermediate locations (red) calculated after first
iteration. C: Intermediate locations after second iteration. D:
Effect of information loss on PW S(I,a) and PW S(I,b).
expect the contributions of community behavior to vary at different
times and for different people. To select the optimal values of βk,
we vary βk from 0 and 1 ( intervals of 0.05) and select the βk, for a
given k, that maximizes prediction accuracy on the training data. α
was optimized in a similar way, but only using PI (inclusion of PC
would have resulted in concurrent optimization of both α and βk).
The value of α as 0.1 performed well on the training set, and was
used in study.
3.7 Evaluation Versus Baseline Models
For fair comparison and to ensure that the variation in performance
is only due to the inference power of the models and not due to
variation in training data, all baseline models were trained using
the same training data for each user (post processed form of data)
as used for ILC, and the performance of the models was tested on
the same test set.
3.7.1 Home-Work location Model. It has been shown that periodic
behavior accounts for up to 70% of an individual's movement [7].
Given that the periodic behavior Hence, the first baseline model
assumes users follow a simple periodic behavior, switching be-
tween two locations: their inferred home and work locations. Using
the training dataset, we computed and assigned a single home
(nighttime) and a work (daytime) location for each individual by
identifying the most frequent location a user is present in between
10pm and 8am, and between 8am and 10pm.
3.7.2 Markov Models. Markov models have been widely used to
predict individual level mobility patterns [4, 36]. An Order-0 Markov
model identifies the most frequent location a user is in during a
given hour of the day, regardless of where the user came from or
is going[36]. The Order-1 Markov model, given the location x of
Creating Full Individual-level Location Timelines from Sparse Social Media Data SIGSPATIAL '18, November 6 -- 9, 2018, Seattle, WA, USA
an individual at time k, identifies the most frequent location the
individual visits at time k +1 if they were at x during time k. Due to
sparsity of data, multiple missing locations are predicted iteratively.
i.e. each subsequent location at k + n is predicted using the previ-
ously predicted location at k + n − 1. For fair comparison, we use a
fall-back version for both Markov models which first computes the
(W S) likelihoods. If no location data exists, the model falls back to
(RS) likelihood, and then to (HS) likelihood.
3.7.3 Collaborative Point-of-Interest Recommendation Model. The
Point of Interest (POI) recommendation model was initially pre-
sented in [42], to recommend locations of interests of individuals
using data from Location Based Social Networks (LBSNs). The
model, in addition to using geographical distance between loca-
tions, first identifies close users both based on the social network
(friends/followers) of an individual as well as those who follow
similar movement patterns, and uses their location to predict the
individuals location. In line with the conclusion of the original
work, that social ties are not strong predictors, and given that we
are not assuming that the location data for the social network of
individuals is available, we model the movement of an individual
using the geographical distances between locations and location
data of users who follow similar movement patterns. Geographical
influence is modelled based on a power-law distribution between
successive data points, while location of similar users is calculated
similar to the community behavior part of our method.
3.7.4 NextPlace: Spatio-Temporal Non-linear Model. This spatio-
temporal non-linear "NextPlace" prediction model uses a non-linear
framework for predictions and unlike Markov models, which pre-
dict the next location at time k + 1 using historical movement
patterns, or the community based methods, which use location data
of similar users, uses the history of trips to the same location to pre-
dict when an individual will be in the same location the next time.
[34] The method first identifies the start time and stay duration of
each trip, then embeds the timeseries in a multidimensional space
by adding multiple instances of the timeseries with delays to ac-
count for non-linearity. Then, the start times and stay durations of
the user's next visit are averaged to predict when and for how long
the next visit to the location will happen. In our implementation,
we used the delay as the smallest temporal unit in our study (i.e 1
and 2 hours for ri=1 and 2). Given the sparsity of data, we define the
start time when an individual makes a tweet from a location, and
stay duration is either inferred as described in the preprocessing
section of paper, or assumed to be either 1 or 2 hours based the
value of ri.
3.8 Recursive Neural Network
RNNs and specifically LSTMs (Long Short-Term Memory blocks)
have been gaining popularity due to their strength in identifying
and utilizing complex sequences of information to make future
predictions. For the domain of mobility prediction, this provides a
contrast to other work in which the heuristics for mobility mod-
elling are self specified. Hence, here we also study the utility of
an RNN architecture in constructing entire mobility timelines of
individuals in the context of sparse location data. Fig. 4 shows the
architecture of the network. We use a basic architecture, similar to
Figure 4: Architecture of Recursive Neural Network.
those used in previous mobility and sequence prediction work [12],
but adapted for full timeline location inference. Specifically, instead
of using separate inputs for current and historical trajectories of
location, due to the sparse nature of data we input a single trajec-
tory of all locations. Secondly and more importantly, here instead
of only using a historical sequence of locations (left padded input),
[x(k−n)w ,... x(k−2)w , x(k−1)w ] to predict xkw , we also use the fu-
ture sequence of location (right padded input), [x(k +1)w , x(k +2)w ,...
x(k +n)w ], to maximize the utility of sparsely available data and
predict a location value for ever missing time step (not just next
step). Thus, the architecture comprises of left and right padded
input layers which are fed to embedding layers to convert sparse
inputs into dense representations. The outputs from the embedding
layers are then input to recurrent units comprising of an array of
LSTM units. The LSTM outputs are then passed through a fully
connected layer and concatenated before being passed through a
fully connected layer to interpret the output and make prediction.
All fully connected layers use rectified linear unit activation except
for output layer which uses softmax activation. The model uses
categorical cross entropy loss function and uses Adam optimizer
to update weights in the network. The model is trained using the
training dataset. 10% of the training set is set aside for validation.
After each epoch, the performance of the model is tested on the
validation dataset. The training is stopped when no improvement
in prediction accuracy of validation data is observed. Though ar-
chitectures can be further augmented with other types of modules
to model further complexities, the comparison here is meant to
evaluate the pure heuristic versus deep learning approaches.
4 RESULTS
4.1 Comparative Performance of Methods
The ILC, RNN, Home-Work and Markov-0 models predicted a lo-
cation value for every missing data point in the dataset (Table 1).
Amongst the remaining methods, the NextPlace algorithm 'filled-in'
SIGSPATIAL '18, November 6 -- 9, 2018, Seattle, WA, USA
Nabeel Abdur Rehman, Kunal Relia, and Rumi Chunara
Table 1: Overall prediction accuracy (%) and average percentage of filled timelines(written in {}) for baseline models and Top 1
and Top 3 locations predicted by the intermediate location computing model.
ri
City
NYC ri=1
ri=2
ri=1
ri=2
ri=1
ri=2
DC
SF
Top 1
72.69{100}
64.78{100}
75.08{100}
68.85{100}
77.20{100}
70.78{100}
Top 3
82.35{100}
77.38{100}
83.61{100}
79.57{100}
86.28{100}
82.06{100}
RNN
73.09{100}
59.33{100}
74.58{100}
63.27{100}
76.26{100}
64.78{100}
Home-Work Markov O(0) Markov O(1)
26.39{32.70}
65.54{100}
32.56{48.69}
59.28{100}
27.75{32.29}
66.91{100}
34.13{48.79}
62.35{100}
67.74{100}
16.78{30.12}
19.52{43.72}
63.66{100}
64.65{100}
57.98{100}
65.76{100}
60.64{100}
67.21{100}
62.91{100}
POI
15.59{56.04}
19.11{76.75}
31.27{70.60}
34.56{82.56}
35.49{60.24}
32.69{67.69}
NextPlace
0.17{18.07}
0.21{28.93}
0.11{17.23}
0.19{28.36}
0.15{17.57}
0.22{28.50}
Table 2: Prediction accuracy (%) for Top 1 (T1) and Top 3 (T3)
locations predicted by the ILC model by grid size. (д) repre-
sents a grid size of д × д miles.
ri
City
NYC ri=1
ri=2
ri=1
ri=2
ri=1
ri=2
DC
SF
T1(0.5) T3(0.5) T1(0.1) T3(0.1)
65.64
59.29
67.32
60.19
70.86
63.37
64.07
57.96
64.10
58.23
67.26
59.81
54.23
46.06
54.27
46.85
57.37
48.07
75.71
71.65
77.65
72.59
80.97
75.47
Figure 5: Cumulative fraction of users vs. prediction accu-
racy for ILC and baseline models, ri = 1, (A) and 2 (B).
Figure 6: Prediction accuracy of ILC (no community data)
and RNN with number of users used to train the model for
NYC ri = 1. Values calculated at # of users=5,10,50,100,200 us-
ing mean of 10 replications. At ~50 users RNN performance
comes close to ILC, and by 200 users the RNN model sur-
passes ILC. Accuracy values for training with all available
users are in Table 1.
the least number of missing data points. ILC and RNN outperformed
all baseline models across all cities (Table 1).
For ri = 1, RNN slightly outperformed ILC in only NYC when
considering the overall performance of methods on test data points
(Table 1). When analyzing prediction accuracy per user in the test
set, RNN slightly outperformed ILC (Fig. 5). For ri = 2 ILC out-
performed RNN across all cities both when considering overall
accuracy on test data and accuracy per user. Additionally, for ri = 2,
despite RNN outperforming Home-Work location model when con-
sidering overall prediction accuracy on test data (Table 1), it per-
formed slightly worse than Home-Work location method when
considering accuracy per user (Fig. 5B).
Amongst the heuristic-based baseline models, simpler models
outperformed more complex models. This was mainly because they
were able to predict a location value for larger number of missing
data points. The Order-0 Markov and Home-Work location model
resulted in similar prediction accuracy and outperformed the re-
maining baseline models. In contrast to previous work, the Order-1
Markov model had a lower prediction accuracy as compared to
Order-0 Markov, largely because it was only able to predict a loca-
tion value for one-third of the data points in timelines at ri=1 and
one-half of the data points in timelines at ri=2. The time-dependent
POI recommendation model outperformed Order-1 Markov model
in SF and DC and underperformed in NYC. This is consistent with
the fact that as shown in Fig. 7B, SF and DC had higher similarity
between locations of individuals as compared to NYC. Additionally,
the POI model was able to predict a much larger portion of users'
timelines as compared to the Markov-1 model, yet accuracy values
for both methods were close. The NextPlace method based on a non-
linear spatio-temporal framework had the least predictive power
given the fact that it relies largely on stay duration information.
Given the lack of this information in social media, the model was
scarcely able to predict missing location values.
While the baseline heuristic based methods have been optimized
for different data types, in general, ILC specifically addresses the
challenge of sparse data by incorporating a wide range of com-
ponents. The simpler components help predict a location value
for each missing point, while the more complex components help
identify complex movement behaviours.
Comparing ILC with RNN shows that RNNs are powerful meth-
ods that can out perform traditional heuristic based methods. How-
ever, we see that in low data settings, heuristics can be used to
outperform the deep learning approach (e.g. when predicting at
less frequent time intervals, or when a lower number of users are
available to train the model). This is evident in Fig. 6, where despite
RNN outperforming ILC in NYC at ri = 1, if trained on a fewer
0.000.250.500.751.000.000.250.500.751.00AccuracyFraction of UsersAMethodNextPlaceMarkov−1POI Recomm.Markov−0Home−WorkRNNILC0.000.250.500.751.000.000.250.500.751.00AccuracyFraction of UsersB020406080050100150200Number of usersAccuracy in %ModelRNNILC w/o communityCreating Full Individual-level Location Timelines from Sparse Social Media Data SIGSPATIAL '18, November 6 -- 9, 2018, Seattle, WA, USA
Figure 7: A: Prediction accuracy (%) vs. number of similar
users (m). Model based on individual and community behav-
ior (black), and community behavior only i.e β = 1 (red).
All values were computed for ri = 2 and using Washington,
DC data. B: Aggregated similarity factors of closest users
u=1 s(u)) vs. fraction of users by city. X-axis normalized by
dividing by the maximum aggregated similarity factor for a
user in the dataset.
(m
number of users, it under performs. Also in Fig. 5 we see that the
RNN requires data from more users to achieve the same accuracy as
ILC, when considering ri=2. However with increases in the amount
of training data, the RNN outperforms ILC. This is due to the fact
that this implementation of ILC only uses a maximum sequence
length of two time steps, RNNs can learn larger and more complex
sequences of locations. Additionally RNNs can also learn longer
sequences of location data of similar users and help improve pre-
diction. Decision between selecting one over the other is based on
the goal of the study and the availability of data. If sparse data for a
large number of users is available, then an RNN approach should be
preferred. But if the goal of the study is to maximize the number of
users for which complete timelines can be constructed by sampling
their locations at less frequent time intervals, or if the number of
available users is low, then a heuristic based method like ILC should
be preferred given that it does not need data to learn patterns.
4.2 Effect of Community Behavior
We found that the effect of community behavior is consistently
higher on an individual's mobility patterns during weekends as
compared to weekdays (βk higher on weekends across all cities and
ri). The average value for βk during weekdays ranged from 0.449
(NYC, ri =1) to 0.466 (DC, ri=2), while during weekends ranged
from 0.456 (NYC, ri =1) to 0.492 (DC, ri=2).
We observe that inclusion of community data helps the perfor-
mance of the method and the main improvement is seen when
the first similar user is accounted for (Fig. 7A). Moreover, after m
= 20, accuracy improvements begin to plateau with more m (the
inclusion of m closest individuals to compute community behavior
will work best for individuals who have high similarity values with
other individuals and are not outliers in terms of their mobility)
justifying the use of m = 50 in our method.
Figure 8: A: Prediction accuracy (%) for Top 1 vs. number of
distinct locations visited for ri = 1 (A) and 2 (B).
uncertainty . Similar trend is observed for RNN as increase in ri
from 1 to 2 hours decreases the overall training data for the model.
Fig. 8 shows prediction accuracy versus the number of distinct
locations grids by individuals, for 1, and 2-hour resolutions; accu-
racy decreases with an increase in the number of distinct location
grids visited by an individual. The fitted line is generated using a
generalized additive model (GAM).
5 CONCLUSION
In this paper, we present a method for predicting missing locations
from an individual's mobility timeline with good accuracy, using
only sparse location tags from social media data. In order to address
the challenge of sparse data, the model uses several heuristics of
human movement and incorporates similar user data. The proposed
approach consistently outperforms baseline heuristic based meth-
ods across data from three major cities, showing stability of the
approach. We also show how ILC fulfills timeline prediction better
than an RNN in sparse data settings, though use of heuristics should
be incorporated into the RNN architecture design in future work
to further advance the approach.
We recognize limitations of this work. Predictions for an individ-
ual can be biased based on their Tweeting patterns (which can be
specific to the types of people who use Twitter), although the incor-
poration of community behavior helps minimize this bias. Second,
even though our work advances previous work by predicting full
timelines for a large number of users, there are still many users for
whom the location cannot be predicted by our model. Hence, despite
the generalizability of the method and the dataset, the methodology
will not be accurate for every single user. Third, here ILC only uses
one location point in the past i.e k − 1 to predict the location at k
due to the sparse nature of the data and prioritization of filling in
the timeline, but we can expand the approach to use the sequence
of n locations in the past to predict the next location, with more
complex considerations. Overall, this research demonstrates a new
approach for the specific problem of filling in location timelines
from sparse social media data, without assuming any information
besides location data is available. The result can be used in many
real-world applications that require location timelines.
4.3 Performance of ILC in Different Settings
We observe that for ILC performance decreases as the interval (ri)
increases from 1 to 2 hours (Table 1), and as the grid size decreases
(Table 2), which is inline with the findings of [10] that at larger
time intervals and smaller grid sizes there is a higher associated
ACKNOWLEDGMENTS
Support for this project was provided in part by a grant from the
National Science Foundation (1737987). We acknowledge Prof. Ju-
liana Freire of New York University and her group for assistance
with data.
020406001020304050Number of similar usersAccuracy in %A0.000.250.500.751.000.000.250.500.751.00Normalized SimilarityFraction of UsersBcityDCNYCSF0.000.250.500.751.0002040Distinct location grids visitedAccuracy in %A0.000.250.500.751.0002040Distinct location grids visitedAccuracy in %BSIGSPATIAL '18, November 6 -- 9, 2018, Seattle, WA, USA
Nabeel Abdur Rehman, Kunal Relia, and Rumi Chunara
REFERENCES
[1] Shunsuke Aoki, Kaoru Sezaki, Nicholas Jing Yuan, and Xing Xie. 2017. An Early
Event Detection Technique with Bus GPS Data. In Proceedings of the 25th ACM
SIGSPATIAL International Conference on Advances in Geographic Information
Systems. ACM, 49.
[2] Akinori Asahara, Kishiko Maruyama, and Ryosuke Shibasaki. 2012. A mixed
autoregressive hidden-markov-chain model applied to people's movements. In
Proceedings of the 20th international conference on advances in geographic infor-
mation systems. ACM, 414 -- 417.
[3] Jie Bao, Yu Zheng, and Mohamed F Mokbel. 2012. Location-based and preference-
aware recommendation using sparse geo-social networking data. In Proceedings
of the 20th international conference on advances in geographic information systems.
ACM, 199 -- 208.
[4] Mitra Baratchi, Nirvana Meratnia, Paul JM Havinga, Andrew K Skidmore, and
Bert AKG Toxopeus. 2014. A hierarchical hidden semi-Markov model for model-
ing mobility data. In Proceedings of the 2014 ACM International Joint Conference
on Pervasive and Ubiquitous Computing. ACM, 401 -- 412.
[5] Francesco Calabrese, Giusy Di Lorenzo, and Carlo Ratti. 2010. Human mobility
prediction based on individual and collective geographical preferences. In Intelli-
gent Transportation Systems (ITSC), 2010 13th International IEEE Conference on.
IEEE, 312 -- 317.
[6] Luca Canzian and Mirco Musolesi. 2015. Trajectories of depression: unobtrusive
monitoring of depressive states by means of smartphone mobility traces analysis.
In Proceedings of the 2015 ACM international joint conference on pervasive and
ubiquitous computing. ACM, 1293 -- 1304.
[7] Eunjoon Cho, Seth A Myers, and Jure Leskovec. 2011. Friendship and mobility:
user movement in location-based social networks. In Proceedings of the 17th ACM
SIGKDD international conference on Knowledge discovery and data mining. ACM,
1082 -- 1090.
[8] Yohan Chon, Hyojeong Shin, Elmurod Talipov, and Hojung Cha. 2012. Evaluating
mobility models for temporal prediction with high-granularity mobility data.
In Pervasive computing and communications (PerCom), 2012 IEEE international
conference on. IEEE, 206 -- 212.
[9] Jacob Cohen. 1968. Weighted kappa: Nominal scale agreement provision for
scaled disagreement or partial credit. Psychological bulletin 70, 4 (1968), 213.
[10] Andrea Cuttone, Sune Lehmann, and Marta C González. 2018. Understanding
Predictability and Exploration in Human Mobility. EPJ Data Science (2018).
[11] Trinh Minh Tri Do and Daniel Gatica-Perez. 2012. Contextual conditional models
for smartphone-based human mobility prediction. In Proceedings of the 2012 ACM
conference on ubiquitous computing. ACM, 163 -- 172.
[12] Jie Feng, Yong Li, Chao Zhang, Funing Sun, Fanchao Meng, Ang Guo, and Depeng
Jin. 2018. DeepMove: Predicting Human Mobility with Attentional Recurrent
Networks. In Proceedings of the 2018 World Wide Web Conference on World Wide
Web. International World Wide Web Conferences Steering Committee, 1459 --
1468.
[13] Sébastien Gambs, Marc-Olivier Killijian, and Miguel Núñez del Prado Cortez.
2010. Show me how you move and I will tell you who you are. In Proceedings of
the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS
and LBS. ACM, 34 -- 41.
[14] Sébastien Gambs, Marc-Olivier Killijian, and Miguel Núñez del Prado Cortez.
2012. Next place prediction using mobility markov chains. In Proceedings of the
First Workshop on Measurement, Privacy, and Mobility. ACM, 3.
[15] M. C. Gonzalez, C. A. Hidalgo, and A. L. Barabasi. 2008. Understanding individual
human mobility patterns. Nature 453, 7196 (2008), 779 -- 82. https://doi.org/10.
1038/nature06958
[16] Samiul Hasan, Christian M Schneider, Satish V Ukkusuri, and Marta C GonzÃąlez.
2013. Spatiotemporal patterns of urban human mobility. Journal of Statistical
Physics 151, 1-2 (2013), 304 -- 318.
[17] Nabil Hossain, Tianran Hu, Roghayeh Feizi, Ann Marie White, Jiebo Luo, and
Henry A Kautz. 2016. Precise Localization of Homes and Activities: Detecting
Drinking-While-Tweeting Patterns in Communities.. In ICWSM. 587 -- 590.
[18] Shenggong Ji, Yu Zheng, and Tianrui Li. 2016. Urban sensing based on human mo-
bility. In Proceedings of the 2016 ACM International Joint Conference on Pervasive
and Ubiquitous Computing. ACM, 1040 -- 1051.
[19] David Jurgens, Tyler Finethy, James McCorriston, Yi Tian Xu, and Derek Ruths.
2015. Geolocation Prediction in Twitter Using Social Networks: A Critical Anal-
ysis and Review of Current Practice. ICWSM 15 (2015), 188 -- 197.
[20] Daniel Kahneman, Alan B Krueger, David A Schkade, Norbert Schwarz, and
Arthur A Stone. 2004. A survey method for characterizing daily life experience:
The day reconstruction method. Science 306, 5702 (2004), 1776 -- 1780.
[21] John Krumm and Eric Horvitz. 2006. Predestination: Inferring destinations from
partial trajectories. UbiComp 2006: Ubiquitous Computing (2006), 243 -- 260.
[22] Yang Li, Dimitrios Gunopulos, Cewu Lu, and Leonidas Guibas. 2017. Urban Travel
Time Prediction using a Small Number of GPS Floating Cars. In Proceedings of
the 25th ACM SIGSPATIAL International Conference on Advances in Geographic
Information Systems. ACM, 3.
[23] L. Liao, D. J. Patterson, D. Fox, and H. Kautz. 2007. Learning and inferring
transportation routines. Artificial Intelligence 171, 5-6 (2007), 311 -- 331. https:
//doi.org/10.1016/j.artint.2007.01.006
[24] Todd Litman. 2003. Measuring transportation: traffic, mobility and accessibility.
Institute of Transportation Engineers. ITE Journal 73, 10 (2003), 28.
[25] Jiajun Liu, Kun Zhao, Saeed Khan, Mark Cameron, and Raja Jurdak. 2015. Multi-
scale population and mobility estimation with geo-tagged tweets. In Data En-
gineering Workshops (ICDEW), 2015 31st IEEE International Conference on. IEEE,
83 -- 86.
[26] Liang Liu, Anyang Hou, Assaf Biderman, Carlo Ratti, and Jun Chen. 2009. Under-
standing individual and collective mobility patterns from smart card records: A
case study in Shenzhen. In Intelligent Transportation Systems, 2009. ITSC'09. 12th
International IEEE Conference On. IEEE, 1 -- 6.
[27] Qiang Liu, Shu Wu, Liang Wang, and Tieniu Tan. 2016. Predicting the Next
Location: A Recurrent Model with Spatial and Temporal Contexts.. In AAAI.
194 -- 200.
[28] James McInerney, Jiangchuan Zheng, Alex Rogers, and Nicholas R Jennings. 2013.
Modelling heterogeneous location habits in human populations for location
prediction under data sparsity. In Proceedings of the 2013 ACM international joint
conference on Pervasive and ubiquitous computing. ACM, 469 -- 478.
[29] Anne Vernez Moudon, Chanam Lee, Allen D Cheadle, Cheza Garvin, Donna
Johnson, Thomas L Schmid, Robert D Weathers, and Lin Lin. 2006. Operational
definitions of walkable neighborhood: theoretical and empirical insights. Journal
of Physical Activity & Health 3 (2006), S99.
[30] Anastasios Noulas, Salvatore Scellato, Neal Lathia, and Cecilia Mascolo. 2012.
Mining user mobility features for next place prediction in location-based services.
In Data mining (ICDM), 2012 IEEE 12th international conference on. IEEE, 1038 --
1043.
[31] Andrew Rundle, Kathryn M Neckerman, Lance Freeman, Gina S Lovasi, Marnie
Purciel, James Quinn, Catherine Richards, Neelanjan Sircar, and Christopher
Weiss. 2009. Neighborhood food environment and walkability predict obesity in
New York City. Environmental health perspectives 117, 3 (2009), 442.
[32] Adam Sadilek, Henry Kautz, and Jeffrey P Bigham. 2012. Finding your friends and
following them to where you are. In Proceedings of the fifth ACM international
conference on Web search and data mining. ACM, 723 -- 732.
[33] Adam Sadilek and John Krumm. 2012. Far Out: Predicting Long-Term Human
Motivations and Recent Changes.. In ICWSM. 250 -- 259.
[39] A. Wesolowski, T. Qureshi, M. F. Boni, P. R. Sundsoy, M. A. Johansson, S. B.
Rasheed, K. Engo-Monsen, and C. O. Buckee. 2015. Impact of human mobility on
the emergence of dengue epidemics in Pakistan. Proc Natl Acad Sci U S A 112, 38
(2015), 11887 -- 92. https://doi.org/10.1073/pnas.1504964112
[40] Cheng Yang, Maosong Sun, Wayne Xin Zhao, Zhiyuan Liu, and Edward Y Chang.
2017. A Neural Network Approach to Jointly Modeling Social Networks and
Mobile Trajectories. ACM Transactions on Information Systems (TOIS) 35, 4 (2017),
36.
[41] A. J. Yu and J. D. Cohen. 2008. Sequential effects: Superstition or rational behavior?
Adv Neural Inf Process Syst 21 (2008), 1873 -- 1880. https://www.ncbi.nlm.nih.gov/
pubmed/26412953
[42] Quan Yuan, Gao Cong, Zongyang Ma, Aixin Sun, and Nadia Magnenat Thalmann.
2013. Time-aware point-of-interest recommendation. In Proceedings of the 36th
international ACM SIGIR conference on Research and development in information
retrieval. ACM, 363 -- 372.
[43] Jia-Dong Zhang, Chi-Yin Chow, and Yanhua Li. 2014. Lore: Exploiting sequential
influence for location recommendations. In Proceedings of the 22nd ACM SIGSPA-
TIAL International Conference on Advances in Geographic Information Systems.
ACM, 103 -- 112.
Mobility.. In AAAI.
[34] S. Scellato, M. Musolesi, C. Mascolo, V. Latora, and A. T. Campbell. 2011.
NextPlace: A Spatio-temporal Prediction Framework for Pervasive Systems. Per-
vasive Computing 6696 (2011), 152 -- 169. <GotoISI>://WOS:000305891700010
[35] C. M. Song, Z. H. Qu, N. Blumm, and A. L. Barabasi. 2010. Limits of Predictability
in Human Mobility. Science 327, 5968 (2010), 1018 -- 1021. https://doi.org/10.1126/
science.1177170
[36] L. B. Song, D. Kotz, R. Jain, and X. N. He. 2006. Evaluating next-cell predictors
with extensive Wi-Fi mobility data. Ieee Transactions on Mobile Computing 5, 12
(2006), 1633 -- 1649. <GotoISI>://WOS:000241195600001
[37] Roberto CSNP Souza, Renato M Assunção, Derick M de Oliveira, Denise EF de
Brito, and Wagner Meira Jr. 2016. Infection Hot Spot Mining from Social Media
Trajectories. In Joint European Conference on Machine Learning and Knowledge
Discovery in Databases. Springer, 739 -- 755.
[38] Dan Tasse, Zichen Liu, Alex Sciuto, and Jason I Hong. 2017. State of the Geotags:
|
1606.08927 | 1 | 1606 | 2016-06-29T01:04:29 | Least Cost Influence Maximization Across Multiple Social Networks | [
"cs.SI",
"physics.soc-ph"
] | Recently in Online Social Networks (OSNs), the Least Cost Influence (LCI) problem has become one of the central research topics. It aims at identifying a minimum number of seed users who can trigger a wide cascade of information propagation. Most of existing literature investigated the LCI problem only based on an individual network. However, nowadays users often join several OSNs such that information could be spread across different networks simultaneously. Therefore, in order to obtain the best set of seed users, it is crucial to consider the role of overlapping users under this circumstances.
In this article, we propose a unified framework to represent and analyze the influence diffusion in multiplex networks. More specifically, we tackle the LCI problem by mapping a set of networks into a single one via lossless and lossy coupling schemes. The lossless coupling scheme preserves all properties of original networks to achieve high quality solutions, while the lossy coupling scheme offers an attractive alternative when the running time and memory consumption are of primary concern. Various experiments conducted on both real and synthesized datasets have validated the effectiveness of the coupling schemes, which also provide some interesting insights into the process of influence propagation in multiplex networks. | cs.SI | cs |
Least Cost Influence Maximization Across Multiple Social Networks
1
Huiyuan Zhang, Dung T. Nguyen, Soham Das, Huiling Zhang and My T. Thai
Department of Computer and Information Science and Engineering
University of Florida, Gainesville, Florida 32611
Email: {huiyuan, dtnguyen, sdas, huiling, mythai}@cise.ufl.edu
Abstract
Recently in Online Social Networks (OSNs), the Least Cost Influence (LCI) problem has become
one of the central research topics. It aims at identifying a minimum number of seed users who can
trigger a wide cascade of information propagation. Most of existing literature investigated the LCI
problem only based on an individual network. However, nowadays users often join several OSNs such
that information could be spread across different networks simultaneously. Therefore, in order to obtain
the best set of seed users, it is crucial to consider the role of overlapping users under this circumstances.
In this article, we propose a unified framework to represent and analyze the influence diffusion
in multiplex networks. More specifically, we tackle the LCI problem by mapping a set of networks
into a single one via lossless and lossy coupling schemes. The lossless coupling scheme preserves
all properties of original networks to achieve high quality solutions, while the lossy coupling scheme
offers an attractive alternative when the running time and memory consumption are of primary concern.
Various experiments conducted on both real and synthesized datasets have validated the effectiveness
of the coupling schemes, which also provide some interesting insights into the process of influence
propagation in multiplex networks.
Coupling, multiple networks, influence propagation, online social networks
Index Terms
I. INTRODUCTION
In the recent decade, the popularity of online social networks, such as Facebook, Google+,
Myspace and Twitter etc., has created a new major communication medium and formed a
promising landscape for information sharing and discovery. On average [1], Facebook users
spend 7 hours and 45 minutes per person per month on interacting with their friends ; 3.2 billion
likes and comments are posted every day on Facebook; 340 million tweets are sent out everyday
on Twitter. Such engagement of online users fertilizes the land for information propagation to a
degree which has never been achieved before in the mass media. More importantly, OSNs also
inherit one of the major properties of real social networks – the word-of-mouth effect, in which
personal opinion or decision can be reshaped or reformed through influence from friends and
colleagues. Recently, motivated by the significant effect of viral marketing, OSNs have been the
most attractive platforms to increase brand awareness of new products as well as strengthen the
relationship between customers and companies. In general, the ultimate goal is to find the least
advertising cost set of users which can trigger a massive influence.
Along with the fast development of all existing OSNs, there have been quite a number of
users who maintain several accounts simultaneously, which allow them to propagate information
This article has been published in IEEE/ACM Transactions on Networking, 24(2), 929-939, March 12, 2015, DOI:
10.1109/TNET.2015.2394793. Copyright (c) 2015 IEEE. Personal use of this material is permitted. Permission from IEEE
must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising
or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted
component of this work in other works. H. Zhang and D. T. Dung are co-first authors of this work.
2
(a) Auto post from Facebook to Twitter (b) Auto post from Twitter to Facebook
Fig. 1.
Information propagation across social networks
(c) The number of shared users between
major OSNs in 2009 [2]
across different networks. For example, Jack, a user of both Twitter and Facebook, knew a
new book from Twitter. After reading it, he found it very interesting and shared this book with
friends in Facebook as well as Twitter. This can be done by configuring both of the accounts
to allow automatically posting across different social networks. As a consequence, the product
information is exposed to his friends and further spreads out on both networks. If we only focus
on an individual network, the spread of the information is estimated inaccurately. As shown
in Fig. 1, the fraction of overlapping users is considerable. Therefore considering the influence
only in one network fails to identify the most influential users, which motivates us to study the
problem in multiplex networks where the influence of users is evaluated based on all OSNs in
which they participate.
Related works. Nearly all the existing works studied different variants of the least cost influence
problem on a single network. Kempe et al. [10] first formulated the influence maximization
problem which asks to find a set of k users who can maximize the influence. The influence is
propagated based on a stochastic process called Independent Cascade Model (IC) in which a user
will influence his friends with probability proportional to the strength of their friendship. The
author proved that the problem is NP-hard and proposed a greedy algorithm with approximation
ratio of (1−1/e). After that, a considerable number of works studied and designed new algorithms
for the problem variants on the same or extended models such as [6], [14], [15], [17]. There are
also works on the linear threshold (LT) model for influence propagation in which a user will
adopt the new product when the total influence of his friends surpass some threshold. Dinh et
al [7] proved the inapproximability as well as proposed efficient algorithms for this problem on
a special case of LT model. In their model, the influence between users is uniform and a user
is influenced if a certain fraction ρ of his friends are active.
Recently, researchers have started to explore multiplex networks with works of Yagan et al.
[16] and Liu et al. [11] which studied the connection between offline and online networks. The
first work investigated the outbreak of information using the SIR model on random networks.
The second one analyzed networks formed by online interactions and offline events. The authors
focused on understanding the flow of information and network clustering but not solving the
least cost influence problem. Additionally, these works did not study any specific optimization
problem of viral marketing. Shen et al. [14] explored the information propagation in multiplex
3
online social networks taking into account the interest and engagement of users. The authors
combined all networks into one network by representing an overlapping user as a super node.
This method cannot preserve the individual networks' properties.
In this article, we studies the LCI problem which aims at finding a set of users with minimum
cardinality to influence a certain fraction of users in multiplex networks. Due to the complex
diffusion process in multiplex networks, it is difficult to develop the solution by directly extending
previous solutions in a single network. Additionally, studying the problem in multiplex networks
introduces several new challenges: (1) how to accurately evaluate the influence of overlapping
users; (2) in which network, a user is easier to be influenced; (3) which network propagates the
influence better. To answer above questions, we first introduce a model representation to illustrate
how information propagate in multiplex networks via coupling schemes. By mapping multiple
networks into one network, different coupling schemes can preserve partial or full properties
of the original networks. After that, we can exploit existing solutions on a single network to
solve the problem in multiplex networks. Moreover, through comprehensive experiments, we
have validated the effectiveness of the coupling schemes, and also provide some interesting
insights into the process of influence propagation in multiplex networks. Our main contributions
are summarized as follows:
• Propose a model representation via various coupling schemes to reduce the problem in
multiplex networks to an equivalent problem on a single network. The proposed coupling
schemes can be applied for most popular diffusion models including: linear threshold model,
stochastic threshold model and independent cascading model.
• Provide a scalable greedy algorithm to solve the LCI problem. Especially, the improvement
factor scales up with the size of the network which allows the algorithm to run on very
large networks with millions of nodes.
• Conduct extensive experiments on both real and synthesized datasets. The results show that
considering multiplex networks instead of a single network can effectively choose the most
influential users.
The rest of the paper is organized as follows. In Section II, we present the influence propagation
model in multiplex networks and define the problem. The lossless and lossy coupling schemes are
introduced in Section IV and Section V. A scalable greedy algorithm is proposed in Section VI.
Section VII shows the experimental results on the performance of different algorithms and
coupling schemes. Finally, Section VIII concludes the paper.
A. Graph notations
II. MODEL AND PROBLEM DEFINITION
We consider k networks G1, G2, . . . , Gk, each of which is modeled as a weighted directed
graph Gi = (V i, Ei, θi, W i). The vertex set V i = {u's} represents the participation of ni = V i
users in the network Gi, and the edge set Ei = {(u, v)'s} contains mi = Ei oriented connections
(e.g., friendships or relationships) among network users. W i = {wi(u, v)'s} is the (normalized)
weight function associated to all edges in the ith network. In our model, weight wi(u, v) can also
interpreted as the strength of influence (or the strength of the relationship) a user u has on another
user v in the ith network. The sets of incoming and outgoing neighbors of vertex u in network Gi
are denoted by N i−
u , respectively. In addition, each user u is associated with a threshold
θi(u) indicating the persistence of his opinions. The higher θi(u) is, the more unlikely that u
will be influenced by the opinions of his friends. Furthermore, the users that actively participate
u and N i+
in multiple networks are referred to as overlapping users and can be identified using methods in
4
[3], [9] (Note that identifying overlapping users is not the focus of this paper). Those users are
considered as bridge users for information propagation across networks. Finally, we denote by
G1...k the system consisting of k networks, and by U the exhaustive set of all users U = ∪k
i=1V i.
B. Influence Propagation Model
We first describe the Linear Threshold (LT) model [7], a popular model for studying informa-
tion and influence diffusion in a single network, and then discuss how LT model can be extended
to cope with multiplex networks. In the classic LT model, each node u can be either active or
inactive: u is in an active state if it is selected into the seed set, or the total influence from the
in-degree neighbors exceeds its threshold θ(u), i.e, Pv∈N (u) w(v, u) ≥ θ(u). Otherwise, u is in
an inactive state.
In multiplex network system, given a number of k networks, the information is propagated
separately in each network and can only flows to other networks via the overlapping users. The
information starts to spread out from a set of seed users S i.e. all users in S are active and the
remaining users are inactive. At time t, a user u becomes active if the total influence from its
active neighbors surpasses its threshold in some network i.e. there exists i such that:
X
v∈N i−
u ,v∈A
wi(v, u) ≥ θi(u)
where A is the set of active users after time (t − 1).
In each time step, some of inactive users become activated and try to influence other users
in the next time step. The process terminates until no more inactive users can be activated. If
we limit the propagation time to d, then the process will stop after t = d time steps. The set
of active users in time d is denoted as Ad(G1...k, S). Note that d is also the number of hops
up to which the influence can be propagated from the seed set, so d is called the number of
propagation hops.
C. Problem definition
In this paper, we address the fundamental problem of viral marketing in multiplex networks:
the Least Cost Influence problem. The problem asks to find a seed set of minimum cardinality
which influences a large fraction of users.
Definition 1. (Least Cost Influence (LCI) Problem) Given a system of k networks G1...k with
the set of users U, a positive integer d, and 0 < β ≤ 1, the LCI problem asks to find a seed set
S ⊂ U of minimum cardinality such that the number of active users after d hops according to
LT model is at least β fraction of users i.e. Ad(G1...k, S) ≥ βU.
When k = 1, we have the variant of the problem on a single network which is NP-hard to
solve [5], Dinh et al. [7] proved the inapproximability and proposed an algorithm for a special
case when the influence between users is uniform and a user is activated if a certain fraction ρ of
his friends are active. In the following sections, we will present different coupling strategies to
reduce the problem in multiplex networks to the problem in a single network in order to utilize
the algorithm design.
III. COUPLING SCHEME
5
A coupling scheme is an approach to project multiple networks to a single network, which can
preserve important network information and reproduce the diffusion process from each individual
network. Such a scheme will facilitate researchers to study various optimization problems that
relate to the diffusion of information on multiple networks. In general, we can mitigate these
problems to the one defined on single network and apply existing solutions to solve them. Next
we specify the requirements for such schemes and the general framework.
A. Coupling scheme general framework
Our goal is to map multiple networks into a single network such that a diffusion process on
multiple networks can be simulated by a process on the projected network. Two most important
points are: (1) which user is active and (2) when a user is activated. Formally, a coupling scheme
that maps a system of networks G1...k with the set of users U to a network G = (V, E) needs
to satisfy following requirements:
(1) There exists a set of nodes U ⊆ V and bijection function that maps users to nodes in the
coupled network: F : U → U.
(2) There exists a time mapping function T : N → N.
(3) User u ∈ U is activated at time t on G1...k iff F (u) is activated at time T (t) on G.
The first constraint reserves the identity of users in the coupled network. The second constraint
allows us the know when a user is activated. The last constraint guarantees that the diffusion
process is preserved, i.e., the diffusion of information on the set of user U is the same on the
set of nodes U. This is the core part of the couple scheme and may be difficult to achieve. Since
the main goal is to construct a solution to the studied problem on multiple networks from the
solution on single network, we can relax the last condition such as u ∈ U is activated at time t
on G1...k if F (u) is activated at time T (t) on G. In this case, the diffusion information is not
totally reserved. The coupling scheme is called lossless coupling scheme if the last condition is
satisfied and lossy coupling scheme otherwise.
Since our main concern is the diffusion of information among users, such coupling scheme
reserve most of the properties of the diffusion process. It helps to answer following questions:
• When a node becomes active?
• How many nodes are activated at a specific time?
• Who are top influencers in the multiple networks?
Another important aspect of the coupling scheme is the activation state of nodes in V \ U.
In some optimization problems, the fraction of active nodes plays an important role. Thus, it is
desirable for the coupling scheme to reserve the fraction of active nodes or the scale-up property.
Definition 2 (Scale-up Property). A coupling scheme is said to have scale-up property if there
exists a constant c = c(G1...k) such that there is cK active nodes on G iff there is K active
users on G1...k.
B. General framework to solve some optimization problems
With the coupling scheme, if we only consider the set of users and its mapped set on the
coupled network, the diffusion process is the same on these two sets. Thus, we can design algo-
rithms to solve various information diffusion optimization problems on multiple networks such
as Influence Maximization problem [10], Limiting the misinformation problem [4], Minimum
Influential Node Selection problem [18], etc, by the following framework: (1) Create a coupled
network following a coupling scheme, (2) Use an algorithm for the studied problem on single
6
networks to identify the set of selected nodes, (3) Use the F function to determine the set of
selected users from the set of selected nodes on the coupled network.
Algorithm 1 General Framework
Input: A set of users U, a system of networks G1...k, and an algorithm A.
Output: A solution S ⊂ U
G ← The coupled network of G1...k
C ← Set of selected users provided by A on G
S ← F (C)
Return I
IV. LOSSLESS COUPLING SCHEMES
In this section, we present the lossless scheme to couple multiple networks into a new single
network with respect to the influence diffusion process on each participant network. A notable
advantage of this newly coupled graph is that we can use any existing algorithm on a single
network to produce the solution in multiplex networks with the same quality.
A. Clique lossless coupling scheme
1, ui
p to ui
2, . . . , ui
In LT-model, the first issue is solved by introducing dummy nodes for each user u in networks
that it does not belong to. These dummy nodes are isolated. Now the vertex set V i of ith network
can be represented by V i = {ui
n} where U = {u1, u2, . . . , un} is the set of all users.
p is called the representative vertex of up in network Gi. In the new representation, there is
ui
an edge from ui
q if up and uq are connected in Gi. Now we can union all k networks
to form a new network G. The approach to overcome the second challenge is to allow nodes
u1, u2, . . . , uk of a user u to influence each other e.g. adding edge (ui, uj) with weight θ(uj).
When ui is influenced, uj is also influenced in the next time step as they are actually a single
overlapping user u, thus the information is transferred from network Gi to Gj. But an emerged
problem is that the information is delayed when it is transferred between two networks. Right
after being activated, ui will influence its neighbors while uj needs one more time step before
it starts to influence its neighbors. It would be better if both ui and uj start to influence their
neighbors in the same time. For this reason, new gateway vertex u0 is added to G such that both
ui and uj can only influence other vertices through u0. In particular, all edges (ui, vi) ((uj, zj))
will be replaced by edges (u0, vi) ((u0, zj)). In addition, more edges are added between u0, ui,
and uj to let them influence each other, since the connection between gateway and representative
vertices of the same user forms a clique, so we call it clique lossless coupling scheme. After
forming the topology of the coupled network, we assign edge weights and vertex thresholds as
following:
Vertex thresholds. All dummy vertices and gateway vertices have the threshold of 1. Any
remaining representative vertex ui
p has the same threshold as up in Gi, i.e., θ(ui
p) = θi(up).
Edge weights. If there is an edge between user u and v in Gi, then the edge (u0, vi) has weight
w(u0, vi) = wi(u, v). The edges between gateway and representative vertices of the same user
u are assigned as w(ui, uj) = θ(uj), ∀ 0 ≤ i, j ≤ k, i 6= j to synchronize their state together.
A simple example of the clique lossless coupling scheme is illustrated in Fig. 2.
7
0.4
0.2
0.5
0.1
0.2
0.7
0.3
0.2
0.6
0.5
0.6
0.5
0.1
0.5
0.1
0.3
0.4
0.2
0.9
0.5
G1
G2
G3
Facebook
Twitter
Foursquare
(a) An instance of multiplex networks with 4 users. Each user is
represented by vertices of the same color with different thresholds in
different networks e.g. green user has thresholds of 0.3 and 0.2 in G2
and G3.
!"#$!%&vertex
'#()#*#+"!",-#&vertex
Dummy ertex
1
1
0.3
0.6
0.5
G2
Twitter
0.6
1
0.4
1
0.7
0.1
0.5
0.2
1
0.2
G1
Facebook
0.5
1
0.1
0.5
0.2
1
1
1
0.9
0.3
0.4
1
G3
0.1
0.2
0.5
Foursquare
0.6
0.7
0.6
0.6
1
0.7
1
0.7
1
0.5
0.7
0.6
0.5
0.5
1
0.5
(b) The influence of gateway vertices on represenative vertices
represent the influence between users in multiplex networks.
(c) The connection between gateway and repre-
sentative vertices of the same user.
Fig. 2. An example of the clique lossless coupling scheme.
Next we will show that the propagation process in the original multiplex networks and the
coupled network is actually the same. Influence is alternatively propagated between gateway and
representative vertices, so the problem with d hops in the multiplex networks is equivalent to
the problem with 2d hops in the coupled network.
Lemma 1. Suppose that the propagation process in the coupled network G starts from the
seed set which contains only gateway vertices S = {s0
p}, then representative vertices are
activated only at even propagation hops.
1, . . . , s0
Proof. Suppose that a gateway vertex u0 is the first gateway vertex that is activated at the odd
hops 2d + 1. u0 must be activated by some vertex ui and ui is the first activated vertex among
vertices u1, u2, . . . , uk. It means that ui is activated in hop 2d. Since all incoming neighbors of
ui are gateway vertices, some gateway vertex becomes active in hop 2d − 1 (contradiction).
Lemma 2. Suppose that the propagation process on G1...k and G starts from the same seed set
S, then following conditions are equivalent:
(1) User u is active after d propagation hops in G1...k.
(2) There exists i such that ui is active after 2d − 1 propagation hops in G.
(3) Vertex u0 is active after 2d propagation hops in G.
Proof. We will prove this lemma by induction. Suppose it is correct for any 1 ≤ d ≤ t, we need
8
to prove it is correct for d = t + 1. Denote A1...k(t) and A(t) as the set of active users and active
vertices after t propagation hops in G1...k and G, respectively.
(1) ⇒ (2): If user u is active at time t + 1 in G1...k, it must be activated in some network Gj.
We have:
X
v∈N j−
u ∩A1...k(t)
wj(v, u) ≥ θj(u)
Due to the induction assumption, for each v ∈ A1...k(t), we also have v0 ∈ A(2t) in G. Thus:
X
uj ∩A(2t)
v0∈N −
w(v0, uj) = X
u ∩A1...k(t)
v∈N j−
= θ(uj)
wj(v, u) ≥ θj(u)
It means that uj is active after (2(t + 1) − 1) propagation hops.
(2) ⇒ (3): If there exists i such that ui is active after 2(t + 1) − 1 propagation hops on G,
then ui will activate u0 in hop 2(t + 1)
(3) ⇒ (1): Suppose that u0 /∈ S is active after 2(t + 1) propagation hops in G, then there
exists uj which activates u0 before. This is equivalent to:
X
uj ,v∈A(2t)
v∈N −
w(v, uj) ≥ θ(uj)
For each v ∈ A(2t), we also have v ∈ A1...k(t). Replace this into the above inequality we
have:
X
v∈N j−
u ∩A1...k(t)
wj(v, u) = X
v0∈N −
uj ∩A(2t)
w(v0, uj)
Thus, u is active in network Gj after t + 1 hops.
Next, we will show that the number of influenced vertices in the coupled network is (k + 1)
≥ θ(uj) = θj(u)
times the number of influenced users in multiplex networks as stated in Theorem 1.
Theorem 1. Given a system of k networks G1...k with the user set U, the coupled network G
produced by the lossless coupling scheme, and a seed set S = {s1, s2, . . . , sp}, if Ad(G1...k, S)
= {a1, a2, . . . , aq} is the set of active users caused by S after d propagation hops in multiplex
networks, then A2d(G, S) = {a0
q } is the set of active vertices caused
by S after 2d propagation hops in the coupled network.
Proof. For each user ai ∈ Ad(G1...k, S) i.e. ai is active after d hops in G1...k, then there exists aj
which is active after 2d − 1 hops in G according to the Lemma 2. As a result, all a0
i , . . . , ak
are active after 2d hops. So B = {a0
1, . . . , ak
Let consider a vertex of A2d(G, S) which is:
Case 1. A gateway vertex u0 which is active after 2d hops in G, so vertex u must be active
q } ⊆ A2d(G, S).
1, . . ., a0
q, a1
1, a1
1, . . . , ak
q, . . . , ak
1, . . ., a0
q, a1
q, . . . , ak
1, a1
i , a1
i
i
after d hops in G1...k. This implies u ∈ Ad(G1...k, S), thus u0 ∈ B.
Case 2. An representative vertex ui. If ui is active after 2d − 1 hops, then u must be active
after d hops due to Lemma 2, thus u ∈ Ad(G1...k, S). Otherwise, ui is activated at hop 2d , it
must be activated by some vertex uj, j > 0 since all gateway vertices only change their state at
even hops. Again, u ∈ Ad(G1...k, S). This results in ui ∈ B.
9
From two above cases, we also have A2d(G, S) ⊆ B. So that A2d(G, S) = B, the proof is
completed.
Theorem 1 provides the basis to derive the solution for LCI in multiplex networks from the
solution on a single network. It implies an important algorithmic property of the lossless coupling
scheme regarding the relationship between the solutions of LCI in G1...k and G. The equivalence
of two solutions is stated below:
Theorem 2. When the lossless scheme is used, the set S = {s1, s2, . . . , sp} influences β fraction
of users in G1...k after d propagation hops if and only if S′ = {s0
p} influences β
fraction of vertices in coupled network G after 2d propagation hops.
2, . . . , s0
1, s0
Size of the coupled network. Each user u has k + 1 corresponding vertices u0, u1, . . . , uk in
the coupled network, thus the number of vertices is V = (k + 1)U = (k + 1)n. The number of
edges equals the total number of edges from all input networks plus the number of new edges
for synchronizing. Thus the total number of edges is E = Pk
B. Star lossless coupling scheme
i=1 Ei + nk(k + 1).
In last subsection, we discussed the clique lossless coupling scheme, however, in this scheme,
the number of edges to synchronize the state of vertices u0, u1, . . . , uk is added up to k(k + 1)
for each user u, which results in nk(k + 1) extra edges in the coupled network. In real networks,
the number of edges is often linear to the number of vertices, while the number of extra edges
greatly increases the size of the coupled network, especially when k is large. Therefore, we
would like to design another synchronization strategy that has less additional edges.
0.7
0.6
0.5
0.7
0.5
0.6
1
1
1
1
1
1
1
Fig. 3. Synchronization of star lossless coupling scheme.
Note that the large volume of extra edges is due to the direct synchronization between each pair
of representative vertices of u in clique lossless coupling scheme, so we can reduce it by using
indirect synchronization. In the new coupling scheme, we create one intermediate vertex uk+1
with threshold θ(uk+1) = 1 and let the active state propagate from any vertex in u1, u2, . . . , uk via
this vertex. Specifically, the synchronization edges are established as follows: w(ui, uk+1) = 1
and w(uk+1, ui) = θ(ui) 1 ≤ i ≤ k; w(uk+1, u0) = w(u0, uk+1) = 1. The synchronization
strategy of star lossless coupling scheme is illustrated in Fig. 3. Now, the number of extra edge
for each user is 2(k +1) and the size of the coupled network is reduced as shown in the following
proposition.
i=1 Ei + 2n(k + 1) edges.
Proposition 1. When star lossless scheme is used, the coupled network has V = (k + 2)U =
10
(k + 2)n vertices and E = Pk
In star lossless coupling scheme, it takes 2 hops to synchronize the states of representative
vertices of each user which leads to delaying the propagation of influence in the coupled network.
Due to the similarity between star lossless scheme and clique lossless scheme, we state the
following property of star lossless scheme without proof.
Theorem 3. When star lossless coupling scheme is used, the set S = {s1, s2, . . . , sp} influences β
fraction of users in G1...k after d propagation hops if and only if S′ = {s0
p} influences
β fraction of vertices in coupled network G after 3d propagation hops.
2, . . . , s0
1, s0
C. Reduced lossless schemes
In all above coupling schemes, we create representative vertices in all networks in G1...k to
guarantee that the number of influenced vertices in the coupled network is scaled up from the
number of influenced users in the original system of networks. This creates an extraordinary
redundant vertices. For example, we have n users and 4 networks with 0.8n, 0.6n, 0.3n, 0.2n
users, then the total number of vertices in all network is only 1.9n while the number of vertices
created in clique lossless scheme and star lossless scheme are 5n and 6n, respectively. The
redundant ratios of these two schemes are 260 % and 315 %. To overcome this redundant, we
use assign weight for vertices in the coupled network and guarantee that the total weight of
active vertices is scaled from the number of active users in the original system. In particular,
we only create representative vertices ui1, ui2, . . . , uip for user u where Gi1, Gi2, . . . , Gip are
networks that u joins in. Each representative vertex is assigned weight 1, and the user vertex is
assigned weight k − p. We have reduced clique lossless scheme or reduced star lossless scheme
corresponding the method to synchronize the state of user and representative vertices is clique
or star type. With this modification, the number of extra vertices is only n and 2n when clique
and star synchronization is used, respectively. The number of extra edges now depends on the
participants of users.
Proposition 2. When reduced clique lossless scheme or reduced star lossless scheme is used,
the coupled network has V = Pk
The relation between the a set of active vertices in coupled network and the set of active users
in original networks is similar to previous schemes. We state this relation without proof below.
Theorem 4. When reduced clique lossless scheme (reduced star lossless scheme) is used, the
set S = {s1, s2, . . . , sp} influences β fraction of users in G1...k after d propagation hops if and
only if the total weight of active vertices caused by S′ = {s0
p} after 2d (3d) hops in
coupled network G is β fraction of the total weight of all vertices.
i=1 V i + n or V = Pk
i=1 V i + 2n vertices, respectively.
2, . . . , s0
1, s0
D. Extensions to other diffusion models
In this section, we show that we can design lossless coupling schemes for some other well-
known diffusion models in each component network. As a result, top influential users can be
identified under these diffusion models. In particular, we investigate two most popular stochastic
diffusion models which are Stochastic Threshold and Independent Cascading models [10].
• Stochastic Threshold model. This model is similar to the Linear Threshold model but the
threshold θi(ui) of each node ui of Gi is a random value in the range [0, Θi(ui)]. Node ui
will be influenced when Pvi∈N −
ui ,v∈A wi(vi, ui) ≥ θi(ui)
• Independent Cascading model. In this model, there are only edge weights representing the
11
influence between users. Once node ui of Gi is influenced, it has a single chance to influence
its neighbor vi ∈ N +(ui) with probability wi(ui, vi).
For both models, we use the same approach of using gateway vertices, representative vertices
and the synchronization edges between gateway vertices and their representative vertices. The
weight of edge (ui, uj), 0 ≤ i 6= j ≤ k will be Θ(uj) for Stochastic Threshold model and 1 for
Independent Cascading model. Once ui is influenced, uj will be influenced with probability 1
in the next time step. The proof for the equivalence of the coupling scheme is similar to ones
for LT-model.
V. LOSSY COUPLING SCHEMES
In the preceding coupling scheme for LT-model, a complicated coupled network is produced
with large numbers of auxiliary vertices and edges. It is ideal to have a coupled network which
only contain users as vertices. This network provides a compact view of the relationship between
users crossing the whole system of networks. The loss of the information is unavoidable when
we try to represent the information of multiplex networks in a compact single network. The
goal is to design a scheme that minimizes the loss as much as possible i.e. the solution for the
problem in the coupled network is very close to one in the original system. Next, we present
these schemes based on the following key observations.
Observation 1. User u will be activated if there exists i such that: Pv∈N i−
u ∩A wi(v, u) ≥ θi(u)
where A is the set of active users. We can relax the condition to activate u with positive
parameters α1(u), α2(u), . . ., αk(u) as follows:
k
X
i=1
(cid:16)αi(u) X
v∈N i−
u ∩A
wi(v, u)(cid:17) ≥
k
X
i=1
αi(u)θi(u)
(1)
u ∩A wi(v, u) − θi(u). In the special case, if Pv∈N i−
Note that sometimes the condition to activate u is met, but the condition (1) still needs more
influence from u's friends to satisfy. The more this need for extra influence is, the looser condition
(1) is. We can reduce this redundancy by increasing the value of αi(u) proportional to the value
of Pv∈N i−
u ∩A wi(v, u) > θi(u) and we choose
αi(u) ≫ αj(u), ∀j 6= i, then there is no redundancy. Unfortunately, we do not know before
hand in which network user u will be activated, so we can only choose parameters heuristically.
Observation 2. When user u participates in multiple networks, it is easier to influence u in
some network than the others. The following simple case illustrate such situation. Suppose that
we have two networks. In network 1, θ1(u) = 0.1 and u has 8 in-neighbors, each neighbor v
influences u with w1(v, u) = 0.1. In network 2, θ2(u) = 0.7 and u has 8 in-neighbors, each
neighbor v influences u with w2(v, u) = 0.1. The number of active neighbors to activate u is 1
and 7 in network 1 and 2, respectively.
Easiness. Intuitively, we can say that u is easier to be influenced in the first network. We
quantify the easiness ǫi(u) that u is influenced in network i as the ratio between the total
influence from friends and the threshold to be influenced: ǫi(u) =
. We can use the
easiness of a user in networks as the parameters of the condition 1.
i−
u
θi(u)
wi(v,u)
P
v∈N
Based on above observations, we couple multiplex networks into one using parameters {αi(u)}.
The vertex set is the set of users V = {u1, u2, . . . , un}. The threshold of vertex u is set to
θ(u) = Pk
i=1 αi(u)θi(u)
12
0.1
1/10
26/25
9/20
5/14
3/5
2.4
2/15
117/50
0.5
3/20
1/2
3/10
0.8
Fig. 4. Lossy coupled network using easiness parameters.
is no edge from v to u in ith network.
The weight of the edge (v, u) is: w(v, u) = Pk
Then the set of edges is E = {(v, u)w(v, u) > 0}. Fig. 4 illustrates the loosy coupled network
i=1 αi(u)wi(v, u) where wi(v, u) = 0 if there
of networks in Fig. 2.
Besides easiness, other metrics can be used for the same purpose. We enumerate here some
other metrics.
Involvement. If a user is surrounded by a group of friends who have high influence on each
other, he tends to be influenced. When a few of his friends are influenced, the whole group
involving him is likely to be influenced. We estimate involvement of a node v in a network Gi
by measuring how strongly the 1-hop neighborhood v is connected and to what extent influence
can propagate from one node to another in the 1-hop neighborhood. Formally we can define
involvement of a node v in network Gi as: σi
is
v∪{v}
the set of all neighbors of v (both in-coming and out-going).
v = Px,y∈N i
Average. All parameters have the same value αi(u) = 1
Next we show the relationship between the solution for LCI in the lossy coupled network
and the original system of networks. As discussed in the above observations, if the propagation
process starts from the same set of users in G1...k and the coupled network G, then the active
state of a user in G implies its active state in G1...k. It means that if the set of users S activates
β fraction of users in G, it also activates at least β fraction of users in G1...k. It implies that if
a seed set is a feasible solution in G, it is also a feasible solution in G1...k. Thus we have the
following result.
Theorem 5. When the lossy coupling scheme is used, if the set of users S activates β fraction
of users in G, then it activates at least β fraction of users in G1...k.
v ∪ N i−
wi(x,y)
θi
y
where N i
v = N i+
v
VI. ALGORITHMS
In this section, we describe a greedy algorithm and its improvement in terms of scalability in
large networks. In the state of the art work, Dinh et al. [7] only solved the problem in a special
case where the threshold is uniform and the required fraction of active nodes is the same for all
nodes.
13
Algorithm 2 Improved Greedy
Input: A system of networks G1...k, fraction β, T , R.
Output: A small seeding set S
G ← The coupled network of G1...k
C ← Set of user vertices
I ← ∅, Counter ← 0
Initialize a heap: H ← ∅
for u ∈ C do
H.push((u, f∅(u)))
end for
while Number of active vertices ≤ βV do
Counter ← Counter + 1
if Counter % R == 0 then
Update key values of all elements in H
else
A ← ∅
for i = 1 to T do
(u, f (u)) ← H.extract−max()
end for
for u ∈ A do
H.push((u, fI(u)))
end for
end if
(u, f (u)) ← H.extract−max()
I ← I ∪ {u}
end while
S ← corresponded users G1...k of nodes in I
Return S
A. Improved greedy algorithm
The bottle neck of the native greedy algorithm is to identify the best node to be selected
in each iteration, thus we focus on reducing the evaluating the computational cost of this step
while maintaining the same quality of selected nodes. We notice that the marginal gain function
fI(·) is recomputed for all unselected nodes and it does not change much after a single iteration.
Since we only select the best one, which indicates that nodes with higher marginal gain in
previous round are necessary to be reevaluated. Therefore, we use a max heap to store the
marginal gain and extra the top one to reevaluate it, if it is not of largest marginal value, it will
be pushed back. Since the time to extract/push an element to the heap is O(log n), the total
computation cost for each iteration is O(T (m + n) + T log n) = O(T (m + n)). Normally, T
is much smaller than n, so the running time is improved significantly. In addition, due to the
property of the Linear Threshold model, the required influence (remained threshold value after
subtracting the influence of activate neighbors) to activate a node is decreasing when the seed
set grows up. When a large number of nodes is selected, there are many nodes are very easy
to be activated. Thus the marginal gain of a node can accumulate to a large value. If we just
apply the proposed strategy, we will never evaluate these nodes again. Therefore, we need to
do exhaustively reevaluation periodically. Combine two strategies together, we present the idea
14
of using heavy and light iterations alternatively. In heavy iteration, we will update fI(·) of all
unselected nodes while only top T nodes are reevaluated in light iteration. Since we do not
want too many heavy iterations, we only use one such iteration after every R iterations. With
this implementation, the running time is reduced much while the quality of the solution only
fluctuates infinitesimal. The improved Greedy is described in Algorithm 2.
This algorithm will terminate when the number of influenced users is larger then the required
fraction of total users. The complexity of this algorithm is O((m + n) · nd) in the worst case
scenario, however, after applying the above discussed update techniques, the running time can
be improved up to 700 times faster than the native greedy from experimental results.
B. Comparing to Optimal Seeding
In this section, we evaluate the performance of proposed algorithm with different coupling
schemes to the optimal solution. We formulate the LCI problem to a 0-1 Integer Linear Pro-
gramming (ILP) problem as follows.
x0
v
v∈V
minimizeX
subject toX
X
v∈V
xd
v ≥ βV
xi−1
u wuv + θv · xi−1
v ≥ θv · xi
v
w∈N (v)
v ≥ xi−1
xi
xi
v ∈ {0, 1}
v
∀v ∈ V, i = 1..d
∀v ∈ V, i = 1..d
∀v ∈ V, i = 0..d
where xi
v = 1 if v is active in round i, otherwise, xi
v = 0.
Since solving IP is NP-hard, we can not run the IP on large networks. Moreover, we have to
run the IP on the coupled network with clique lossless coupling scheme, where there will be
additional nodes and edges created, and the propagation hops need to be doubled (Theorem 2).
Therefore, to evaluate the performance of our algorithm, we compare the result with small size
synthesize networks. For generating networks, 50 nodes are randomly chosen from a 100 users
base, and the probability of connecting each pair of nodes is p = 0.04, which yields a coupled
network of 300 users and with an expected average degree 2. Fig.4(a) shows the obtained seed
size with influence fraction from 0.2 to 0.8 under all coupling schemes. And we also evaluate
the impact of setting different propagation hops on seed size in Fig.4(b) with influence fraction
β = 0.4.
The optimal seeding along with the results of the improved greedy are shown in Fig.4. As
can be seen in Fig. 4(a), the seeding sizes obtained from the proposed algorithm are close to the
optimal solution while varying the influenced fraction β. The same phenomenon is also shown
by varying the number of propagation hops in Fig.4(b). Especially, when the number of hops is
relatively larger, the result is only one or two more than the optimal solution.
(cid:1)(cid:2)(cid:3)
(cid:4)(cid:5)(cid:6)(cid:6)(cid:7)(cid:8)(cid:6)(cid:6)
(cid:9)(cid:10)(cid:8)(cid:11)(cid:12)(cid:13)(cid:8)
(cid:14)(cid:15)(cid:10)(cid:5)(cid:7)(cid:10)(cid:8)(cid:16)(cid:8)(cid:15)(cid:17)
(cid:18)(cid:12)(cid:6)(cid:19)(cid:15)(cid:8)(cid:6)(cid:6)
(cid:2)
(cid:6)
(cid:5)
(cid:1)
(cid:4)
(cid:3)
(cid:2)
(cid:2)
(cid:1)
(cid:1)(cid:6)(cid:2)
(cid:1)(cid:5)(cid:3)
(cid:1)(cid:5)(cid:2)
(cid:1)(cid:4)(cid:3)
(cid:1)(cid:4)(cid:2)
(cid:1)(cid:3)
(cid:1)(cid:2)
(cid:1)(cid:2)(cid:7)(cid:5)
(cid:1)(cid:2)(cid:7)(cid:8)
(cid:1)(cid:2)(cid:7)(cid:9)
(cid:1)(cid:2)(cid:7)(cid:10)
(cid:7)(cid:8)(cid:9)(cid:10)(cid:11)(cid:2)(cid:8)(cid:12)(cid:2)(cid:4)(cid:13)(cid:14)(cid:15)(cid:12)(cid:16)(cid:5)(cid:17)(cid:8)
(a)
Fig. 5. Seed size on synthesize network.
(cid:1)(cid:5)(cid:2)
(cid:1)(cid:4)(cid:3)
(cid:1)(cid:4)(cid:2)
(cid:1)(cid:3)
(cid:2)
(cid:6)
(cid:5)
(cid:1)
(cid:4)
(cid:3)
(cid:2)
(cid:2)
(cid:1)
(cid:1)(cid:2)
(cid:1)(cid:4)
(cid:1)(cid:2)(cid:3)
(cid:4)(cid:5)(cid:6)(cid:6)(cid:7)(cid:8)(cid:6)(cid:6)
(cid:9)(cid:10)(cid:8)(cid:11)(cid:12)(cid:13)(cid:8)
(cid:14)(cid:15)(cid:10)(cid:5)(cid:7)(cid:10)(cid:8)(cid:16)(cid:8)(cid:15)(cid:17)
(cid:18)(cid:12)(cid:6)(cid:19)(cid:15)(cid:8)(cid:6)(cid:6)
15
(cid:1)(cid:5)
(cid:1)(cid:6)
(cid:1)(cid:7)
(cid:7)(cid:8)(cid:9)(cid:10)(cid:11)(cid:12)(cid:11)(cid:13)(cid:5)(cid:9)(cid:14)(cid:4)(cid:15)(cid:9)(cid:10)
(b)
VII. EXPERIMENTS
In this section, we show the experimental results to compare the proposed coupling schemes
and utilize these coupling schemes to analyze the influence diffusion in multiplex networks.
First, we compare lossless and lossy coupling schemes to measure the trade-off between the
running time and the quality of solutions. In particular, for those different kinds of lossless
coupling methods, all of them can preserve complete information of all networks. As a result,
the quality of seeds are the same, the only difference would be the running time which have
been theoretically proved in Proposition 1 and Proposition 2. Therefore, we only chose the clique
coupling scheme to be evaluated. Second, we investigate the relationship between networks in the
information diffusion to address the following questions: (1) What is the role of overlapping users
in diffusing the information? (2) What do we miss when considering each network separately?
(3) How and to what extent does the diffusion on one network provide a burst of information
in other networks?
A. Datasets
Real networks. We perform experiments on two datasets:
• Foursquare (FSQ) and Twitter networks [14]
• Co-author networks in the area of Condensed Matter(CM) [13], High-Energy Theory(Het)
[13], and Network Science (NetS) [12].
The statistics of those networks are described in Table I. The number of overlapping users
in the first dataset FSQ-Twitter is 4100 [14]. We examine the in and out-degree of overlapping
nodes. For the second dataset, we match overlapping users based on authors' names. The numbers
of overlapping users of the network pairs CM-Het, CM-NetS, and Het-NetS are 2860, 517, and
90, respectively. While the edge weights are provided for co-author networks, only the topology
is available for Twitter and Foursquare networks. Thus to assign the weight of each edge, we
adopt the method in [10], where each edge weight is randomly picked from 0 to 1 and then
normalize it so that the total weight of in-coming edges is sum up to 1 for each node. This is
suitable since the influence of user u on user v tends to be small if v is under the influence of
many friends. Finally, we also adopt the assignment of threshold in [10] where all thresholds
are randomly chosen from 0 to 1.
Synthesized networks. We also use synthesized networks generated by Erdos-Renyi random
network model [8] to test on networks with controlled parameters. There are two networks with
10000 nodes which are formed by randomly connecting each pair of nodes with probability
p1 = 0.0008 and p2 = 0.006. The average degrees, 8 and 60, reflect the diversity of network
TABLE I
DATASETS DESCRIPTION
16
Networks
Twitter
FSQ
CM
Het
NetS
#Nodes
48277
44992
40420
8360
1588
#Edges
16304712
1664402
175692
15751
2742
Avg. Degree
289.7
35.99
8.69
1.88
1.73
densities in reality. Then, we select randomly f fraction of nodes in two networks as overlapping
nodes. We shall refer to 0 ≤ f ≤ 1 as the overlapping fraction. The edge weights and node
thresholds are assigned as Twitter.
Setup. We ran all our experiments on a desktop with an Intel(R) Xeon(R) W350 CPU and 12
GB RAM. The number of hops is d = 4 and the influenced fraction β = 0.8, unless otherwise
mentioned.
B. Comparison of coupling schemes
We evaluate the impact of the coupling schemes on the running time and the solution quality
of the greedy algorithm to solve the LCI problem.
Solution quality. As shown in Figs. 6(a) and 6(b), the greedy algorithm provides larger seed
sets but runs faster in lossy coupled networks than lossless coupled networks. In both Twitter-
FSQ and the co-author networks, the seed size is smallest when the lossless coupling scheme is
used. It is as expected since the lossless coupling scheme reserves all the influence information
which is exploited later to solve LCI. However, the seed sizes are only a bit larger using the lossy
coupling schemes. In the lossy coupling schemes, the information is only lost at overlapping
users which occupy a small fraction the total number of users (roughly 5% in FSQ-Twitter and
7% in co-author networks). Thus, the impact of the lossy coupling schemes on the solution
quality is small especially when seed sets are large to influence a large fraction of users.
A closer examination reveals the relative effectiveness of the coupling methods on the seed
size. That is when the seed size is significantly small, the lossess coupling outperforms all the
lossy methods. For example, when the overlapping fraction f = 0.8, the solution using the
lossless coupling is roughly 55% of that in the solution using the (lossy) Easiness, and the
solution using Easiness is about 15% smaller than the other two lossy methods (Fig. 7(a)).
Running time. The greedy algorithm runs much faster in the lossy coupled networks than
the lossless ones in general. As shown in Figs. 6(c) and 6(d), using the lossy coupling reduces
the running times by a factor of 2 in FSQ-Twitter and a factor 4 in the co-author networks
compared to the lossless coupling. The major disadvantages of the lossless coupling scheme are
the redundant nodes and edges. Therefore, the lossy coupling schemes works better on networks
that are sparse and the number of overlapping users is small.
However, in some other cases, the lossless coupling scheme is more efficient. As shown in Fig.
7(b), the running time in the lossless coupled networks is larger in the beginning, but gradually
reduces down and beats other methods at f = 0.4. The larger f is, the larger the ratio between
seed size in the lossless and lossy coupled networks is. As the running time depends on the seed
size, thus it reduces faster in the lossless coupled network with larger overlapping ratio.
Overall, the lossless coupling scheme returns solution with higher quality, especially when
the seed set is small. However, if the constraint of running time and the memory are of priority,
the lossy Easiness coupling scheme offers an attractive alternative.
Average
Easiness
Involvement
Lossless
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8
Influenced fraction (β)
(a) Seed size - co-author networks
Average
Easiness
Involvement
Lossless
4000
3500
3000
2500
2000
1500
1000
500
0
4500
4000
3500
3000
2500
2000
1500
1000
500
0
e
z
i
S
d
e
e
S
s
n
i
i
e
m
T
g
n
n
n
u
R
i
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8
Influenced fraction (β)
(c) Running time - co-author networks
Average
Easiness
Involvement
Lossless
17
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8
Influenced fraction (β)
(b) Seed size - FSQ-Twitter
Average
Easiness
Involvement
Lossless
1600
1400
1200
1000
800
600
400
200
0
0
40000
35000
30000
25000
20000
15000
10000
5000
0
e
z
i
S
d
e
e
S
s
n
i
i
e
m
T
g
n
n
n
u
R
i
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8
Influenced fraction (β)
(d) Running time - FSQ-Twitter
Fig. 6.
Impact of coupling schemes on finding the minimum seed set
C. Advantages of using coupled networks.
To understand the benefit of taking consideration of overlapping users and coupled network,
in this part, we are going to compare the seed size with/out using coupled network. In particular,
we do two comparisons on: 1) influencing a fraction β of the nodes in all networks by selecting
seeds from each network and taking the union to compare with seeds achieved from lossless
coupling scheme; 2) influencing a fraction β of the nodes in a particular network by only
choosing seeds from that network compare to the seeds obtained from lossless coupling scheme.
e
z
i
S
d
e
e
S
4500
4000
3500
3000
2500
2000
1500
1000
500
0
0.1
Average
Easiness
Involvement
Lossless
s
n
i
i
e
m
T
g
n
n
n
u
R
i
Average
Easiness
Involvement
Lossless
9000
8000
7000
6000
5000
4000
3000
2000
1000
0
0.3
0.8
0.2
Overlapping fraction (f)
0.4
0.5
0.6
0.7
0.9
1
0.2
0.4
0.8
0.3
Overlapping fraction (f)
0.5
0.6
0.7
0.9
1
(a) Seed size
(b) Running time
Fig. 7. Comparing coupling schemes in the synthesized networks
The results for the first scenario are shown in Fig. 8. The seed obtained by the lossless coupling
method outperforms other methods. The size of the union set is approximately 30% and 47%
larger than lossless coupling method in co-author and FSQ-Twitter, respectively. This shows that
overlapping users do propagate information through several networks and thus effectively help
18
reduce the overall seed size.
e
z
i
S
d
e
e
S
e
z
i
S
d
e
e
S
4500
4000
3500
3000
2500
2000
1500
1000
500
0
0
3500
3000
2500
2000
1500
1000
500
0
0
Only CM
Only Het
Only NetS
Lossless
Seed Union
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8
Influenced fraction (β)
(a) Co-author networks
Separate CM
CM in Lossless
Separate Het
Het in Lossless
Separate NetS
NetS in Lossless
2000
1800
1600
1400
1200
1000
800
600
400
200
0
1600
1400
1200
1000
800
600
400
200
e
z
i
S
d
e
e
S
e
z
i
S
d
e
e
S
Only FSQ
Only Twitter
Lossless
Seed Union
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8
Influenced fraction (β)
(b) FSQ and Twitter
Separate FSQ
FSQ in Lossless
Separate Twitter
Twitter in Lossless
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8
Influenced fraction (β)
(c) Co-author networks
0
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8
Influenced fraction (β)
(d) FSQ and Twitter
Fig. 8. The quality of seed sets with and without using the coupled network
In the second scenario, the lossless coupling scheme achieves the best result in both networks.
When the network is considered as a standalone network and choose seeds individually(labeled
with Only in Fig. 8), the seeds size is relatively larger than choosing from the coupled network.
As shown in Fig. 8), the sizes decrease by 9%, 25%, and 17% in CM, Het, and FSQ, accordingly.
This improvement is also due to the information diffusion across several networks by the
overlapping users. Especially, when the network sizes are unbalanced, like Het with the smaller
size of users seems to get more improvement than CM.
D. Analysis of seed sets
We analyze seed sets with different influenced fraction β to find out: the composition of the
seed set and the influenced set; and the influence contribution of each network. As illustrated in
Fig. 9, a significant fraction of the seed set is overlapping nodes although only 5% (7%) users
of FSQ-Twitter (the co-author networks) are overlapping users. With β = 0.4, the fraction of
overlapping seed vertices is around 24.9% and 25% in the co-author and FSQ-Twitter networks,
respectively. As overlapping users can influence friends in different networks, they are more likely
to be selected in the seed set than ones participating in only one network. Fig. 10 demonstrates
the high influence contribution of the overlapping users, especially when β is small (contribute
more than 50% of the total influence when β = 0.2). However, when β is large, good overlapping
users are already selected, so overlapping users are not favored any more.
Additionally, there is an imbalance between the number of selected vertices and influenced
vertices in each networks. In the co-author dataset, CM contributes a large number of seed
Overlap
Only CM
Only Het
Only NetS
0.2
0.8
Influenced fraction (β)
0.4
0.6
Overlap
Only CM
Only Het
Only NetS
3500
3000
2500
2000
1500
1000
500
0
40000
35000
30000
25000
20000
15000
10000
5000
0
e
z
i
S
d
e
e
S
s
e
d
o
N
d
e
c
n
e
u
l
f
n
I
f
o
.
o
N
1400
1200
1000
800
600
400
200
0
80000
70000
60000
50000
40000
30000
20000
10000
0
e
z
i
S
d
e
e
S
s
e
d
o
N
d
e
c
n
e
u
l
f
n
I
f
o
.
o
N
Overlap
Only FSQ
Only Twitter
19
0.2
0.8
Influenced fraction (β)
0.4
0.6
Overlap
Only FSQ
Only Twitter
0.2
0.8
Influenced fraction (β)
0.4
0.6
(a) Co-author networks
Fig. 9. The bias in selecting seed nodes
0.6
0.4
0.2
0.8
Influenced fraction (β)
(b) FSQ-Twitter
vertices and influenced vertices since the size of CM is significantly larger than other networks.
When β = 0.8, 76.7% of seed vertices and 80.5% of influenced vertices are from CM. In
contrast, the number of seed vertices from FSQ is small but the number of influenced vertices
in FSQ is much higher than Twitter. With β = 0.4, 27% (without overlapping vertices) of seed
vertices belong to FSQ while 70% of influenced vertices are in FSQ. After the major of vertices
in FSQ are influenced, the algorithm starts to select more vertices in Twitter to increase the
influence fraction. This implies that it is easier for the information to propagate in one network
than the other, even when we consider the overlapping between them. Moreover, we can target
the overlapping users in one network (e.g. Twitter) to influence users in another network (e.g.
FSQ).
E. Mutual impact of networks
We evaluate the mutual impact between networks when the number of network k increases. We
use a user base of 10000 users to synthesize networks for the experiment. For each network, we
randomly select 4000 users from the user base and connect each pair of selected users randomly
with probability 0.0025. Thus all networks have the same size and the expected average outgoing
(incoming) degree of 10. The expected overlapping fraction of any network pair is 16%. We
measure the seed size to influence 60% of users (6000 users) with the different number of
networks (Fig. 11(a)). When k increases from 2 to 5, the seed size decreases several times. It
implies that the introduction of a new OSN increases the diffusion of information significantly.
We also compute how much new networks help the existing one to propagate the information.
Using the same seed set found by the greedy algorithm to influence 60% (2400 users) of the
target network (the first created network), we compute the total number of influenced vertices in
Overlap
Only CM
Only Het
Only NetS
y
a
l
e
R
l
a
t
o
T
40000
35000
30000
25000
20000
15000
10000
5000
0
y
a
l
e
R
l
a
t
o
T
80000
70000
60000
50000
40000
30000
20000
10000
0
Overlap
Only FSQ
Only Twitter
20
0.4
0.2
0.8
Influenced fraction (β)
0.6
(a) Co-author networks
Fig. 10. The influence contribution of seed vertices from component networks
0.6
0.4
0.2
0.8
Influenced Fraction (β)
(b) FSQ and Twitter
that network as well as the external influence. Fig. 11(b) shows that the number of influenced
vertices is raised 46% with the support of 3 new networks when k is changed from 2 to 5. In
addition, the fraction of external influence is also increased dramatically from 39% when k = 2
to 67% when k = 5. It means that the majority of influence can be obtained via the support of
other networks. On the hand, these results suggest that the existing networks may benefit from
the newly introduced competitor.
e
z
i
S
d
e
e
S
1600
1400
1200
1000
800
600
400
200
0
Average
Easiness
Involment
Lossless
Internal Influence
External Influence
l
y
a
e
R
l
a
t
o
T
4500
4000
3500
3000
2500
2000
1500
1000
500
0
2
3
4
5
No. of Networks
(a)
2
3
4
5
No. of Networks
(b)
Fig. 11. The impact of additional networks
VIII. CONCLUSIONS
In this paper, we study the least cost influence problem in multiplex networks. To tackle the
problem, we introduced novel coupling schemes to reduce the problem to a version on a single
network. Then we design a new metric to quantify the flow of influence inside and between
networks based on the coupled network. Exhaustive experiments provide new insights to the
information diffusion in multiplex networks.
In the future, we plan to investigate the problem in multiplex networks with heterogeneous
diffusion models in which each network may have its own diffusion model. It is still an ongoing
problem whether they can be represented efficiently, or we have better method to couple them
into one network.
This work is supported in part of NSF CCF-1422116 and DTRA HDTRA1-14-1-0055.
ACKNOWLEDGMENT
[1] 216 social media and internet statistics. http://thesocialskinny.com/216-social-media-and-internet-statistics-september-2012/.
[2] Overlap among major social network services. http://www.tomhcanderson.com/2009/07/09/overlap-among-major-social-network-services/.
[3] Francesco Buccafurri, Gianluca Lax, Antonino Nocera, and Domenico Ursino. Discovering links among social networks.
REFERENCES
21
In Machine Learning and Knowledge Discovery in Databases, pages 467–482. Springer, 2012.
[4] Ceren Budak, Divyakant Agrawal, and Amr El Abbadi. Limiting the spread of misinformation in social networks.
In
Proceedings of the 20th international conference on World wide web, pages 665–674. ACM, 2011.
[5] Ning Chen. On the approximability of influence in social networks. In SODA, pages 1029–1037, 2008.
[6] Wei Chen, Chi Wang, and Yajun Wang. Scalable influence maximization for prevalent viral marketing in large-scale social
networks. In SIGKDD, pages 1029–1038, 2010.
[7] T. N. Dinh, H. Zhang, D. T. Nguyen, and M. T. Thai. Cost-effective viral marketing for time-critical campaigns in
large-scale social networks. IEEE/ ACM Transactions on Networking (ToN), 22(6):2001–2011, 2013.
[8] Paul Erdos and A R´enyi. On the evolution of random graphs. Publ. Math. Inst. Hungar. Acad. Sci, 5:17–61, 1960.
[9] Tereza Iofciu, Peter Fankhauser, Fabian Abel, and Kerstin Bischoff. Identifying users across social tagging systems. In
ICWSM, pages 522–525, 2011.
[10] David Kempe, Jon Kleinberg, and ´Eva Tardos. Maximizing the spread of influence through a social network. In KDD,
pages 137–146, 2003.
[11] Xingjie Liu, Qi He, Yuanyuan Tian, Wang-Chien Lee, John McPherson, and Jiawei Han. Event-based social networks:
linking the online and offline social worlds. In KDD, pages 1032–1040, 2012.
[12] M. E. J. Newman. Finding community structure in networks using the eigenvectors of matrices. Phys. Rev. E, 74:036104,
2006.
[13] Mark EJ Newman. The structure of scientific collaboration networks. Proceedings of the National Academy of Sciences,
98(2):404–409, 2001.
[14] Y. Shen, T. N. Dinh, H. Zhang, and M. T. Thai.
Interest-matching information propagation in multiple online social
networks. In in Proceedings of ACM Int Conference on Information and Knowledge Management (CIKM), pages 1824–
1828, 2012.
[15] Wen Xu, Zaixin Lu, Weili Wu, and Zhiming Chen. A novel approach to online social influence maximization. Social
Network Analysis and Mining, 4(1):1–13, 2014.
[16] Osman Yagan, Dajun Qian, Junshan Zhang, and Douglas Cochran.
Information diffusion in overlaying social-physical
networks. In CISS, pages 1–6, 2012.
[17] Huiyuan Zhang, Thang N Dinh, and My T Thai. Maximizing the spread of positive influence in online social networks.
In ICDCS, pages 317–326. IEEE, 2013.
[18] Feng Zou, Zhao Zhang, and Weili Wu. Latency-bounded minimum influential node selection in social networks.
In
International Conference on Wireless Algorithms, Systems, and Applications, pages 519–526. Springer, 2009.
|
1801.05042 | 1 | 1801 | 2018-01-15T21:50:28 | Centralized "big science" communities more likely generate non-replicable results | [
"cs.SI",
"nlin.AO",
"physics.data-an",
"q-bio.QM"
] | Growing concern that most published results, including those widely agreed upon, may be false are rarely examined against rapidly expanding research production. Replications have only occurred on small scales due to prohibitive expense and limited professional incentive. We introduce a novel, high-throughput replication strategy aligning 51,292 published claims about drug-gene interactions with high-throughput experiments performed through the NIH LINCS L1000 program. We show (1) that unique claims replicate 19% more frequently than at random, while those widely agreed upon replicate 45% more frequently, manifesting collective correction mechanisms in science; but (2) centralized scientific communities perpetuate claims that are less likely to replicate even if widely agreed upon, demonstrating how centralized, overlapping collaborations weaken collective understanding. Decentralized research communities involve more independent teams and use more diverse methodologies, generating the most robust, replicable results. Our findings highlight the importance of science policies that foster decentralized collaboration to promote robust scientific advance. | cs.SI | cs | Centralized "big science" communities more likely generate
non-replicable results
Valentin Danchev1,2,3*, Andrey Rzhetsky3,4,5, and James A. Evans1,2,3*
1 Department of Sociology, University of Chicago, 1126 E 59th St, Chicago, IL 60637, USA
2 Knowledge Lab, University of Chicago, 5735 South Ellis Avenue, Chicago, IL 60637, USA
3 Computation Institute, University of Chicago, 5735 South Ellis Avenue, Chicago, IL 60637,
USA
4 Departments of Medicine and Human Genetics, University of Chicago, 5841 S. Maryland Ave.,
Chicago, IL 60637, USA
5 Institute for Genomic and Systems Biology, 900 East 57th Street, Chicago, IL 60637, USA
*Please address correspondence to [email protected] and [email protected].
Abstract
Growing concern that most published results, including those widely agreed upon, may
be false are rarely examined against rapidly expanding research production. Replications
have only occurred on small scales due to prohibitive expense and limited professional
incentive. We introduce a novel, high-throughput replication strategy aligning 51,292
published claims about drug-gene interactions with high-throughput experiments
performed through the NIH LINCS L1000 program. We show (1) that unique claims
replicate 19% more frequently than at random, while those widely agreed upon replicate
45% more frequently, manifesting collective correction mechanisms in science; but (2)
centralized scientific communities perpetuate claims that are less likely to replicate even
if widely agreed upon, demonstrating how centralized, overlapping collaborations
weaken collective understanding. Decentralized research communities involve more
independent teams and use more diverse methodologies, generating the most robust,
replicable results. Our findings highlight the importance of science policies that foster
decentralized collaboration to promote robust scientific advance.
1
Introduction
Concern over reliability (1) and reproducibility (2, 3) in science calls into question the
cumulative process of building on prior results published by others. In a publication
environment that rewards novel findings over verifications (4, 5), scientists remain
uncertain about the published claims they assemble into new research designs and
discoveries. In this paper, we demonstrate a claim replication strategy that repurposes
high-throughput experiments to evaluate the replication likelihood for tens of thousands
of scientific claims curated from a wide range of research articles.
Our strategy builds on the synergy of two advances. First, databases of empirical
claims on many topics, ranging from material science to biomedicine (6, 7), are extracted
from literature and linked to digital archives of scientific articles such as MEDLINE and
Web of Science, making possible systematic analysis of features that characterize the
provenance of a scientific claim, such as where, when, who, and how many experiments
provided findings for and against it (8). Second, high-throughput experiments driven by
consistent, programmable robots have become increasingly widespread, initially in
genome sequencing (9) but extending to many domains, including drug-gene interactions.
These experiments provide large-scale biomedical data enabling simultaneous estimation
of the replication likelihood for many prior published claims.
Replication failures are typically attributed to systemic bias in a publication
system that favors positive results (1). This incentivizes questionable research choices
such as p-hacking (10, 11), "flexible" data analysis (12), low statistical power (13),
selective reporting ("the file drawer problem") (14), and confirmation bias (15), which
generate false results unlikely to replicate in future experiments (12).
Here we investigate the social and methodological structure of scientific and
methodological communities that coalesce around scientific claims. What network
dependencies linking scientists and their experimental methods produce the most robust,
replicable claims? We hypothesize that an empirical claim tested by a decentralized
community of non-overlapping teams with diverse training and prior knowledge, using
distinct methods under varying experimental conditions will produce robust knowledge,
likely to replicate in future experiments. By contrast, increased collaboration (16),
growing teams (17), star scientists (18, 19), and expensive, shared equipment trace a
2
pathway to "big science" (20) approaches to knowledge production (Fig. S1), which at
the extreme involve integrated collaboration of an entire community around massive,
singular research efforts like the Human Genome Project and the Laser Interferometer
Gravitational-Wave Observatory (LIGO) (20-22). We hypothesize that a claim tested by
a centralized or densely connected community involving repeated collaborations and a
narrow range of methods, knowledge, and conditions is fragile and less likely to replicate
than those produced by many decentralized or independent labs, while acknowledging
that some claims can only be explored through massive, integrated collaboration.
Prior studies simulated the effect of network structure on scientific outcomes,
suggesting that independent labs should more likely arrive at truth than a connected
network of scientists, which can more easily propagate early, false results (23-25). A
more recent experiment demonstrates that decentralized network ties, rather than
independence, most likely improves the wisdom of crowds (26). Scientific findings could
also be more or less robust as a function of diverse methods (27, 28) used to corroborate
them or distinct theories used to motivate them. Consider Jean Perrin's use of multiple
experimental techniques and theories to precisely determine Avogadro's number (29).
We represent the provenance of a scientific claim with a multilayer network (30,
31), where each network node depicts a research article reporting a finding about that
claim. Articles are linked based on whether they (1) agree and the degree to which they
share (2) scientific collaborators, (3) empirical methodologies, and (4) references to prior
work (see Fig. 2A). This network representation allows us to analyse the replication
likelihood for each claim as a function of the epistemic, social, technical and intellectual
dependencies that underlie it.
High-throughput Claim Replication Strategy
We examined a corpus of 51,292 scientific claims about chemical/drug-gene/mRNA
interactions in human systems. We compiled the corpus by using claims about directed
drug-gene interactions curated from biomedical publications in the most comprehensive
database, the Comparative Toxicogenomics Database (CTD) (6), recording over one
million published claims regarding drug-gene interactions. Each scientific claim is a
triple of drug, gene, and interaction effect. For comparability with high-throughput
3
experiments, we selected interaction effects in which a drug "increases expression" or
"decreases expression" of an mRNA in humans (effect magnitudes were not recorded).
The database identifies source articles in which the finding is claimed (i.e., PubMed ID),
which enabled examination of article content (e.g., methods) and metadata features (e.g.,
authors).
To estimate replication likelihood, we map our corpus of drug-gene claims to
high-throughput experimental data from the NIH LINCS L1000 program. The program
generated 1.3M gene expression profiles from 42,080 chemical and genetic perturbagens
across cell lines, time points, and doses (32). We used profiles induced by chemical
perturbagens, amounting to 19,811 small molecule compounds (including FDA approved
drugs). To measure relative gene expression resulting from chemical perturbations, the
LINCS L1000 team computed robust z-scores that represent differential expression
signatures. We combined
the z-scores across signatures using a bootstrapped
modification of Stouffer's method (33, 34) to generate drug-gene interaction triples of (i)
drug, (ii) gene (mRNA), and (iii) combined z-score indicating experimental effect size
and effect direction. We matched drug-gene interaction triples from the LINCS L1000
experiments to triples in CTD, and found 51,292 drug-gene interaction claims at the
intersection, corresponding to 60,159 supportive and 4,253 opposing findings from the
literature, annotated from 3,363 scientific papers.
We distinguish between robustness to social, methodological and intellectual
dependencies and robustness to experimental conditions (27) like time, dosages, cells, or
tissues, which delimit the potential for a drug-gene interaction to generalize. In all
subsequent models, we control for the variability of drug-gene interactions in LINCS
L1000 to disentangle features of experimental and biological heterogeneity from global
patterns of (in)dependence.
Our high-throughput replication strategy evaluates reliability of the overall
scientific claim rather than of any particular finding. The latter would require precise
reproduction of the original research following the original experimental protocol (35).
Nevertheless, collective agreement across many articles may serve as evidence of a
generalized claim robust to any one technique (28, 36), scientist, research group, or
4
biological setting (e.g., cell line), thereby justifying increased confidence in the claim's
widespread scientific and biomedical relevance.
Results
We observe a long-tailed distribution of published findings in support of a given
scientific claim (Fig. 1A). Most claims are supported by findings in one (89%) or two
(8%) articles, while few appear in many articles. The distribution of experimental effect
sizes over drug-gene interactions in LINCS L1000 decays much more slowly (Fig. 1D).
Published findings widely agree on the direction of drug-gene interactions (93%)
(Fig. 1A). In contrast, the majority of interaction effect-sizes (59%) in LINCS L1000
across experimental conditions are statistically undetermined (Fig. 1D). We find that
consensus in the literature is positively associated with social dependencies. A pair of
findings about a drug-gene interaction reported in papers with shared author(s) are
significantly more likely to agree in the direction of the effect (0.989; 95% CI: 0.984,
0.993; 2,514 pairs of papers) than findings reported in socially independent papers
(0.889; 95% CI: 0.884, 0.893; 20,846 pairs of papers) (Fig. S2).
We also find that generalizable interactions, which converge across experimental
conditions in LINCS L1000, are more likely to replicate published claims (RR = 0.60)
than interactions that vary across conditions (RR = 0.52), which are indistinguishable
from random (RR = 0.501) in our corpus (Fig. 1E). We define the replication success (R
= 1; 0 otherwise) of a claim as the effect size (combined z-score) in LINCS L1000
matching the direction (increase or decrease) of the effect claimed in literature (see SM).
5
A
e
n
e
g
-
g
u
r
d
f
o
r
e
b
m
u
N
s
m
a
c
i
l
Support Oppose
Drug-gene claim
105
104
103
102
101
100
100
Support
Oppose
101
Number of published findings
102
B
2500
2000
y
c
n
e
u
q
e
r
F
Support Oppose
0%
20%
40%
60%
80%
100%
C
Very high
(N = 325)
High
(N = 1,083)
Moderate
(N = 4,743)
Low
(N = 50,807)
Contradictory
µ
>
95%
>
80%
>
68%
~
68%
(N = 77)
<
68%
Probability of support in literature
0
0.5
1
P
P
P
P
P
P
G
10.0
0
0
0
1
L
S
C
N
L
I
n
i
y
t
i
l
i
b
a
i
r
a
V
P = 0.0032
P = 0.0175
P = 0.010
P = 0.0090
n.s.
n.s.
n.s.
7.5
5.0
2.5
0.0
Abs. combined z-scores
D
e
n
e
g
-
g
u
r
d
f
o
r
e
b
m
u
N
s
n
o
i
t
c
a
r
e
t
n
i
105
104
103
102
101
100
100
Effect size in LINCS L1000 experiment
102
101
Significant
40%
20%
Not significant
60%
80%
100%
0%
E
R
R
,
e
t
a
r
n
o
i
t
a
c
i
l
p
e
R
1.00
0.75
0.50
0.25
0.00
Probability of support in literature
Corpus
Contradictory
Low
Moderate
High
Very high
RRobs
RRrand
Not significant
Random
Significant
Random
N = 136
N = 406
N = 21,181
N = 18,688
N = 1,908
N = 43
F
)
%
(
e
s
a
e
r
c
n
d
n
a
r
R
R
i
n
o
i
t
a
c
i
l
d
n
a
r
R
R
p
e
r
e
v
i
t
s
b
o
R
R
Effect size in LINCS L1000 experiment
l
a
e
R
Very high
Contradictory
Moderate
High
Low
All significant
Contradictory
All significant
Moderate
High
Low
Very high
Fig. 1. Aligning drug-gene claims from the literature with interactions from high-
throughput experiments to evaluate replication likelihood. (A) On top, the
distribution of drug-gene claims against the number of supporting and opposing findings
in the literature on a log-log scale. On bottom, the proportion of supporting and opposing
findings on aggregate. (B) Posterior distributions of support in the biomedical literature
for a sample of drug-gene claims. For each claim, we summarize the probability of
support (dashed line) using the lower bound on the 95% posterior credible intervals
(PCI). (C) Typology of drug-gene claims from the literature on the basis of claim's
distribution of support compared to the null value of 0.5. Number of claims included in a
category provided in brackets. (D) Effect sizes (combined z-scores) for drug-gene
interactions derived from LINCS L1000 experiments. On top, the distribution of drug-
gene interactions against absolute experimental effect size in LINCS L1000 (log-log
scale). On bottom, the proportion of significant and insignificant interactions in LINCS
L1000. We established significance at the 0.05 level by bootstrapping (10,000 iterations)
the combined z-score for each of the 51,292 interactions sampling from experiments
across different cell lines, durations, and dosages. (E) Observed, 𝑅𝑅!"#, versus expected,
𝑅𝑅!"#$, replication rate (see SM) for drug-gene claims differentiated by significance in
of claim, indicating the percentage increase of 𝑅𝑅!"# relative to random 𝑅𝑅!"#$ or
100 × RRobs!RRrand
. (G), Variability (coefficient of variation) in LINCS L1000 across cell
lines, durations, and dosages for each type of claim. We established statistical
significance using a nonparametric bootstrap test with 100,000 iterations. Error bars
represent SEM.
LINCS L1000 and support from literature. (F) Relative replication increase for each type
6
RRrand
A central concern is whether the replication problem applies only to novel and
rare claims or if it also afflicts widely supported results, as recently hypothesised (37,
38). To integrate collective support in the literature over multiple claim sources, we
design a binomial Bayesian model with a uniform prior that accommodates skewed
distributions (39) like that of findings per claim we observed. To estimate the probability
of support for each drug-gene claim, we assume that the number of supportive published
findings 𝛾 in 𝑛 findings about that claim is drawn from a binomial distribution,
𝑝(γ θ ~ Bin γ n, θ (see SM). The model allocates higher probability to scientific claims
We find a strong relationship between scientific support in the literature 𝐿!"#$
unanimously supported in a large number of articles and lower probability to infrequent
and disputed claims (Fig. 1B).
and the probability of replication success, ranging from 0.507 (95% CI: 0. 492, 0.522) for
claims with the least support to 0.705 (95% CI: 0.665, 0.743) for claims with the largest,
controlling for biological and experimental variability in LINCS L1000 (Fig. S3A).
When we consider only significant drug-gene interactions (Fig. S3B), which generalize
across experimental conditions, the probability of replication for top-supported claims
reaches 0.798 (95% CI: 0. 751, 0.845).
To examine the hypothesis that convergent drug-gene claims more likely replicate
than those claimed rarely or disputed in literature, we categorized claims on the basis of
their distribution of support (Figs. 1C and S4; see SM). We found that claims with "Very
high" (RRI = 45.4%; SEM ± 13.5%) and "High" (RRI = 34.5%; SEM ± 7.6%) support in
the biomedical literature are significantly more likely to replicate in high-throughput
experiments than claims with "Low" (RRI = 19%; SEM ± 1.1%) and "Moderate" (RRI =
16.2%; SEM = 3.3%) support (Fig. 1F). The replication of "Low" and "Moderate"
support claims is consistent with estimates (~11–25%) from recent biomedical
reproducibility studies (2, 3), but those receiving support from multiple sources is much
higher. "Contradictory" claims are significantly less likely to replicate than random. They
are also associated with greater experimental variability (Fig. 1G), indicating that
collective disagreements among findings truthfully signal unstable drug-gene interactions
with low replication likelihood. These results suggest that findings reported in a single
7
Independent and decentralized sources of evidence should increase claim
scientific article may be fallible, but viewed as a system of converging and diverging
findings, science exhibits collective correction.
robustness. Figure 2A presents a schematic of a multilayer network 𝑀=(𝑉!,𝐸!,𝐿) for
a claim. In each network layer L, nodes 𝑉 are scientific papers and edges 𝐸 between pairs
of papers represent either a binary relationship of agreement (𝐿!) or the amount of
(𝐿!), methodologies (𝐿!), and references to prior literature (𝐿!). Our independence scores
overlap measured with the Jaccard coefficient, between the two papers' sets of authors
for social, methodological, and prior knowledge range between 0 (dependent) and 1
(independent), and can be viewed as the probability that any two randomly chosen
findings about a claim are obtained by disconnected sets of authors, methods, and
references, respectively (see SM). Figure 2B-C present schematics of bipartite networks
of authors connected to the papers they publish. To quantify the centralization of research
communities C, we compute the Gini coefficient of the authors' degree distribution (see
Fig. 2D-E).
in LINCS L1000. Figure 2F shows that the odds ratios (OR) of replication increase
We examine the impact of network dependencies on claim replicability by fitting
logistic regression models that predict replication success against the measures described
above and defined for each claim, using a sub-corpus of 2,493 claims with determined
direction of the drug-gene effect in the literature (𝐿!"#$=68% PCI > µ < 68% PCI) and
substantially with the increase of scientific support in the literature 𝐿!"#$ (OR 23.20; 95%
CI: 9.08, 59.3), social independence 𝑆!"# (OR 6.31; 95% CI: 4.07, 9.79), methodological
independence 𝑀!"# (OR 6.30; 95% CI: 3.44, 11.53), and prior knowledge independence
𝐾!"# (OR 5.53; 95% CI: 2.58, 11.84). By contrast, claim replication decreases with
centralization 𝐶 (OR 0.36; 95% CI: 0.27, 0.48). Our estimates indicate that claim
robustness, defined here as multiple decentralized evidence, increases replication success
(Fig. 2G-M). When all predictors are modelled simultaneously (Fig. 2F), however,
centralization and support in the literature account for the rest, suggesting that centralized
academic training and extensive collaboration mediates the application of research
techniques and attention to prior research.
8
A
Agree-
ment
Authors
overlap
Methods
overlap
References
overlap
6
1
2
1
B
d
e
z
i
l
a
r
t
n
e
C
C
d
e
z
i
l
a
r
t
n
e
e
D
Benzo(a)pyrene SLC22A3
Sulforafan NQO1
Estradiol PRSS23
T
R
O
P
P
U
S
T
R
O
P
P
U
S
L
S
S I N
0
P
U
T = 0.6
D = 0.8 5
D = 0.8 7
M IN
D = 0.6
IIN
T
R
O
P
P
U
S
L
P
U
S
S I N
4
T = 0.8
D = 0.9 9
D = 0.9 1
M IN
D = 0.8 1
IIN
Authors in many papers
Authors in one paper
P
S
U
L
7
OPPOSE
T = 0.4
D = 0.9 6
D = 0.8 8
S I N
M IN
D = 0.8 7
D
P
P
O
Tretinoin F3
O
S
E
S
P
U
L
9
SUPPORT
T = 0.6
D = 0.8 6
D = 0.7 9
M IN
D = 0.9 1
S I N
IIN
Tretinoin F3
C = 28.3%
IIN
T
r
e
t
i
n
o
n
i
F
3
E
s
t
r
a
d
o
i
l
P
R
S
S
2
3
100%
80%
60%
40%
20%
s
e
g
d
e
r
e
p
a
p
-
o
t
-
r
o
h
t
u
a
f
o
e
r
a
h
S
E
s
e
g
d
e
r
e
p
a
p
-
o
t
-
r
o
h
t
u
a
f
o
e
r
a
h
S
0%
0% 20% 40% 60% 80% 100%
Share of authors from low to high degrees
100%
80%
60%
40%
20%
Estradiol PRSS23
C = 12.4%
0%
0% 20% 40% 60% 80% 100%
Share of authors from low to high degrees
Authors
Research papers
G
100%
75%
50%
25%
0%
K
100%
75%
50%
25%
0%
0.00 0.25 0.50 0.75 1.00
Support in literature
H
100%
75%
50%
25%
0%
L
100%
75%
50%
25%
0%
0.00
n
o
i
t
a
c
i
l
p
e
r
i
l
m
a
c
f
o
y
t
i
l
i
b
a
b
o
r
P
1
5 10 25 50
Claim replication (OR, 95% CI)
F
Support
in literature
Journal
prominence
Social
independence
Methodological
independence
Prior knowledge
independence
Variability
in LINCSL1000
Centralization
J
100%
75%
50%
25%
0%
n
o
i
t
a
c
i
l
p
e
r
i
m
a
c
f
l
o
y
t
i
l
i
b
a
b
o
r
P
0.25
0.75
Social independence
0.50
I
100%
75%
50%
25%
0%
1.00
0.00
M
100%
75%
50%
25%
0%
0.50
0.25
Centralization
0.75
1.00
0.00 0.25 0.50 0.75 1.00
0.25
0.00
1.00
Methodological independence
0.50
0.75
0.25
0.00
1.00
Prior knowledge independence
0.50
0.75
Journal prominence
Fig. 2. Multilayer networks of social, methodological, and prior knowledge
dependences predict replication likelihood. (A) Examples of multilayer claim
networks. Each layer 𝐿 represents a co-paper network: nodes are scientific papers; pairs
of papers are connected by an unweighted edge if they agree on the effect direction (𝐿!),
9
0.00 0.25 0.50 0.75 1.00
Variability in LINCS L1000
two papers' authors (𝐿!), methodologies (𝐿!), and references to prior literature (𝐿!).
and a weighted edge proportional to the overlap (Jaccard coefficient or JC) between the
Dashed red line in the agreement layer indicates opposing edges. For clarity, we only plot
edges above the mean JC value for overlapping methods. (B-C) Example of centralized
and decentralized bipartite networks. Edges connect authors (rectangles) to papers they
published (circles). Centralization C is the Gini coefficient of the authors' degree
distribution. (D-E) Lorenz curves showing different level of centralization, corresponding
to the examples in B and C. (F) Logistic regression models with replication success as the
response variable and predictors modelled
(bottom)
simultaneously. Predictors are rescaled
probabilities (PP) of claim replication PP𝑅=1 = !"# (!!!!!!)
!!!!"# (!)
!"#!!!"# (!) for comparability. (G-M) Predicted
!!!"# (!!!!!!) for logistic models of
(top)
independently and
independent predictors with 95% error bounds.
An alternative explanation of replication success is the biological tendency for
some drug-gene interactions to generalize across conditions and so replicate in future
experiments. Figure 2F shows that experimental variability has a small, insignificant
negative effect, and that support from multiple, decentralized teams are much more
informative predictors of replication success.
Our combined model also controls for journal prominence J, which we measure
with journal eigenfactor (40), a score that credits journals receiving many citations from
highly cited journals. Claim replication increases with journal prominence (Figs. 2F and
2L), but prominent journals are responsible for only a tiny fraction of all claims, which
warrants our evaluation strategy and the practice of extracting and archiving findings
from a wide range of journals (6).
Figure 3 shows that by accounting for scientific support, centralization, and social
independence, we can identify claims with high replication probability. Claims supported
by many publications have about 45 percent higher probability to replicate when
investigated by decentralized versus centralized communities (Figs. 3A and S8). Even if a
claim garners wide support, if studied exclusively by a centralized scientific community,
the claim is indistinguishable in replication probability from a claim reported in a single
paper. This suggests a condition under which collective correction in science is
undermined, when one or several scientists exercise disproportionate influence on team
assembly and research across multiple investigations of a claim. Claims robust to
multiple, socially independent investigations have a 55 percent higher probability to
10
replicate than those studied by small clusters of overlapping collaborators (Figs. 3B and
S9). These effects all account for the experimental and biological variability of drug-gene
interactions.
A
B
Fig. 3. Contour plots of the probability of claim replication based on network
dependencies and support in the literature. (A) The probability of claim replication is
greater in decentralized communities of scientists, after controlling for variability in
LINCS L1000 across cell lines, durations, and dosages. (B) The probability of claim
replication increases with support in the literature and social independence, after
controlling again for experimental variability.
Discussion
Extensive (22) and often overlapping scientific collaboration (16), along with cumulative
advantage processes that create central, star scientists (19), produce centralized "big
science" communities with dense methodological and intellectual dependencies. Such
communities tend to publish fragile findings. Our research points to the importance of
science policies that foster competition and decentralized collaboration to promote robust
and replicable scientific advance. Our analysis demonstrates the utility of large-scale
experiments coupled with enriched article content and metadata to diagnose the
replicability of published research. Our findings suggest a calculus for evaluating the
system-level trade-off between investments in robust, replicable knowledge, which
comes at the price of larger, but weaker, preliminary insight.
11
0.350.350.350.40.40.40.450.450.450.50.50.550.550.60.60.650.650.70.70.750.80.850.9Social independence00.20.40.60.810.20.30.40.50.60.70.80.910.30.350.40.450.450.50.50.550.550.60.60.60.650.650.65Centralization00.20.40.60.81Support in literature00.20.40.60.81Probability of claim replicationReferences
J.
P.
Ioannidis,
Why
most
published
research
findings
are
false.
PLoS
Med
2,
1.
e124
(2005).
F.
Prinz,
T.
Schlange,
K.
Asadullah,
Believe
it
or
not:
how
much
can
we
rely
on
2.
published
data
on
potential
drug
targets?
Nat
Rev
Drug
Discov
10,
712–712
(2011).
C.
G.
Begley,
L.
M.
Ellis,
Drug
development:
Raise
standards
for
preclinical
3.
cancer
research.
Nature
483,
531–533
(2012).
B.
A.
Nosek,
J.
R.
Spies,
M.
Motyl,
Scientific
Utopia:
II.
Restructuring
incentives
4.
and
practices
to
promote
truth
over
publishability.
Perspectives
on
Psychological
Science
7,
615–631
(2012).
B.
Alberts
et
al.,
Self--‐correction
in
science
at
work.
Science
348,
1420
(2015).
5.
A.
P.
Davis
et
al.,
The
Comparative
Toxicogenomics
Database:
update
2017.
6.
Nucleic
Acids
Research
45,
972–978
(2017).
A.
H.
Wagner
et
al.,
DGIdb
2.0:
mining
clinically
relevant
drug–gene
7.
interactions.
Nucleic
acids
research,
gkv1165
(2015).
8.
J.
A.
Evans,
J.
G.
Foster,
Metaknowledge.
Science
331,
721
(2011).
International
Human
Genome
Sequencing.
Consortium,
Initial
sequencing
9.
and
analysis
of
the
human
genome.
Nature
409,
860
(2001).
10.
M.
L.
Head,
L.
Holman,
R.
Lanfear,
A.
T.
Kahn,
M.
D.
Jennions,
The
extent
and
consequences
of
p--‐hacking
in
science.
PLoS
Biol
13,
e1002106
(2015).
11.
U.
Simonsohn,
L.
D.
Nelson,
J.
P.
Simmons,
P--‐curve:
a
key
to
the
file--‐drawer.
Journal
of
Experimental
Psychology:
General
143,
534
(2014).
12.
J.
P.
Simmons,
L.
D.
Nelson,
U.
Simonsohn,
False--‐Positive
Psychology.
Psychological
Science
22,
1359–1366
(2011).
E.
Dumas--‐Mallet,
K.
S.
Button,
T.
Boraud,
F.
Gonon,
M.
R.
Munafò,
Low
13.
statistical
power
in
biomedical
science:
a
review
of
three
human
research
domains.
Royal
Society
Open
Science
4,
160254
(2017).
14.
R.
Rosenthal,
The
file
drawer
problem
and
tolerance
for
null
results.
Psychological
Bulletin
86,
638–641
(1979).
15.
R.
Nuzzo,
Fooling
ourselves.
Nature
526,
182–185
(2015).
R.
Guimerà,
B.
Uzzi,
J.
Spiro,
L.
A.
N.
Amaral,
Team
Assembly
Mechanisms
16.
Determine
Collaboration
Network
Structure
and
Team
Performance.
Science
308,
697
(2005).
17.
S.
Wuchty,
B.
F.
Jones,
B.
Uzzi,
The
Increasing
Dominance
of
Teams
in
Production
of
Knowledge.
Science
316,
1036
(2007).
R.
K.
Merton,
The
Matthew
effect
in
science.
Science
159,
56–63
(1968).
18.
19.
P.
Azoulay,
T.
Stuart,
Y.
Wang,
Matthew:
Effect
or
Fable?
Management
Science
60,
92--‐109
(2013).
D.
J.
de
Solla
Price,
Little
science,
big
science.
(Columbia
University
Press,
New
20.
York,
1963).
21.
A.
M.
Weinberg,
Impact
of
Large--‐Scale
Science
on
the
United
States.
Science
134,
161
(1961).
D.
Hicks,
J.
S.
Katz,
Science
policy
for
a
highly
collaborative
science
system.
22.
Science
and
Public
Policy
23,
39–44
(1996).
12
N.
Payette,
in
Models
of
Science
Dynamics:
Encounters
Between
Complexity
23.
Theory
and
Information
Sciences,
A.
Scharnhorst,
K.
Börner,
P.
van
den
Besselaar,
Eds.
(Springer,
Berlin,
Heidelberg,
2012),
pp.
127–157.
Kevin
J.
S.
Zollman,
The
Communication
Structure
of
Epistemic
Communities.
24.
Philosophy
of
Science
74,
574–587
(2007).
J.
Lorenz,
H.
Rauhut,
F.
Schweitzer,
D.
Helbing,
How
social
influence
can
25.
undermine
the
wisdom
of
crowd
effect.
Proceedings
of
the
National
Academy
of
Sciences
108,
9020–9025
(2011).
J.
Becker,
D.
Brackbill,
D.
Centola,
Network
dynamics
of
social
influence
in
the
26.
wisdom
of
crowds.
Proceedings
of
the
National
Academy
of
Sciences
114,
E5070--‐E5076
(2017).
27.
W.
G.
Kaelin
Jr,
Common
pitfalls
in
preclinical
cancer
target
validation.
Nat
Rev
Cancer
17,
425–440
(2017).
28.
W.
C.
Wimsatt,
in
Characterizing
the
Robustness
of
Science:
After
the
Practice
Turn
in
Philosophy
of
Science,
L.
Soler,
E.
Trizio,
T.
Nickles,
W.
Wimsatt,
Eds.
(Springer
Netherlands,
Dordrecht,
2012),
pp.
61–87.
29.
W.
Salmon,
Scientific
explanation
and
the
causal
structure
of
the
world.
(Princeton
University
Press,
Princeton,
New
Jersey,
1984).
30.
M.
Kivelä
et
al.,
Multilayer
networks.
Journal
of
Complex
Networks
2,
203–271
(2014).
31.
J.
F.
Padgett,
C.
K.
Ansell,
Robust
Action
and
the
Rise
of
the
Medici,
1400–
1434.
American
Journal
of
Sociology
98,
1259–1319
(1993).
A.
Subramanian
et
al.,
A
Next
Generation
Connectivity
Map:
L1000
Platform
32.
and
the
First
1,000,000
Profiles.
Cell
171,
1437–1452.e1417.
33.
M.
C.
Whitlock,
Combining
probability
from
independent
tests:
the
weighted
Z--‐method
is
superior
to
Fisher's
approach.
Journal
of
evolutionary
biology
18,
1368–1373
(2005).
34.
D.
S.
Himmelstein
et
al.,
Systematic
integration
of
biomedical
knowledge
prioritizes
drugs
for
repurposing.
eLife
6,
e26726
(2017).
T.
M.
Errington
et
al.,
An
open
investigation
of
the
reproducibility
of
cancer
35.
biology
research.
Elife
3,
e04333
(2014).
36.
B.
A.
Nosek,
T.
M.
Errington,
Making
sense
of
replications.
eLife
6,
e23383
(2017).
S.
B.
Nissen,
T.
Magidson,
K.
Gross,
C.
T.
Bergstrom,
Publication
bias
and
the
37.
canonization
of
false
facts.
eLife
5,
e21451
(2016).
R.
McElreath,
P.
E.
Smaldino,
Replication,
Communication,
and
the
Population
38.
Dynamics
of
Scientific
Discovery.
PLOS
ONE
10,
e0136088
(2015).
39.
C.
Davidson--‐Pilon,
Bayesian
Methods
for
Hackers:
Probabilistic
Programming
and
Bayesian
Inference.
(Pearson
Education,
2015).
C.
T.
Bergstrom,
J.
D.
West,
M.
A.
Wiseman,
The
Eigenfactor™
Metrics.
The
40.
Journal
of
Neuroscience
28,
11433
(2008).
41.
J.
Kruschke,
Doing
Bayesian
Data
Analysis:
A
Tutorial
with
R,
JAGS,
and
Stan.
(Elsevier
Science,
2014).
42.
A.
Gelman
et
al.,
Bayesian
Data
Analysis.
(Taylor
&
Francis,
ed.
Third
edition,
2014).
13
43.
M.
Kivelä,
Multilayer
Networks
Library
for
Python
(Pymnet),
available
at
http://bitbucket.org/bolozna/multilayer--‐networks--‐library.
2017.
S.
Wasserman,
K.
Faust,
Social
network
analysis:
methods
and
applications.
44.
(Cambridge
University
Press,
Cambridge,
1994),
pp.
825.
A.
Bandrowski
et
al.,
The
Ontology
for
Biomedical
Investigations.
PLOS
ONE
45.
11,
e0154556
(2016).
46.
A.
Gonzalez--‐Beltran,
P.
Rocca--‐Serra,
O.
Burke,
S.--‐A.
Sansone.
(Available
online:
http://bioportal.bioontology.org/ontologies/STATO,
Last
accessed
on
07
November
2017,
2016).
47.
M.
M.
Kessler,
Bibliographic
coupling
between
scientific
papers.
American
Documentation
14,
10–25
(1963).
48.
B.
Peirson,
R.
Erick,
e.
al.
(http://diging.github.io/tethne/,
2017).
A.
Hagberg,
P.
Swart,
D.
S
Chult,
"Exploring
network
structure,
dynamics,
and
49.
function
using
NetworkX,"
(Los
Alamos
National
Laboratory
(LANL),
2008).
J.
Kunegis,
J.
Preusse,
in
Proceedings
of
the
3rd
Annual
ACM
Web
Science
50.
Conference.
(ACM,
2012),
pp.
175–184.
51.
L.
C.
Freeman,
Centrality
in
social
networks
conceptual
clarification.
Soc
Networks
1,
215–239
(1978).
52.
J.
M.
Badham,
Commentary:
Measuring
the
shape
of
degree
distributions.
Network
Science
1,
213–225
(2013).
53.
J.
Fox,
Effect
displays
in
R
for
generalised
linear
models.
Journal
of
statistical
software
8,
1–27
(2003).
D.
Lüdecke,
sjPlot:
data
visualization
for
statistics
in
social
science.
R
package
54.
version
2.3.3
(2017).
Acknowledgments
We thank A. Belikov, D. Centola, E. Duede, J. P.A. Ioannidis, M. Lewis, and T. Stoeger
for helpful discussions and comments, E. Demir and R. Melamed for advice on curated
drug-gene databases and high-throughput experimental data, respectively, W. Catino for
computational help, M. Kivelä for help with his Multilayer Networks Library for Python
(Pymnet), and T. Natoli from Broad Institute for advice on NIH LINCS L1000 data. We
used MEDLINE/PubMed and Web of Science data to build the co-paper networks. We
thank Clarivate Analytics for supplying the Web of Science data and T. Ando for
computing the journal eigenfactor scores. This work was supported by DARPA's Big
Mechanism research program grant 14145043, NSF SciSIP grant 1158803, and AFOSR
grant FA9550-15-1-0162.
14
Supplementary Materials
List of supplementary content:
Materials and Methods
Data Analysis
Figures
Tables
Materials and Methods
DATA
High-throughput drug-gene interactions
We used the Library of Integrated Network-based Cellular Signatures (LINCS) Phase I
L1000 data set to estimate claim replication (32). The data set measures the expression of
978 landmark genes treated with wide range of perturbagens across cell lines, time
points, and doses (concentration), resulting in approximately 1.3M profiles. The
experimental profiles are aggregated to 473,647 signatures, as represented in Level 5 data
we used to perform our analysis. The landmark genes are subsequently used to infer gene
expressions for the remaining genes in the human genome. In addition to the 978
landmark genes, we consider 9,196 for which the LINCS L1000 project estimated to be
well inferred, resulting in 10,174 Best INferred Genes (BING) in total. With respect to
perturbagen types, we used the set of small-molecule compounds (19,811 compounds),
which includes a subset of approximately 1,300 FDA-approved drugs. We accessed the
data file GSE70138_Broad_LINCS_Level5_COMPZ_n118050x12328_2017-03-
06.gctx.gz and metadata from the GEO depository at
https://www.ncbi.nlm.nih.gov/geo/query/acc.cgi?acc=GSE70138.
Published drug-gene interactions
We analysed curated data about published interactions between chemicals/drugs and
genes/mRNAs released by the Comparative Toxicogenomics Database (CTD) (6) on June
7 2016. (The current CTD data release is available here: http://ctdbase.org/downloads/.)
To align triples of drug, gene, and interaction effect in CTD to corresponding triples in
the experimental signatures from LINCS L1000, we performed the following procedures.
First, we selected drug-gene interactions about Homo sapiens, comprising approximately
40% of the CTD data. Second, CTD reports the form of the gene (e.g., mRNA, protein)
that is implicated, and we selected only mRNA as LINCS L1000 measures gene
expression at the mRNA level. Third, we mapped chemical names and Entrez gene IDs in
the CTD to perturbagen names and Entrez gene IDs in LINCS L1000. Fourth, to ensure
comparability to the LINCS L1000 signatures, we selected drug-gene interactions with a
single interaction effect, either "decreases expression" or "increases expression", defining
the direction of the effect that chemical/drug manifests on a gene/mRNA. Note that we
do not consider complex interactions with multiple, nested effects in our analysis.
15
Likewise, interactions for which the direction of the effect is not specified, such as
"affects binding", are not considered. The resulting corpus at the intersection of LINCS
L1000 and CTD comprises 51,292 drug-gene claim combinations of 605 unique drugs
and 9,123 unique genes, annotated from 3,363 scientific articles.
METHODS
Combining LINCS L1000 effect sizes
The LINCS L1000 team applied a moderated Z-scoring procedure to estimate weighted
average signatures. For each drug-gene interaction, we computed a combined gene
signature using Stouffer's method (33, 34) Z =
i=1! , where 𝑍! is an experimental z-score
and 𝑘 is the number of signatures. Using this procedure, we aggregated experiments
about drug-gene interactions across cell lines, dosages, and durations into a combined
effect size (z-score). Some drug-gene interactions generalize across conditions, whereas
others are context specific. We define as generalized drug-gene effect sizes that are
significant at the 0.05 level. To measure significance, for each drug-gene interaction, we
performed 10,000 bootstrap iterations on the combined z-score, sampling from
experiments performed under different cell lines, dosages, and durations. Conventionally,
if the 95% confidence intervals do not contain the null value of 0, we consider a drug-
gene interaction as generalized.
Measuring variability in LINCS L1000
To measure how each drug-gene interaction varies across cell lines, dosages, and
durations in LINCS L1000, we computed the coefficient of variation. The coefficient of
variation (CI) is the ratio of the standard deviation to the absolute value of the mean:
Zi
k
measure that allows us to make comparisons across drug-gene interactions.
Modelling claims' support in literature
We apply a binomial Bayesian model (39, 41, 42) to estimate the probability of scientific
𝐶𝐼= !!"#(!). In comparison to scale-dependent measures of variability, CI is a normalized
support 𝜃 for each drug-gene claim given the number of supportive findings 𝛾 in all
prior distribution of 𝜃 is uniform on the interval [0,1]: θ!~Uniform(min=0,max=1).
This uninformative prior considers all possible probability support values 𝜃 as equally
assume that the number of findings in support of a drug-gene claim 𝛾 follows a binomial
distribution 𝑝(𝛾𝑁,𝜃 ~ Binomial𝛾𝑁,𝜃 where Binomial𝛾𝑁,𝜃 ~ 𝑁𝛾 𝜃!(1−
𝜃)!!!. Then, the posterior density for 𝜃 is 𝑝𝜃𝛾 ∝ 𝜃!1−𝜃 !!!. We approximated
the posterior density of 𝜃 for each drug-gene claim by performing 10,000 Markov chain
findings N reported in CTD about a particular drug-gene interaction. We assume that the
possible and is suitable for the skewed distribution of findings over drug-gene claims. We
Monte Carlo (MCMC) sampling iterations (2,500 burn in iterations) for each drug-gene
claim using the Metropolis–Hastings MCMC sampler implemented in the PyMC package
(version 2.3.6) for Python. To improve convergence, we approximate the maximum
posterior (MAP) before running the MCMC sampler (39).
16
1,083 claims, supported and opposed in 3,525 and 42 articles, respectively); Moderate
from multiple papers (~7 papers on average), amounting to 325 claims that are supported
by 2,241 findings, but only opposed by 21; High support claims
Typology of drug-gene claims
To avoid setting arbitrary thresholds to categorize claims by their support in literature, we
used the posterior distributions from our Bayesian model of support. For each claim, we
estimated the overlap between the posterior credible intervals (PCI) and the null value of
µ = 0.5 (Fig. 1C): Very high support claims (𝐿!"#$ 95% PCI exceeds µ) yield agreement
(80% PCI ≥ 𝐿!"#$ < 95% PCI exceeds µ) yield agreement from 3 papers on average (N =
support claims (68% PCI ≥ 𝐿!"#$ < 80% PCI exceeds µ) yield agreement from 2 papers
respectively); Low support claims (68% PCI ≥ 𝐿!"#$ < 80% PCI contains µ) are
claims (𝐿!"#$ 68% PCI is smaller than µ) generate lower support than expected as a
We define replication as a binary variable 𝑅∈{0,1}, where R = 1 indicates that the
random replication rate 𝑅𝑅!"#$ by iteratively randomizing LINCS L1000 drug-gene
greater number of papers reported findings in the opposite direction (N = 77 claims,
supported and opposed in 101 and 484 articles, respectively) (Fig. S4).
Null model for estimating relative replication increase
overwhelmingly supported by a single paper or opposed by virtually the same number of
papers that support them such that the direction of the effect is undetermined (N = 46,064
claims, supported and opposed in 46,735 and 3,668 articles, respectively). Contradictory
direction (increase or decrease) of the effect claimed in literature is matched by the
combined z-score in LINCS L1000, and R = 0 otherwise. To estimate the amount of
relative replication increase (RRI), we first empirically established the expected or
on average (N = 3,743 claims, supported and opposed in 7,557 and 38 articles,
interactions. For each randomization, we computed the replication rate for all significant
drug-gene claims (N = 21,181) as well as for the collection of very high support (N =
136), high support (N = 406), moderate (N = 1,908), low (N = 18,688), and contradictory
(N = 43) claims against the drug-gene interactions from LINCS L1000 that randomly
matched them. We repeated the estimation procedure 100,000 times to generate
randomized distributions, mean randomized replication rates RRrand, and standard errors
of the RRrand (or SEM) for each claim type. This randomization model takes into account
biases in the distribution of published claims, as when disproportionately more claims of
a certain direction, either "increasing" or "decreasing", are present. This allows us to
conservatively estimate the expected replication rate on the basis of empirical data, rather
than assuming a random null value of 0.5. We bootstrapped (100,000 iterations with
replacement) the observed replication vector for each type of claim to generate
distributions of observed replication rates, mean observed replication rates RRobs, and the
standard error of RRobs (or SEM). We used the randomized and bootstrapped distributions
for each type of claim to estimate the percentage relative replication increase: 𝑅𝑅𝐼=
100 × RRobs!RRrand
multilayer network 𝑀= 𝑉!,𝐸!,𝐿 (30). The network consists of four layers, which we
plot using the Multilayer Networks Library for Python (Pymnet) (43). Nodes 𝑉! in the
Claim multilayer networks
To investigate the robustness of drug-gene claims, we represent each claim as a
17
RRrand
.
network are scientific papers. In each layer L, edges 𝐸 between pairs of papers represent
either a binary relationship of agreement and disagreement about effect direction (𝐿!), or
the amount of overlap between the two articles' authors (𝐿!), methods (𝐿!), and
references (𝐿!). For this analysis, we exclude claims with low support as estimated via
our Bayesian model because they are primarily reported by a single paper and therefore,
lack independence and robustness. To examine the impact of claim robustness on the
probability of replication in high-throughput experiments, we interrogated only
interactions that produce a replication signal by posting a statistically significant effect
size. These are claims that generalize across experimental and biological conditions in
LINCS L1000. By exploring only statements having significant agreement within the
literature and within LINCS L1000, we can directly examine the effect of social,
methodological, and epistemic dependencies on shaping agreement between literature
and high-throughput experiment. The sub-corpus of claims both supported in the
literature and significant within LINCS L1000 consists of 2,493 claims, associated with
6,272 supporting and 339 opposing findings from 1,282 papers. For each claim, we create
a multilayer co-paper network and model the predictive power of each layer on the
replicability of a claim in the LINCS L1000 experiments.
Quantifying overlap between articles' authors, methods, and references
To quantify the amount of overlap between papers, we used the Jaccard coefficient (JC).
JC is the size of intersection divided by the size of the union:
For any two sets of paper's attributes-i.e., authors, methods, or references-𝐴! and 𝐴!,
𝐽𝐶𝐴!,𝐴! =
!! ! !! ! !! ∩ !!. The resulting quantity represents the edge weight
!! ∩ !!
between a pair of articles in the respective network layers of shared authors (𝐿!),
methods (𝐿!), and references (𝐿!). Each drug-gene claim constitutes an undirected,
, where 𝑊 is the sum over
in a network layer 𝐸!"#=
multilayer network of papers connected via such weighted edges across layers (see Fig
2A).
Independence of findings
We define an independence score IND as the proportion of maximum possible edges (44)
!(!!!)/! not present, 𝐼𝑁𝐷=!!"#! !!!"#
!
all weighted edges in a claim's respective layer of shared authors, methods, or references.
The independence scores for social, methodological, and prior knowledge approaches 1
when most papers with findings in support of a claim share no common authors, methods,
and references, and 0 when all papers share all of their authors, methods, and references,
respectively.
Social independence
We used the MEDLINE/PubMed database to extract the set of authors for each paper. To
measure the overlap between two sets of authors, we need individual identifiers for
authors. Authors' name disambiguation is a common problem in research on scientific
knowledge production. We used the individual identifiers based on author last name and
initials. We note that because we assessed authors separately for each claim, our
conservative matching procedure is very unlikely to produce false positive author
linkages, and so our author co-paper network should be considered a lower bound for
18
author co-paper density. For the sub-corpus of 2,493 claims, sourced from 1,282 papers,
we estimated a mean of 6.4 authors per paper and a mean of 23.5 authors per scientific
community defined here as the total number of authors that have published papers
reporting a drug-gene claim. For the set of papers supporting a claim, we applied JC to
measure the overlap between any two sets of papers' authors and utilized the output to
compute claim's social independence 𝑆!"# using our independence score.
Methodological independence
We compiled a controlled vocabulary of 3,074 terms (incl. synonyms) concerning
methods, techniques, and experimental apparatus used in biomedical research using
ontologies of biomedical investigations (45) and statistics (46). We then used the
RESTful API Web Service of Europe PMC to query the methods sections from 4.4
million full text articles and extracted, on aggregate, 13,095 terms for 488 articles (38%).
In parallel, for all 1,282 articles that share a drug-gene claim, we applied fuzzy matching
against our vocabulary using the difflib module in Python and extracted 12,135 terms
from abstracts available in MEDLINE/PubMed. We combined the outputs from the two
search procedures. Then, for the set of papers supporting a claim, we again used JC to
measure the overlap between any two sets of papers' methods and then employed our
independence score to measure claim's methodological independence 𝑀!"#.
Prior knowledge independence
To examine whether a pair of publications is exposed to similar or dissimilar prior
information, we use the notion of bibliographic coupling (47), i.e., the number of
citations any two papers share. To compute bibliographic coupling, we used the Web of
Science citation data. Out of 1,282 papers sharing a drug-gene claim with at least one
other paper, we mapped 1,234 PubMed IDs to Web of Science IDs and performed
bibliographic coupling on this subset using Python modules Tethne (48) and NetworkX
(49). 880 of our 1,234 papers were coupled bibliographically by at least one paper.
Consistent with the procedure we applied to measure shared authors and methods, we
used JC to measure the overlap between any two sets of papers' citations and then
employed our independence score to measure claim's prior knowledge independence
𝐾!"#.
Centralization of scientific communities
To quantify the centralization of scientific communities in the bipartite author-article
networks for each claim, we employed the Gini coefficient. The Gini coefficient is used
to measure the heterogeneity of distributions in social and information networks (50).
The coefficient ranges between 0 and 1. In the context of a bipartite author-article
network, the coefficient approaches 0 when all investigators author equal numbers of
articles about a claim and increases to 0.3 and above (depending on the number of
articles), when one investigator authors all articles and all others author only one. The
Gini coefficient can be also represented as a percentage ranging from 0 to 100, as in
Figure 2D-E. While other measures of network centralization are available (e.g.,
Freeman's centralization (51)), the Gini coefficient, and the Lorenz curve on which it is
based, is independent from the underlying degree distribution, making it suitable for
comparisons among networks with different size and mean degree (50, 52).
19
Journal prominence
To measure journal prominence, we employed the journal eigenfactor score (40). The
eigenfactor score acts like a recursively weighted degree index by rating journals highly
that receive citations from journals that are themselves highly cited. Using the Web of
Science database, we computed journal eigenfactor scores for 3,162 papers (94% of all
3,363 papers in our corpus) published in 656 journals between 1995 and 2016. For the
sub-corpus of 1,282 papers with shared drug-gene claims, we recovered 1,212 papers or
95% published in 496 journals. For each claim, we computed mean journal eigenfactor
scores by averaging over the eigenfactor score of all journals that published a paper
reporting findings in support of the claim. The distribution of mean journal eigenfactor
scores (i.e., journal prominence) per claim is highly skewed (Figs. S4 and S5), indicating
that claims receive overwhelmingly support from findings published in low and medium
ranked journals. This highlights the value of archiving findings across a wide range of
journals, as do CTD and other scientific database projects, which makes possible our
large-scale evaluation of scientific output.
Shared authors and scientific agreement
To examine whether papers with shared authors are more likely to agree on the direction
("increasing expression" or "decreasing expression") of the drug-gene interaction, we
identified all pairs of papers with shared or distinct authors that reported findings about
the same drug-gene pair irrespective of the directionality of the effect. We found that
among the 2,514 edges between papers with shared authors, 2,486 (98.9%) agreed on the
direction of the effect. By comparison, among the 20,846 pairs of papers with distinct
authors, 18,527 (88.9%) agreed on the direction of the effect. To examine the differences
in agreement rates among papers with common versus distinct authors, we performed a
two-tailed bootstrap test (100,000 samples) (Fig. S2).
Predictors of replication success
We estimate logistic regression models to predict claim replication R [Replicated = 1,
Non-replicated = 0] as a function of support in the literature 𝐿!"#$, social independence
𝑆!"#, methodological independence 𝑀!"#, prior knowledge independence 𝐾!"#,
centralization 𝐶, journal prominence 𝐽, and experimental variability 𝑉. First, for
exploratory purposes, we model each variable independently (see Table S1):
logit P𝑅=1 =𝛽!+𝛽!× 𝐿!"#$
𝛽!+𝛽!× 𝑆!"#
𝛽!+𝛽!× 𝑀!"#
𝛽!+𝛽!× 𝐾!"#
𝛽!+𝛽!× 𝐶
𝛽!+𝛽!× 𝐽
𝛽!+𝛽!× 𝑉.
Second, we model our variables simultaneously (see Table S2):
logit Ρ𝑅=1 =𝛽!+𝛽!×𝐿!"#$+𝛽!×𝑆!"#+𝛽!×𝑀!"#+𝛽!×𝐾!"#+𝛽!×𝐶+𝛽!×𝐽+𝛽!×𝑉.
20
Third, we estimate two interaction models to examine the effect of support in the
literature on replication success as a function of social independence and centralization,
respectively (see Figs. 3 and S8–9):
logit P𝑅=1 =𝛽!+𝛽!×𝐿!"#$× 𝑆!"#+𝛽!×𝑉
𝛽!+𝛽!×𝐿!"#$× 𝐶+𝛽!×𝑉.
To estimate and visualized the logistic regression models, we used the "glm" function
and the "effects" (53) and "sjPlot" (54) packages for R.
Data Analysis
Robustness analysis
Some of our variables are correlated (e.g., methodological independence and prior
knowledge independence; see Fig. S7), which is to be expected as they capture related
dimensions of scientific knowledge production. We performed a multicollinearity test
using the variance inflation factor (VIF). The variance inflation factors vary from low for
variability in LINCS L1000 (VIF = 1.015), journal prominence (VIF = 1.135), and
support in literature (VIF = 1.534) to moderate for centralization (VIF = 3.162),
methodological independence (VIF = 3.752), prior knowledge independence (VIF =
4.681), and social independence (VIF = 4.900). We observe no predictor with high
variance inflation factor, i.e., VIF ≥ 10. We removed the two variables with the highest
VIF > 4 and refit our logistic regression model. In the refitted model, both support in the
literature and decentralization of scientific communities remain strong and significant
predictors of replication success (Fig. S10). Further, we verified that the effects of
support from the literature and community centralization on claim replication success are
not dominated by outliers. Recall the long-tailed distribution of findings per claim, with
few claims receiving support from many published findings (Fig. 1A). We removed
claims supported by 10 or more findings, amounting to 26 claims supported by 426
findings and found that support from the literature (OR 34.785; 95% CI: 12.518, 96.662,
P = 1.00e-11) and community centralization (OR 0.335; 95% CI: 0.249, 0.451, P =
5.57e-13) remain strong and significant predictors of replication success, after controlling
for biological and experimental variability in LINCS L1000 (OR 0.726; 95% CI: 0.429,
1.232; P = 0.236). Similarly, the distribution of findings per paper and per pair of papers
is heterogeneous (Fig. S11). We removed the largest set of 796 drug-gene claims reported
by a pair of papers and still found that the effect of support from the literature (OR
19.512; 95% CI: 7.193, 52.929, P = 5.37e-09) and centralization (OR 0.432; 95% CI:
0.287, 0.65, P = 5.71e-05) holds and is not explained by variability in LINCS L1000 (OR
0.574; 95% CI: 0.279, 1.181; P = 0.131).
21
A
Small
science
Big
science
B
Small
science
s
e
i
t
i
n
u
m
m
o
c
f
o
r
e
b
m
u
N
104
103
102
101
100
100
N = 51,292
101
102
Size of scientific communities
reporting a claim (# of authors)
s
e
i
t
i
n
u
m
m
o
c
f
o
r
e
b
m
u
N
102
101
100
100
Big
science
N = 2,493
101
102
Size of scientific communities
reporting a claim (# of authors)
Fig. S1. A continuum of "small" to "big" science communities defined as the total
number of authors that have published papers reporting a drug-gene claim. (A-B)
Distribution of scientific communities of different sizes against the number of
communities for the corpus of 51,292 and for the sub-corpus of 2,493 claims,
respectively.
22
A
y
c
n
e
u
q
i
r
F
8000
6000
4000
2000
Papers with
shared authors
Papers with
distinct authors
B
8000
6000
4000
2000
0
0.85
0.9
0.95
1
Agreement rate among pairs of papers
0
Difference between agreement rates
0.05
0.1
0
Fig. S2. Publications that share authors are more likely to agree about the direction
of a drug-gene interaction than publications with distinct authors, computed among
pairs of papers reporting claims in the sub--‐corpus
of
2,493 claims. (A) Bootstrap
samples of agreement (1 = agreement, 0 = disagreement) among pairs of papers that
reported findings about the same drug-gene interaction depending on whether the pairs of
papers shared (2,514 pairs of papers) or did not share author(s) in common (20,846 pairs
of papers). (B) A two-tailed bootstrap test of difference between means indicates that
papers with one or more authors in common have significantly higher agreement rates
than pairs of papers with distinct authors (100,000 samples with replacement). The solid
dark line indicates the sample mean, the dashed line indicates 95% CI, and the red line
indicates the null hypothesis.
23
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
A
n
o
i
t
y
t
i
l
i
a
c
i
l
b
a
b
o
r
P
p
e
r
i
m
a
c
f
l
o
B
n
o
i
t
y
t
i
l
i
a
c
i
l
b
a
b
o
r
P
p
e
r
i
m
a
c
f
l
o
OR = 2.33; 95% CI: 1.82, 2.97
P < 0.0001
N = 51,292
0.0
0.4
0.6
0.2
0.8
Support in literature
N = 21,181
n
o
i
t
a
c
i
l
p
e
r
i
m
a
c
f
l
y
t
i
l
i
b
a
b
o
r
P
1.0
o
n
o
i
t
OR = 3.50; 95% CI: 2.40, 5.11
P < 0.0001
y
t
i
l
i
b
a
b
o
r
P
a
c
i
l
p
e
r
i
m
a
c
f
l
o
1.0
0.0
0.6
0.4
0.2
0.8
Support in literature
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
OR = 0.04; 95% CI: 0.002, 0.72
P = 0.029
0.2
0.4
0.0
1.0
Variability in LINCS L1000
0.6
0.8
OR = 0.56; 95% CI: 0.44, 0.72
P < 0.0001
0.2
0.4
0.0
1.0
Variability in LINCS L1000
0.6
0.8
Fig. S3. Replication success increases with claim's probability of support in the
literature. (A) Probability of claim replication estimated via a logistic regression model
with replication as the response variable and support in the literature and experimental
variability as predictors, for the whole corpus of 51,292 claims. (B) Same as A but for the
subset of 21,181 significant drug-gene interactions in LINCS L1000. For each variable,
we indicate odds ratios (OR), 95% confidence interval, and significance.
24
B
100
Supporting
Opposing
A
s
g
n
d
n
i
i
f
f
o
r
e
b
m
u
n
n
a
e
M
l
i
m
a
c
r
e
p
10.0
7.5
5.0
2.5
0.0
Low
Moderate
High
Very High
Contradictory
Types of claims
by support
Very High
support
N = 325
)
n
o
%
i
t
(
s
m
a
c
u
b
i
r
t
s
d
i
i
l
e
n
e
g
-
g
u
r
d
e
v
i
t
l
a
u
m
u
C
f
o
High
support
N = 1,083
Moderate
support
N = 4,743
80
60
40
20
Low
support
N = 46,064
Contradictory
N = 77
0
0
0.4
0.2
0.8
Probability of support in literature
0.6
1
Fig. S4. Description of claim types in the whole
corpus
of
51,292
claims. (A) Mean
number of findings supporting or opposing the direction of the effect for a scientific
claim across our typology. (B) Cumulative distribution of the probability of support in the
literature, including a schematic of our claim typology.
25
y
t
i
s
n
e
D
30
20
10
0
0
0.3
0.2
0.1
y
t
i
s
n
e
D
N = 51,292
0.5
Support in literature
1
y
t
i
s
n
e
D
30
20
10
0
0
Abs. combined z-scores
N = 51,292
y
t
i
s
n
e
D
0
0
Effect sizes in LINCS L1000
150
100
50
N = 50,346
12
Journal prominence
× 10-5
N = 51,292
2
1.5
1
0.5
0
Variability in LINCS L1000
46
2
× 104
Fig. S5. Estimates of probability density functions for variables of interest in our
corpus using a normal kernel function. We used the normal kernel function to estimate
probability density functions.
26
20
10
0
0
10
5
0
-0.5
10
5
0
-0.2
y
t
i
s
n
e
D
y
t
i
s
n
e
D
y
t
i
s
n
e
D
y
t
i
s
n
e
D
N = 2,493
20
10
N = 2,493
0.5
Support in literature
1
N = 2,493
0
0.5
1
Methodological
independence
N = 2,493
0
-0.5
0
1
Social independence
0.5
40
20
0
-0.5
100
50
N = 2,493
0
0.5
1
Prior knowledge
independence
N = 2,491
0
0.2
Centralization
0.4
0
0
12
Journal prominence
0.1
0.05
N = 2,493
0.4
0.2
N = 2,493
0
-200
Effect size in LINCS L1000
-100
100
0
0
20
Variability in LINCS L1000
10
0
Fig. S6. Estimates of probability density functions for our variables for the sub-
corpus of claims with determined direction of the drug-gene effect in CTD and
LINCS L1000. As in Fig. S5, we used the normal kernel function to estimate probability
density functions.
27
Prior knowledge independence
Methodological independence
0.79
Social independence
0.74
0.66
Centralization
−0.62
−0.33
−0.03
Corr
1.0
0.5
0.0
−0.5
−1.0
Centralization
Social independence
Prior knowledge independence
Methodological independence
Fig. S7. Pearson correlation coefficients between network indices. Social,
methodological, and prior knowledge (in)dependencies are positively correlated with
each other and negatively correlated with the network centralization of scientific
communities. N = 2,493 claims.
28
A
n
o
i
t
a
c
i
l
p
e
r
i
m
a
c
f
l
o
y
t
i
l
i
b
a
b
o
r
P
0
0.2
Support in literature
1
0.5
0.8
1.0
0.8
0.6
0.4
0.2
0.0
C
0.0
0.2
0.6
0.4
Centralization
0.8
1.0
Intercept
Support in
literature*Centralization
Variability in LINCS L1000
B
n
o
i
t
a
c
i
l
p
e
r
i
m
a
c
f
l
o
y
t
i
l
i
b
a
b
o
r
P
1.0
0.8
0.6
0.4
0.2
0.0
0.0
0.2
0.4
0.6
0.8
1.0
Variability in LINCS L1000
B
SE Exp(B)
0.823*** 0.079 0.553
–1.96*** 0.35 28.786
95% CI
[1.951, 2.657]
[0.071, 0.28]
–0.47 0.265 0.704
[0.372, 1.052]
Fig. S8. Claims reported by centralized communities less likely replicate. (A-C),
Logistic interaction model with claim replication as the response variable regressed on
support in the literature and centralization as interacting predictors, controlling for
variability in LINCS L1000 across cell lines, durations, and dosages. Predictors are
rescaled
!"#!!!"# (!) for comparability. N = 2,493 claims. *** P < 0.001; ** P < 0.01;
!!!!"# (!)
* P < 0.05.
29
A
n
o
i
t
a
c
i
l
p
e
r
i
m
a
c
f
l
o
y
t
i
l
i
b
a
b
o
r
P
0
0.2
Support in literature
1
0.5
0.8
1.0
0.8
0.6
0.4
0.2
0.0
C
0.0
0.4
0.2
0.8
Social independence
0.6
Intercept
Support in literature*Social
independence
Variability in LINCS L1000
B
n
o
i
t
a
c
i
l
p
e
r
i
m
a
c
f
l
o
y
t
i
l
i
b
a
b
o
r
P
1.0
1.0
0.8
0.6
0.4
0.2
0.0
0.0
0.2
0.4
0.6
0.8
1.0
Variability in LINCS L1000
B
SE Exp(B)
–0.59*** 0.148 0.553
3.36*** 0.384 28.786
95% CI
[0.414, 0.738]
[13.56, 61.1]
–0.351 0.268 0.704
[0.417, 1.189]
Fig. S9. Claims reported by multiple socially independent teams more likely
replicate. (A-C) Logistic interaction model with claim replication as the response
variable regressed on support from the literature and social independence as interacting
predictors, controlling for variability in LINCS L1000 across cell lines, durations, and
dosages. Predictors are rescaled
!!!!"# (!)
*** P < 0.001; ** P < 0.01; * P < 0.05.
!"#!!!"# (!) for comparability. N = 2,493 claims.
30
Support in literature
20.72 ***
Journal prominence
2.69
Methodological independence
Variability in LINCS L1000
1.23
0.66
Centralization
0.39 ***
0.2 0.5 1 2
Claim replication (OR, 95% CI)
5 10 20 50
Fig. S10. Support in the literature and decentralization of scientific communities
remain strong and significant predictors of claim replication success after we
account for multicollinearity. Logistic model with replication as the response variable,
including only predictors with relatively low variance inflation factor (VIF < 4).
Predictors are rescaled
!!!!"# (!)
!"#!!!"# (!) for comparability. N = 2,491 claims. *** P < 0.001;
** P < 0.01; * P < 0.05.
31
A
s
r
e
p
a
p
f
o
r
e
b
m
u
N
102
101
100
100
101
102
Number of findings
reported by a paper
B
s
r
e
p
a
p
f
o
s
r
i
a
p
f
o
r
e
b
m
u
N
105
104
103
102
101
100
100
Number of findings reported by
101
102
a pair of papers
Fig. S11. Papers and pairs of papers are differentiated by the number of findings
they report (in the sub-corpus of 2,493 claims). (A) Distribution of papers against the
number of supporting findings they report. (B) Distribution of pairs of papers against the
number of supporting findings they report.
32
Variable
B
SE Exp(B)
95% CI
Intercept
Support in literature
Intercept
Journal prominence
Intercept
Social independence
Intercept
Methodological independence
Intercept
Prior knowledge independence
Intercept
Variability in LINCS L1000
Intercept
Centralization
–0.762*** 0.195
3.144*** 0.479
0.47
23.2
[0.318, 0.684]
[9.078, 59.287]
0.414***
1.513
2.379*** 0.564 10.795
0.046
[1.384, 1.654]
[3.571, 32.638]
–1.053***
0.193
1.843*** 0.224
0.349
6.312
[0.239, 0.509]
[4.069, 9.793]
–1.004***
0.255
1.841*** 0.308
–1.14**
1.71***
0.585***
-0.444
0.376
0.388
0.065
0.264
0.8***
0.062
–1.018*** 0.149
0.366
6.301
0.32
5.53
1.794
0.641
2.224
0.361
[0.222, 0.604]
[3.444, 11.527]
[0.153, 0.668]
[2.584, 11.835]
[1.579, 2.039]
[0.382, 1.077]
[1.972, 2.51]
[0.27, 0.484]
33
Table S1. Logistic regression models with claim replication R [Replicated = 1, Non-
replicated = 0] as response variable and predictors modelled independently.
Predictors are rescaled
!!!!"# (!)
!"#!!!"# (!) for comparability. N = 2,493 claims (N = 2,491 in
the Journal eigenfactor model); *** P < 0.001; ** P < 0.01; * P < 0.05.
Variable
B
SE Exp(B)
95% CI
Intercept
Support in literature
Journal prominence
Social independence
Methodological independence
Prior knowledge independence
Variability in LINCS L1000
Centralization
0.5
–0.693* 0.352
2.729*** 0.595 15.316
2.769
1.881
0.833
0.971
0.664
0.48
0.563
0.486
0.585
0.769
0.271
–0.734** 0.268
1.019
0.632
–0.183
–0.029
–0.41
[0.251, 0.996]
[4.772, 49.153]
[0.918, 8.355]
[0.725, 4.877]
[0.265, 2.621]
[0.215, 4.383]
[0.391, 1.128]
[0.284, 0.812]
Table S2. Logistic regression models with claim replication R [Replicated = 1, Non-
replicated = 0] as response variable and predictors modelled simultaneously.
Predictors are rescaled
!!!!"# (!)
!"#!!!"# (!) for comparability. N = 2,491 claims; *** P < 0.001;
** P < 0.01; * P < 0.05.
34
|
1805.03348 | 1 | 1805 | 2018-05-09T02:01:19 | Wisdom in Sum of Parts: Multi-Platform Activity Prediction in Social Collaborative Sites | [
"cs.SI",
"cs.DL",
"cs.SE"
] | In this paper, we proposed a novel framework which uses user interests inferred from activities (a.k.a., activity interests) in multiple social collaborative platforms to predict users' platform activities. Included in the framework are two prediction approaches: (i) direct platform activity prediction, which predicts a user's activities in a platform using his or her activity interests from the same platform (e.g., predict if a user answers a given Stack Overflow question using the user's interests inferred from his or her prior answer and favorite activities in Stack Overflow), and (ii) cross-platform activity prediction, which predicts a user's activities in a platform using his or her activity interests from another platform (e.g., predict if a user answers a given Stack Overflow question using the user's interests inferred from his or her fork and watch activities in GitHub). To evaluate our proposed method, we conduct prediction experiments on two widely used social collaborative platforms in the software development community: GitHub and Stack Overflow. Our experiments show that combining both direct and cross-platform activity prediction approaches yield the best accuracies for predicting user activities in GitHub (AUC=0.75) and Stack Overflow (AUC=0.89). | cs.SI | cs | Wisdom in Sum of Parts: Multi-Platform Activity
Prediction in Social Collaborative Sites
Roy Ka-Wei Lee
David Lo
Living Analytics Research Centre
Singapore Management University
[email protected]
Singapore Management University
[email protected]
8
1
0
2
y
a
M
9
]
I
S
.
s
c
[
1
v
8
4
3
3
0
.
5
0
8
1
:
v
i
X
r
a
ABSTRACT
In this paper, we proposed a novel framework which uses user in-
terests inferred from activities (a.k.a., activity interests) in multiple
social collaborative platforms to predict users' platform activities.
Included in the framework are two prediction approaches: (i) direct
platform activity prediction, which predicts a user's activities in a
platform using his or her activity interests from the same platform
(e.g., predict if a user answers a given Stack Overflow question
using the user's interests inferred from his or her prior answer and
favorite activities in Stack Overflow), and (ii) cross-platform activity
prediction, which predicts a user's activities in a platform using his
or her activity interests from another platform (e.g., predict if a user
answers a given Stack Overflow question using the user's interests
inferred from his or her fork and watch activities in GitHub). To
evaluate our proposed method, we conduct prediction experiments
on two widely used social collaborative platforms in the software
development community: GitHub and Stack Overflow. Our experi-
ments show that combining both direct and cross platform activity
prediction approaches yield the best accuracies for predicting user
activities in GitHub (AUC=0.75) and Stack Overflow (AUC=0.89).
KEYWORDS
Social Collaborative Platforms; Prediction; Stack Overflow; GitHub
ACM Reference Format:
Roy Ka-Wei Lee and David Lo. 2018. Wisdom in Sum of Parts: Multi-Platform
Activity Prediction in Social Collaborative Sites. In WebSci'18: 10th ACM
Conference on Web Science, May 27–30, 2018, Amsterdam, Netherlands. ACM,
New York, NY, USA, 10 pages. https://doi.org/10.1145/3201064.3201067
1 INTRODUCTION
Software developers are increasingly adopting social collaborative
platforms for software development. GitHub and Stack Overflow are
two of such popular platforms. GitHub is a collaborative software
development platform that allows code sharing and version control.
Users can participate in various activities in GitHub, for example,
users may fork (i.e., create a copy of) repositories of other users or
watch the activities of repositories of interest. Stack Overflow is a
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
WebSci'18, May 27–30, 2018, Amsterdam, Netherlands
© 2018 Association for Computing Machinery.
ACM ISBN 978-1-4503-5563-6/18/05...$15.00
https://doi.org/10.1145/3201064.3201067
technical question-and-answer community-based website where
users post and answer questions relating to software development.
As these social collaborative platforms gain popularity, many
research studies have proposed recommender systems to improve
the usability of these platforms. For example, there are work which
predict and recommend relevant Stack Overflow questions and
answers to aid users in software development [7, 32, 34]. While
for GitHub, researchers have proposed methods to predict which
software repositories are more relevant to a target user [9, 11, 43].
Nevertheless, many of these studies only consider the users' be-
haviours and interests in a single platform when predicting and
recommending user platform activities.
There have been few existing inter-platform studies on GitHub
and Stack Overflow. Vasilescu et al. [29] studied how users' involve-
ment in Stack Overflow impacted their productivity in GitHub.
Badashian et al. [2] did an empirical study on the correlation be-
tween different types of user activities in GitHub and Stack Over-
flow. In a more recent study by Lee and Lo [15], the researchers
found that users who have accounts on both GitHub and Stack
Overflow do share similar interests across the two platforms. For
example, a user who commits to Java-related repositories in GitHub,
is likely to also answer Java-related questions in Stack Overflow.
In this paper, we aim to extend the study in [15], and propose a
multi-platform activity prediction method, which predicts a user's
activities in a platform using the user's interests inferred from his
or her activities in multiple platforms.
Figure 1 illustrates an example for activity prediction in a multi-
platform setting. Consider user u, who has accounts on both GitHub
and Stack Overflow. If we adopt a direct platform activity prediction
approach, i.e., predicts a user's activities in a platform using his or
her activity interests from the same platform, we could predict that
u is likely to answer or favorite1 question X in Stack Overflow as u
has previously answered a LSTM related question. However, if we
adopt a cross-platform activity prediction approach, i.e., predicts a
user's activities in a platform using his or her activity interests from
another platform, we could predict that u is also likely to answer
or favorite a SVM related question Y as u has previously watched2
a SVM related repository B in GitHub.
The social collaborative nature of these platforms could also
be exploited for activity prediction. According to Lee and Lo [15],
users who participated in the same GitHub repositories and Stack
Overflow questions tend to share common interests. Therefore, we
also explore the possibility to expand a user's interests to include
the interests of users whom he or she had co-participated activities
with. Referencing to the same example in Figure 1, user v co-forked
1Bookmark a question in Stack Overflow
2Subscribe and receive updates on a repository in GitHub
Figure 1: Example of Activity Prediction in Multi-Platform Setting
the same scikit-learn related repository as u and forked another
XGBoost related repository. Although u did not participate in any
XGBoost related repositories and questions, we can "expand" u's
interests to include XGBoost as it is an interest of user v. Finally, we
could predict that u is likely to also answer or favorite a XGBoost
related question. This expansion of interests could be particularly
useful when a user has participated in very few activities on either
platform. Note that the example also work for predicting GitHub
activities using user's activities in Stack Overflow.
There are a number of benefits for using user interests from
multi-platforms for activity prediction. Firstly, it enables predic-
tion and recommendation of user activities in social collaborative
platforms even when past activity history of a user is minimal or
unavailable, i.e, cold-start problem [23]. For example, if we learn
from a user's activities in GitHub that she is interested in Python
and text mining techniques, we would predict that she will likely
participate in Python and text mining related Stack Overflow ques-
tions even when she has just newly joined Stack Overflow and has
not participated in any questions. Second, it could cover the blind
spots of activity recommender systems which use only data from a
single platform. For example, if a user has forked Android related
repositories in GitHub, recommender systems which are built on
user's past activity in GitHub will likely to recommend the user
more Android related repositories. However, the same user may
have also participated in some iOS related questions in Stack Over-
flow, and such observations can be used to make relevant GitHub
activity recommendations to the user.
Contributions. This work improves the state-of-the-art of inter-
platform studies on multiple social collaborative platforms. Key
contributions of this work include: Firstly, we proposed a novel
framework which enables predicting users' activities using inter-
ests inferred from their activities in multiple social collaborative
platforms. Secondly, we evaluate our method using large real-world
datasets from Stack Overflow and GitHub. The results from our
prediction experiments show that our proposed method is able to
predict users' activities in GitHub and Stack Overflow with good
accuracy, achieving an AUC score of up to 0.75 and 0.89 respectively.
Paper outline. The rest of the paper is organized as follows.
Section 2 introduces the social collaborative platform activity pre-
diction problem and describe our proposed the multi-platform pre-
diction framework. Section 3 describe the data extraction process
and the two real-world datasets, Stack Overflow and GitHub, that
we used in our prediction experiments. Section 4 presents our ex-
periments to predict user activities in the two social collaborative
platforms using our proposed framework. Threat to validity of our
study are discussed in Section 5. Section 6 reviews the literature
related to our study. Finally, we summarize and conclude our work
in Section 7.
2 PROPOSED METHOD
In this section, we first present our proposed multi-platform activity
prediction framework. We then define the prediction problem and
describe the features used in our proposed prediction method.
2.1 Multi-Platform Prediction Framework
Figure 2 shows the framework that we adopt for multi-platform
activity prediction. We begin with data extraction from two social
collaborative platforms: Stack Overflow and GitHub. There are
three sub-processes in data extraction: (i) matching of users Stack
Overflow and GitHub accounts, (ii) extracting the users' platform
activities, and (iii) inferring users' interests from their activities.
The details of these sub-processes will be covered in Section 3. Next,
we construct the Stack Overflow and GitHub user features which
we will use in our prediction.
Our framework also incorporates two approaches to predict
users' platform activities, namely: direct and cross platform activity
prediction. We define direct platform activity prediction as predict-
ing a user's platform activity using features from the same platform.
For example, we predict if a given user will answer a given Stack
Overflow question using the user's Stack Overflow features. Con-
versely, we define cross-platform activity prediction as predicting a
platform activity to a user using features from a different platform.
For example, we predict if a given user will answer a given Stack
Overflow question using the user's GitHub features. The perfor-
mance of both prediction approaches will be evaluated on four
prediction tasks, which will be described in Section 4.
Repository A<LSTM>Repository B<SVM>Repository C<scikit-learn>Repository D<XGBoost>Question Z<XGBoost>Question Y<SVM>Question X<LSTM>Question W<LSTM>user uuser vforkwatchforkforkforkansweranswer/favorite?favoriteanswer/favorite?answer/favorite?Figure 2: Cross-Platform Activity Prediction Framework
2.2 Problem Statement
Given a pair of query user and item (i.e., question or repository),
(u, k), we aim to predict if u will perform an activity (e.g. answer,
favorite, fork or watch) on k. There are various ways to measure
the likelihood of u performing an activity on k. For example, we
could consider the similarity between k's description and u's inter-
ests inferred from different activities, or the similarity between k's
description and the inferred interests of the user who co-participate
activities with u. In our proposed framework, we propose two types
of user features, namely:user activity interest similarity features
and user co-activity interest similarity features. The notations used
throughout this paper are summarized in Table 1.
We denote the estimated interests of a user given a repository
r that he or she forked and watched in GitHub as I(r). Similarly,
we denote the estimated interests of a user given a question q that
he or she answered and favorited in Stack Overflow as I(q). Since
the estimated interests given a repository or a question is the same
for all users participated in it, we also refer to I(r) and I(q) as the
interests in r and q. For simplicity, we also refer to them as r's
interests and q's interests respectively.
2.3 User Activity Interest Similarity Features
This set of features measures the similarity between a query item
k and a query user u's fork, watch, answer and favorite activity
interests in GitHub and Stack Overflow. The intuition behind this
set of features comes from the empirical study from Lee and Lo
[15], where they found that users in GitHub and Stack Overflow
shared similarities between their interests in different types of
activities and across the two platforms. Suppose that we want to
predict if a user would fork a given repository in GitHub, we would
measure the similarity between the given repository's interests and
the developer's interests for the different activity types. Intuitively,
Table 1: List of notations used
Symbol
u
k
v
r
q
I(r)
I(q)
I(k)
u.RF
u.RW
u.QA
u.QF
CoF ork(u)
CoW atch(u)
CoAns(u)
CoF av(u)
Description
Query user
Query item
User who co-participated activities with user u
Repository
Question
Interests of repository r
Interests of question q
Interests of query item k
Set of repositories forked by user u
Set of repositories watched by user u
Set of questions answered by user u
Set of questions favorited by user u
Set of users who co-forked at least one reposi-
tory with user u
Set of users who co-watched at least one repos-
itory with user u
Set of users who co-answered at least one ques-
tion with user u
Set of users who co-favorited at least one ques-
tion with user u
the higher the similarity scores, the more likely the user would fork
the given repositories. Equation 1 captures the above intuition and
measures similarity between k and u's fork activity interests (i.e.,
SimF ork(u, k)), by dividing {r ∈ u.RFI(r) ∈ I(k))}, which is the
number of u's forked repositories that shared common interests
with the item interests of k, by the total number of repositories
forked by u (i.e.,u.RF).
Answer FavoriteQuestionsGitHubUsersForkWatchRepositoriesStack Overflow UsersMatch Users with SO and GH AccountsInfer User Interests in Stack OverflowInfer User Interests in GitHubAnswer Interests SimilarityFavorite Interests SimilarityCo-Answer Interests SimilarityCo-Favorite Interests SimilarityStack Overflow FeaturesFork Interests SimilarityWatch Interests SimilarityCo-Fork Interests SimilarityCo-Watch Interests SimilarityGitHub FeaturesData ExtractionFeature ConstructionEvaluationStack OverflowTask S1: Predict if user answer a given questionTask S2: Predict if user favorite a given questionGitHubTask G1: Predict if user fork a given repositoryTask G2: Predict if user watch a given repositoryDirect PlatformDirect Platform Cross PlatformPredictionCross PlatformStack OverflowGitHubRepository C), while the total number of repositories forked by v
1
is 2 (i.e., Repository C and D). Finally, SimCoF ork(u, k) =
1 = 0.5.
2
SimCoF ork(u, k) =
(1)
(2)
(3)
SimCoW atch(u, k) =
SimCoAns(u, k) =
v ∈CoF or k(u)
{r ∈v .RF I(r)∈I(k)}
v .RF
CoF ork(u)
v ∈CoW atch(u)
{r ∈v .RW I(r)∈I(k)}
v .RW
CoW atch(u)
v ∈CoAns(u)
{q∈v .QAI(q)∈I(k)}
v .QA
CoAns(u)
(cid:21)
(cid:21)
(cid:21)
(cid:21)
(5)
(6)
(7)
Example. Referencing to the earlier example in Figure 1, we
could predict if user u will answer question X by computing the
similarity between question X and u's fork activity interests. In this
example, the common interests between u and question X will be
LSTM. The number of u's forked repositories that shared common
interests with question X (i.e.,{r ∈ u.RFI(r) ∈ I(k))}) will then be
1 (i.e., Repository A), while the total number of repositories forked
by u is 2 (i.e., Repository A and B). Thus, SimF ork(u, k) = 1
2 = 0.5.
SimF ork(u, k) =
SimW atch(u, k) =
SimAns(u, k) =
{r ∈ u.RFI(r) ∈ I(k))}
{r ∈ u.RW I(r) ∈ I(k)}
{q ∈ u.QAI(q) ∈ I(k)}
u.RF
u.RW
u.QA
{q ∈ u.QFI(q) ∈ I(k)}
SimF av(u, k) =
u.QF
(4)
We compute the similarities between k and u's watch, answer
and favorite activities interests in similar ways as shown in Equation
2, 3 and 4 respectively.
2.4 User Co-Activity Interest Similarity
Features
This set of features measures the similarity between a query item k
and the activity interests of other users v who have co-participated
in an activity with a query user u. The intuition behind this set
of features also comes from the empirical study from Lee and Lo
[15], where they found that users share similar interests with other
users who they co-participated an activity (even minimally) in a
social collaborative platform. Suppose that we want to predict if a
user would fork a given repository in GitHub, we would measure
the similarity between the given repository's interests and the
interests of other users who had co-forked repositories with the
user in GitHub. Intuitively, we would also expect that the higher the
similarity score, the more likely the user would answer the given
question. Equation 5 captures the above intuition and measures the
average similarity between k and fork activity interests of all users
v, who had co-forked at least one question with u (i.e., CoF ork(u)).
As users also share common interests across different activities
and platforms, we would expect that considering other users who
had co-participated in other types of platform activities with the
target user can also potentially help to predict if the target user
would participate in a given platform activity. For instance, we are
potentially able to predict if a user would fork a given repository
by measuring the similarity between the given repository's interest
and the interests of other users who have co-participated with the
user in watch, answer and favorite activities.
Example. Referencing to the example in Figure 1, we could
predict if user u will favorite question Z by computing the similarity
between question Z and the fork activity interests of other users
who have co-fork a repository with user u. Assuming that user u
only has 1 other user, v, who co-fork repositories with him or her,
the common interests between v and question Z will be XGBoost.
The number of v's forked repositories that shared common interests
with question Z (i.e.,{r ∈ v.RFI(r) ∈ I(k))}) will then be 1 (i.e.,
(cid:20)
(cid:20)
(cid:20)
(cid:20)
v ∈CoF av(u)
{q∈v .Q F I(q)∈I(k)}
v .Q F
SimCoF av(u, k) =
We compute the similarities between k and activity interests of
other users v who have co-watched, co-answered and co-favorited
with a target user u in similar ways as shown in Equation 6, 7 and
8 respectively.
CoF av(u)
(8)
3 DATA EXTRACTION & EXAMINATION
In this section, we first introduce the two large real-world datasets
that we use in our activity prediction experiments. Next, we dis-
cuss the user accounts linkage process to retrieve users who are
active in multiple social collaborative sites, and a summary of the
users' activities retrieved. We then discuss the heuristic used to
infer user interests from their participated activities. Finally, we
empirically examine the similarity between the GitHub repositories
and Stack Overflow questions participated by users on both social
collaborative sites.
3.1 Datasets
There are two main datasets used in our study. For the GitHub
dataset, we use the MongoDB database dump released on March
2015 [8]. The dataset contains GitHub activities from October 2013
to March 2015 of about 2.5 million users. Specifically, we are inter-
ested in the fork and watch repositories activities of the GitHub
users. For Stack Overflow, we use the XML dataset released on
March 20153. This dataset contains information of estimated 1 mil-
lion Stack Overflow users and their activities from October 2013
to March 2015. We are particularly interested in the answer and
favorite activities of the Stack Overflow users.
3.2 User Account Linkage
As this study intends to investigate user interests across GitHub
and Stack Overflow, we need to identify users who were using both
platforms. For this work, we used the dataset provided by Badashian
et al. [2], where they utilized GitHub users' email addresses and
Stack Overflow users' email MD5 hashes to find the intersection
between the two datasets. We also filter out users who do not have
3https://archive.org/details/stackexchange
at least 1 activity on both platforms between October 2013 and
March 2015. In total, we identify 92,427 users, which forms our base
users set. After the base users have been identified, we extract their
GitHub and Stack Overflow activities from the datasets. In total, we
have extracted 416,171 fork, 2,168,871 watch, 766,315 answer and
427,093 favorite activities from the base users.
Figure 3: Base users' Stack Overflow and GitHub Activity
Distributions
Figure 3 shows the distributions of base users' activities in GitHub
and Stack Overflow. Most of the base users forked 1-10 repositories
(64% of the base users), answered 1-10 questions (54% of the base
users). There are also quite a number of developers who watched
11-100 repositories (26% of the base users). We also observe that
more than half of base users have at least answered 1 questions
(71%) and a substantial number of base users also answered 11-100
questions (12%).Interestingly, the high contribution of answers to
questions in Stack Overflow could also suggest that the many of
these active developers in our study were experts in their domain or
areas of interest. Lastly, we also notice that there are developers (al-
beit very few in number) who were extremely active in GitHub and
Stack Overflow; they forked, watched, committed, pull-requested
more than 1000 repositories, or asked, answered and favorited more
than 1000 questions.
3.3 Inferring User Interests
Next, we infer user interests by observing repositories and questions
that users participated in GitHub and Stack Overflow. We use the
following heuristics to infer user interests:
(1) To infer user interests in Stack Overflow, we use the descrip-
tive tags of the questions that they answered and favorited.
For example, consider a question related to mobile program-
ming for Android smartphones which contain the following
set of descriptive tags: {Java, Android}. If a user answered,
or favorited that question, we infer that his interests include
Java and Android.
(2) In the time period covered in our dataset, GitHub does not
allow users to tag repositories but it allows users to describe
their repositories. These descriptions often contain impor-
tant keywords that can shed light on user interests. To infer
user interests from the repositories that a user had partic-
ipated, we first collect all descriptive tags that appear in
our Stack Overflow dataset. In total, 39,837 unique descrip-
tive tags are collected. Next, we perform keyword matching
between the collected Stack Overflow tags and a GitHub
repository description. We consider the matched keywords
as the inferred interests. We choose to use Stack Overflow
tags to ensure that developer interests across the two plat-
forms can be mapped to the same vocabulary.
3.4 Similarity between GitHub repositories and
Stack Overflow Questions
In [15], Lee and Lo had empirically studied the similarity between
user activity interests in GitHub and Stack Overflow. We extend
their study by examining the descriptive tags of GitHub repositories
and Stack Overflow questions participated by the base users. The
objective is to investigate what are the popular descriptive tags
used by the users on two sites and if there are overlaps among the
popular descriptive tags.
Table 2: Top 10 most used descriptive tags in Stack Overflow
and GitHub
Stack Overflow
% Questions
GitHub
% Repositories
Rank
1
2
3
4
5
6
7
8
9
10
Tag
javascript
java
python
c
php
android
jquery
ios
ruby
css
3.758
3.104
2.760
1.940
1.884
1.787
1.577
1.459
1.031
0.963
Tag
javascript
ruby
python
c
java
objective-c
php
go
css
shell
8.163
2.698
2.604
2.163
1.928
1.731
1.330
1.275
1.236
0.884
Table 2 shows the top 10 most used descriptive tags and the
percentages of Stack Overflow questions and GitHub repositories
containing these tags. We observe quite a significant number of
overlap in the top 10 descriptive tags between the two social col-
laborative sites (known as overlapped tags); i.e., javascript, java,
python, c, php, ruby and css. This suggests that generally, the base
users participated in questions and repositories of similar domain
and nature in Stack Overflow and GitHub. Another interesting
observation is the proportions of questions and repositories with
the top 10 descriptive tags; the overlapped tags are used in similar
proportions of Stack Overflow questions and GitHub repositories,
with the exception of javascript, which seems to be more popular
in GitHub (i.e., ∼8% of repositories) than Stack Overflow (i.e., ∼3%
of questions).
We further investigate the usage of these descriptive tags in the
different Stack Overflow and GitHub user activities. Figure 4 shows
the activity bar charts for the most used descriptive tags. For exam-
ple, ∼7% of the repositories watched by the base users contained the
descriptive tag javascript, while only ∼3% of the questions answered
by the base users contained the same tag. We observe that for a
Figure 4: Bar chats of percentages of activities that use the different descriptive tags. Note that "A", "FA", "FO" and "W" denote
answer, favorite, fork and watch activities respectively.
given descriptive tag, the proportion of activities involving the tag
is not uniform even within the same social collaborative site. For
example, the base users answered more Stack Overflow questions
on php than favoriting them. Conversely, for android related ques-
tions, the base users favorited these question more than answering
them. This unevenness in activity proportions is also observed to
be greater for activities involving non-overlaps descriptive tags.
For example, the base users fork and watch significantly more shell
related repositories than answering and favoriting tshell related
questions. This suggests that although the users do participate in
questions and repositories of similar domains, the activity prefer-
ences involving the similar domains varies. Thus, it would be more
natural to learn the user interests at the activity level instead of
aggregating the interests at the platform level.
AFAFOW0.02.55.07.5% activitiesjavascriptAFAFOW0123% activitiesjavaAFAFOW0123% activitiespythonAFAFOW012% activitiescAFAFOW012% activitiesphpAFAFOW012% activitiesandroidAFAFOW0.00.51.01.5% activitiesjqueryAFAFOW0.00.51.01.5% activitiesiosAFAFOW0123% activitiesrubyAFAFOW0.00.51.01.5% activitiescssAFAFOW0.00.51.01.5% activitiesobjective-cAFAFOW0.00.51.0% activitiesgoAFAFOW0.000.250.500.75% activitiesshell4 EXPERIMENTS
In this section, we describe the supervised prediction experiments
conducted to evaluate our proposed method. Specifically, we con-
sider the following activity prediction tasks:
predict if the user will answer the question
• Answer Prediction. Given a Stack Overflow user-question pair,
• Favorite Prediction. Given a Stack Overflow user-question,
• Fork Prediction. Given a GitHub user-repository, predict if the
• Watch Prediction. Given a GitHub user-repository, predict if
predict if the user will favorite the question
user will fork the repository
the user will watch the repository
4.1 Experiment Setup
Data Selection. For answer prediction task, we retrieve all the Stack
Overflow questions that the base users have answered and define
a positive instance as a user-question pair where a base user had
answered the particular question in Stack Overflow. For negative
instances, we randomly assign a Stack Overflow question to the
base users and check that the randomly assigned pair does not exist
in the positive instance set. For the training datasets used in answer
prediction task, we randomly generated 5,000 negative instances
and randomly selected 5,000 positive instances from the questions
answered by users between October 2013 and June 2014 (9 months).
The same approach was used to generate the positive and negative
instances for test sets using the questions answered by the users
between July 2014 and March 2015 (9 months). Similar approach
was used to generate the user-question and user-repository pairs
for positive and negative instances used in favorite, fork and watch
prediction tasks.
Note that we have repeated the prediction experiments for five
runs, and the random selection of train and tests set are repeated for
each of the runs. Also, although we know the true labels of the user-
question and user-repository pairs, we do not take the labels into
consideration when deriving the values of our proposed features,
i.e., we assume that we do not know the labels of the pairs.
Feature Configuration. To compare the performance of direct
and cross platform activity prediction approaches, we use Support
Vector Machine (SVM) with linear kernel and apply the following
feature sets on all prediction tasks:
• SO_Act: This set of features includes the Answer (Eqn. 3)
and Favorite (Eqn. 4) Interests Similarity scores for a given
user-question or user-repository pair.
• SO_CoAct: This set of features includes the Co-Answer (Eqn.
7) and Co-Favorite (Eqn. 8) Interests Similarity scores for a
given user-question or user-repository pair.
• GH_Act: This set of features includes the Fork (Eqn. 1) and
Watch (Eqn. 2) Interests Similarity scores for a given user-
question or user-repository pair.
• GH_CoAct: This set of features includes the Co-Fork (Eqn. 5)
and Co-Watch (Eqn. 6) Interests Similarity scores for a given
user-question or user-repository pair.
• ALL: This set of features is the union of all features.
4.2 Prediction Results
We measure the prediction accuracy for each feature configuration
by computing the average area under the ROC curve (AUC) over
a set of positive and negative examples drawn from the test set
for each of the five runs. The results for the four prediction tasks
are shown in Figure 5. We observe that feature configuration ALL
performed the best in all prediction tasks, achieving an AUC of 0.89,
0.77, 0.75 and 0.67 for answer, favorite, fork and watch prediction
tasks respectively.
Performance of cross-platform prediction approach. Al-
though the cross-platform prediction approach did not outperform
the direct platform prediction approach in user activity prediction,
they still yield good accuracy. For example, when predicting user's
answer and favorite activities in Stack Overflow, the GitHub user
activity interests similarity features (i.e., GH_Act) has AUC of 0.71
and 0.64 respectively, and when predicting user's fork and watch
activities in GitHub, the Stack Overflow user activity interests simi-
larity features (i.e., SO_Act) has AUC of 0.65 and 0.58 respectively.
The AUC for predicting user's answer activities in Stack Overflow
using user activity interests similarity features (i.e., GH_Act) is ob-
served to be slightly higher than the prediction for other activities.
A possible explanation for this could be the difference between the
nature of user activities; answering a question in Stack Overflow
would require that a user possesses a particular domain expertise,
whereas other activities such as watching a GitHub repository or
favoriting a Stack Overflow question depend on the user's interests.
As such, we observe higher AUC score for predicting answer activity
task as the users' expertise are usually more specialized and less
diverse than their interests.
More interestingly, using cross-platform prediction approach with
user co-activity interests similarity features (i.e., GH_CoAct and
SO_CoAct), have also yielded reasonable prediction accuracies.
For example, when predicting user's answer activities in Stack
Overflow, GH_CoAct has yielded an AUC of 0.62. This suggests
that even with no information about a user's past activities in the
Stack Overflow and only minimal information such as the user's
co-activities in GitHub, we are still able to reasonably predict user's
activity in Stack Overflow. Similar observations are made when
predicting user activities in GitHub using user's co-activities in
Stack Overflow.
4.3 Discussion
The results of the four prediction tasks offer us some insights in
performing recommendations in social collaborative platforms.
Solving cold-starts. The reasonably good accuracies of cross-
platform prediction approach also demonstrate its potential to solve
the cold-start problem; i.e., predicting and recommending a user's
activities without knowing the users' past activity history on the
platform. For example, when predicting user's answer activities in
Stack Overflow, we are able to achieve AUC as high as 0.71 with-
out using any Stack Overflow features (i.e, using GitHub features
GH_Act only). Similar observations were made for fork, watch and
favorite activities.
We further conduct a small case study to retrieve and review
fork predictions of users who did not have any past fork activities.
For example, we successfully predicted that user U420338 would
Figure 5: ROCs for Four Prediction Tasks
forked repository R12172473 in GitHub even when this was the
first repository forked by the user (i.e., no past user fork activity).
Examining into details, we found that R12172473 has description
tags ⟨svд, javascript⟩, and among the 95 questions U420338 had
answered in Stack Overflow, 83 contain the tags ⟨javascript⟩ or
⟨svд⟩ or both. By analyzing U420338's Stack Overflow activities,
our approach can identify his interests, which ultimately help in
predicting the user's GitHub activities.
Heterogeneous behaviors in cross-platform. There are ex-
isting research work on recommendations in cross-platform set-
ting. For example, Yan et al.[38] addressed the cold-start friend
recommendation problem by combining random walk with Flickr
platform features to recommend friends on Twitter. Lee and Lim
[13] performed similar cross-platform friendship recommendation
in Instagram and Twitter using friendship maintenance features
derived from users' friendship behaviours in multiple social plat-
forms. In a more recent study, Lee et al [14] proposed a probabilistic
model to predict which social media platform would a user publish
a given post.
However, most of these cross-platform recommendation studies
only focus on recommending homogeneous behaviours (e.g. con-
necting users, publishing post, etc) in online social platforms. In our
study, we handled recommendation of heterogeneous behaviors
(e.g. user fork and watch repositories in GitHub) in a cross-platform
setting. Although our prediction experiments are conducted on so-
cial collaborative platforms, the cross-platform activity prediction
framework can also be applied to other online social platforms. For
example, we can predict if a user will like, comment or retweet a post
in Twitter by learning the same user's heterogeneous behaviors in
Facebook.
5 THREATS TO VALIDITY
Threats to Internal Validity. Threats to internal validity often
refer to experimenter biases. In this study, most of our processes
are automated. The positive and negative instances in our training
and testing datasets were also randomly selected and generated.
when estimating the developer interests on GitHub, we matched
the keywords in repositories' descriptions to the tags collected from
Stack Overflow questions. There could be cases where the words
from a repository's descriptions did not match any of the collected
tags, and thus we are not able to infer the interest of the developer
using that repository. In the future, we plan to mitigate this by
labelling the repositories using a tag recommendation approach
[27, 28, 33, 35, 36].
Threats to External Validity. Threats to external validity refer
to the generalizability of our findings. We have used large datasets
from GitHub and Stack Overflow for our analysis and experiments.
Our study findings are based on 92,427 developers, which is close to
10% of the Stack Overflow users who are active during the studied
period, the interests of these users were derived using the data from
the whole GitHub and Stack Overflow datasets (2.5 million and 1
million active users respectively). The current studied users were
also obtained from the dataset provided in previous research by
Badashian et al. [2]. Both Vasilescu et al. [29] and Badashian et al.
0.00.20.40.60.81.0False Positive Rate0.00.20.40.60.81.0True Positive RateROC for Answer PredictionSO_ACT (AUC = 0.86)SO_CoACT (AUC = 0.82)GH_ACT (AUC = 0.71)GH_CoACT (AUC = 0.62)ALL (AUC = 0.89)0.00.20.40.60.81.0False Positive Rate0.00.20.40.60.81.0True Positive RateROC for Favorite PredictionSO_ACT (AUC = 0.75)SO_CoACT (AUC = 0.66)GH_ACT (AUC = 0.64)GH_CoACT (AUC = 0.56)ALL (AUC = 0.77)0.00.20.40.60.81.0False Positive Rate0.00.20.40.60.81.0True Positive RateROC for Fork PredictionSO_ACT (AUC = 0.65)SO_CoACT (AUC = 0.57)GH_ACT (AUC = 0.69)GH_CoACT (AUC = 0.68)ALL (AUC = 0.75)0.00.20.40.60.81.0False Positive Rate0.00.20.40.60.81.0True Positive RateROC for Watch PredictionSO_ACT (AUC = 0.58)SO_CoACT (AUC = 0.55)GH_ACT (AUC = 0.63)GH_CoACT (AUC = 0.57)ALL (AUC = 0.67)[2] had utilized GitHub users' email address and Stack Overflow
users' email MD5 hashes to find the intersection between the two
platform datasets. However, this existing method is no longer valid
as Stack Overflow no longer make the email hash of their user
available [26], thus motivating new methods to match users in two
social collaborative platforms. As part of our future work, we will
explore new user matching methods such as matching users by
their username to generate a large dataset of cross-platform users.
Threats to Construct Validity. Threats to construct refer to
the appropriateness of metrics used. In this work, we use precision,
recall and F1-measure to evaluate the results of our prediction ex-
periments. These metrics were commonly used for other prediction
experiments, e.g., [5, 12, 16, 17].
6 RELATED WORK
In this section, we review three groups of existing research work
related to our research. The first group discuss the studies on user
interests in social collaborative platforms, in particularly, GitHub
and Stack Overflow. The second group focuses on studies on pre-
diction and recommendation in GitHub and Stack Overflow. The
last group reviews the inter-platform studies on users in the two
platforms.
The user interests in social collaborative platforms have been
a widely studied research area. There were research work that
focused on analyzing topics asked by the user in Stack Overflow [3,
4, 22, 40, 44]. Barua et al. [4] conducted an extensive empirical
study to mine the topics discussed by users in Stack Overflow. Bajaj
et al. [3] performed a similar study specific to web development
while Rosen and Shihab [22] performed a similar study specific to
mobile application development. Similarly, there were also work
on analyzing programming languages used by users in GitHub and
their relationships to GitHub contributions [18, 20, 24, 30]. Our
work extends this group of research by comparing user interests in
the two social collaborative platforms.
Prediction and recommendation in social collaborative platforms
have been widely studied. These work can be further categorized
into two groups: (i) finding experts to perform a certain platform
tasks or activities [1, 6, 10, 19, 21, 31, 37, 39, 41, 42] and (ii) recom-
mending content or activities to users in the platforms [7, 9, 11, 32,
34, 43]. For work in group (i), there were work which proposed
methods to find experts to answer questions in Stack Overflow
[6, 21, 31, 37, 39], while for GitHub, experts are predicted if they
will review pull-requests and code for repositories [19, 41, 42]. For
work in group (ii), Wang et al.[34] conducted a study in Stack Over-
flow to recommend questions and answers concerning API issues
to users. de Souza et al. [7] conducted an experiment to recommend
Stack Overflow question-answer pairs relevant to selected software
programming problems. Zhang et al. [43] predict and recommend
relevant repositories to users based on the users' past activities (e.g.
fork, watch, etc) in the platform. In a more recent work, Jiang et
al. [11] proposed to use user programming language preferences
and one-class collaborative filtering to improve prediction of which
GitHub repositories are relevant to a user. Our study adds on to the
state-of-the-art in group (ii) by proposing a novel method that use
multiple platform data to predict platform activities
There have been few existing inter-platform studies on GitHub
and Stack Overflow. Vasilescu et al. performed a study on de-
velopers' involvement and productivity in Stack Overflow and
GitHub [29]. They found that users who are more active on GitHub
(in terms of GitHub commits), tend to ask and answer more ques-
tions on Stack Overflow. Badashian et al. [2] did an empirical study
on the correlation between different types of activities in the two
platforms. Silvestri et at. [25] proposed a user linkage model to link
users' Stack Overflow, GitHub and Twitter accounts. More recently,
Lee and Lo [15] did an extensive study on users' interests across
GitHub and Stack Overflow. In that study, the researchers found
that users who have accounts with GitHub and Stack Overflow
do exhibit similar interests observed from their activities in the
two social collaborative platforms. Our work builds upon insights
reported in [15] by proposing a prediction method based on user
interests across and within social collaborative platforms.
7 CONCLUSION AND FUTURE WORK
In this paper, we propose a novel framework which predicts users
activities in multiple social collaborative platforms. We conducted
experiments on large real-world datasets which contain activities
of 92,427 users who are active in GitHub and Stack Overflow. Our
proposed methods achieved good accuracy in predicting various
user activities (up to an AUC score of 0.89).
Our experiments have shown that user activities in Stack Over-
flow can be predicted with reasonable accuracy using the same
user's interests inferred from his or her activities in GitHub. The
same observation was made when predicting a user's activities in
GitHub using his or her interests inferred from his or her activi-
ties in Stack Overflow. The reasonable accuracies yield by cross-
platform prediction approach demonstrates its potential in solving
the cold-start problem in user activity prediction and recommenda-
tion in social collaborative platforms.
For future work, we intend to consider more advanced techniques
(e.g., topic models or deep learning models) to derive and measure
user interests similarity across multiple platforms. We will also
consider platforms aside from Stack Overflow and GitHub (e.g.
Quora).
ACKNOWLEDGMENTS
This research is supported by the Living Analytics Research Centre
(LARC), a research centre set up in Singapore Management Univer-
sity (SMU) with Carnegie Mellon University (CMU) that focuses
on behavioural and social network analytics in the fields of Ur-
ban and Community Liveability, Personalised Urban Mobility, Jobs
and Skills Intelligence, as well as Smart Consumption and Healthy
Lifestyle.
REFERENCES
[1] Mohammad Y. Allaho and Wang-Chien Lee. 2014. Increasing the Responsiveness
of Recommended Expert Collaborators for Online Open Projects. In CIKM.
[2] Ali Sajedi Badashian, Afsaneh Esteki, Ameneh Gholipour, Abram Hindle, and
Eleni Stroulia. 2014. Involvement, contribution and influence in GitHub and
stack overflow. In CSSE.
[3] Kartik Bajaj, Karthik Pattabiraman, and Ali Mesbah. 2014. Mining Questions
Asked by Web Developers. In MSR.
[4] Anton Barua, Stephen W. Thomas, and Ahmed E. Hassan. 2014. What Are
Developers Talking About? An Analysis of Topics and Trends in Stack Overflow.
Empirical Software Engineering 19, 3 (2014).
[5] Gerardo Canfora, Andrea De Lucia, Massimiliano Di Penta, Rocco Oliveto, Anni-
bale Panichella, and Sebastiano Panichella. 2013. Multi-objective cross-project
defect prediction. In ICST.
[6] Morakot Choetkiertikul, Daniel Avery, Hoa Khanh Dam, Truyen Tran, and Aditya
Ghose. 2015. Who Will Answer My Question on Stack Overflow?. In ASWEC.
[7] Lucas B. L. de Souza, Eduardo C. Campos, and Marcelo de A. Maia. 2014. Ranking
Crowd Knowledge to Assist Software Development. In ICPC.
[8] Georgios Gousios. 2013. The GHTorrent dataset and tool suite. In MSR.
[9] Mohamed Guendouz, Abdelmalek Amine, and Reda Mohamed Hamou. 2015.
Recommending relevant GitHub repositories: a collaborative-filtering approach.
on Networking and Advanced Systems (2015).
[10] Chaoran Huang, Lina Yao, Xianzhi Wang, Boualem Benatallah, and Quan Z Sheng.
2017. Expert as a Service: Software Expert Recommendation via Knowledge
Domain Embeddings in Stack Overflow. In ICWS.
[11] Jyun-Yu Jiang, Pu-Jen Cheng, and Wei Wang. 2017. Open Source Repository
Recommendation in Social Coding. In SIGIR.
[12] Sunghun Kim, E James Whitehead, and Yi Zhang. 2008. Classifying software
changes: Clean or buggy? Software Engineering, IEEE Transactions on 34, 2 (2008),
181–196.
[13] Ka-Wei Roy Lee and Ee-Peng Lim. 2016. Friendship maintenance and prediction in
multiple social networks. In Proceedings of the 27th ACM Conference on Hypertext
and Social Media. ACM, 83–92.
[14] Roy Ka-Wei Lee, Tuan-Anh Hoang, and Ee-Peng Lim. 2017. On Analyzing
User Topic-Specific Platform Preferences Across Multiple Social Media Sites. In
Proceedings of the 26th International Conference on World Wide Web. International
World Wide Web Conferences Steering Committee, 1351–1359.
[15] Roy Ka-Wei Lee and David Lo. 2017. GitHub and Stack Overflow: Analyzing
Developer Interests Across Multiple Social Collaborative Platforms. In SOCINFO.
[16] Jaechang Nam, Sinno Jialin Pan, and Sunghun Kim. 2013. Transfer defect learning.
[17] Foyzur Rahman, Daryl Posnett, and Premkumar Devanbu. 2012. Recalling the
imprecision of cross-project defect prediction. In FSE.
[18] Mohammad Masudur Rahman and Chanchal K. Roy. 2014. An Insight into the
Pull Requests of GitHub. In MSR.
[19] Mohammad Masudur Rahman, Chanchal K Roy, and Jason A Collins. 2016. CoR-
ReCT: code reviewer recommendation in GitHub based on cross-project and
technology experience. In ICSE.
[20] Baishakhi Ray, Daryl Posnett, Vladimir Filkov, and Premkumar Devanbu. 2014.
A Large Scale Study of Programming Languages and Code Quality in Github. In
FSE.
[21] Fatemeh Riahi, Zainab Zolaktaf, Mahdi Shafiei, and Evangelos Milios. 2012. Find-
ing Expert Users in Community Question Answering. In WWW.
[22] Christoffer Rosen and Emad Shihab. 2015. What are mobile developers asking
about? A large scale study using stack overflow. Empirical Software Engineering
(2015).
[23] Andrew I Schein, Alexandrin Popescul, Lyle H Ungar, and David M Pennock.
2002. Methods and metrics for cold-start recommendations. In SIGIR.
[24] Jyoti Sheoran, Kelly Blincoe, Eirini Kalliamvakou, Daniela Damian, and Jordan
Ell. 2014. Understanding "Watchers" on GitHub. In MSR.
[25] Giuseppe Silvestri, Jie Yang, Alessandro Bozzon, and Andrea Tagarelli. 2015.
Linking Accounts across Social Networks: the Case of StackOverflow, Github
In ICSE.
and Twitter.. In KDWeb.
[26] StackExchange. 2014. Where did EmailHash go?
(2014).
stackexchange.com/questions/221027/where-did-emailhash-gom
[27] Clayton Stanley and Michael D Byrne. 2013. Predicting tags for stackoverflow
http://meta.
posts. In ICCM.
[28] Santiago Vargas-Baldrich, Mario Linares-Vasquez, and Denys Poshyvanyk. 2015.
Automated Tagging of Software Projects Using Bytecode and Dependencies (N).
In ASE.
[29] Bogdan Vasilescu, Vladimir Filkov, and Alexander Serebrenik. 2013. StackOver-
flow and GitHub: associations between software development and crowdsourced
knowledge. In SocialCom.
[30] Bogdan Vasilescu, Yue Yu, Huaimin Wang, Premkumar Devanbu, and Vladimir
Filkov. 2015. Quality and Productivity Outcomes Relating to Continuous Integra-
tion in GitHub. In FSE.
[31] Jian Wang, Jiqing Sun, Hongfei Lin, Hualei Dong, and Shaowu Zhang. 2017. Con-
volutional neural networks for expert recommendation in community question
answering. Science China Information Sciences 60, 11 (2017).
[32] Lin Wang, Bin Wu, Juan Yang, and Shuang Peng. 2016. Personalized recommen-
dation for new questions in community question answering. In ASONAM.
[33] S. Wang, D. Lo, B. Vasilescu, and A. Serebrenik. 2014. EnTagRec: An Enhanced
Tag Recommendation System for Software Information Sites. In ICSME.
[34] Wei Wang, Haroon Malik, and Michael W. Godfrey. 2015. Recommending Posts
Concerning API Issues in Developer Q&sA Sites. In MSR.
[35] Xin Xia, David Lo, Xinyu Wang, and Bo Zhou. 2013. Tag recommendation in
software information sites. In MSR.
[36] Bowen Xu, Deheng Ye, Zhenchang Xing, Xin Xia, Guibin Chen, and Shanping Li.
2016. Predicting Semantically Linkable Knowledge in Developer Online Forums
via Convolutional Neural Network. In ASE.
[37] Congfu Xu, Xin Wang, and Yunhui Guo. 2016. Collaborative Expert Recommen-
dation for Community-Based Question Answering. In ECML-KDD.
[38] Ming Yan, Jitao Sang, Tao Mei, and Changsheng Xu. 2013. Friend transfer:
Cold-start friend recommendation with cross-platform transfer learning of social
knowledge. In 2013 IEEE International Conference on Multimedia and Expo (ICME).
IEEE, 1–6.
[39] Liu Yang, Minghui Qiu, Swapna Gottipati, Feida Zhu, Jing Jiang, Huiping Sun, and
Zhong Chen. 2013. CQArank: Jointly Model Topics and Expertise in Community
Question Answering. In CIKM.
[40] Xin-Li Yang, David Lo, Xin Xia, Zhi-Yuan Wan, and Jian-Ling Sun. 2016. What
Security Questions Do Developers Ask? A Large-Scale Study of Stack Overflow
Posts. Journal of Computer Science and Technology 31, 5 (2016).
[41] Yue Yu, Huaimin Wang, Gang Yin, and Charles X Ling. 2014. Reviewer recom-
mender of pull-requests in GitHub. In ICSME.
[42] Yue Yu, Huaimin Wang, Gang Yin, and Tao Wang. 2016. Reviewer recommenda-
tion for pull-requests in GitHub: What can we learn from code review and bug
assignment? Information and Software Technology 74 (2016).
[43] Lingxiao Zhang, Yanzhen Zou, Bing Xie, and Zixiao Zhu. 2014. Recommend-
ing relevant projects via user behaviour: an exploratory study on github. In
CrowdSoft.
[44] Jie Zou, Ling Xu, Weikang Guo, Meng Yan, Dan Yang, and Xiaohong Zhang. 2015.
Which Non-functional Requirements Do Developers Focus On? An Empirical
Study on Stack Overflow Using Topic Analysis. In MSR.
|
1802.06189 | 1 | 1802 | 2018-02-17T04:11:58 | Contrast Subgraph Mining from Coherent Cores | [
"cs.SI"
] | Graph pattern mining methods can extract informative and useful patterns from large-scale graphs and capture underlying principles through the overwhelmed information. Contrast analysis serves as a keystone in various fields and has demonstrated its effectiveness in mining valuable information. However, it has been long overlooked in graph pattern mining. Therefore, in this paper, we introduce the concept of contrast subgraph, that is, a subset of nodes that have significantly different edges or edge weights in two given graphs of the same node set. The major challenge comes from the gap between the contrast and the informativeness. Because of the widely existing noise edges in real-world graphs, the contrast may lead to subgraphs of pure noise. To avoid such meaningless subgraphs, we leverage the similarity as the cornerstone of the contrast. Specifically, we first identify a coherent core, which is a small subset of nodes with similar edge structures in the two graphs, and then induce contrast subgraphs from the coherent cores. Moreover, we design a general family of coherence and contrast metrics and derive a polynomial-time algorithm to efficiently extract contrast subgraphs. Extensive experiments verify the necessity of introducing coherent cores as well as the effectiveness and efficiency of our algorithm. Real-world applications demonstrate the tremendous potentials of contrast subgraph mining. | cs.SI | cs | Contrast Subgraph Mining from Coherent Cores
Jingbo Shang1, Xiyao Shi1, Meng Jiang2, Liyuan Liu1, Timothy Hanra(cid:138)y3, Jiawei Han1
1Department of Computer Science, University of Illinois Urbana-Champaign, IL, USA
2Department of Computer Science and Engineering, University of Notre Dame, IN, USA
3US Army Research Laboratory, MD, USA
1{shang7, xshi27, ll2, hanj}@illinois.edu
[email protected]
3timothy.p.hanra(cid:138)[email protected]
8
1
0
2
b
e
F
7
1
]
I
S
.
s
c
[
1
v
9
8
1
6
0
.
2
0
8
1
:
v
i
X
r
a
ABSTRACT
Graph pa(cid:138)ern mining methods can extract informative and useful
pa(cid:138)erns from large-scale graphs and capture underlying principles
through the overwhelmed information. Contrast analysis serves as
a keystone in various (cid:128)elds and has demonstrated its e(cid:130)ectiveness in
mining valuable information. However, it has been long overlooked
in graph pa(cid:138)ern mining. (cid:140)erefore, in this paper, we introduce the
concept of contrast subgraph, that is, a subset of nodes that have
signi(cid:128)cantly di(cid:130)erent edges or edge weights in two given graphs of
the same node set. (cid:140)e major challenge comes from the gap between
the contrast and the informativeness. Because of the widely existing
noise edges in real-world graphs, the contrast may lead to subgraphs
of pure noise. To avoid such meaningless subgraphs, we leverage
the similarity as the cornerstone of the contrast. Speci(cid:128)cally, we
(cid:128)rst identify a coherent core, which is a small subset of nodes
with similar edge structures in the two graphs, and then induce
contrast subgraphs from the coherent cores. Moreover, we design
a general family of coherence and contrast metrics and derive a
polynomial-time algorithm to e(cid:129)ciently extract contrast subgraphs.
Extensive experiments verify the necessity of introducing coherent
cores as well as the e(cid:130)ectiveness and e(cid:129)ciency of our algorithm.
Real-world applications demonstrate the tremendous potentials of
contrast subgraph mining.
ACM Reference format:
Jingbo Shang1, Xiyao Shi1, Meng Jiang2, Liyuan Liu1, Timothy Hanra(cid:138)y3,
Jiawei Han1. 2018. Contrast Subgraph Mining from Coherent Cores. In
Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data
Mining, London, UK, August 2018 (KDD'18), 9 pages.
DOI: 10.475/123 4
1 INTRODUCTION
Graph pa(cid:138)ern mining methods can extract useful information from
large-scale graphs and capture underlying principles through the
overwhelmed information. Such information has bene(cid:128)ted many
(cid:128)elds, such as community analysis, document retrieval, and human
mobility analysis.
Recently, graph pa(cid:138)erns across multi-layer/multi-view graphs,
or graphs having di(cid:130)erent edge structures of the same node set,
have drawn lots of a(cid:138)entions. For example, frequent subgraph
mining aims to discover the similar pa(cid:138)erns in di(cid:130)erent graphs [33,
34]. Many researchers tried to identify the subsets of nodes that
Permission to make digital or hard copies of part or all of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation
on the (cid:128)rst page. Copyrights for third-party components of this work must be honored.
For all other uses, contact the owner/author(s).
KDD'18, London, UK
© 2018 Copyright held by the owner/author(s). 123-4567-24-567/08/06...$15.00
DOI: 10.475/123 4
Figure 1: Work(cid:131)ow visualization using hypothetical graphs.
form dense subgraphs in most of the graphs [11, 12, 24] or identify
discriminative (sometimes also named as "contrast" [29]) structures
from frequent subgraphs using node labels [13, 28, 29].
Contrast analysis serves as a keystone in many data mining
problems, while the related study in graph pa(cid:138)ern mining has
been long overlooked. For example, in the (cid:128)elds of text mining
and document retrieval, given a major corpus and a background
corpus of the same vocabulary, much e(cid:130)ort has been paid to identify
informative phrases whose frequencies in the major corpus are
signi(cid:128)cantly higher than those in the background corpus [2, 6, 18,
19, 21, 27]. Meanwhile, very few a(cid:138)empt has been made to contrast
subgraph mining. Analogous to document comparative analysis,
if we compare two graphs, GA and GB, of the same set of nodes V ,
we should be able to (cid:128)nd some informative subgraph g whose edge
weights in GA are signi(cid:128)cantly di(cid:130)erent from those in GB. In this
paper, we name such subgraph g as a contrast subgraph.
Contrast subgraphs have great potentials to facilitate many
downstream applications such as temporal role identi(cid:128)cation [9,
20, 25, 31], online-o(cid:132)ine community detection [5, 15, 32, 32, 37],
and spatio-tempral event detection [10, 36]. For example, contrast
subgraphs can provide useful signals for advisor-advisee identi(cid:128)-
cation tasks [31]. Moreover, when both online and o(cid:132)ine social
networks are provided, mining contrast subgraphs can detect some
unusual relationships [5, 32]. Also, by contrasting the incoming
and outgoing real-time tra(cid:129)cs, one can detect speci(cid:128)c types of
spatio-temporal events [10].
Graph AGraph BContrastSubgraphSeedsWorkflow: Seeds àCoherent Core àContrast Subgraph(similar parts) (different parts)Coherent CoreKDD'18, August 2018, London, UK
J. Shang et al.
Figure 2: Spatio-Temporal Event Detection. Heat maps visualize the adjacency matrices within the corresponding regions. (cid:135)e
darker, the more tra(cid:129)c. Contrasting two road networks of the real-time tra(cid:129)c and historical averages, the identi(cid:128)ed coherent
core demonstrates the usual, busy tra(cid:129)c on the East 2nd Ring in Beijing, while the extracted contrast subgraph reveals an
unusually large volume of tra(cid:129)c, which indicates the ending of a concert event at the Beijing Workers' Sports Complex.
Besides extracting contrast subgraphs, de(cid:128)ning the contrast itself
remains an open problem. Moreover, trying to induce informative
subgraphs from the contrast makes the task even more challenging.
In real-world graphs, there usually exist noise edges. For the algo-
rithms directly optimizing the contrast, it is likely to end up with a
subset of nodes which have heavy noise in one of the graphs and
no edge in the other graph. To avoid such numerous but meaning-
less subgraphs, we propose to induce contrast subgraphs from the
coherent cores, i.e., a subset of nodes with similar edge structures
in GA and GB. We visualize the work(cid:131)ow using two hypothetical
graphs in Figure 1. Given the seed node 5, we (cid:128)rst identify the co-
herent core of nodes {3, 4, 5, 6}, and then add nodes 1, 7, and 8 into
the contrast graph. More experiments in Section 5.2 demonstrate
that inducing from the coherent cores is necessary and it acts as an
anchor to guarantee the informativeness of the induced contrast
subgraphs.
Beyond the problem formulation, it is also challenging to develop
an e(cid:129)cient and scalable algorithm for mining contrast subgraphs
from large-scale graphs. A straightforward solution is to apply co-
dense graph mining algorithms on (GA, GB) and then on (GA, GB).
However, the dense complementary graph (i.e., GA or GB) makes
most of, if not all, pruning techniques initially designed for sparse
graphs ine(cid:130)ective.
In this paper, we derive a polynomial-time
algorithm to e(cid:129)ciently identify coherent subgraph cores and then
extract contrast subgraphs. More speci(cid:128)cally, we apply a binary
search on the coherent/contrast score and construct a network
such that whether the current score is achievable is equivalent
to whether the min S − T cut in the network is above a certain
threshold. (cid:140)anks to the duality between the min cut and the max
(cid:131)ow, we can solve the reduced problem in a polynomial time [22].
Our experimental results based on real-world datasets demon-
strate the identi(cid:128)ed coherent core and the extracted contrast sub-
graph are quite insightful and encouraging in a variety of tasks.
For example, based on the tra(cid:129)c data and road network in Beijing,
contrast subgraphs between the real-time tra(cid:129)c and the historical
tra(cid:129)c indicate the events happening in the city. Figure 2 shows
the coherent core and the contrast subgraph discovered by our
proposed method through a comparison between the tra(cid:129)c data on
Nov 24, 2012, and the historical averages. (cid:140)e usual, busy tra(cid:129)c on
the major roads (i.e., the East 2nd Ring in Beijing) form the coher-
ent core. (cid:140)e contrast subgraph reveals the unusual tra(cid:129)c around
the Beijing Workers' Sports Complex between 10:30 – 11:00 PM.
We (cid:128)nd that the contrast subgraph indicates the ending of Dang
Ding's concert event, which further re(cid:131)ects the precious value of
the proposed contrast subgraph mining.
Reproducibility: We release our code at the GitHub1.
1h(cid:138)ps://github.com/shangjingbo1226/ContrastSubgraphMining
To our best knowledge, this is the (cid:128)rst work that aims to mine
informative contrast subgraphs between two graphs. Our contribu-
tions are highlighted as follows.
• We formulate the contrast subgraph mining problem and avoid
meaningless contrast subgraphs by inducing from coherent cores.
(cid:140)e problem is formulated for multiple applications using a gen-
eral family of metrics.
• We derive a polynomial-time algorithm to e(cid:129)ciently extract
• Extensive experiments verify the necessity of introducing co-
herent cores as well as the e(cid:130)ectiveness and e(cid:129)ciency of our
algorithm. Real-world applications demonstrate the tremendous
potentials of contrast subgraph mining.
contrast subgraphs from large-scale graphs.
DangDing'sconcertonNov24,2012atBeijingWorkers'SportsComplex.Theconcertendedaround10:30PM,whichledtoasignificanttrafficjam.Given SeedsOur Identified Coherent CoreEast 2ndRing in Beijing,one of the major roadsNov 24, 2012Historical AvgNov 24, 2012Historical AvgBeijing, China10:30 PM -11:00 PMOur Extracted Contrast SubgraphContrast Subgraph Mining from Coherent Cores
KDD'18, August 2018, London, UK
(cid:140)e remainder of this paper is organized as follows. We (cid:128)rst
formulate the contrast subgraph mining problem in Section 2. (cid:140)e
related work is discussed in Section 3. Section 4 covers the technical
details of our derived polynomial-time algorithm. In Section 5, we
use a real-world task to verify the necessity of inducing contrast
subgraph from coherent cores and evaluate the e(cid:129)ciency of our al-
gorithm. Section 6 uses two real-world applications to demonstrate
the importance of contrast subgraph mining. Section 7 concludes
this paper and outlines future directions.
2 CONTRAST SUBGRAPH MINING
In this section, we (cid:128)rst formulate the problem and propose a general
family of metrics. And then, we discuss our choices of speci(cid:128)c
metrics used in our experiments.
2.1 Problem Formulation
(cid:140)e input of the contrast subgraph mining problem consists of two
weighted, undirected graphs GA = (V , EA) and GB = (V , EB). (cid:140)e
node set V is the same in both GA and GB. But the edge weights in
EA and EB are di(cid:130)erent. As summarized in Table 1, we use EA(u, v)
and EB(u, v) to denote the edge weights of the edge between nodes
u and v in these two graphs, respectively. Because GA and GB
are undirected graphs, we have ∀u, v, EA(u, v) = EA(v, u) and
EB(u, v) = EB(v, u).
In this paper, without loss of generality, we make two assump-
tions for the input graphs. First, we assume EA(u, v), EB(u, v) ≥ 0,
where the edge weight 0 means there is no edge. In most of the
applications, the edge weights are mainly about the connection
strengths between nodes. And we only care about the weight di(cid:130)er-
ence between the corresponding edges. (cid:140)erefore, it is reasonable
to assume the weights are non-negative. Note that this assumption
includes boolean edges as a special case. Second, we assume the
preprocessing has been conducted on EA and EB, thus the ranges
or distributions of EA(u, v) and EB(u, v) would be similar.
(cid:140)e user can provide seed nodes, if necessary, to be(cid:138)er facili-
tate her interests. To make sure the nodes are really around the
given seeds or the coherent core, we de(cid:128)ne the neighbor nodes by a
parameter r,
Nr(s) = {udA(s, u) ≤ r ∨ dB(s, u) ≤ r}
(1)
where s is a subset of nodes, dA(s, u) and dB(s, u) are the minimum
number of non-zero edges to traverse from the node u to any node in
s. In practice, the value of r can be chosen based on the diameter of
the two input graphs. For example, the collaborator graph induced
from the DBLP publication dataset has a small diameter, so r = 1
and r = 2 are good choices. (cid:140)e road network has a relatively large
diameter, so we choose r from 10 to 20. Reasonable values of r can
always lead to meaningful results.
In summary, the inputs are two undirected, weighted graphs GA
and GB, a parameter r, and seed nodes seeds (could be empty). As
we discussed, to avoid meaningless cases, we propose to induce
contrast subgraphs from the coherent cores, where a coherent core
is a subset of nodes with similar edges in the two graphs. (cid:140)e goal
is to (cid:128)rst identify the coherent core c around the seed nodes seeds
(seeds ⊂ c ⊂ Nr(seeds)), and then induce the contrast subgraph g
from this coherent core (c ⊂ g ⊂ Nr(c)).
GA, GB
GA, GB
V
EA(u, v), EB(u, v)
seeds
c
g
Nr(s)
coherence(c)
coherence(u, v)
contrast(g)
contrast(u, v)
penalty(u)
Table 1: Notation Table.
Two undirected, weighted input graphs.
Complementary graphs considering whether the edge exists.
(cid:140)e node set for both GA and GB.
Edge weights between nodes u and v in GA and GB.
A set of seed nodes. It could be empty.
Coherent core. A subset of V . seeds ⊂ c.
Contrast subgraph. A subset of V . c ⊂ g
Neighbor node set of the node set s. r is a parameter.
Coherence metric for a subgraph.
Coherence metric for an edge between u and v.
Contrast metric for a subgraph.
Contrast metric for an edge between u and v.
Node penalty metric.
2.2 A General Family of Metrics
With a speci(cid:128)c coherence metric, i.e., coherence(c), and a speci(cid:128)c
contrast metric, i.e., contrast(g), the contrast subgraph mining prob-
lem becomes the following two maximization problems.
(1) Identify the coherent core around the seed nodes:
c =
argmax
seeds⊂c⊂Nr (seeds)
coherence(c).
(2) Induce the contrast subgraph from the identi(cid:128)ed coherent core:
g = argmax
c⊂g⊂Nr (c)
contrast(g).
It is natural to start from a single edge, since an edge is also a sub-
graph of two nodes. We denote the edge coherence as coherence(u, v)
and the edge contrast as contrast(u, v). Inspired by the formula-
tion of the maximum dense subgraphs [8], we design the coher-
ence/contrast metric based on the edge coherence/contrast as fol-
lows:
coherence(c) =
(2)
u,v ∈c∧u <v coherence(u, v)
u,v ∈❕∧u <v contrast(u, v)
u∈c penalty(u)
u∈g penalty(u)
,
,
contrast(g) =
(3)
where penalty(u) is a function to control the subgraph size. (cid:140)e
numerators in Equation 2 and Equation 3 become bigger when the
subgraph grows. (cid:140)e idea of introducing node penalty is to penalize
these large subgraphs. In fact, the form of these two de(cid:128)nitions is
a generalization of the density function in [8].
Remark. (1) When there is no user-provided seed (i.e., seeds = ∅),
we will identify the most coherent subgraph among all non-empty
subgraphs, which is the most "similar" part between GA and GB.
(2) We can (cid:128)nd a series of non-overlapping contrast subgraphs by
iteratively removing the newly added nodes in the most contrasting
subgraph, i.e., g \ c, until g \ c = ∅. Here g is the most contrasting
subgraph in the current iteration, while c is the same coherent core
in all iterations.
2.3 Speci(cid:128)c Metrics
Our algorithm works with any (1) non-negative edge coherence
coherence(u, v); (2) non-negative edge contrast contrast(u, v); and
(3) positive node penalty penalty(u). (cid:140)erefore, there are countless
ways to de(cid:128)ne these metrics. We discuss the speci(cid:128)c metrics utilized
in both Section 5 and Section 6 here.
KDD'18, August 2018, London, UK
J. Shang et al.
Edge Coherence. Considering the real-world graphs are usually
sparse, the non-zero edges are more telling than the zero-weighted
edges. For example, in co-authorship graphs, the observed co-
authorship node pairs are more important compared to any two
unrelated nodes. Additionally, as discussed before, the edge weights
are mainly about the connection strengths, and their distributions
are similar. So in our experiments, for a given edge, we adopt
its smaller weight in two graphs to describe its edge coherence.
Formally,
coherence(u, v) = min{EA(u, v), EB(u, v)}.
(4)
Edge Contrast. A good contrast metric must meet the following
requirements.
(1) Symmetric. (cid:140)e order of GA and GB should have no e(cid:130)ect on
the contrast metric. Formally, given two nodes, u and v, if we
swap EA and EB, contrast(u, v) should be the same.
(2) Zero. It is natural to require contrast(u, v) = 0 when the edge
weights in two graphs are the same. (cid:140)at is, when EA(u, v) =
EB(u, v), contrast(u, v) must be 0.
(3) Monotonicity. Suppose EA(u, v) ≤ EB(u, v). If we increase
EB(u, v) and keep the other same, the score contrast(u, v) should
increase. If we decrease EA(u, v) and keep the other same, the
score contrast(u, v) should also increase.
Starting from these three requirements, we (cid:128)nd a neat de(cid:128)nition
as follows.
contrast(u, v) = EA(u, v) − EB(u, v)
(5)
It meets all the requirements and is therefore adopted in our exper-
iments.
Node Penalty. If there is no prior knowledge about the two graphs,
a uniform node penalty is always a safe choice. (cid:140)erefore, we use
penalty(u) = 1 in all our experiments.
3 RELATED WORK
In this section, we introduce the related work on dense graph
pa(cid:138)erns within a single graph, cross-graph pa(cid:138)erns, and interesting
phrase pa(cid:138)erns of contrast in the text mining (cid:128)eld.
3.1 Dense Subgraphs within a Single Graph
Our coherence and contrast metrics are inspired by the dense sub-
graph problem, i.e., (cid:128)nding a subset of nodes that maximizes the
ratio of the number of edges between these nodes over the number
of selected nodes. A polynomial time algorithm using a network
(cid:131)ow model is (cid:128)rst proposed to solve this problem [8]. [1] tries to
solve it approximately using a greedy algorithm. Beyond traditional
dense subgraphs, it has been proved that if one wants to specify
the subgraph size, the problem becomes NP-hard [16]. Gibson et
al. [7] design an e(cid:129)cient algorithm speci(cid:128)cally for giant dense sub-
graphs. Rossi et al. [26] develop a fast, parallel maximum clique
algorithm for sparse graphs; and Leeuwen et al. [30] explore the
most interesting dense subgraphs based on the user's prior belief.
3.2 Cross-Graph Patterns
Frequent Subgraph. Given a large collection of graphs, frequent
subgraph mining aims to (cid:128)nd frequent structures across di(cid:130)erent
graphs [33, 34]. It is an unsupervised task but focuses on shared
pa(cid:138)erns instead of contrast pa(cid:138)erns. Moreover, it usually requires
more than two, usually tens of graphs as input.
Discriminative Subgraph. In discriminative subgraph mining,
given multiple graphs with their class labels, the goal is to (cid:128)gure
out the subgraphs that discriminate between classes [13, 28, 29]. Dis-
criminative subgraph is sometimes named as contrast subgraph [29],
however, it's completely di(cid:130)erent from our contrast subgraph min-
ing, due to its supervised learning nature.
Co-Dense Subgraph. Density is an important measurement for
graphs. Among various models and de(cid:128)nitions of dense subgraphs,
quasi-clique is one of the most prominent ones [17]. As a natural
extension, researchers have explored how to e(cid:129)ciently (cid:128)nd cross-
graph quasi-cliques [24] and coherent subgraphs [3, 4]. Jiang et al.
further extend cross-graph quasi-cliques to frequent cross-graph
quasi-cliques [12]. As an application, coherent dense subgraph
mining has shown its usefulness in biological networks [11]. We
can also generate some contrast subgraph in terms of density by
straightforwardly applying co-dense subgraph mining methods
on GA, GB and then on GA, GB. However, as shown in our ex-
periments, these algorithms become extremely slow because the
complementary graphs are so dense that pruning techniques are
no longer e(cid:130)ective.
3.3 Informative Phrases from the Contrast
Given two corpora (i.e., the main corpus and the background cor-
pus), informative phrases are the phrases that occur more frequently
in the main corpus than the background corpus [2, 6, 18, 19, 21, 27].
With the concept of contrast, informative phrases are more salient
than routine phrases like those consisted of stopwords, although
their frequencies in the main corpus are not super high. (cid:140)e def-
inition of informative phrases is based on individual phrase fre-
quencies without considering a set of phrases as a whole. Such
de(cid:128)nition is not applicable for subgraphs.
4 METHODOLOGY
In this section, we derive the polynomial-time algorithm for the
contrast subgraph mining. Since the forms of coherence and con-
trast metrics are similar, we focus on extracting contrast subgraphs
in the derivation. For identifying coherent cores, the same deriva-
tion applies if one replaces the edge contrast contrast(u, v) with
the edge coherence coherence(u, v).
4.1 Binary Search
First of all, we reduce the original maximization problem to a veri-
(cid:128)cation problem by applying the binary search technique on the
contrast score. In order to conduct the binary search, we need to
(cid:128)gure out the lower/upper bounds of the subgraph contrast as well
as the minimum contrast di(cid:130)erence between two subgraphs.
Lower Bound. In the worst case, there is only one di(cid:130)erent edge
between GA and GB (assuming they are not exactly same). Let
c > 0 be the minimum non-zero edge contrast. We have
contrast(g) ≥
c
u∈V penalty(u)
Upper Bound. As an ideal case, all edges are self-loops of the same
node in one graph, while that node has no self-loops in the other
Contrast Subgraph Mining from Coherent Cores
KDD'18, August 2018, London, UK
We (cid:128)rst construct a network with a source node S and a sink
node T as shown in Figure 3, then show a one-to-one mapping
between its S − T (cid:128)nite-value cuts and the contrast subgraphs g
meeting the constraints. Finally, we prove that the min cut gives
us the most contrasting subgraph.
Constructed Network. (cid:140)e network is constructed as follows.
• Creates a source node S and a sink node T .
• ∀u ∈ c, adds an edge between S and u of a weight +∞.
• Chooses a large enough constant U to make sure that all follow-
ing edge weights are positive. In our implementation, U is set as
u,v contrast(u, v), which is no smaller than any d(u).
• ∀u ∈ Nr(c) \ c, adds an edge between S and u of a weight U .
• ∀u ∈ Nr(c), adds an edge between u and T of a weight U + 2 ·
δ · penalty(u) − d(u).
• ∀contrast(u, v) (cid:44) 0, adds an edge between u and v of a weight
contrast(u, v).
One-to-One Mapping. Here, we show the one-to-one mapping
between its S − T (cid:128)nite-value cuts and the contrast subgraphs g
meeting the constraints. AnyS−T cut can be uniquely identi(cid:128)ed by
the set of nodes connected to the source node S, which is denoted
as s(S − T). Note that, we have a hard constraint that c ⊂ g.
(cid:140)erefore, any valid g should contain all nodes in c, which means
there are only 2Nr (c)−c valid g's. Discarding those cuts of +∞
cost (i.e., including those edges from S to c), we will also have
2Nr (c)−c di(cid:130)erent cuts le(cid:137). So mapping the remaining S − T
cuts to s(S − T) forms a one-to-one mapping between the cuts and
contrast subgraphs.
Moreover, the value of the S − T cut can be transformed to the
hδ(g) function. Suppose we have a S − T cut. According to the
one-to-one mapping, we know that g = s(S − T). (cid:140)e cut edges
can be grouped into three types: (1) (cid:140)e edges between g and T ;
(2) (cid:140)e edges between S and Nr(c) \ g; And (3) the edges between
g and Nr(c) \ g. (cid:140)e sum of these edge weights are
u∈g
cutδ(S − T) =
+
= Nr(c) · U +
+
v ∈Nr (c)\g
u∈g
u∈g,v ∈Nr (c)\g
(U + 2 · δ · penalty(u) − d(u))
U +
contrast(u, v)
u∈g,v ∈Nr (c)\g
(2 · δ · penalty(u) − d(u))
contrast(u, v)
(cid:140)erefore, if we follow the one-to-one mapping, we have
hδ(g) = cutδ(S − T) = cutδ(g) − Nr(c) · U
Final Solution. As a result, minimizing hδ(g) is equivalent to (cid:128)nd
the min cut in the constructed network. (cid:140)anks to the duality be-
tween the min cut and the max (cid:131)ow, we can locate the min-cut
among the exponential number of candidates within a polynomial
time [23]. More speci(cid:128)cally, treating the edge weights in the con-
structed network as capacities, we calculate the max (cid:131)ow from S
to T . In the residual network, the nodes connected to S form g. To
obtain the result node set, we do a depth-(cid:128)rst-search in the min-cut
residual graph from S and return all reachable nodes. Algorithm 1
presents the work(cid:131)ow.
Figure 3: An Illustration for the Min-Cut Model.
graph. Let p > 0 be the minimum node penalty. We have
contrast(g) ≤
u,v ∈V ∧u <v contrast(u, v)
p
Minimum Contrast Di(cid:130)erence. Given any two subgraphs g1, g2,
because the edge contrast di(cid:130)erence is at least c and the denomi-
u∈V penalty(u), we
have
nator is no more than the total node penalty
(
contrast(g1) − contrast(g2) >
u∈V penalty(u))2
(cid:140)en, the key problem becomes that given a binary searched
contrast score δ, whether we can (cid:128)nd a subgraph g such that c ⊂
g ⊂ Nr(c) and contrast(g) ≥ δ. Speci(cid:128)cally, we need an algorithm
that can e(cid:129)ciently check whether contrast(g) ≥ δ for any δ ≥ 0. It
is equivalent to checking the following inequalities.
c
u,v∈g∧u <v
contrast(u, v) */
u∈g
u∈❕
v∈Nr (c)
u,v∈g∧u <v
u∈g penalty(u)
u,v∈g∧u <v contrast(u, v)
≥ δ
/* because penalties are positive */
contrast(u, v) −
δ · penalty(u) −
/* let d(u) =
(cid:16)
d(u) −
u∈g
− 1
(cid:16)2 · δ · penalty(u) − d(u)(cid:17)
2
+
(cid:16)2 · δ · penalty(u) − d(u)(cid:17)
+
contrast(u, v) ≤ 0
δ · penalty(u)
u∈g,v∈Nr (c)\g
u∈g,v∈Nr (c)\g
u∈g
u∈g
maxc⊂g⊂Nr (c)
⇔ maxc⊂g⊂Nr (c)
⇔ minc⊂g⊂Nr (c)
⇔ minc⊂g⊂Nr (c)
⇔ minc⊂g⊂Nr (c)
hδ(g) =
u∈g
δ · penalty(u) ≥ 0
contrast(u, v) ≤ 0
contrast(u, v)(cid:17) ≤ 0
(cid:140)erefore, the problem is transformed to minimize the following
function hδ(g) with the constraints c ⊂ g ⊂ Nr(c).
contrast(u, v)
u∈❕,v(cid:60)❕
4.2 Min-Cut Derivation
Fortunately, we (cid:128)nd the aforementioned minimization problem for
the function hδ(g) is solvable in a polynomial time.
STabU+2⋅%⋅penalty(.)−1(.)2∈4567Never cut here!ccontrast(a, b)g =; ; is connected to A} ={2,.,…}contrast(b, c)Uan F−G4HIConclusion: ℎKL=M;NK(L) – P⋅RS(M)Minimize ℎKLóMinimize cutK(L)……KDD'18, August 2018, London, UK
J. Shang et al.
Algorithm 1: Contrast Subgraph Mining from Coherent Core
Require: GA, GB, the coherent core c, and the parameter r.
Return: (cid:140)e most contrasting subgraph g (c ⊂ g ⊂ Nr(c)).
Compute Nr(c) using a breadth-(cid:128)rst search (BFS).
c ← minu,v ∈V ∧u <v contrast(u, v)
p ← minu,v ∈V ∧u <v penalty(u, v)
l ←
h ←
←
(cid:16)
u∈V penalty(u)(cid:17)2
u∈V penalty(u)
u,v ∈V ∧u <v contrast(u, v)
p
c
c
g ← c
while h − l > do
m ← l + h
2
Construct the network as described in Section 4.2.
(cid:131)ow ← the max (cid:131)ow of the constructed network
if (cid:131)ow - Nr(c) · U ≤ 0 then
l ← m
Update g by the current S − T cut.
h ← m
else
return g.
About the constraints c ⊂ g ⊂ Nr(c), it is clear that the min-cut
solution will only involve nodes in Nr(c) because they are the only
nodes in the constructed network. Moreover, because the edge
weights of all edges from S to ∀u ∈ c are set to +∞, they will
never be included in the min cut. (cid:140)erefore, the g induced from the
min-cut will never miss any nodes in the coherent core c.
4.3 Time Complexity Analysis
We analyze the time complexity step by step. Given the parameter
r and seed nodes s, we can obtain Nr(s) in an O(V + EA + EB)
time through a breadth-(cid:128)rst-search. Computing c and p costs
O(V + EA + EB) time. (cid:140)e binary search will have log2 h−l
iterations before it stops. (cid:140)e bo(cid:138)leneck inside the binary search
is the max (cid:131)ow part. (cid:140)e state-of-the-art max (cid:131)ow algorithm [22]
is O(nm) by combining James B Orlin's algorithm (for the sparse
network) and the KRT algorithm (for the dense network), where
n and m are the numbers of nodes and edges in the constructed
network. (cid:140)erefore, the time complexity of the max (cid:131)ow part is
O(cid:0)Nr(c)(Nr(c) + EA + EB)(cid:1). So the overall time complexity
becomes O(cid:0)V +EA+EB+Nr(c)(Nr(c)+EA+EB) log2 h−l
(cid:1).
the worst case time complexity is O(cid:0)V (V +EA +EB) log2 h−l
(cid:1)
In the worst case, when r is big enough, Nr(c) becomes V . So
Moreover, as both log2(h − l) and log2 are no more than the input
length, this time complexity is polynomial.
5 EXPERIMENTS
In this section, we utilize the collaboration change detection task
as a sanity check. We (cid:128)rst present the useful results from contrast
subgraph mining. (cid:140)en, we discuss the importance of the coher-
ent core and neighborhood constraints. In the end, we compare
our algorithm with an adapted co-dense subgraph mining method,
regarding both e(cid:130)ectiveness and e(cid:129)ciency. We implement both
our algorithm and the compared method in C++. (cid:140)e following
execution time experiments were conducted on a machine with
Intel(R) Xeon(R) CPU E5-2680 v2 @ 2.80GHz using a single thread.
5.1 Collaboration Change Detection
(cid:135)e Two Graphs. Two co-authorship graphs are constructed by
spli(cid:138)ing the DBLP publication network dataset2 into two time
periods (2001–2008 and 2009–2016). (cid:140)e nodes are authors who
published at least one paper in KDD, ICDM, WWW, ICML, and
NIPS. (cid:140)e co-authorship from 2001 to 2008 forms the edges in GA,
while GB consists of co-authorships from 2009 to 2016. It ends up
with 6, 999 nodes and 17, 806 edges in total. (cid:140)e edge weight is the
log value (i.e., log(x) + 1) of the actual collaboration time x. We
choose r = 1.
Visualization. We use two aligned heat maps (a black vertical
line in between) to visualize adjacency matrices of the subgraphs.
(cid:140)e darker color, the larger weight. (cid:140)e coherent core is always
positioned in the bo(cid:138)om-right corner and enclosed by red squares,
while the nodes are ranked by their total edge weights of EA within
this subgraph. Moreover, we append a table of the node names in
the top-down order of the rows in the heat map.
Expectations. In this task, coherent cores are expected to be some
long-term collaborators of the seed author spanned over 2001 –
2016, and contrast subgraphs will be likely the researchers who
have more collaborations with the seed author in only one of the
two periods.
Results. Since the time periods start from 2001, we choose a senior
professor, Prof. Jiawei Han from the University of Illinois at Urbana-
Champaign as the seed. As shown in Figure 4, we (cid:128)nd that all
authors in the coherent core are long-term collaborators of Prof.
Jiawei Han. (cid:140)is contrast subgraph achieves a contrast score of
8.99. Note that Jing Gao was Prof. Jiawei Han's Ph.D. student
from 2006 to 2011, and 2008/2009 happens to be her midpoint.
Moreover, they keep collaborating a(cid:137)er Jing Gao's graduation. (cid:140)e
(cid:128)rst 11 researchers in g \ c have much more collaborations with
the researchers in the coherent core in 2001 – 2008 than those in
2009 – 2016. (cid:140)e later 15 researchers have more collaborations
from 2009 to 2016. In summary, the semantic meanings of these
results match our observation and reality. (cid:140)erefore, the contrast
subgraph mining is helpful to the collaboration change detection
task, and our algorithm is e(cid:130)ective.
5.2 Coherent Core and Neighbor Constraints
If NOT inducing from coherent cores. If we directly extract
the most contrasting subgraph without the coherent core step and
the neighborhood step, we will (cid:128)nd, of course, a subgraph with a
potentially higher contrast score. We run the collaboration change
detection task using Prof. Jiawei Han as the seed again but skip
these two steps. As shown in Figure 5, we obtain a subgraph of a
contrast score 11.08, which is higher than the previous score (i.e.,
8.99). Despite the high contrast, as highlighted by the light blue box
in the (cid:128)gure, the seed node Prof. Jiawei Han never collaborated with
anyone in the contrast subgraph. (cid:140)erefore, although this subgraph
2h(cid:138)ps://aminer.org/citation
Contrast Subgraph Mining from Coherent Cores
KDD'18, August 2018, London, UK
seeds
c
g \ c
Jiawei Han
Jiawei Han, Philip S. Yu, Jing Gao, Wei Fan, Charu C. Aggarwal,
Latifur Khan, Bhavani M. (cid:140)uraisingham, Mohammad M. Masud
Hong Cheng−, Chen Chen−, Xifeng Yan−, Haixun Wang−, Dong
Xin−, Chao Liu−, Feida Zhu−, Qiaozhu Mei−, Chengxiang Zhai−,
Jian Pei−, Bo Zhao−, Hanghang Tong, Dan Roth+, (cid:140)omas S.
Huang+, Cindy Xide Lin+, David Lo+, Chi Wang+, Yizhou Sun+,
Fangbo Tao+, Xiao Yu+, Brandon Norick+, Marina Danilevsky+,
Feng Liang+, Jialu Liu+, Ahmed El-Kishky+, Jie Tang+
8.99
contrast(g)
Figure 4: Collaboration Change Detection. (cid:135)e darker, the
more collaborations. In g \ c, − means they have more col-
laborations with Prof. Jiawei Han in the (cid:128)rst time period,
while + means they have more collaborations with Prof. Ji-
awei Han in the second time period.
has a high contrast score, we believe its semantic is unrelated to
the expected collaboration change detection. (cid:140)is example shows
the necessity of inducing from coherent cores and enforcing the
neighbor constraint, which acts as anchors to make the induced
contrast subgraph semantically stable and smooth.
If NOT considering the Nr(c) constraint. Suppose we only uti-
lize the coherent core, but we drop the Nr(c) constraint. Again, we
can (cid:128)nd a subgraph of a higher contrast score, as shown in Figure 6.
Its contrast score is 9.37, which is higher than the previous result,
8.99. However, the results are noisy because of involving many
researchers who never worked with any researcher in the coherent
core. We cannot locate the researchers that are speci(cid:128)cally related
to the researchers in the core because there is no guarantee for the
distance from the researchers in our coherent core. For example, as
highlighted by two blue rectangles in the (cid:128)gure, those researchers
have absolutely no connection to our coherent core. For sure, this
result looks be(cid:138)er than the one without any constraint, but it is
still not as good as Figure 4, in terms of semantic meanings. (cid:140)ere-
fore, the neighbor constraint is necessary to bridge the contrast
subgraph to the coherent core and make them more semantically
connected.
5.3 Running Time and Contrast Comparisons
To our best knowledge, we are the (cid:128)rst to mine informative contrast
subgraphs between two graphs. (cid:140)ere is few a(cid:138)empt before to
a(cid:138)ack this problem directly. In order to make comparisons, we
adapt the co-dense subgraph mining algorithm [3, 4] by using
(GA, GB) and (GB , GA) as inputs. We name it as adapted co-dense
algorithm. (cid:140)is algorithm (cid:128)rst (cid:128)nds several subgraphs which are
dense in one graph but sparse in the other graph. From these results,
seeds
c
g \ c
Jiwei Han
(no coherent core is computed) Jiawei Han
Chang-Tien Lu, Feng Chen, Achla Marathe, Naren Ramakrish-
nan, Nathan Self, Patrick Butler, Rupinder Paul Khandpur, Parang
Saraf, Sathappan Muthiah, Wei Wang, Jose Cadena, Liang Zhao,
Andy Doyle, Anil Vullikanti, Chris J. Kuhlman, Bert Huang, Jaime
Arredondo, Graham Katz, David Mares, Lise Getoor, Kristen Maria
Summers, Fang Jin
11.08
contrast(g)
Figure 5: [Without c and Nr(c)] Collaboration Change Detec-
tion. In the g\c part, none of them has collaborated with the
seed. (cid:135)e results become meaningless.
seeds
c
g \ c
Jiawei Han
Jiawei Han, Philip S. Yu, Wei Fan, Jing Gao, Charu C. Aggarwal,
Latifur Khan, Bhavani M. (cid:140)uraisingham, Mohammad M. Masud
Haixun Wang, Jian Pei, Wei Wang, Chang-Tien Lu, Feng Chen,
Achla Marathe, Naren Ramakrishnan, Nathan Self, Patrick Butler,
Rupinder Paul Khandpur, Parang Saraf, Sathappan Muthiah, Jose
Cadena, Liang Zhao, Andy Doyle, Anil Vullikanti, Chris J. Kuhlman,
Bert Huang, Jaime Arredondo, Graham Katz, David Mares, Lise
Getoor, Kristen Maria Summers, Fang Jin
9.37
contrast(g)
Figure 6: [Without Nr(c)] Collaboration Change Detection.
Most researchers in g \ c have no collaboration with the re-
searchers in c. (cid:135)e results are noisy and less meaningful.
we then pick the subgraph of the highest contrast(g) score as the
contrast subgraph.
We randomly pick a node as the seed and only pass the edges
within Nr(seeds) to the adapted co-dense algorithm. Figure 7(a)
plots the running times of both methods a(cid:137)er the same seeds is
given. Note that the Y-axis is log-scale. From the (cid:128)gure, one can
observe that the adapted co-dense algorithm requires an exponen-
tial running time w.r.t. the number of neighbor nodes. (cid:140)e primary
reason is that the complementary graphs are so dense that most of,
KDD'18, August 2018, London, UK
J. Shang et al.
(a) Running Time
(b) Contrast Scores
Figure 7: Comparison between the adapted co-dense algo-
rithm and our contrast subgraph mining algorithm.
if not all, pruning techniques are no longer e(cid:130)ective. Our algorithm
demonstrates a polynomial growth as same as our previous time
complexity analysis.
We also compare the contrast scores achieved by the two al-
gorithms, as shown in Figure 7(b). In this (cid:128)gure, each data point
corresponds to two runs of the same seed. For a given seed, we
record the contrast score of the adapted co-dense algorithm as X
and the contrast score of our contrast subgraph mining algorithm
as Y. (cid:140)erefore, the data points above y = x indicates be(cid:138)er perfor-
mance than the adapted co-dense algorithm, vice versa. We plot
the y = x line for reference. It is not surprising that the contrast
subgraph mining algorithm will always have a higher score than
the adapted co-dense algorithm because they have slightly di(cid:130)er-
ent objectives. (cid:140)e "contrast" obtained from the adapted co-dense
algorithm emphasizes more on the density vs. the sparsity. (cid:140)is
is from a macro view, while our contrast(g) is de(cid:128)ned in a micro
view by considering every edge.
In summary, our contrast subgraph mining algorithm signi(cid:128)-
cantly outperforms the adapted co-dense subgraph mining algo-
rithm regarding both e(cid:129)ciency and e(cid:130)ectiveness.
6 REAL-WORLD APPLICATIONS
In this section, we present two real-world applications of contrast
subgraph mining: (1) spatio-temporal event detection based on
a taxi trajectory dataset and (2) trend detection on e-commerce
platforms based on an Amazon rating dataset.
6.1 Spatio-Temporal Event Detection
(cid:135)e Two Graphs. We construct two graphs using the tra(cid:129)c data
and road network in Beijing. (cid:140)e same taxi trajectory dataset in [10]
is utilized. We use the road network data of Beijing, which contains
148,110 road joints as nodes and 96,307 road segments as edges.
(cid:140)e GPS trajectories were generated by 33,000 taxis during a period
of 30 days in November 2012. Taxi trajectories are mapped onto
the road network using map matching algorithm proposed in [35].
For each road segment, its weight in GA is set as the number of
taxis traveled along this road segment between 10:30 PM and 11:00
PM on November 24th, 2012, while its weight in GB is set as the
average number of taxis traveled along this road segment between
10:30 PM and 11:00 PM from November 1st to November 23rd. (cid:140)e
neighborhood parameter r is set as 20 considering the roads are
segmented in a (cid:128)ne-grained way.
Visualization. A(cid:137)er identi(cid:128)ed the coherent core and extracted the
contrast subgraph, we project them on a map and utilize a red dot,
seeds
c
g \ c
Games & Strategy Guides
Computers & Internet, Games & Strategy Guides, Strategy Guide,
Programming, Video Games
Tomb Raider−, Half-Life−, Doom+
1.44
contrast(g)
Figure 8: Trend Detection on E-commerce Platform. (cid:135)e
darker, the more popular. In g \ c, − means more popular
in 2002, while + means more popular in 2004.
a blue circle, and a black dashed polygon to highlight the seed, the
coherent core, and the contrast subgraph, respectively.
Expectations. In this task, coherent cores are expected to contain
those road segments that are busy in both the real-time graph and
the historical graph, and contrast subgraphs will be likely those
road segments that are only busy in either the real-time graph of
the historical graph.
Results. We choose some seeds on the East 2nd Ring, a major road
in Beijing. As shown in Figure 2, our algorithm (cid:128)rst identi(cid:128)es a
coherent core about the usual, busy tra(cid:129)c on the East 2nd Ring,
and later extracts a contrast subgraph including many nodes and
road segments around the Beijing Workers' Sports Complex. (cid:140)e
contrast score is 23.87. (cid:140)is contrast subgraph demonstrates a
signi(cid:128)cantly busier real-time tra(cid:129)c than usual, therefore, it may
re(cid:131)ect some unusual event. A(cid:137)er some search on the Internet,
interestingly, on November 24, 2012, there was a concert hosted at
the Beijing Workers' Sports Complex, whose ending time was just
around 10:30 PM. (cid:140)is (cid:128)nding further consolidates the usefulness
of contrast subgraph mining and the e(cid:130)ectiveness of our algorithm
in real world applications.
6.2 Trend Detection on E-commerce Platform
(cid:135)e Two Graphs. We construct two trees based on Amazon's
product hierarchy. (cid:140)e Amazon rating dataset [14] is adopted to ex-
tract the tree and assign weights to each tree edge. (cid:140)ere are 14,222
nodes in total. (cid:140)e root node is "Subjects". A node is represented
as its pre(cid:128)x path from the root, such as "Subjects→Computers &
Internet→Games & Strategy Guides". (cid:140)e weight of an edge linking
from node u to node v equals to the log value (i.e., log(x) + 1) of
the total number of reviews x received by the products under the
node v. In GA, the total number of received reviews are calculated
based on the year 2002, while those in GB come from the year 2004.
We set r = 1.
Visualization. Considering these two graphs are trees, we directly
visualize the tree structures. Only nodes within the contrast sub-
graphs are colored. (cid:140)e darker, the bigger weights of the edge from
v's parent node to v. (cid:140)e blue polygon shows the coherent core
and the dashed black polygon encloses the contrast subgraph.
Contrast Subgraph Mining from Coherent Cores
KDD'18, August 2018, London, UK
Expectations. In this task, we expect the nodes in the coherent
core represent popular products types in both years, while the
nodes in the contrast subgraph demonstrate the speci(cid:128)c trends in
one of the two years.
Results. We choose "Subjects→Computers & Internet→Games &
Strategy Guides" as the seed. As shown in Figure 8, because the
popularity of each sub-category under "Games & Strategy Guides" is
similar in both years, they form the coherent core. Moreover, "Tomb
Raider" and "Half-Life" received many reviews in 2002 but not in
2004, while "Doom" became popular in term of the review amount
in 2004. (cid:140)erefore, these three nodes become the contrast subgraph
of a contrast score 1.44. A(cid:137)er some brief research in Wikipedia,
we found out that "Tomb Raider" released "(cid:140)e Prophecy" episode
in 2002 but nothing in 2004, while "Doom" released "Doom 3" in
2004 and its predecessor (i.e., "Doom 64") was long time ago in
1997. (cid:140)ese results are constructive for the sales trend analysis on
e-commerce platforms and further prove the e(cid:130)ectiveness of our
algorithm on graphs of abstract nodes like hierarchical trees.
7 CONCLUSION & FUTURE WORK
In this paper, we formulated the important contrast subgraph min-
ing problem. To avoid meaningless contrast subgraphs, we pro-
posed to (cid:128)rst identify coherent cores as cornerstones. Our frame-
work can admit a general family of coherence, contrast, and node
penalty metrics. A(cid:137)er rigorous derivations, we developed an el-
egant polynomial-time algorithm to (cid:128)nd the global optimum for
this problem. Extensive experiments veri(cid:128)ed the necessity of intro-
ducing coherent cores as well as the e(cid:129)ciency and e(cid:130)ectiveness of
our proposed algorithm. Real-world applications demonstrated the
tremendous potentials of the contrast subgraph mining.
In future, we will (1) extend the problem se(cid:138)ing to more than
two graphs; (2) (cid:128)nd the top-k contrast subgraphs with overlaps; and
(3) apply our contrast subgraph mining algorithm to other tasks,
like the abnormality detection in social networks.
REFERENCES
[1] Y. Asahiro, K. Iwama, H. Tamaki, and T. Tokuyama. Greedily (cid:128)nding a dense
subgraph. Journal of Algorithms, 34(2):203–221, 2000.
[2] S. Bedathur, K. Berberich, J. Di(cid:138)rich, N. Mamoulis, and G. Weikum. Interesting-
phrase mining for ad-hoc text analytics. Proceedings of the VLDB Endowment,
3(1-2):1348–1357, 2010.
[3] B. Boden, S. Gunnemann, H. Ho(cid:130)mann, and T. Seidl. Mining coherent subgraphs
in multi-layer graphs with edge labels. In Proceedings of the 18th ACM SIGKDD
international conference on Knowledge discovery and data mining, pages 1258–
1266. ACM, 2012.
[4] B. Boden, S. Gunnemann, H. Ho(cid:130)mann, and T. Seidl. Mimag: mining coherent
subgraphs in multi-layer graphs with edge labels. Knowledge and Information
Systems, 50(2):417–446, 2017.
[5] V. M. Buote, E. Wood, and M. Pra(cid:138). Exploring similarities and di(cid:130)erences between
online and o(cid:132)ine friendships: (cid:140)e role of a(cid:138)achment style. Computers in Human
Behavior, 25(2):560–567, 2009.
[6] C. Gao and S. Michel. Top-k interesting phrase mining in ad-hoc collections using
sequence pa(cid:138)ern indexing. In Proceedings of the 15th International Conference on
Extending Database Technology, pages 264–275. ACM, 2012.
[7] D. Gibson, R. Kumar, and A. Tomkins. Discovering large dense subgraphs in
massive graphs. In Proceedings of the 31st international conference on Very large
data bases, pages 721–732. VLDB Endowment, 2005.
[8] A. V. Goldberg. Finding a maximum density subgraph. University of California
Berkeley, CA, 1984.
[9] K. Henderson, B. Gallagher, T. Eliassi-Rad, H. Tong, S. Basu, L. Akoglu, D. Koutra,
C. Faloutsos, and L. Li. Rolx: structural role extraction & mining in large graphs.
In Proceedings of the 18th ACM SIGKDD international conference on Knowledge
discovery and data mining, pages 1231–1239. ACM, 2012.
[10] L. Hong, Y. Zheng, D. Yung, J. Shang, and L. Zou. Detecting urban black holes
based on human mobility data. In Proceedings of the 23rd SIGSPATIAL International
Conference on Advances in Geographic Information Systems, page 35. ACM, 2015.
[11] H. Hu, X. Yan, Y. Huang, J. Han, and X. J. Zhou. Mining coherent dense subgraphs
across massive biological networks for functional discovery. Bioinformatics,
21(suppl 1):i213–i221, 2005.
[12] D. Jiang and J. Pei. Mining frequent cross-graph quasi-cliques. ACM Transactions
on Knowledge Discovery from Data (TKDD), 2(4):16, 2009.
[13] N. Jin and W. Wang. Lts: Discriminative subgraph mining by learning from search
history. In Data Engineering (ICDE), 2011 IEEE 27th International Conference on,
pages 207–218. IEEE, 2011.
[14] N. Jindal and B. Liu. Opinion spam and analysis. In Proceedings of the 2008
International Conference on Web Search and Data Mining, pages 219–230. ACM,
2008.
[15] A. Kavanaugh, J. M. Carroll, M. B. Rosson, T. T. Zin, and D. D. Reese. Community
networks: Where o(cid:132)ine communities meet online. Journal of Computer-Mediated
Communication, 10(4):JCMC10417, 2005.
[16] S. Khot. Ruling out ptas for graph min-bisection, dense k-subgraph, and bipartite
clique. SIAM Journal on Computing, 36(4):1025–1071, 2006.
Machine Learning and Knowledge Discovery in Databases, pages 33–49, 2008.
J. Liu, J. Shang, C. Wang, X. Ren, and J. Han. Mining quality phrases from massive
text corpora. In Proceedings of the 2015 ACM SIGMOD International Conference
on Management of Data, pages 1729–1744. ACM, 2015.
[19] D. P. A. D. D. Majumdar. Fast mining of interesting phrases from subsets of text
corpora. 2014.
[17] G. Liu and L. Wong. E(cid:130)ective pruning techniques for mining quasi-cliques.
[20] A. McCallum, A. Corrada-Emmanuel, and X. Wang. Topic and role discovery in
[18]
[22]
social networks. In Ijcai, volume 5, pages 786–791. Citeseer, 2005.
[21] B. L. Monroe, M. P. Colaresi, and K. M. (cid:139)inn. Fightin'words: Lexical feature
selection and evaluation for identifying the content of political con(cid:131)ict. Political
Analysis, 16(4):372–403, 2008.
J. B. Orlin. Max (cid:131)ows in o (nm) time, or be(cid:138)er. In Proceedings of the forty-(cid:128)(cid:135)h
annual ACM symposium on (cid:138)eory of computing, pages 765–774. ACM, 2013.
[23] C. H. Papadimitriou and K. Steiglitz. Combinatorial optimization: algorithms and
complexity. Courier Corporation, 1998.
J. Pei, D. Jiang, and A. Zhang. On mining cross-graph quasi-cliques. In Proceedings
[24]
of the eleventh ACM SIGKDD international conference on Knowledge discovery in
data mining, pages 228–238. ACM, 2005.
[25] R. A. Rossi and N. K. Ahmed. Role discovery in networks. IEEE Transactions on
Knowledge and Data Engineering, 27(4):1112–1131, 2015.
[26] R. A. Rossi, D. F. Gleich, A. H. Gebremedhin, and M. M. A. Patwary. Fast maximum
clique algorithms for large graphs.
In Proceedings of the 23rd International
Conference on World Wide Web, pages 365–366. ACM, 2014.
J. Shang, J. Liu, M. Jiang, X. Ren, C. R. Voss, and J. Han. Automated phrase
mining from massive text corpora. arXiv preprint arXiv:1702.04457, 2017.
[28] M. (cid:140)oma, H. Cheng, A. Gre(cid:138)on, J. Han, H.-P. Kriegel, A. Smola, L. Song, P. S.
Yu, X. Yan, and K. M. Borgwardt. Discriminative frequent subgraph mining
with optimality guarantees. Statistical Analysis and Data Mining: (cid:138)e ASA Data
Science Journal, 3(5):302–318, 2010.
[29] R. M. H. Ting and J. Bailey. Mining minimal contrast subgraph pa(cid:138)erns. In
Proceedings of the 2006 SIAM International Conference on Data Mining, pages
639–643. SIAM, 2006.
[30] M. van Leeuwen, T. De Bie, E. Spyropoulou, and C. Mesnage. Subjective inter-
[34] X. Yan and J. Han. Closegraph: mining closed frequent graph pa(cid:138)erns.
estingness of subgraph pa(cid:138)erns. Machine Learning, 105(1):41–75, 2016.
[31] C. Wang, J. Han, Y. Jia, J. Tang, D. Zhang, Y. Yu, and J. Guo. Mining advisor-
advisee relationships from research publication networks. In Proceedings of the
16th ACM SIGKDD international conference on Knowledge discovery and data
mining, pages 203–212. ACM, 2010.
[32] B. Wellman, J. Boase, and W. Chen. (cid:140)e networked nature of community: Online
and o(cid:132)ine. It & Society, 1(1):151–165, 2002.
[33] X. Yan and J. Han. gspan: Graph-based substructure pa(cid:138)ern mining. In Data
Mining, 2002. ICDM 2003. Proceedings. 2002 IEEE International Conference on,
pages 721–724. IEEE, 2002.
In
Proceedings of the ninth ACM SIGKDD international conference on Knowledge
discovery and data mining, pages 286–295. ACM, 2003.
J. Yuan, Y. Zheng, C. Zhang, X. Xie, and G.-Z. Sun. An interactive-voting based
map matching algorithm. In Mobile Data Management (MDM), 2010 Eleventh
International Conference on, pages 43–52. IEEE, 2010.
[36] C. Zhang, G. Zhou, Q. Yuan, H. Zhuang, Y. Zheng, L. Kaplan, S. Wang, and
J. Han. Geoburst: Real-time local event detection in geo-tagged tweet streams.
In Proceedings of the 39th International ACM SIGIR conference on Research and
Development in Information Retrieval, pages 513–522. ACM, 2016.
[37] S. Zhang, H. Jiang, and J. M. Carroll. Integrating online and o(cid:132)ine commu-
nity through facebook. In Collaboration Technologies and Systems (CTS), 2011
International Conference on, pages 569–578. IEEE, 2011.
[27]
[35]
|
1912.07551 | 1 | 1912 | 2019-12-16T17:56:56 | Following the footsteps of giants: Modeling the mobility of historically notable individuals using Wikipedia | [
"cs.SI",
"physics.soc-ph"
] | The steady growth of digitized historical information is continuously stimulating new different approaches to the fields of Digital Humanities and Computational Social Science. In this work, we use Natural Language Processing techniques to retrieve large amounts of historical information from Wikipedia. In particular, the pages of a set of historically notable individuals are processed to catch the locations and the date of people's movements. This information is then structured in a geographical network of mobility patterns. We analyze the mobility of historically notable individuals from different perspectives to better understand the role of migrations and international collaborations in the context of innovation and cultural development. In this work, we first present some general characteristics of the dataset from a social and geographical perspective. Then, we build a spatial network of cities, and we model and quantify the tendency to explore by a set of people that can be considered historically and culturally notable. In this framework, we show that by using a multilevel radiation model for human mobility, we are able to catch important features of migration's behavior. Results show that the choice of the target migration place for historically and culturally relevant people is limited to a small number of locations and that it depends on the discipline a notable is interested in and on the number of opportunities she/he can find there. | cs.SI | cs |
Lucchini et al.
RESEARCH
Following the footsteps of giants: Modeling the
mobility of historically notable individuals using
Wikipedia
Lorenzo Lucchini1,2*, Sara Tonelli1 and Bruno Lepri1
*Correspondence: [email protected]
1Fondazione Bruno Kessler, via
Sommarive, 18, 38122 Trento,
Italy
Full list of author information is
available at the end of the article
Abstract
The steady growth of digitized historical information is continuously stimulating
new different approaches to the fields of Digital Humanities and Computational
Social Science. In this work we use Natural Language Processing techniques to
retrieve large amounts of historical information from Wikipedia. In particular, the
pages of a set of historically notable individuals are processed to catch the
locations and the date of people's movements. This information is then
structured in a geographical network of mobility patterns.
We analyze the mobility of historically notable individuals from different
perspectives to better understand the role of migrations and international
collaborations in the context of innovation and cultural development. In this
work, we first present some general characteristics of the dataset from a social
and geographical perspective. Then, we build a spatial network of cities, and we
model and quantify the tendency to explore of a set of people that can be
considered as historically and culturally notable. In this framework, we show that
by using a multilevel radiation model for human mobility, we are able to catch
important features of migration's behavior. Results show that the choice of the
target migration place for historically and culturally relevant people is limited to a
small number of locations and that it depends on the discipline a notable is
interested in and on the number of opportunities she/he can find there.
Keywords: Human behavior understanding; Natural language processing;
Computational social science; Network theory; Human mobility
1 Introduction
Ever since the first villages were built by primitive people, humankind has moved
from one community to another, in search of better life conditions or new oppor-
tunities [1]. These conditions can be represented by different factors, such as the
opportunity of a job, better living standards, or the distance from the home country
[2, 3]. The set of all these factors is difficult to define a-priori.
For example, according to the dominant neo-classical theory, people tend to make
choices in order to maximize their income or level of well-being [4, 5]. Thus, the
search for better economic conditions is one of the most important factors in the
decision of moving from one location to a more attractive one. However, there are
other factors that could play an important role in the decision-making process of a
specific group of people. The attractiveness of an opportunity can also depend on
cultural and linguistic barriers, and on the presence of particular communities at
Lucchini et al.
Page 2 of 17
the destination [4, 6, 7]. Hence, in order to define a complete migration framework
it is important to consider all the linked aspects that intervene in modifying the
attractiveness of a location (e.g. economical, environmental, cultural, and political
aspects) [4, 7, 8]. As a consequence, we believe that, in the same way as the economic
conditions play a central role for those seeking employment, it is very relevant to
investigate if there are other factors playing a role for specific kinds of migration, for
example the migration of notable people and intellectuals in the course of history
[9].
For the general problem of human migration different mathematical models have
been built both in a descriptive [10, 11, 12, 13] and predictive [14] framework. How-
ever, these models have never been applied to the specific scenario of modeling the
historical movements and migrations of intellectual figures. Instead, mobility and
migrations historically played, and still play, an important role in the process of cul-
tural evolution introducing seeds of change in different places around the world [15].
Thus, understanding the patterns that historically notable individuals followed dur-
ing their lives and how these affected the cultural evolution and the human history
is an intriguing and still open research question [16]. This approach introduces new
challenges because of the specificity of the problem and the relatively small num-
ber of people that had an impact on cultural evolution and human history. New
perspectives were opened by a recent approach proposed by Schich et al. [17]. By
analyzing birth and death locations historically notable individuals they captured,
from a network perspective, the key characteristics of their exploratory behavior.
In our paper, we propose a way of using Natural Language Processing (NLP)
and Network Science techniques to further characterize and model the mobility of
historically and culturally notable individuals and to investigate the factors playing
a role in their migration patterns.
In the last decade, the NLP community has developed technologies for extract-
ing information from unstructured texts, thus enabling their application also to
interdisciplinary research areas. Understanding and modeling historical migration
phenomena require specific historical data. To this end, we propose to use NLP
techniques to process the digital biographies contained in Wikipedia and to extract
migratory events from its encyclopedic information. In particular, a subset of the
biographies available in the English version of Wikipedia is used as raw data source.
From this source, for each notable person we search for her/his footsteps hidden in
her/his Wikipedia page and collect the following information: (i) the place and date
of birth, (ii) the place and date of death, and (iii) the place and date of the various
in-life migrations (e.g. moving from one city to a different one). This results in a
more complete set of data with respect to [17], enriching the global picture of the
mobility of notable individuals with a finer temporal granularity, while enabling, to
the best of our knowledge, to model this process from a historical point of view for
the first time.
As proposed in [18], we use the term culture to focus our attention on the set of
notable contributions to the development of human history in its broadest sense:
from poetry to sports, from music to physics and mathematics. In particular, we
model the mobility dynamics of notable people, namely those people whose cultural
production is known at a global level. To this end, we introduce a modification to
Lucchini et al.
Page 3 of 17
the radiation model for human mobility [13]. The assumption behind the radiation
model resides in using the city size (i.e. the city population) as a proxy of the
number of job opportunities. In our paper, we modify the radiation model to take
into account, in addition to the role played by the city size, also the attractive role
played by the different disciplines and by the number of notable people as proxies
of cultural opportunities.
Then, we compare the predictive performances of our cultural-based radiation
model and of the state-of-the art population-based radiation model on three main
aspects of the migration processes of notable people: (i) the radius of gyration of
each notable person, (ii) the number of different cities the notable people lived in
during their lives, and (iii) the distances between the source of a migration and its
destination (jump lengths). Interestingly, our results show that the radius of gyra-
tion and the jump lengths are best modeled considering three different factors: (i)
the population of the city, as a proxy for the economical wealth and job opportuni-
ties, (ii) the number of notable individuals that spent some time of their lives in a
given city, as a proxy for the role played by the city as a cultural attractor, and (iii)
the specific discipline an historically and culturally notable person is working in,
as a proxy both for the interests a city has in investing on a specific cultural area
and for the tendency that people, interested or working on that discipline, have to
follow notable figures from the same domain.
Our results pave the way for further investigations on the historical role played
by places and cities (e.g. ancient Athens, Renaissance Florence, Song Dynasty
Hangzhou, Vienna of 1900, Silicon Valley, etc.) in becoming cultural attractors
for historically and culturally notable individuals and, thus, making them grow into
flourishing places for novel artistic and literary movements, for new scientific and
philosophical theories, for social, technological and political innovations [19].
2 Materials and Methods
2.1 Data
In this section, we present and discuss how we build a dataset containing biographi-
cal information on thousands of historically relevant people in the context of cultural
production and innovation. Together with information about their field of influence,
we also extract information about their mobility patterns.
We start from the set of notable people identified by the Pantheon project [18].
This project collected the biographies of 11, 341 historically and culturally relevant
people that lived from 3500 B.C. to 2010 A.D. More precisely, the dataset was built
by extracting information from the Wikipedia biography and info-boxes. Here, a
person is defined as notable if the corresponding Wikipedia page is translated in
25 or more different languages, since the focus is on global historical and cultural
contributions.
For each notable person, several features were annotated and manually verified,
among which we consider the following ones:
• birth place (geo-localized), state, and date;
• occupation, work area, and discipline.
While the process of selection of notable people in Yu et al. [18] resulted in 11, 341
biographies selected from more than one million biographies available in Wikipedia,
Lucchini et al.
Page 4 of 17
Table 1 Composition of the selected subset of notable people, organized by the different work
areas and disciplines present in the Pantheon dataset [18]. In particular, 15 work areas are
presented, sorted by discipline.
Work Area
Discipline
Percentage (%)
Film and Theatre
Music
Fine Arts
Design
Natural Sciences
Social Sciences
Medicine
Math
Language
Philosophy
Government
Military
Activism
Arts
Arts
Arts
Arts
Science and Technology
Science and Technology
Science and Technology
Science and Technology
Humanities
Humanities
Institutions
Institutions
Public Figure
Individual Sports
Sports
Business
Business and Law
10.35
8.81
5.61
1.68
13.74
3.92
2.25
2.04
17.39
3.51
15.90
3.81
1.23
1.28
1.07
we further restrict our analyses on the notable people that were actively working and
producing cultural outcomes in a specific time-window, the first fifty years of the
20th century. The focus on this specific time-window is justified by two combined
needs. The first is to have a sufficiently short time span so that the properties
of the global mobility do not change. The second is to have the highest possible
number of notable people with complete and precise migratory information, i.e.
with birth, in-life, and death locations. The first requirement reduces the width of
the time-window, while the second one requires to consider relatively recent years.
We therefore consider active the notable people that were at least 20 years old by
the end of the considered time-window to ensure that their historical and cultural
contribution was made during this time span, and that no bias in the type of
migratory event (birth, in-life, and death) is introduced.
By applying this filtering procedure based on the time-window of interest, we
reduce the number of Wikipedia biographies to be processed to 2, 407. We report
in Table 1 the distribution of work areas and disciplines present in this subset of
Wikipedia biographies, which will be further processed as described in the next
Section.
2.1.1 Extracting migration footsteps
For the purposes of our study, we are interested in identifying the different locations
that were visited by the selected set of notable people during their lives and the
year of their visits, in order to build a trajectory (made of multiple footsteps)
for each notable person. This kind of information is not present in the Pantheon
dataset and we therefore need to extract it automatically. The approach we adopt
follows the one recently proposed with Ramble-On [20], a text processing pipeline
dealing with two main tasks: (i) the identification of predicates of migration and
their arguments (i.e. the subject of the migration frame) in Wikipedia biography
pages, and (ii) the recognition and classification of dates, places, and mentions. We
Lucchini et al.
Page 5 of 17
Table 2 Example of identification and classification of a sentence using Semaphor and FrameNet.
Snippet
Predicate
Frame
Place
Time
"Paul moved to Chicago in 1934,
where he continued to
perform on radio."
moved
Motion
Chicago
in 1936
focus our attention on migration processes because they are more likely to describe
a motion action that resulted in a long time permanence in a new location. As a
consequence, if the permanence in a specific location is long, it is more likely that the
notable person had the time to provide his/her cultural contribution there. While
there have been recent attempts to automatically extract people's trajectories and
an associated time period from Wikipedia biographical pages [21], these rely on
shallow NLP approaches based on the presence of keywords and geo-links in the
pages. Furthermore, trajectories are coupled with time spans and not time points
like in our study, leading to a lower granularity of the extracted information. In our
case, the use of semantic parsing associated with a selection of predicates describing
possible trajectories enables a very precise analysis of the resulting data.
To identify the predicates related to migration events, the Ramble-On applica-
tion[1] calls PIKES [22], a suite for NLP that extracts information from English
plain texts, which in turn automatically assigns to each predicate a semantic frame
based on the FrameNet classification [23]. Also the arguments attached to each pred-
icate are automatically labeled with semantic roles, relying on the frame-semantic
parser Semafor [24] . To better distinguish migration predicates, we again follow
the approach proposed in [20], thus removing 16 motion frames (e.g. Escaping,
Getting underway, Touring) out of 45 because of the high number of false posi-
tives found during the identification. Hence, 29 motion frames (e.g. Arriving, Be-
ing employed, Transfer, Travel ) were used for the identification of notable people's
migration actions described in their biographies.
Once a migration frame was identified in a sentence extracted from a Wikipedia
biography page, three elements are required to be present in order to extract a
migration trajectory: (i) the time/date of the motion, (ii) the traveler, and (iii)
the destination. Again, the Ramble-On application selects only sentences satisfying
these constraints, where the date, the notable person (or a reference to him/her)
and the destination have been identified. With this approach, precision is favoured
over recall, requiring that these three elements are explicitly mentioned in the same
sentence.
In Table 2 we show as an example the snippet of a sentence identified as a move-
ment. In this case the predicate "moved" is assigned to the frame "Motion" and it
is selected as a migration frame. Then, the different arguments of the sentence are
identified and labelled depending on their role in the sentence (e.g. the time, the
traveller and the destination/place).
Once the movements have been identified and the information about the date
and the location have been extracted, Ramble-On geo-locates each word related
to the identified destinations using OpenStreetMap Nominatim [2], a search engine
for geo-referenced OpenStreetMap locations. Destinations that lack coordinates are
[1]Code available here: https://github.com/dhfbk/rambleon
[2]https://nominatim.openstreetmap.org/
Lucchini et al.
Page 6 of 17
discarded from the movements' list since they may be erroneously annotated as
destinations. Besides, place and date of death are retrieved for each biography by
Ramble-On using DBpedia [3], where structured data about each notable person are
stored.
In Table 3 we present the information retrieved by processing the same biogra-
phy as in Table 2. Together with the birth information retrieved from Pantheon,
other important information such as date and place of death are extracted from
DBpedia as discussed above. The Migration 1 element, M1, is the first additional
trajectory retrieved by running the Ramble-On tool on the biography page. Merg-
ing the information retrieved about the inventor and musician Les Paul (see Table
2), we identify two jumps, i.e. two migratory events: (i) the first one from the birth
location to Chicago, and (ii) the second one from Chicago to the death location.
Table 3 Results obtained by processing Les Paul's biography using the Ramble-On pipeline.
Birth
Movement 1 Death
date
place
latitude
longitude
predicate
resource
place frame
resource frame
19150000
Waukesha
43.0117
-88.2317
null
dbpedia
null
Birth
19340000
Chicago
41.8369
-87.6847
moved
FrameNet
@Goal
Motion
20091231
White Plains
41.0400
-73.7786
null
dbpedia
null
Death
We refer to [20] for a detailed discussion on the performance of the extraction pro-
cess. In brief, Ramble-On has a precision of 0.86 in correctly identifying migration
frames. As mentioned before, however, the strategy adopted to identify trajectories
may penalize recall, failing to extract movements whose date or destination are
mentioned implicitly or in two different sentences. In order to estimate the amount
of locations visited (birth and death locations included) that we are not able to
capture in our study, we manually annotate the trajectories in the biographies of 50
notable people randomly sampled stratifying over the number of locations found.
In this way, we have estimated that the recall of Ramble-on approach is equal to
0.59.
2.1.2 Dataset composition
The processing of the 2, 407 biographies results in a set of 7, 240 locations connected
with notable persons' trajectories. Among these, we consider the 4, 028 movements
taking place in the 1900-1950 time-window. Each movement with the associated
date and destination was then manually checked by comparing the extracted in-
formation with the source Wikipedia sentence, and corrected if necessary. Also the
coordinates associated with the extracted locations by Nominatim were manually
checked, since the geographical information associated with trajectories is at the
core of our migration model and possible errors must be minimized. These are then
collapsed to the nearest great city, where we adopted as a definition of great cities
the list proposed in [25]. In their work, Reba et al. [25] collected also precious his-
torical demographic data for most of these cities, that we used to test our baseline
for the migration model. More specifically, geo-localized locations are merged based
[3]http://wiki.dbpedia.org/
Lucchini et al.
Page 7 of 17
Figure 1 Two examples of the trajectories obtained after the extraction. Panel A on the left
shows the travels made by Albert Einstein while panel B those made by Maria Montessori.
on a Voronoi tessellation of the Earth. In this framework each cell is built from a list
of cities for which historical population data was available [25]. The space is built
using the great-circle approximation to associate each identified location with the
corresponding Voronoi cell. The distribution of the clustering process is reported in
Fig. SM7 of the Supplementary Materials (SM). In Fig. 1 we present two examples
of trajectories for Albert Einstein, the famous physicist, and Maria Montessori, the
renowned physician and educator. The arcs connects different locations where these
two notable figures spent a part of their lives. The blue coloured side of an arc
indicates the origin of the migration while the red one its destination. For example,
the extraction well captures Einstein's movements from Zurich to Berlin and from
Berlin to US. His first movement from Ulm, his home town, is missing since it hap-
pened before the beginning of 20th century. We also notice that his short period as
visiting professor to Caltech is detected by Ramble-On. Similarly, Maria Montes-
sori's experiences around Europe (i.e. Barcelona, Amsterdam, Vienna, Rome) are
correctly identified. In contrast, we stress that, due to the lack of population data,
her trips to Sri-Lanka are collapsed to cities in India. This shows how the collapsing
process might impact the actual migration distribution.
The merging step results in a set of 629 different cities visited by our notable
people during their lifetime. Figure 2.A shows the members of our set of notable
individuals listed by discipline (as labelled by [18]); while Figure 2.B shows the
distribution of different visited cities for the top two discipline communities, namely
"Arts" and "Science and Technology". The colored dots represent the data while
the lines the geometrical fit to the data. Both the distributions can be described
using a geometrical distribution with parameter p, representing the probability of
successfully settling in a city, p ∼ 1
2 .
2.2 Cultural network and migration modeling
In our framework, we assume that a culturally notable person living in a place
for a certain period of time contributed in some way to make such place a cultural
attractor for other people interested in cultural innovation and development. At the
same time, when a culturally notable person was moving from one place to another,
s/he linked the cultural relations s/he had and the work s/he did in the first place
with the relations and work in the second place. In this way, each movement creates
a cultural connection between two different places around the world. Depending
on the number of notable people moving from one place to another, we can add
Lucchini et al.
Page 8 of 17
Figure 2 A: Size of disciplinary communities present in the dataset. From the bar-plot it is evident
the difference in the number of notable individuals between arts, science&technology, humanities,
institutions and public figures, sports, business&law, exploration. B: Distribution of the number of
trajectories per person in the set of notable people. The lines represent the geometric fit to the
distributions of the two most numerous disciplines, i.e. Arts and Science and Technology. Both
distributions can be described in terms of a geometric distribution with parameter p ∼ 1
2 .
a weight to the links of this cultural network. Thus, the nodes correspond to the
different cities visited by our set of notable people, while the edges are cultural links,
built by interpersonal relations together with the cultural contamination a person
brings with herself/himself while migrating from one place to another, weighted by
the number of occurrences.
In Figure 3 we show a representation of this weighted directed network, where
the weight is the percentage of notable people migrating from a location to their
destination. In the left panel and right panel we show a sector of the network
considering different time frames. On the left, we restrict our focus on a 3-year time-
window centering the map to highlight the connections between Eastern Europe
and Asia (Union of Soviet Socialist Republics in particular) during the October
revolution in 1917. It is interesting to notice that the structure of the network
nicely catches the known phenomenon of Siberian exile of aristocratic families and
important political personalities such as representatives of the previous tsarists'
power and relevant persons not aligned with the current regime. In this example,
we are capturing the movements of people that were forced to migrate to specific
locations. Hence, our notion of cultural attractor both includes locations to which
people moved voluntarily and locations to which culturally notable people were
forced to move. In particular, the number of forced movements (i.e. people sent to
concentration camps and imprisoned people) is 36 out of 3474 identified movements.
Top right panel shows the strong migratory flux of intellectuals from Europe to the
US during the Second World War.
As previously said, we are interested in modeling the mobility of culturally relevant
figures and in investigating the factors playing a role in their migration patterns.
To this end, we modify the radiation model to take into account the role played
by the city size (i.e. proxy for job opportunities) as well as the ones played by the
different disciplines and by the number of notable people (i.e. proxies for cultural
opportunities). The radiation model [13] describes the mobility of people seeking
job opportunities in terms of job openings per number of inhabitants. The model
is developed in the framework of network theory since it treats cities as nodes of a
246810TRIPS102101100B: Number of tripsSCIENCE & TECHNOLOGYp = 0.491rmse = 0.014ARTSp = 0.506rmse = 0.010102103MEMBERSARTSSCIENCE & TECHNOLOGYHUMANITIESINSTITUTIONSPUBLIC FIGURESPORTSBUSINESS & LAWEXPLORATIONA: Discipline communitiesMembersLucchini et al.
Page 9 of 17
Figure 3 A representation of the spatial directed network encoding the mobility information of the
chosen set of notable people during the first half of the 20th century. We use the blue hexagon to
indicate the source point and the red to indicate the destination of the migratory jump. In this
figure, we present the network structure considering the migratory events during two different
time snapshots. Figure 3.a on the left shows the escaping and exiling from Saint Petersburg of the
aristocratic families during the years of the red revolution. Similarly, Figure 3.b on the left shows
the migration flows from Europe to North America during World War 2, due to the fascist regimes
and persecutions.
completely connected weighted network. Specifically, the radiation model describes
the human mobility behavior at long distances, e.g. at the country or global scale,
better than other often used models (e.g. gravity model) [26]. It is also important to
notice that it undershoots the real flows. Moreover, its performances are dependent
on the structure of the system even though it directly accounts for variations of
the population between the source and the destination of a migration, i.e. the less
population you have between two cities the more probable is to migrate from one
to the other.
Simini et al. [13] show that, using this formulation of the problem, the flow of
people between cities only depends on the population of the two cities (namely mi
and ni), and the population living in the circle of radius rij is equal to the distance
between the two cities (namely sij). The relation can be summarized in a simple and
parameter-free equation. We report here the formula for the probability to move
from city i to city j:
Pij = Pi
(mi + sij)(mi + nj + sij)
nj
,
(1)
j∈N
nj
ability of moving from i to every city (i included): Pi =(cid:80)
where Pi is the normalization coefficient for city i that ensures that Pij is the prob-
(mi+sij )(mi+nj +sij )
,
where N is the set of all nodes present in the network. In our work we make use of
these concepts to model in a similar way the mobility of culturally relevant people.
In particular, inspired by multidimensional network theory and it recent applica-
tions in modeling human mobility [27, 28, 29], we propose a multilevel approach to
cultural mobility. In this framework, every cultural discipline works as a separate
system described by a cultural radiation model. Formally, a level is a fully connected
weighted and directed network in which the nodes are the cities visited by all the
notables of a specific discipline and the links represent the probability of migrating
from a city to a different one. Each node has also a link pointing to itself, represent-
ing the probability of remaining in the same city instead of moving to a different
Lucchini et al.
Page 10 of 17
place. The different levels, l ∈ L where L is the set of all disciplines, do not interact
with each other but their contribution to the overall migratory exploration sums
up. Each level contributes to the global migration model with a factor proportional
to the share of notable people the discipline has, N S. Thus, the probability of this
multilevel migratory network can be described by
Pij =
N SlPil
njl
(mil + sijl )(mil + njl + sijl )
,
(2)
where N Sl is the notable share of discipline l ∈ L, mil and njl are the population
of locations i and j respectively in the discipline level l, and sijl is equivalent to
sij for the specific level l. In a similar way, the generalized Pi normalizes Pij to a
probability following the idea of equation (1):
(cid:88)
∀l∈L
(cid:88)
(mil + sijl )(mil + njl + sijl )
Pil =
j∈N
njl
(3)
Starting from these two equations, we propose different implementations of the
radiation model. In particular, we stress that the radiation model introduces the
concept of attractiveness of a city based on the number of job opportunities that a
city can provide. The assumption that this number is directly proportional to the
number of people living in a city [13] directly connects the concept of attractive-
ness with the population size of a city. Here, with similar assumptions we propose
different formulations of the model based on different possible ways of modeling
cultural attractiveness. In particular, we use, as possible alternatives to the stan-
dard formulation of the model, the number of notable people that visited a city
and its combination with the population of the city. In the case of notable people
that visited a city, we count this quantity considering all the visits during the whole
time-window. As a consequence, we model cultural dynamics of individuals within
this period of observation considering the effects of the notable people distribu-
tion as a constant feature of our model, as we do for general population, which is
not updated after every step of the dynamics. This is equivalent to assume that
a single step of the dynamics has a latency larger than the size of the considered
time-window in affecting the importance of cultural attractors. Moreover, counting
notable people in this way also relies on the simplifying assumption that they all
equally contributed to the importance of a city from a cultural perspective. More
realistic modeling will require a relevance score based on the historical relevance of
the notable people.
We test each of these three possible definitions, namely the standard one based on
population size, the one based only on the number of notable people, and the com-
bination of the two, using both a single level formulation of the radiation model and
a multilevel formulation. Using this probabilistic model, our aim is to understand if
the radiation model abstraction can be used to describe the level of exploration of
the historically and culturally relevant figures (namely, the radius of gyration of each
notable people, the number of different cities visited, and the distance distribution
of the migration jumps) and which formulation better captures these properties. In
the next Section, we discuss first the general information that can be obtained by
Lucchini et al.
Page 11 of 17
analyzing the system in terms of network theory metrics and then the comparison
between the different formulations proposed.
3 Results
3.1 Properties of the migration network
One of the most interesting characteristics of cultural migration patterns is the
tendency of notable figures to explore different cities. To study this property, we
can define S(t) as the number of different cities and N (t) as the number of notable
people's birth locations, the number of their death locations, and the number of
their jumps during the selected time-window, as displayed in Figure 4.A. by the
curves for Birth, Death and In-life respectively. The growth of S(t) is modeled as a
function of N (t) using a Heap's law S(t) = N (t)α. Our result is consistent with the
estimate of the parameter α for the Birth curve obtained by Schich et al. in [17].
A similar result is obtained also for the Death and In-life curves representing the
growth of the location for which the exponent, α = 0.85, suggests a tendency to
migrate to a smaller number of cities with respect to the number of different cities
where notable individuals were born. This finding may be interpreted as a general
and global tendency of notable figures to migrate to a more culturally renowned
subset of cities with respect to all the possible available locations.
Focusing on the migration jumps that notable people made during their life, we
can study the most central cities both from a global and discipline-based perspective.
Here, we use the Page-Rank centrality [30] to measure the importance in terms of
the number of incoming links that point to a city and the relative importance of
the cities from which these links are coming. In Figure 4.B, we measure Page-Rank
centrality for two different time-windows, namely 1900-1925 and 1926-1950, to show
the structural changes of the network during the first half of the 20th century. It
is interesting to notice how the development of the film industry in Los Angeles
attracted several figures to the city. It is also worth noticing how, due to the Second
World War (WW2), Berlin loses positions in the ranking of the more central cities.
In Figure SM4, we highlight the specific effect of WW2, evaluating Page-Rank
centrality before and after the rise of the Nazism regime in Germany, showing the
overall loss in cultural centrality for most of the European cities.
We also evaluated Page-Rank centrality for the sub-network built only by consid-
ering the migration jumps of the four top disciplines in those years. Figure 5 shows
how notable people from different disciplines migrated to different cities, suggesting
that the cultural centrality of a city depends on its cultural characteristics, e.g. Los
Angeles and the film industry. This, indeed, results in Los Angeles being a central
node for Arts (in particular for actors) and Sports, but a more peripheral one for
Institutions, having their more central nodes in capital cities such as London, Paris
and Moscow. In Fig. SM3 we performed a discipline Page-Rank analysis for two
time windows as in Fig. 4, showing that an important change is present also at the
discipline level. An example is given by the dramatic change (i.e. a decrease) in the
centrality of Berlin for the scientific community before and after 1933.
3.2 Cultural attractiveness in a multilevel radiation model
With the results obtained so far we aim at modeling notable figures' migratory
patterns to better understand what is the process driving the choice of the location
Lucchini et al.
Page 12 of 17
Figure 4 A: Number of different visited cities as a function of the notable birth/death/in-life
visited locations. In the case of in-life migrations the number of visited locations does not
necessarily corresponds to the number of notable figures in the dataset, but it represents the
different cities visited in time as a function of the number of trips made by the notable figures. B:
Page-rank centrality for the global mobility network evaluated in two different time-windows. In
blue we report the centrality values for the 1900 -- 1925 window, while in red the centrality in the
window 1926 -- 1950.
where to migrate. The radiation model proposed in [13] finds the motivating factor
of mobility for those seeking a job in the number of opportunities a city can provide.
Following this idea and using the results obtained by Simini et al. [13], we propose
a similar approach to understand if such a model can catch the main factors of
cultural mobility. We assume that the number of opportunities that are available in
the selected time-window is directly proportional to the number of notable figures
that lived in a city during the same time interval. In particular, we explore the
following different configurations:
• cultural opportunities are uniformly distributed among cities;
• cultural opportunities are proportional to the population of a city;
• cultural opportunities of a city are directly proportional to the number of
notable figures that lived in that city;
• cultural opportunities are directly proportional both to the population of a
city and to the number of notable figures that lived in that city.
In addition, we also want to check whether cultural opportunities depend on the
discipline a notable individual is part of. We study all these possibilities using the
formulation proposed in Section 2.2.
To find which model better describes the historical mobility of the first half of
20th century, we simulate mobility using a set of walkers that can move following a
radiation model over the cultural network, based on different equations depending
on the model we are simulating. Thus, depending on the selected configuration, we
are using respectively (i) a random walker dynamics' model over the network, (ii) a
standard (population-related) radiation model, and (iii) an implementation of the
radiation model that specifically considers the cultural opportunities as a subset of
job opportunities not necessarily driven by the same factors. The starting location
of each simulated notable individual is chosen based on a random choice weighted
by the population size of each city.
To compare the models we analyze their impact on predicting (i) the number of
different cities visited, as a proxy of the availability to explore different and new
Lucchini et al.
Page 13 of 17
Figure 5 Page rank centrality per discipline for the five most visited cities. This figures shows the
different importance of cities in terms of discipline specific attractiveness.
Table 4 Models' performances. Results obtained for the five models on predicting the number of
destinations, the radius of gyration, and the distribution of the length of the migration jumps. The
metrics used are the adjusted-R2, the Pearson correlation coefficient, ρ, between models and data,
the Kullback-Leibler distance (K-L dist), and the first Wasserstein distance (Wasserstein dist).
Model
adj − R2
Pearson ρ
K-L dist
Wass. dist
Radius of gyration
pop-notable-multilevel
0.2414 ± 0.0027
pop-multilevel −0.2004 ± 0.0034
notable-multilevel −0.6849 ± 0.0041
notable-singlelevel −1.0249 ± 0.0048
random-singlelevel −2.2673 ± 0.0054
Different destinations
pop-notable-multilevel
pop-multilevel
notable-multilevel
notable-singlelevel
random-singlelevel
0.9547 ± 0.0004
0.9612 ± 0.0004
0.9619 ± 0.0003
0.9624 ± 0.0003
0.9606 ± 0.0004
Length of migration jumps
pop-notable-multilevel
pop-multilevel
0.5104 ± 0.0019
0.2249 ± 0.0023
notable-multilevel −0.0640 ± 0.0029
notable-singlelevel −0.2192 ± 0.0029
random-singlelevel −0.8313 ± 0.0034
0.962∗∗∗
0.953∗∗∗
0.947∗∗∗
0.923∗∗∗
0.886∗∗∗
0.978∗∗∗
0.981∗∗∗
0.982∗∗∗
0.982∗∗∗
0.982∗∗∗
0.982∗∗∗
0.974∗∗∗
0.967∗∗∗
0.962∗∗∗
0.947∗∗∗
0.00554 ± 0.00004
0.00655 ± 0.00005
0.00836 ± 0.00005
0.01006 ± 0.00006
0.01559 ± 0.00009
0.000100 ± 2e − 7
0.000125 ± 1.e − 7
0.000139 ± 1e − 7
0.000143 ± 1e − 7
0.000173 ± 1e − 7
0.0649 ± 0.002
0.0561 ± 0.001
0.0570 ± 0.001
0.0623 ± 0.002
0.0724 ± 0.002
0.0150 ± 0.0001
0.0154 ± 0.0001
0.0155 ± 0.0001
0.0159 ± 0.0001
0.0163 ± 0.0001
0.00533 ± 0.00005
0.00686 ± 0.00005
0.00795 ± 0.00005
0.00790 ± 0.00006
0.01265 ± 0.00006
0.000080 ± 1e − 7
0.000099 ± 1e − 7
0.000109 ± 1e − 7
0.000112 ± 1e − 7
0.000131 ± 1e − 7
destinations, (ii) the radius of gyration of each notable figure simulated, and (iii)
the distribution of the length of the migration jumps. We report in Table 4 the
results obtained for five representative models: (i) the random walker model, (ii)
the notable-based jump probability on a single-level structure, (iii) the notable-
based jump probability on a multilevel structure, (iv) the population-based jump
probability on a multilevel structure, and (v) the mixed population-notable-based
jump probability on a multilevel structure. Results for the other models are reported
in the SM, specifically in Tables SM1, Table SM2, and Table SM3.
Among the different possibilities tested, we found that a modeling approach con-
sidering cultural attractors as a product of both job-opportunities and cultural
SCI & TECHARTSINSTITUTIONSHUMANITIESSPORTSBUSINESS & LAWPUBLIC FIGUREEXPLORATION0.000.020.040.060.080.100.12Page rank centralityMoscowLondonLos AngelesParisNew YorkLucchini et al.
Page 14 of 17
Figure 6 A: The distribution of the radius of gyration per notable person; B: The distributions of
the data and the five different models for the number of different cities visited per notable person;
C: The distribution of the lengths of the all the jumps simulated for the different model (lines)
and for the data (stepped density histogram).
interests, by means of the population number and the effective number of notable
people migrated in the time-window under investigation, better captures key fea-
tures of notables' mobility. Moreover, we stress that the model treating different
disciplines as different dynamics outperforms the single-level models in terms of
Kullback-Leibler divergence [31] and first Wasserstein distance [32].
These quantities are measured after simulating the mobility for 2, 000 notable
people, whose number of migration jumps was randomly sampled from a geometric
distribution with parameter p ∼ 0.5. We repeated the simulation for 500 times
to estimate the stability and the standard error of the different metrics. Figure
6.A shows the distribution of the mean radius of gyration of the 500 simulations
against the data (blue-stepped line). Figure 6.B shows the distribution of different
cities visited by a notable person during her/his lifetime, while the distribution
presented in Figure 6.C shows the probability of jumping to a destination that is
at a specific distance from the origin. These distributions are highly dependent on
the geographical distance. Short distance migrations are largely privileged while at
∼ 2500km and ∼ 5500km respectively a second smaller peak appears capturing
the overseas migrations (across the Atlantic Ocean) mainly from Europe to US.
2468Different cities103102101100Pr (density)B: Different visited cities per notablepop-not_multipop_multinot_multinot_singlerand_singledata0200040006000Km106105104103102Pr (density)C: Jump lengthspop-not_multipop_multinot_multinot_singlerand_singledata0100020003000400050006000Km106105104103102101Pr (density)A: Radius of gyration distributionpop-not_multipop_multinot_multinot_singlerand_singledataLucchini et al.
Page 15 of 17
We stress that the effect of slightly underestimating the log-distance trips, which
also affects the radius-of-gyration distribution, has been proven to be a structural
feature of the radiation model under irregular geographical configurations such as
those imposed by oceans [26].
4 Discussion and Conclusions
A complex question has been posed in [17], i.e. whether it is possible to describe
the dynamical properties of the cultural migration phenomenon. Starting from their
idea of using network theory to tackle the problem, we make some further steps in
understanding this issue. First of all, we use NLP tools to capture a more detailed
representation of the lives of historically notable people that can be considered
as cultural developers or important actors in the evolutionary process of culture.
Our approach gathers information not only from the birth and death events but
also from in-life migratory events, enabling us to study in a more detailed way
the cultural migration processes and to include in our model the years in which a
person is professionally more active. Indeed, there is a difference between the birth
location of a person and the locations s/he migrates to or where s/he decide to
spend her/his last years. The first birth location is not determined by a decision of
the born individual, while the in-life migrations and the death places are more likely
to be chosen following some precise interests and motivations. Using our data we
are able to capture this difference and quantify the contribution of the exploration
level of notable people during these phases of life.
Moreover, we focus our attention on understanding the main features that drive
this kind of mobility. Our results provide evidence that the mobility of historically
and culturally notable individuals is best described by simultaneously considering
three different factors: (i) the population of a city, as a proxy of economic wealth
and generic job opportunities; (ii) the number of culturally notable people that
spent some time of their lives there, as a proxy of the attractive role played by this
city as a cultural hub and of the proneness of this city to invest in culture; and
(iii) the discipline a culturally notable person is working in, as a proxy both of the
interest a city has in investing on a specific cultural area and the tendency of people,
interested or working on a given discipline, to follow notable ones from the same
discipline. The solution proposed in our work represent a functional integration, in
a quantitative theoretical model, of these components.
It is also worth highlighting some limitations of our work. First of all, we rely on
Wikipedia as data source, which shows a clear bias towards the Western culture
and male figures. This limitation is even more relevant since we focus only on pages
written in English. Then, we consider a specific time-window in the cultural his-
tory, i.e. the first half of the 20th century. So, our results may be dependent on the
time chosen (for example, we may observe different behaviors during wider time-
windows) and on the small available dataset of historically and culturally notable
personalities. Besides, while our data on trajectories were extracted automatically
but manually revised, we estimate a recall of our information extraction pipeline of
0.59, as pointed out in Section 2.1.1. This implies that some migration destinations
that are mentioned in the Wikipedia biographies should be added (e.g. by improving
the extraction performances of Ramble-On) in order to make our set of data even
Lucchini et al.
Page 16 of 17
richer. A richer dataset will also help in stabilizing, constructing and precisely char-
acterizing the structure of the network. However, we also stress that the extension
to the radiation model proposed here only uses the visited locations and not the
migration timelines of notables. Thus, the present recall level in extracting complete
timelines does not directly affect the dynamical structure of our model. Thanks to
these considerations, it is also interesting to discuss the specific limitations of the
mobility model proposed. In particular, while the fit of the number of trips might
depend on the recall limitations discussed above and thus affect the number of dif-
ferent visited locations, this does not explain the systematical underestimation of
the probability of high-distance jumps and high-radius of gyration. We expect the
geographical constraints (as discussed in Section 2.2) and the specific time-window
we selected (e.g. WW2 forced to migrate many notable people whose choice was
biased towards US) to be two determinants of these discrepancies.
Overall, our results open interesting possibilities on further investigating the his-
torical role played by places and cities in attracting culturally relevant figures as
well as on better analyzing the level of contribution of each of the factors identified
by our approach (i.e. city's population, number of intellectuals living in the city, and
strength of a specific cultural discipline in the city).Similarly, changing the perspec-
tive, it will become possible to quantify the impact of cultural communities on local
well-being, helping our understanding on how individuals from similar or different
disciplines combine and collaborate to seed the vital growth of cities' economies.
Availability of data and material
The data used in this work are available at: https://doi.org/10.7910/DVN/PJS21L or
https://figshare.com/articles/Following_the_footsteps_of_giants/7352987.
The code used to extract the destinations from the Wikipedia biographies is publicly released at
https://github.com/dhfbk/rambleon.
Competing interests
The authors declare no competing financial or non-financial interests.
Author's contributions
All authors conceptualized the project. L.L acquired and cleaned the data, performed the investigation, the
statistical analyses and drafted the original manuscript. All authors contributed revising the manuscript and gave
final approval for publication.
Funding
No funding supported our research.
Abbreviations
NLP: Natural Language Processing; WW2: World War 2; US: United States; SM: Supplementary Material.
Author details
1Fondazione Bruno Kessler, via Sommarive, 18, 38122 Trento, Italy. 2Department of Information Engineering and
Computer Science, University of Trento, via Sommarive, 9, 38122 Trento, Italy.
References
1. Manning, P.: Migration in World History. London: Routledge, ??? (2005)
2. Lee, E.S.: A theory of migration. Demography 3, 47 -- 57 (1966)
3. Arango, J.: Explaining migration: A critical view. International Social Science Journal 52, 283 -- 296 (2000)
4. Castles, S.: International migration at the beginning of the twenty-first century: Global trends and issues.
International Social Science Journal 52, 269 -- 281 (2000). doi:10.1111/1468-2451.00258
5. Todaro, M.P., Smith, S.: Economic Development. Boston: Addison Wesley, ??? (2000)
6. Guiso, L., Sapienza, P., Zingales, L.: Cultural biases in economic exchange? The Quarterly Journal of
Economics 124, 1095 -- 1131 (2009)
7. Belot, M., Ederveen, S.: Cultural barriers in migration between oecd countries. Journal of Population
Economics 25, 1077 -- 1105 (2012)
8. Beine, M., Parsons, C.: Climatic factors as determinants of international migration. The Scandinavian Journal
of Economics 117, 723 -- 767 (2015)
9. Khoshkish, A.: Intellectual migration: A sociological approach to 'brain drain'. Journal Of World History 10,
1095 -- 1131 (1966)
Lucchini et al.
Page 17 of 17
10. Zipf, G.K.: The p1 p2/d hypothesis: On the intercity movement of persons. American Sociological Review
11(6), 677 -- 686 (1946)
11. Stouffer, S.A.: Intervening opportunities: A theory relating mobility and distance. American Sociological Review
5(6), 845 -- 867 (1940)
12. Block, H.D.: Random Orderings and Stochastic Theories of Responses (1960), pp. 172 -- 217. Springer,
Dordrecht (1974). doi:10.1007/978-94-010-9276-0 8. http://dx.doi.org/10.1007/978-94-010-9276-0 8
13. Simini, F., Gonz´alez, M.C., Maritan, A., Barab´asi, A.-L.: A universal model for mobility and migration patterns.
Nature 484, 96 -- 100 (2012). doi:10.1038/nature10856. 1111.0586
14. Ahmed, M., Barlacchi, G., Braghin, S., Calabrese, F., Ferretti, M., Lonij, V., Nair, R., Novack, R., Paraszczak,
J., Toor, A.: A multi-scale approach to data-driven mass migration analysis. CEUR Workshop Proceedings 1831
(2016)
15. Cavalli-Sforza, L.L., Feldman, M.W.: Cultural Transmission and Evolution: A Quantitative Approach. Princeton
University Press, ??? (1981). http://groups.lis.illinois.edu/amag/langev/paper/cavallisforza81book.html
16. Brewer, J., Gelfand, M., Jackson, J.C., MacDonald, I.F., Peregrine, P.N., Richerson, P.J., Turchin, P.,
Whitehouse, H., Wilson, D.S.: Grand challenges for the study of cultural evolution. Nature Ecology and
Evolution 1, 0070 (2017). Comment
17. Schich, M., Song, C., Ahn, Y.-Y., Mirsky, A., Martino, M., Barab´asi, A.-L., Helbing, D.: A network framework
of cultural history. Science 345(6196), 558 -- 562 (2014). doi:10.1126/science.1240064.
http://science.sciencemag.org/content/345/6196/558.full.pdf
18. Yu, A.Z., Ronen, S., Hu, K., Lu, T., Hidalgo, C.A.: Pantheon 1.0: A manually verified dataset of globally
famous biographies. Scientific Data 3, 150075 (2016). doi:10.1038/sdata.2015.75
19. Weiner, E.: The Geography of the Genius: Lessons from the World's Most Creative Places. Simon & Schuster
Paperbacks, ??? (2016)
20. Menini, S., Sprugnoli, R., Moretti, G., Bignotti, E., Tonelli, S., Lepri, B.: Ramble on: Tracing movements of
popular historical figures. In: Proceedings of EACL 2017 (2017)
21. Gergaud, O., Laou´enan, M., Wasmer, E., et al.: A brief history of human time: Exploring a database of'notable
people'. Technical Report 63, Sciences Po Departement of Economics (2016)
22. Corcoglioniti, F., Rospocher, M., Aprosio, A.P.: Extracting knowledge from text with pikes. In: ISWC 2015
Posters & Demonstrations Track, Within the 14th International Semantic Web Conference (ISWC 2015),
Bethlehem, USA, October 11-15, 2015 (2015). http://ceur-ws.org/Vol-1486/paper 66.pdf
23. Baker, C.F., Fillmore, C.J., Lowe, J.B.: The berkeley framenet project. In: Proceedings of the 17th International
Conference on Computational Linguistics - Volume 1. COLING '98, pp. 86 -- 90. Association for Computational
Linguistics, Stroudsburg, PA, USA (1998). doi:10.3115/980451.980860.
https://doi.org/10.3115/980451.980860
24. Kshirsagar, M., Thomson, S., Schneider, N., Carbonell, J., Smith, N., Dyer, C.: Frame-semantic role labeling
with heterogeneous annotations. In: Proceedings of the 53rd Annual Meeting of the Association for
Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (2015).
doi:10.3115/v1/P15-2036
25. Reba, M., Reitsma, F., Seto, K.C.: Spatializing 6,000 years of global urbanization from 3700 BC to AD 2000.
Nature Scientific Data, Volume 3, id. 160034 (2016). 3, 160034 (2016). doi:10.1038/sdata.2016.34
26. Masucci, A.P., Serras, J., Johansson, A., Batty, M.: Gravity versus radiation models: On the importance of
scale and heterogeneity in commuting flows. Physical Review E 88(2), 022812 (2013).
doi:10.1103/PhysRevE.88.022812. 1206.5735
27. De Domenico, M., Sol´e-Ribalta, A., Cozzo, E., Kivela, M., Moreno, Y., Porter, M.A., G´omez, S., Arenas, A.:
Mathematical formulation of multilayer networks. Phys. Rev. X 3, 041022 (2013).
doi:10.1103/PhysRevX.3.041022
28. Belyi, A., Bojic, I., Sobolevsky, S., Sitko, I., Hawelka, B., Rudikova, L., Kurbatski, A., Ratti, C.: Global
multi-layer network of human mobility. CoRR abs/1601.05532 (2016). 1601.05532
29. Ferretti, M., Barlacchi, G., Pappalardo, L., Lucchini, L., Lepri, B.: Weak nodes detection in urban transport
systems: Planning for resilience in singapore. In: 2018 IEEE 5th International Conference on Data Science and
Advanced Analytics (DSAA), pp. 472 -- 480 (2018). doi:10.1109/DSAA.2018.00061
30. Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. In: Proceedings of WWW
1998 (1998)
31. Kullback, S., Leibler, R.A.: On information and sufficiency. Annals of Mathematical Statistics 22(1), 257 -- 263
(1951)
32. Olkin, I., Pukelsheim, F.: The distance between two random vectors with given dispersion matrices. Linear
Algebra Applied 48, 257 -- 263 (1982)
|
1802.08961 | 1 | 1802 | 2018-02-25T07:32:58 | Optimal Containment of Epidemics over Temporal Activity-Driven Networks | [
"cs.SI",
"math.OC",
"physics.soc-ph"
] | In this paper, we study the dynamics of epidemic processes taking place in temporal and adaptive networks. Building on the activity-driven network model, we propose an adaptive model of epidemic processes, where the network topology dynamically changes due to both exogenous factors independent of the epidemic dynamics as well as endogenous preventive measures adopted by individuals in response to the state of the infection. A direct analysis of the model using Markov processes involves the spectral analysis of a transition probability matrix whose size grows exponentially with the number of nodes. To overcome this limitation, we derive an upper-bound on the decay rate of the number of infected nodes in terms of the eigenvalues of a $2 \times 2$ matrix. Using this upper bound, we propose an efficient algorithm to tune the parameters describing the endogenous preventive measures in order to contain epidemics over time. We confirm our theoretical results via numerical simulations. | cs.SI | cs | OPTIMAL CONTAINMENT OF EPIDEMICS OVER TEMPORAL
ACTIVITY-DRIVEN NETWORKS∗
MASAKI OGURA† , VICTOR M. PRECIADO‡ , AND NAOKI MASUDA§
Abstract. In this paper, we study the dynamics of epidemic processes taking place in tempo-
ral and adaptive networks. Building on the activity-driven network model, we propose an adaptive
model of epidemic processes, where the network topology dynamically changes due to both exogenous
factors independent of the epidemic dynamics as well as endogenous preventive measures adopted
by individuals in response to the state of the infection. A direct analysis of the model using Markov
processes involves the spectral analysis of a transition probability matrix whose size grows expo-
nentially with the number of nodes. To overcome this limitation, we derive an upper-bound on the
decay rate of the number of infected nodes in terms of the eigenvalues of a 2 × 2 matrix. Using this
upper bound, we propose an efficient algorithm to tune the parameters describing the endogenous
preventive measures in order to contain epidemics over time. We confirm our theoretical results via
numerical simulations.
Key words. Temporal networks, adaptive networks, epidemics, stochastic processes, convex
optimization.
AMS subject classifications. 39A50, 60J10, 90C25, 91D10, 91D30
1. Introduction. Accurate prediction and cost-effective containment of epi-
demics in human and animal populations are fundamental problems in mathematical
epidemiology [7, 16, 28]. In order to achieve these goals, it is indispensable to develop
effective mathematical models describing the spread of disease in human and animal
contact networks [8, 9].
In this direction, we find a broad literature on modeling,
analysis, and containment of epidemic processes in static contact networks. However,
these works neglect an important factor: the temporality of the interactions [15,39,40],
which arises either independently of or dependent on epidemic propagations. A frame-
work for modeling temporal interactions in human and animal populations is temporal
networks (i.e., time-varying networks), where individuals and interactions are modeled
as nodes and edges, respectively, which can appear and disappear over time [13,14,24].
Under this framework, the effect of temporal interactions on epidemic propagations
has been investigated numerically and theoretically [22, 23]. For containing epidemic
processes on temporal networks, we find a plethora of heuristic approaches [18, 31]
and analytical methods [19, 26].
Adaptive networks refer to the case in which changes in nodes or edges occur
in response to the state of the dynamics taking place on the network [9, 11, 24, 36].
A common temporality of agent-agent interaction in epidemic dynamics arises from
social distancing behavior [1–3], which let the structure of contact networks change
over time as a result of adaptation to the state of the epidemics. Several models of
such adaptive networks have been proposed. For example, Gross et al. proposed a
rewiring mechanism where a healthy node actively avoids to be adjacent to infected
nodes [10]. Extensions of this model are found in [9, 17, 21, 41, 42]. Guo et al. pro-
posed an alternative model in which links connecting an infected node and a healthy
8
1
0
2
b
e
F
5
2
]
I
S
.
s
c
[
1
v
1
6
9
8
0
.
2
0
8
1
:
v
i
X
r
a
([email protected]).
∗Submitted to the editors DATE.
†Graduate School of Information Science, Nara Institute of Science and Technology, Ikoma, Nara
‡Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia,
§Department of Engineering Mathematics, University of Bristol, Clifton, Bristol BS8 1UB
PA USA ([email protected]).
([email protected]).
1
2
M. OGURA, V. M. PRECIADO, AND N. MASUDA
node are deactivated [12]. As for the containment of epidemic processes on adap-
tive networks, various heuristic [5, 20] and analytical [25, 27] approaches have been
proposed. However, in many studies, the effects of exogenous temporal factors and
endogenous adaptive measures on epidemic processes have been separately examined,
leaving unclear how their combination affects the dynamics of the spread.
In this paper, we study epidemic processes and containment strategies in a tempo-
ral network model where the effect of exogenous factors and that of adaptive measures
are simultaneously present. Our model is based on the activity-driven temporal net-
work model [30]. In this model, a node is stochastically activated and connects to
other nodes independently of the dynamics taking place in the network. In order to
analyze the joint effect of exogenous factors and endogenous adaptations, we add a
mechanism of social distancing to the standard activity-driven model. In other words,
we allow an infected node to endogenously adapt to the state of the epidemics by 1) de-
creasing its activation probability and 2) refusing interactions with other activated
nodes. On top of this temporal network, we adopt the standard susceptible-infected-
susceptible (SIS) model of epidemic dynamics (see, e.g., [28]) and derive an analytical
upper bound on the decay rate of the number of infected nodes over time. Based on
this result, we then propose an efficient strategy for tuning the social distancing rates
in order to suppress the number of infected nodes.
Our work is related to [35], in which an infected individual is allowed to decrease
its activation probability. However, in [35], the durations of temporal interactions are
assumed to be sufficiently short compared with the time scale of the epidemic dynam-
ics, leaving out the interesting case where the time scale of the network dynamics and
that of the epidemic process are comparable. In addition, our results hold true for
networks of any size, while the results in [35] require the networks to be sufficiently
large.
This paper is organized as follows. In Section 2, we introduce a model of epidemic
processes on temporal and adaptive networks. In Section 3, we derive an upper bound
on the decay rate of the infection size. Based on this bound, in Section 4 we formulate
and solve optimization problems for containing the spread of epidemics. The obtained
theoretical results are numerically illustrated in Section 5.
2. Problem setting. In this section, we first describe the activity-driven net-
work proposed in [30]. We then introduce an adaptive SIS (A-SIS) model on activity-
driven networks, which allows nodes to adapt to the state of the nodes (i.e., susceptible
or infected) in their neighborhoods.
2.1. Activity-driven networks. Throughout this paper, we let the set of nodes
in a network be given by V = {v1, . . . , vn}. The activity-driven network is a temporal
network in discrete time and is defined as follows.
Definition 2.1 ([30]). For each i = 1, . . . , n, let ai be a positive constant less
than or equal to 1. We call ai the activity rate of node vi. Let m be a positive
integer less than or equal to n − 1. The activity-driven network is defined as an
independent and identically distributed sequence of undirected graphs created by the
following procedure (see Figure 1 for a schematic illustration):
1. At each time t = 0, 1, 2, . . . , each node vi becomes "activated" with probabil-
ity ai independently of other nodes.
2. Each activated node, say, vi, randomly and uniformly chooses m other nodes
independently of other activated nodes. For each chosen node, say, vj, an
edge {vi, vj} is created. These edges are discarded at time t + 1 (i.e., do not
CONTAINING EPIDEMICS ON ACTIVITY-DRIVEN NETWORKS
3
Fig. 1: Schematic on an activity-driven network. We set n = 10 and m = 2. Filled
circles represent active nodes. Open circles represent inactive nodes. The time is
denoted by t.
exist at time t + 1).
3. Steps 2 and 3 are repeated for each time t ≥ 0, independently of past realiza-
tions.
Remark 2.2. We do not allow multiple edges between a pair of nodes. In other
words, even when a pair of activated nodes choose each other as their neighbors at a
specific time, we assume that one and only one edge is spanned between those nodes.
Although the activity-driven network is relatively simple, the model can reproduce
an arbitrary degree distribution [30]. Several properties of activity-driven networks
have been investigated, including structural properties [30,38], steady-state properties
of random walks [29,34], and spreading dynamics [30,35,37]. However, the model does
not allow nodes to adapt to the state of the epidemics and, therefore, is not suitable
for discussing how social distancing affects the dynamics of the spread. In the next
subsection, we extend the activity-driven network by incorporating social distancing
behaviors of nodes.
2.2. Activity-driven A-SIS model. Building upon the activity-driven net-
work described above, we consider the scenario where nodes change their neighbor-
hoods in response to the state of the epidemics over the network [25]. Specifically,
we propose the activity-driven adaptive-SIS model (activity-driven A-SIS model for
short) as follows:
Definition 2.3 (Activity-driven A-SIS model). For each i, let ai, χi, πi ∈ (0, 1]
be constants. We call ai, χi, and πi the activity rate, adaptation factor, and accep-
tance rate of node vi, respectively. Also, let m ≤ n − 1 be a positive integer, and
β, δ ∈ (0, 1] be constants. We call β and δ the infection rate and recovery rate, re-
spectively. The activity-driven A-SIS model is defined by the following procedures (see
Figure 2 for an illustration):
1. At the initial time t = 0, each node is either susceptible or infected.
2. At each time t = 0, 1, 2, . . . , each node vi randomly becomes activated inde-
pendently of other nodes with the following probability:
(cid:40)
(1)
Pr(node vi becomes activated) =
ai,
χiai,
if vi is susceptible,
if vi is infected.
3. Each activated node, say, vi, randomly and uniformly chooses m other nodes
independently of other activated nodes. For each chosen node, say, vj, an
𝑡=0𝑡=1𝑡=24
M. OGURA, V. M. PRECIADO, AND N. MASUDA
Fig. 2: Adaptation of nodes in the activity-driven A-SIS model. Filled and empty
circles represent active and inactive nodes, respectively. (a) A susceptible node is
activated with probability ai. (b) An infected node is activated with probability χiai.
(c) An infected node (vj) accepts an edge spanned from an activated node with
probability πj.
edge {vi, vj} is created with the following probability:
(2)
Pr({vi, vj} is created) =
1,
πj,
if vj is susceptible,
if vj is infected.
(cid:40)
These edges are discarded at time t + 1 (i.e., do not exist at time t + 1). As
in Remark 2.2, we do not allow multiple edges between a pair of nodes.
4. The states of nodes are updated according to the SIS model. In other words,
if a node vi is infected, it transits to the susceptible state with probability δ.
If vi is susceptible, its infected neighbors infect node vi with probability β
independently of the other infected neighbors.
5. Steps 2–4 are repeated for each time t ≥ 0.
Steps 2 and 3 in Definition 2.3 model social distancing behavior by infected nodes.
In Step 2, an infected node decreases its activity rate to avoid infecting other nodes.
Step 2 can also be regarded as modeling reduction of social activity by infected nodes
due to sickness. In Step 3, an infected node, say, vj, establishes a connection with an
activated node only with probability πj to avoid infecting other nodes (when πj < 1).
A susceptible node behaves in the same way as in the standard SIS model in the
original activity-driven network.
3. Decay rate. In order to quantify the persistence of epidemic infections in
the activity-driven A-SIS model, in this section, we introduce the concept of decay
rate of the epidemics. A direct computation of the decay rate requires computing the
eigenvalues of a matrix whose size grows exponentially with the number of the nodes.
To overcome this difficulty, we present an upper bound on the decay rate in terms of
the eigenvalues of a 2 × 2 matrix.
3.1. Definition. For each time t and node vi, define the random variable
(cid:40)
(3)
xi(t) =
0,
1,
if vi is susceptible at time t,
if vi is infected at time t.
𝜋𝑗SSS𝑎𝑖𝑣𝑖1−𝑎𝑖III𝜒𝑖𝑎𝑖𝑣𝑖1−𝜒𝑖𝑎𝑖I𝑣𝑗I𝑣𝑗(a)(b)(c)𝑣𝑖𝑣𝑖CONTAINING EPIDEMICS ON ACTIVITY-DRIVEN NETWORKS
5
Define the vector p(t) = [p1(t) ··· pn(t)](cid:62) of the infection probabilities by
(4)
pi(t) = Pr(vi is infected at time t).
In this paper, we measure the persistence of infection by the rate of convergence of
infection probabilities to the origin.
Definition 3.1. We define the decay rate of the activity-driven A-SIS model by
(5)
α = sup
x(0)
lim sup
t≥0
log(cid:107)p(t)(cid:107)
t
,
where (cid:107)·(cid:107) denotes the (cid:96)1 norm.
The infection-free equilibrium, x1 = ··· = xn = 0, is the unique absorbing state
of the Markov process {x1(t), . . . , xn(t)}t≥0. Moreover, the infection-free equilibrium
is reachable from any other states by our assumption δ > 0. This implies α < 1.
In fact, α is difficult to compute for large networks for the following reason. The
Markov process {x1(t), . . . , xn(t)}t≥0 has 2n states. Let Q denote its 2n×2n transition
probability matrix. Since the disease-free state is the unique absorbing state, it follows
that
(6)
α = max{λ : λ is an eigenvalue of Q, λ < 1}.
Because the size of the matrix Q grows exponentially fast with respect to the number
of the nodes, a direct computation of the decay rate is difficult for large networks.
3.2. An upper bound. We start with the following proposition, which allows
us to upper-bound the infection probabilities using a linear dynamics:
Proposition 3.2. Let
(7)
¯m = m/(n − 1)
and, for all i, define the constants
(8)
Then,
(9)
φi = ¯mχiai, ψi = ¯mπiai.
pi(t + 1) ≤ (1 − δ)pi(t) + β
n(cid:88)
j=1
[1 − (1 − ψi)(1 − φj)]pj(t)
for all nodes vi and t ≥ 0.
Proof. By the definition of the A-SIS dynamics on the activity-driven network,
the nodal states x1, . . . , xn obey the following stochastic difference equation
(10) xi(t + 1) = xi(t)− xi(t)N (i)
δ (t) + (1− xi(t))
1 − aij(t)xj(t)N (ij)
β
(t)
where
(11)
aij(t) =
(cid:40)
if an edge {vi, vj} exists at time t,
1,
0, otherwise,
1 −(cid:89)
j(cid:54)=i
(cid:16)
(cid:17) ,
M. OGURA, V. M. PRECIADO, AND N. MASUDA
t=0 are independent and identically distributed ran-
6
and {N (i)
(t)}∞
dom Bernoulli variables satisfying
t=0 and {N (ij)
δ (t)}∞
β
(12)
and
(13)
N (i)
δ (t) =
N (ij)
β
(t) =
(cid:40)
(cid:40)
1, with probability δ,
0, with probability 1 − δ,
1, with probability β,
0, with probability 1 − β.
On the right-hand side of equation (10), the second and third terms represent recovery
and transmission events, respectively (a similar equation for the case of static networks
can be found in [6]).
(10) is upper-bounded by (1 − xi(t))(cid:80)n
By the Weierstrass product inequality, the third term on the right-hand side of
(t). Since the expectation
j=1 aij(t)xj(t)N (ij)
β
of xi(t) equals pi(t), taking the expectation in (10) gives
(14)
pi(t + 1) ≤ pi(t) − δpi(t) + β
E[(1 − xi(t))aij(t)xj(t)],
(cid:88)
j(cid:54)=i
where E[·] denotes the expectation of a random variable.
Now, assume i (cid:54)= j. By the definition of the variables xi and aij, it follows that
(15)
E[(1 − xi(t))aij(t)xj(t)]
= Pr(vi and vj are adjacent, vi is susceptible, and vj is infected at time t)
= Pr(vi and vj are adjacent at time t Ξt
i,j) Pr(Ξt
i,j),
where the event Ξt
i,j is defined by
(16)
Ξt
i,j = "vi is susceptible and vj is infected at time t".
If we further define the event
(17)
Γt
i→j = "vi is activated and chooses vj as its neighbor at time t",
then, we obtain
(18)
Pr(vi and vj are adjacent at time t Ξt
i,j)
i,j) − Pr(Γt
i→j Ξt
j→i Ξt
i,j)(cid:3)(cid:2)1 − Pr(Γt
=1 −(cid:2)1 − Pr(Γt
i,j) + Pr(Γt
i→j Ξt
i,j)(cid:3).
i→j Ξt
j→i Ξt
= Pr(Γt
i,j) Pr(Γt
j→i Ξt
i,j)
The event Γt
i→j occurs when and only when vi is activated, chooses vj as a potential
neighbor, and actually connects to vj (according to the probability given by equa-
tion (2)). Therefore, equation (8) implies
(19)
Pr(Γt
i→jΞt
i,j) = ψi.
Similarly, the event Γt
j→i occurs when and only when vj is activated (with probabil-
ity χjaj if vj is infected at time t) and chooses vi as one of its m neighbors. Therefore,
we have
(20)
Pr(Γt
j→iΞt
i,j) = φj.
CONTAINING EPIDEMICS ON ACTIVITY-DRIVEN NETWORKS
7
Hence, for i (cid:54)= j, combination of equations (15) and (18)–(20) yields
E[(1 − xi(t))aij(t)xj(t)] = [1 − (1 − ψi)(1 − φj)] Pr(Ξt
≤ [1 − (1 − ψi)(1 − φj)]pj(t),
(21)
i,j)
i,j) ≤ pj(t). Moreover, inequality (21)
where we have used the trivial inequality Pr(Ξt
trivially holds true also when i = j. Inequalities (14) and (21) prove (9), as desired.
Using Proposition 3.2, we obtain the following theorem that gives an explicit
upper bound on the decay rate of the activity-driven A-SIS model. For a vector ξ ∈
Rn, introduce the notations
(22)
(cid:104)ξ(cid:105)a =
1
n
Theorem 3.3. Define
n(cid:88)
i=1
aiξi,
(cid:104)ξ(cid:105)a2 =
1
n
a2
i ξi.
n(cid:88)
i=1
(23)
where
(24)
κ =
(cid:104)χ(cid:105)a + (cid:104)π(cid:105)a − ¯m(cid:104)χπ(cid:105)a2 +
Then, the decay rate α satisfies
(25)
αu = 1 − δ + κ ¯mnβ,
(cid:113)
((cid:104)χ(cid:105)a + (cid:104)π(cid:105)a − ¯m(cid:104)χπ(cid:105)a2)2 + 4((cid:104)χπ(cid:105)a2 − (cid:104)χ(cid:105)a(cid:104)π(cid:105)a)
2
α ≤ αu.
.
Proof. Inequality (9) implies that there exists a nonnegative variable i(t) such
that
(26)
pi(t + 1) = (1 − δ)pi(t) + β
n(cid:88)
(1 − (1 − ψi)(1 − φj)) pj(t) − i(t)
for all nodes vi and t ≥ 0. Let us define the vectors (t) = [(t) ··· n(t)](cid:62), φ =
[φ1 ··· φn](cid:62), and ψ = [ψ1 ··· ψn](cid:62). Equation (26) is rewritten as
j=1
(27)
where
p(t + 1) = Fp(t) − (t),
F = (1 − δ)I + β(cid:2)11(cid:62) − (1 − ψ)(1 − φ)(cid:62)(cid:3) ,
(28)
1 denotes the n-dimensional vector whose entries are all one, and I denotes the n× n
identity matrix. Since F and (t) are nonnegative entrywise, equation (27) leads to
p(t) = F tp(0) −(cid:80)t
(cid:96)=0 F k−(cid:96)((cid:96)) ≤ F tp(0). This inequality shows
α ≤ ρ(F),
(29)
where ρ(·) denotes the spectral radius of a matrix.
Now, we evaluate ρ(F). Equation (28) is rewritten as F = (1 − δ)I + βA, where
A = 11(cid:62) − (1 − ψ)(1 − φ)(cid:62). Since A is nonnegative entrywise and 1 − δ ≥ 0, we
obtain
(30)
ρ(F) = 1 − δ + βρ(A).
8
M. OGURA, V. M. PRECIADO, AND N. MASUDA
Fig. 3: Characteristic equation (34)
Furthermore, as we prove in Appendix A, it holds that
ρ(A) = ρ(nB),
(cid:104)φ(cid:105) + (cid:104)ψ(cid:105) − (cid:104)φψ(cid:105) ±(cid:113)
having the roots
(35)
λ =
((cid:104)φ(cid:105) + (cid:104)ψ(cid:105) − (cid:104)φψ(cid:105))2 + 4((cid:104)φψ(cid:105) − (cid:104)φ(cid:105)(cid:104)ψ(cid:105))
2
.
The roots are real because
((cid:104)φ(cid:105) + (cid:104)ψ(cid:105) − (cid:104)φψ(cid:105))2 + 4((cid:104)φψ(cid:105) − (cid:104)φ(cid:105)(cid:104)ψ(cid:105)) ≥ ((cid:104)ψ(cid:105) − (cid:104)φ(cid:105))2 + (cid:104)φψ(cid:105)2 > 0,
(36)
which follows from the trivial inequality 4(cid:104)φψ(cid:105) ≥ 2(cid:104)φ(cid:105)(cid:104)φψ(cid:105) + 2(cid:104)ψ(cid:105)(cid:104)φψ(cid:105). Therefore,
by substituting equation (8) into equation (35), we obtain ρ(B) = κ ¯m. This equation
and (29)–(31) complete the proof of the theorem.
The following corollary shows that an epidemic will become extinct more quickly
when the adaptation factor and acceptance rate are less correlated in a weighted sense.
Corollary 3.4. Let (χ, π) and (χ(cid:48), π(cid:48)) be pairs of adaptation factors and accep-
tance rates of nodes, and denote the corresponding upper-bounds on the decay rates
u, respectively. If (cid:104)χ(cid:105)a = (cid:104)χ(cid:48)(cid:105)a, (cid:104)π(cid:105)a = (cid:104)π(cid:48)(cid:105)a, and (cid:104)χπ(cid:105)a2 < (cid:104)χ(cid:48)π(cid:48)(cid:105)a2, then
by αu and α(cid:48)
(37)
αu < α(cid:48)
u.
(31)
where
(32)
(33)
(34)
(cid:20)
n(cid:88)
i=1
B =
1
1 − (cid:104)ψ(cid:105)
−1 + (cid:104)φ(cid:105) −1 + (cid:104)φ(cid:105) + (cid:104)ψ(cid:105) − (cid:104)φψ(cid:105)
1
n
(cid:104)φψ(cid:105) =
(cid:104)ψ(cid:105) =
n(cid:88)
1
n
φi,
ψi,
i=1
(cid:104)φ(cid:105) =
1
n
(cid:21)
n(cid:88)
,
i=1
φiψi.
As shown in Figure 3, matrix B has the characteristic equation
(1 − λ)(cid:104)φψ(cid:105) = (λ − (cid:104)φ(cid:105))(λ − (cid:104)ψ(cid:105))
CONTAINING EPIDEMICS ON ACTIVITY-DRIVEN NETWORKS
9
Proof. By the proof of Theorem 3.3, we have αu = 1 − δ + ρ(B)nβ. Figure 3
implies that ρ(B) increases with (cid:104)φψ(cid:105) when (cid:104)φ(cid:105) and (cid:104)ψ(cid:105) are fixed. This proves the
claim of the corollary because (cid:104)χπ(cid:105)a2 = (cid:104)φψ(cid:105)/ ¯m2, (cid:104)χ(cid:105)a = (cid:104)φ(cid:105)/ ¯m, and (cid:104)π(cid:105)a = (cid:104)ψ(cid:105)/ ¯m.
As another corollary of Theorem 3.3, we also present an upper bound on the
decay rate when nodes do not adapt to the states of the nodes.
Corollary 3.5. Assume χi = πi = 1 for all i. Let
2(cid:104)a(cid:105) − ¯m(cid:104)a2(cid:105) +(cid:112)4(cid:104)a2(cid:105) − 4 ¯m(cid:104)a(cid:105)(cid:104)a2(cid:105) + ¯m2(cid:104)a2(cid:105)2
(38)
κ0 =
2
.
Then, the decay rate of the activity-driven SIS model is at most 1 − δ + κ0 ¯mnβ.
Remark 3.6. If m is sufficiently small compared with n and, furthermore, n is
sufficiently large (as implicitly assumed in [30]), the upper-bound in Corollary 3.5
reduces to 1 − δ + ((cid:104)a(cid:105) +(cid:112)(cid:104)a2(cid:105))mβ, which coincides with the result in [30].
4. Cost-optimal adaptations. In this section, we study the problem of eradi-
cating an epidemic outbreak by distributing resources to nodes in the activity-driven
network. We consider the situation in which there is a budget that can be invested
on strengthening the preventative behaviors of each node. We show that the optimal
budget allocation is found using geometric programs, which can be efficiently solved
in polynomial time.
4.1. Problem statement. We consider an optimal resource allocation problem
in which we can tune the adaptation factors and acceptance rates of nodes. Assume
that, to set the adaptation factor of node vi to χi, we need to pay a cost fi(χi).
Similarly we need to pay a cost gi(πi) to set the acceptance rate of node vi to πi. The
total cost for tuning the parameters to the values χ1, . . . , χn, π1, . . . , πn equals
n(cid:88)
(39)
C =
(fi(χi) + gi(πi)).
i=1
Throughout this section, we assume the following box constraints:
(40)
0 <
χi ≤ χi ≤ ¯χi,
¯
0 <
πi ≤ πi ≤ ¯πi.
¯
In this paper, we consider the following two types of optimal resource allocation
problems.
Problem 4.1 (Cost-constrained optimal resource allocation). Given a total bud-
get ¯C, find the adaptation rates and acceptance rates that minimize αu while satisfying
the budget constraint
(41)
C ≤ ¯C.
Problem 4.2 (Performance-constrained optimal resource allocation). Given a
largest tolerable decay rate ¯α, find the adaptation rates and acceptance rates that
minimize the total cost C while satisfying the performance constraint
(42)
αu ≤ ¯α.
10
M. OGURA, V. M. PRECIADO, AND N. MASUDA
4.2. Cost-constrained optimal resource allocation. In this subsection, we
show that Problem 4.1 can be transformed to a geometric program [4], which can be
efficiently solved. Before stating our main results, we give a brief review of geometric
programs. Let x1, . . . , xn denote positive variables and define x = (x1, . . . , xn). We
say that a real function q(x) is a monomial if there exist c ≥ 0 and a1, . . . , an ∈ R
such that q(x) = cxa1
n . Also, we say that a function r(x) is a posynomial if
it is a sum of monomials of x (we point the readers to [4] for more details). Given
a collection of posynomials r0(x), . . . , rk(x) and monomials q1(x), . . . , q(cid:96)(x), the
optimization problem
1 ··· xan
(43)
r0(x)
minimize
subject to ri(x) ≤ 1,
qj(x) = 1,
i = 1, . . . , k,
j = 1, . . . , (cid:96),
is called a geometric program. A constraint of the form r(x) ≤ 1 with r(x) being
a posynomial is called a posynomial constraint. Although geometric programs are
not convex, they can be efficiently converted into equivalent convex optimization
problems [4].
We assume that the cost functions fi and gi decrease with the adaptation fac-
tor χi and acceptance rate πi, respectively. This assumption implies a natural sit-
uation in which it is more costly to suppress χi and πi to a larger extent. We also
expect diminishing returns with increasing investments [33]. For a fixed > 0, let
∆fi(χi) = fi(χi − ) − fi(χi) denote the cost for improving the adaptation factor
from χi to χi − . Then, diminishing returns imply that ∆fi decreases with χi, which
implies the convexity of fi. Therefore, we place the following assumption on the cost
functions.
Assumption 4.3. For all i ∈ {1, . . . , n}, decompose fi and gi into the differences
of their positive and negative parts as follows:
(44)
(45)
fi = f +
gi = g+
i − f−
i ,
i − g−
i ,
where f +
Then, f +
i = max(f, 0), f−
i and g+
i are posynomials, and f−
i = max(−f, 0), g+
i and g−
i = max(g, 0), and g−
i = max(−g, 0).
i are constants.
Assumption 4.3 allows us to use any cost functions that are convex on the log-
log scale because any function convex on the log-log scale can be approximated by a
posynomial with an arbitrary accuracy [4, Section 8]. We now state our first main
result in this section, which allows us to efficiently solve Problem 4.1 via geometric
programming:
Theorem 4.4. Let χ(cid:63)
i and π(cid:63)
i be the solutions of the following optimization prob-
CONTAINING EPIDEMICS ON ACTIVITY-DRIVEN NETWORKS
11
minimize
λ, χi, πi, ζ, η>0
subject to
lem:
(46a)
(46b)
(46c)
(46d)
(46e)
(46f)
1/λ
n(cid:88)
i=1
(40),
¯m2λ(cid:104)χπ(cid:105)a2ζη ≤ 1,
ζ−1 + λ + ¯m(cid:104)χ(cid:105)a ≤ 1,
η−1 + λ + ¯m(cid:104)π(cid:105)a ≤ 1,
(f +
i (χi) + g+
i (πi)) ≤ ¯C +
n(cid:88)
i=1
(f−
i + g−
i ).
Then, the adaptation factor χi = χ(cid:63)
i solve Prob-
lem 4.1. Moreover, under Assumption 4.3, the optimization problem (46) is a geo-
metric program.
i and the acceptance rate πi = π(cid:63)
To prove this theorem, we show an alternative characterization of the decay rate
in terms of inequalities.
Lemma 4.5. Let λ > 0. The upper bound αu satisfies
(47)
if and only if
(48)
(49)
(50)
αu ≤ 1 − δ + λnβ
(1 − λ)(cid:104)φψ(cid:105) ≤ (λ − (cid:104)φ(cid:105))(λ − (cid:104)ψ(cid:105)),
(cid:104)φ(cid:105) < λ,
(cid:104)ψ(cid:105) < λ.
Proof. By the proof of Theorem 3.3, inequality (47) holds true if and only if
λ ≥ ρ(B). Figure 3 indicates that λ ≥ ρ(B) is equivalent to conditions (48)–(50).
We can now prove Theorem 4.4:
Proof of Theorem 4.4. By Lemma 4.5, the solutions of Problem 4.1 are given by
those of the following optimization problem:
(51a)
1 − δ + λnβ
minimize
λ, χi, πi>0
subject to (40), (41), and (48)–(50).
(51b)
Define the auxiliary variables ζ = 1/(λ − (cid:104)φ(cid:105)) and η = 1/(λ − (cid:104)ψ(cid:105)). Then, con-
ditions (48)–(50) hold true if and only if (1 − λ)(cid:104)φψ(cid:105)ζη ≤ 1, ζ > 0, and η > 0.
Therefore, the optimization problem (51) is equivalent to the following optimization
problem:
(52a)
(52b)
(52c)
(52d)
(52e)
minimize
λ, χi, πi, ζ, η>0
subject to
λ
(40) and (41),
(1 − λ)(cid:104)φψ(cid:105)ζη ≤ 1,
ζ−1 − λ + (cid:104)φ(cid:105) = 0,
η−1 − λ + (cid:104)ψ(cid:105) = 0,
M. OGURA, V. M. PRECIADO, AND N. MASUDA
12
where we minimize λ instead of 1 − δ + λnβ. We claim that the optimal value of the
objective function is equal to the one in the following optimization problem:
(53a)
(53b)
(53c)
(53d)
(53e)
minimize
λ, χi, πi, ζ, η>0
subject to
λ
(40) and (41),
(1 − λ)(cid:104)φψ(cid:105)ζη ≤ 1,
ζ−1 − λ + (cid:104)φ(cid:105) ≤ 0,
η−1 − λ + (cid:104)ψ(cid:105) ≤ 0.
i , π(cid:63)
i , π(cid:63)
Let λ(cid:63)
1 and λ(cid:63)
1 ≥ λ(cid:63)
1 ≤ λ(cid:63)
2. Assume that the optimal value λ(cid:63)
2 be the optimal values of the objective functions in problems (52) and
(53), respectively. We have λ(cid:63)
2 because the constraints in problem (52) are more
strict than those in (53). Let us show λ(cid:63)
2 in
problem (53) is attained by the parameters (λ, χi, πi, ζ, η) = (λ(cid:63), χ(cid:63)
i , ζ (cid:63), η(cid:63)). Since
the left-hand sides of constraints (53d) and (53e) decease with ζ and η, there exist
nonnegative constants ∆ζ and ∆η such that ζ = ζ (cid:63) − ∆ζ and η = η(cid:63) − ∆η satisfy
the equality constraints (52d) and (52e). Moreover, since the left-hand side of the
constraint (53c) increases with ζ and η, the new set of parameters (λ, χi, πi, ζ, η) =
i , ζ (cid:63) − ∆ζ, η(cid:63) − ∆η) still satisfies (53c). Furthermore, these changes of pa-
(λ(cid:63), χ(cid:63)
rameters do not affect the feasibility of the box constraints (40) and the budget
constraint (41) because the constraints are independent of the values of ζ and η.
Therefore, we have shown the existence of parameters achieving λ = λ(cid:63)
2 but still sat-
isfying the constraints in the optimization problem (52). This shows λ(cid:63)
2, as
desired.
Now, by rewriting the optimization problem (53) in terms of the variables λ = 1−λ
and substituting (8) in (53), we obtain the optimization problem (46). Notice that
minimizing λ is equivalent to maximizing 1 − λ, which is equivalent to minimizing
1/λ.
1 ≤ λ(cid:63)
Let us finally show that (46) is a geometric program. The objective function, 1/λ,
is a posynomial in λ. The constraints (40) and (46c)–(46e) are posynomial constraints.
Finally, Assumption 4.3 guarantees that constraint (46f) is a posynomial constraint
as well. This completes the proof of the theorem.
4.3. Performance-constrained optimal resource allocation. In the same
way as in the previous section, we can efficiently solve Problem 4.2 via geometric
programming:
Theorem 4.6. Let χ(cid:63)
i and π(cid:63)
i be the solution of the following optimization prob-
n(cid:88)
minimize
λ, χi, πi, ζ, η>0
subject to
lem:
(54a)
(54b)
(54c)
(f +
i (χi) + g+
i (πi))
i=1
(40) and (46c)–(46e),
βn + 1 − δ − ¯α
λ−1 ≤ 1.
βn
Then, the adaptation factor χi = χ(cid:63)
i solve Prob-
lem 4.2. Moreover, under Assumption 4.3, the optimization problem is a geometric
program.
i and the acceptance rate πi = π(cid:63)
Proof. Constraint (54c) is equivalent to the performance constraint (42). The
rest of the proof is almost the same as the proof of Theorem 4.4 and is omitted.
CONTAINING EPIDEMICS ON ACTIVITY-DRIVEN NETWORKS
13
Fig. 4: Comparison between the numerically obtained decay rates α and their upper
bounds αu in Case 1 when β = 0.8. (a) m = 2, (b) m = 10, and (c) m = 50.
Fig. 5: Discrepancy between the true decay rates and their upper bounds in Case 1.
(a) m = 2, (b) m = 10, and (c) m = 50.
5. Numerical simulations. In this section, we illustrate the theoretical results
obtained in previous sections by numerical simulations.
5.1. Accuracy of the upper bound. We first illustrate the accuracy of the
upper bound (23) on the decay rate. We use an activity-driven network with n = 250
nodes and study the following two cases:
Case 1. Activity rates following a uniform distribution over [0, 10−2];
Case 2. Activity rates following a probability distribution F (a) that is propor-
tional to a−2.8 in the interval [10−3, 1] and equal to zero elsewhere [30].
We assume that both the adaptation factors χi and acceptance rates πi follow a
uniform distribution over [0, 1]. For various values of the infection rate β, the recovery
rate δ, and m, we compute the decay rate α based on numerical simulations of the
model and its upper bound αu. To compute the decay rate α, we use Monte Carlo
simulations. For each triple (β, δ, m), we run 10,000 simulations of the activity-driven
A-SIS model with all nodes being infected at time t = 0. In each numerical simulation,
we compute the probability vector p(t) for each t = 0, 1, 2, . . . until the norm (cid:107)p(t)(cid:107)
falls below 0.1. We then estimate the decay rate by α = maxt t−1 log(cid:107)p(t)(cid:107).
In Figure 4, we let β = 0.8 and compare the decay rates and their upper bounds
in Case 1 for various values of δ and m. We confirm that αu bounds the numerically
obtained decay rates. The discrepancy αu − α increases with m. To further examine
how the discrepancy depends on the parameters, we present the discrepancy for vari-
ous values of β, δ, and m in Figure 5. Besides the aforementioned dependence of the
discrepancy on m, we also see that the discrepancy tends to be large when β is large.
00.050.10.1500.050.10.1514
M. OGURA, V. M. PRECIADO, AND N. MASUDA
Fig. 6: Comparison between the numerically obtained decay rates α and their upper
bounds αu in Case 2 when β = 0.8. (a) m = 2, (b) m = 10, and (c) m = 50.
Fig. 7: Discrepancy between the true decay rates and their upper bounds in Case 2.
(a) m = 2, (b) m = 10, and (c) m = 50.
Fig. 8: Cost function fi(χi) for p = 0.01, 1, 10, and 100 when χi = 0.5.
We observe the same trend in the case of the power-law distribution of the activity
rate (Case 2; shown in Figures 6 and 7).
5.2. Optimal resource distribution. We numerically illustrate our framework
to solve the optimal resource allocation problems developed in Section 4. We assume
¯χi = 1 and ¯πi = 1 in the box constraints (40). We use the following cost functions
00.020.040.060.0800.020.040.060.08CONTAINING EPIDEMICS ON ACTIVITY-DRIVEN NETWORKS
15
Fig. 9: Optimal investments on adaptation factors (circles) and acceptance rates
(squares) in Case 1. Left column: m = 2, middle column: m = 10, right column:
m = 50. Top row: πi = 0.2, middle row: πi = 0.7, bottom row: πi = 0.9.
(similar to the ones in [32]):
(55)
fi(χi) = (1 −
−p
i − 1
−p
i − 1
,
χi)
¯
χ
χ
¯
gi(πi) = (1 −
−q
i − 1
−q
i − 1
.
π
π
¯
πi)
¯
These cost functions satisfy Assumption 4.3. Parameters p, q > 0 tune the shape of
the cost functions as illustrated in Figure 8. Because the cost functions are normalized
as fi(
πi, and gi(¯πi) = gi(1) = 0, the
πi) (1 ≤ i ≤ n) in the network is achieved with
¯
maximum adaptation (χi, πi) = (
¯
the budget
πi) = 1 −
χi, fi( ¯χi) = fi(1) = 0, gi(
¯
¯
χi) = 1 −
¯
(56)
χi,
¯
Cmax = 2n − n(cid:88)
(
χi +
¯
πi).
¯
i=1
As in our previous simulations, we consider the activity-driven A-SIS model over
χi = 0.8.
a network with n = 250 nodes. We let m be either 2, 10, or 50. Let
¯
πi be either 0.2, 0.7, or 0.9, and use p = q = 0.01 for the
We let the value of
¯
cost functions (55). We use the fixed budget ¯C = Cmax/4. For each pair (m,
πi),
¯
we determinate the adaptation factors and acceptance rates for the cost-constrained
16
M. OGURA, V. M. PRECIADO, AND N. MASUDA
Fig. 10: Optimal investments on adaptation factors (red circles) and acceptance rates
(blue squares) in Case 2. Left column: m = 2, middle column: m = 10, right column:
m = 50. Top row: πi = 0.2, middle row: πi = 0.7, bottom row: πi = 0.9.
optimal resource allocation problem (Problem 4.1) by solving the geometric program
shown in Theorem 4.4.
The optimal investments on the adaptation factors and acceptance rates (i.e.,
fi(χi) and gi(πi)) are shown in Figure 9 for Case 1. We see that the smaller the
lower limit of the acceptance rate
πi, the more we should invest on decreasing the
¯
acceptance rates. We also find that, in the case of m = 2 and 10, the resulting
investment is almost independent of the activity rates of nodes. This trend disappears
for larger values of m. In the case of m = 50, the optimal solution disproportionately
invests on the nodes having high activity rates. This result reflects the structure of the
optimization problem (46) for the following reason. If m (cid:28) n, then ¯m (cid:28) 1. Therefore,
the set of constraints in the optimization problem (46) approximately reduces to the
set of constraints (40),
(57)
(58)
ζ−1 + λ ≤ 1,
η−1 + λ ≤ 1,
and (46f). These four constraints do not involve activity rates, which leads to optimal
adaptation factors and acceptance rates that are independent of the activity rates.
On the other hand, for a large m, constraints (46c)–(46e) involving the weighted
CONTAINING EPIDEMICS ON ACTIVITY-DRIVEN NETWORKS
17
sums (cid:104)χ(cid:105)a, (cid:104)π(cid:105)a, and (cid:104)χπ(cid:105)a2 become tighter, rendering investments on high-activity
nodes more effective.
The optimal investments for Case 2 are shown in Figure 10. As in Case 1, the
smaller
πi, the optimal solution invests more on decreasing the acceptance rates.
¯
However, the dependence of the optimal solution on the value of m is not as strong
as in Case 1.
6. Conclusion. In this paper, we have studied epidemic processes taking place
in temporal and adaptive networks. Based on the activity-driven network model, we
have proposed the activity-driven A-SIS model, where infected individuals adaptively
decrease their activity and reduce connectivity with other nodes to prevent the spread
of the infection.
In order to avoid the computational complexity arising from the
model, we have first derived a linear dynamics able to upper-bound the infection
probabilities of the nodes. We have then derived an upper-bound on the decay rate of
the expected number of infected nodes in the network in terms of the eigenvalues of a
2× 2 matrix. Then, we have shown that a small correlation between the two different
adaptation mechanisms is desirable for suppressing epidemic infection. Furthermore,
we have proposed an efficient algorithm to optimally tune the adaptation rates in
order to suppress the number of infected nodes in networks. We have illustrated our
results by numerical simulations.
Appendix A. Proof of (31). The image of A is spanned by 1 and 1 − ψ. All
but two eigenvalues of A are zero. Therefore, an eigenvector of A corresponding to
the spectral radius of A is a linear combination of vectors 1 and 1 − ψ. Assume that
v = s11 + s2(1 − ψ) is such an eigenvector of A with eigenvalue λ. By comparing the
coefficients of the vectors 1 and 1 − ψ in the eigenvalue equation Av = λv, we obtain
s1n + s2
ψi
= λs1,
(cid:32)
n − n(cid:88)
(cid:33)
(cid:32)
n − n(cid:88)
i=1
φi
(cid:33)
− s2
(59)
(60)
− s1
i=1
We rewrite (59) and (60) as
(61)
(cid:33)
ψiφi
= λs2.
n(cid:88)
i=1
φi +
(cid:32)
n − n(cid:88)
(cid:20)s1
(cid:21)
i=1
nB
s2
ψi − n(cid:88)
(cid:20)s1
(cid:21)
i=1
,
= λ
s2
where we have used the notations in (32) and (33). Therefore, λ is an eigenvalue of
the matrix nB, as desired.
Acknowledgments. N.M. acknowledges the support provided through JST
CREST Grant Number JPMJCR1304 and the JST ERATO Grant Number JPM-
JER1201, Japan. V.M.P. acknowledges the support of the US National Science Foun-
dation under grant CAREER-ECCS-1651433.
REFERENCES
[1] J. E. Aledort, N. Lurie, J. Wasserman, and S. A. Bozzette, Non-pharmaceutical pub-
lic health interventions for pandemic influenza: an evaluation of the evidence base,
BMC Public Health, 7 (2007), p. 208, https://doi.org/10.1186/1471-2458-7-208, http:
//bmcpublichealth.biomedcentral.com/articles/10.1186/1471-2458-7-208.
18
M. OGURA, V. M. PRECIADO, AND N. MASUDA
[2] D. Bell, A. Nicoll, K. Fukuda, P. Horby, A. Monto, F. Hayden, C. Wylks, L. Sanders,
and J. Van Tam, Nonpharmaceutical interventions for pandemic influenza, national and
community measures, Emerging Infectious Diseases, 12 (2006), pp. 88–94, https://doi.org/
10.3201/eid1201.051371.
[3] M. C. J. Bootsma and N. M. Ferguson, The effect of public health measures on the 1918
influenza pandemic in U.S. cities, Proceedings of the National Academy of Sciences, 104
(2007), pp. 7588–7593, https://doi.org/10.1073/pnas.0611071104, http://www.pnas.org/
cgi/doi/10.1073/pnas.0611071104.
[4] S. Boyd, S.-J. Kim, L. Vandenberghe, and A. Hassibi, A tutorial on geometric pro-
gramming, Optimization and Engineering, 8 (2007), pp. 67–127, https://doi.org/10.1007/
s11081-007-9001-7.
[5] Y. Bu, S. Gregory, and H. L. Mills, Efficient local behavioral-change strategies to reduce
the spread of epidemics in networks, Physical Review E, 88 (2013), p. 042801, https:
//doi.org/10.1103/PhysRevE.88.042801.
[6] D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, and C. Faloutsos, Epidemic thresholds
in real networks, ACM Transactions on Information and System Security, 10 (2008).
[7] O. Diekmann and J. A. P. Heesterbeek, Mathematical Epidemiology of Infectious Diseases:
Model Building, Analysis and Interpretation, Wiley, 2000.
[8] S. Funk, M. Salath´e, and V. A. A. Jansen, Modelling the influence of human behaviour on
the spread of infectious diseases: a review., Journal of the Royal Society, Interface / the
Royal Society, 7 (2010), pp. 1247–1256, https://doi.org/10.1098/rsif.2010.0142.
[9] T. Gross and B. Blasius, Adaptive coevolutionary networks: a review., Journal of the Royal
Society, Interface / the Royal Society, 5 (2008), pp. 259–271, https://doi.org/10.1098/rsif.
2007.1229.
[10] T. Gross, C. J. D. D'Lima, and B. Blasius, Epidemic dynamics on an adaptive network,
Physical Review Letters, 96 (2006), p. 208701, https://doi.org/10.1103/PhysRevLett.96.
208701.
[11] T. Gross and H. Sayama, Adaptive Networks, Springer-Verlag Berlin Heidelberg, 2009.
[12] D. Guo, S. Trajanovski, R. van de Bovenkamp, H. Wang, and P. Van Mieghem, Epi-
demic threshold and topological structure of susceptible-infectious-susceptible epidemics
in adaptive networks, Physical Review E, 88 (2013), p. 042802, https://doi.org/10.1103/
PhysRevE.88.042802.
[13] P. Holme, Modern temporal network theory: a colloquium, The European Physical Journal B,
88 (2015), p. 234, https://arxiv.org/abs/1508.01303.
[14] P. Holme and J. Saramaki, Temporal networks, Physics Reports, 519 (2012), pp. 97–125.
[15] L. Isella, J. Stehl´e, A. Barrat, C. Cattuto, J. F. Pinton, and W. Van den Broeck,
What's in a crowd? Analysis of face-to-face behavioral networks, Journal of Theoretical
Biology, 271 (2011), pp. 166–180, https://doi.org/10.1016/j.jtbi.2010.11.033, https://arxiv.
org/abs/1006.1260.
[16] I. Z. Kiss, J. C. Miller, and P. L. Simon, Mathematics of Epidemics on Networks, Springer,
2017.
[17] C. Lagorio, M. Dickison, F. Vazquez, L. A. Braunstein, P. A. Macri, M. V. Migue-
les, S. Havlin, and H. E. Stanley, Quarantine-generated phase transition in epidemic
spreading, Physical Review E, 83 (2011), p. 026102, https://doi.org/10.1103/PhysRevE.
83.026102.
[18] S. Lee, L. E. C. Rocha, F. Liljeros, and P. Holme, Exploiting temporal network structures
of human interaction to effectively immunize populations, PloS One, 7 (2012), p. e36439,
https://doi.org/10.1371/journal.pone.0036439.
[19] S. Liu, N. Perra, M. Karsai, and A. Vespignani, Controlling contagion processes in activity
driven networks, Physical Review Letters, 112 (2014), p. 118702, https://doi.org/10.1103/
PhysRevLett.112.118702.
[20] S. Maharaj and A. Kleczkowski, Controlling epidemic spread by social distancing: Do
it well or not at all, BMC Public Health, 12 (2012), p. 679, https://doi.org/10.1186/
1471-2458-12-679.
[21] V. Marceau, P. A. Noel, L. H´ebert-Dufresne, A. Allard, and L. J. Dub´e, Adaptive
networks: Coevolution of disease and topology, Physical Review E, 82 (2010), p. 036116,
https://doi.org/10.1103/PhysRevE.82.036116.
[22] N. Masuda and P. Holme, Predicting and controlling infectious disease epidemics using tem-
poral networks, F1000prime reports, 5 (2013), p. 6, https://doi.org/10.12703/P5-6.
[23] N. Masuda and P. Holme, Temporal Network Epidemiology, Springer, 2017, https://doi.org/
10.1007/978-981-10-5287-3.
[24] N. Masuda and R. Lambiotte, A Guide to Temporal Networks, World Scientific Publishing,
CONTAINING EPIDEMICS ON ACTIVITY-DRIVEN NETWORKS
19
2016.
[25] M. Ogura and V. M. Preciado, Epidemic processes over adaptive state-dependent net-
works, Physical Review E, 93 (2016), p. 062316, https://doi.org/10.1103/PhysRevE.
93.062316, http://journals.aps.org/pre/abstract/10.1103/PhysRevE.93.062316, https://
arxiv.org/abs/1602.08456.
[26] M. Ogura and V. M. Preciado, Stability of spreading processes over time-varying large-
scale networks, IEEE Transactions on Network Science and Engineering, 3 (2016), pp. 44–
57, https://doi.org/10.1109/TNSE.2016.2516346, http://ieeexplore.ieee.org/document/
7377119/, https://arxiv.org/abs/1507.07017.
[27] M. Ogura and V. M. Preciado, Optimal Containment of Epidemics in Temporal and
Adaptive Networks, in Temporal Networks Epidemiology, Springer, 2017, pp. 241–266,
https://doi.org/10.1007/978-981-10-5287-3, https://goo.gl/vRFGcA, https://arxiv.org/
abs/1612.06832.
[28] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespignani, Epidemic
processes in complex networks, Reviews of Modern Physics, 87 (2015), pp. 925–979, https:
//arxiv.org/abs/1408.2701.
[29] N. Perra, A. Baronchelli, D. Mocanu, B. Gonc¸alves, R. Pastor-Satorras, and
A. Vespignani, Random walks and search in time-varying networks, Physical Review
Letters, 109 (2012), p. 238701, https://doi.org/10.1103/PhysRevLett.109.238701, https:
//arxiv.org/abs/1206.2858.
[30] N. Perra, B. Gonc¸alves, R. Pastor-Satorras, and A. Vespignani, Activity driven mod-
eling of time varying networks, Scientific Reports, 2 (2012), https://doi.org/10.1038/
srep00469.
[31] B. A. Prakash, H. Tong, N. Valler, M. Faloutsos, and C. Faloutsos, Virus propaga-
tion on time-varying networks: theory and immunization algorithms, in Joint European
Conference on Machine Learning and Knowledge Discovery in Databases, 2010, pp. 99–114.
[32] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and G. J. Pappas, Optimal
resource allocation for network protection against spreading processes, IEEE Transactions
on Control of Network Systems, 1 (2014), pp. 99–108, https://doi.org/10.1109/TCNS.2014.
2310911.
[33] T. C. Reluga, Game theory of social distancing in response to an epidemic, PLoS Computa-
tional Biology, 6 (2010), pp. 1–9, https://doi.org/10.1371/journal.pcbi.1000793.
[34] B. Ribeiro, N. Perra, and A. Baronchelli, Quantifying the effect of temporal resolution
on time-varying networks, Scientific Reports, 3 (2013), p. 3006, https://doi.org/10.1038/
srep03006, https://arxiv.org/abs/1211.7052.
[35] A. Rizzo, M. Frasca, and M. Porfiri, Effect of individual behavior on epidemic spreading
in activity-driven networks, Physical Review E, 90 (2014), p. 042801, https://doi.org/10.
1103/PhysRevE.90.042801.
[36] H. Sayama, I. Pestov, J. Schmidt, B. J. Bush, C. Wong, J. Yamanoi, and T. Gross,
Modeling complex systems with adaptive networks, Computers & Mathematics with Ap-
plications, 65 (2013), pp. 1645–1664, https://doi.org/10.1016/j.camwa.2012.12.005, https:
//arxiv.org/abs/1301.2561.
[37] L. Speidel, K. Klemm, V. M. Egu´ıluz, and N. Masuda, Temporal interactions facilitate
endemicity in the susceptible-infected-susceptible epidemic model, New Journal of Physics,
18 (2016), p. 073013, https://doi.org/10.1088/1367-2630/18/7/073013.
[38] M. Starnini and R. Pastor-Satorras, Topological properties of a time-integrated activity-
driven network, Physical Review E, 87 (2013), p. 062807, https://doi.org/10.1103/
PhysRevE.87.062807, https://arxiv.org/abs/arXiv:1304.3370v1.
[39] J. Stehl´e, N. Voirin, A. Barrat, C. Cattuto, L. Isella, J. F. Pinton, M. Quaggiotto,
W. van den Broeck, C. R´egis, B. Lina, and P. Vanhems, High-resolution measurements
of face-to-face contact patterns in a primary school, PLoS ONE, 6 (2011), p. e23176,
https://arxiv.org/abs/1109.1015.
[40] L. Sun, K. W. Axhausen, D.-H. Lee, and X. Huang, Understanding metropolitan pat-
terns of daily encounters, Proceedings of the National Academy of Sciences, 110
(2013), pp. 13774–13779, https://doi.org/10.1073/pnas.1306440110, http://www.pnas.
org/lookup/doi/10.1073/pnas.1306440110, https://arxiv.org/abs/1301.5979.
[41] I. Tunc and L. B. Shaw, Effects of community structure on epidemic spread in an adaptive
network, Physical Review E, 90 (2014), p. 022801, https://doi.org/10.1103/PhysRevE.90.
022801.
[42] D. H. Zanette and S. Risau-Gusm´an, Infection spreading in a population with evolving
contacts, Journal of Biological Physics, 34 (2008), pp. 135–148, https://doi.org/10.1007/
s10867-008-9060-9.
|
1810.05101 | 2 | 1810 | 2018-10-12T21:23:33 | Centrality in Modular Networks | [
"cs.SI",
"physics.soc-ph"
] | Identifying influential nodes in a network is a fundamental issue due to its wide applications, such as accelerating information diffusion or halting virus spreading. Many measures based on the network topology have emerged over the years to identify influential nodes such as Betweenness, Closeness, and Eigenvalue centrality. However, although most real-world networks are modular, few measures exploit this property. Recent works have shown that it has a significant effect on the dynamics on networks. In a modular network, a node has two types of influence: a local influence (on the nodes of its community) through its intra-community links and a global influence (on the nodes in other communities) through its inter-community links. Depending of the strength of the community structure, these two components are more or less influential. Based on this idea, we propose to extend all the standard centrality measures defined for networks with no community structure to modular networks. The so-called "Modular centrality" is a two dimensional vector. Its first component quantifies the local influence of a node in its community while the second component quantifies its global influence on the other communities of the network. In order to illustrate the effectiveness of the Modular centrality extensions, comparison with their scalar counterpart are performed in an epidemic process setting. Simulation results using the Susceptible-Infected-Recovered (SIR) model on synthetic networks with controlled community structure allows getting a clear idea about the relation between the strength of the community structure and the major type of influence (global/local). Furthermore, experiments on real-world networks demonstrate the merit of this approach. | cs.SI | cs | Noname manuscript No.
(will be inserted by the editor)
Centrality in Modular Networks
Zakariya Ghalmane · Mohammed El
Hassouni · Chantal Cherifi · Hocine
Cherifi
8
1
0
2
t
c
O
2
1
]
I
S
.
s
c
[
2
v
1
0
1
5
0
.
0
1
8
1
:
v
i
X
r
a
Received: date / Accepted: date
Abstract Identifying influential nodes in a network is a fundamental issue due
to its wide applications, such as accelerating information diffusion or halting virus
spreading. Many measures based on the network topology have emerged over the
years to identify influential nodes such as Betweenness, Closeness, and Eigenvalue
centrality. However, although most real-world networks are modular, few measures
exploit this property. Recent works have shown that it has a significant effect on
the dynamics on networks. In a modular network, a node has two types of influ-
ence: a local influence (on the nodes of its community) through its intra-community
links and a global influence (on the nodes in other communities) through its inter-
community links. Depending of the strength of the community structure, these
two components are more or less influential. Based on this idea, we propose to
extend all the standard centrality measures defined for networks with no commu-
nity structure to modular networks. The so-called "Modular centrality" is a two
dimensional vector. Its first component quantifies the local influence of a node
in its community while the second component quantifies its global influence on
the other communities of the network. In order to illustrate the effectiveness of
the Modular centrality extensions, comparison with their scalar counterpart are
performed in an epidemic process setting. Simulation results using the Susceptible-
Infected-Recovered (SIR) model on synthetic networks with controlled community
Zakariya Ghalmane
LRIT URAC No 29, Faculty of Science, Rabat IT center, Mohammed V University, Rabat,
Morocco
E-mail: [email protected]
Mohammed El Hassouni
LRIT URAC No 29, Faculty of Science, Rabat IT center, Mohammed V University, Rabat,
Morocco
E-mail: [email protected]
Chantal Cherifi
DISP Lab, University of Lyon 2
E-mail: [email protected]
Hocine Cherifi
LE2I UMR 6306 CNRS, University of Burgundy, Dijon, France
E-mail: [email protected]
2
Zakariya Ghalmane et al.
structure allows getting a clear idea about the relation between the strength of the
community structure and the major type of influence (global/local). Furthermore,
experiments on real-world networks demonstrate the merit of this approach.
Keywords Influential nodes · Centrality measures · Community Structure · SIR
model
1 Introduction
Identifying the most influential nodes in a network has gained much attention
among researchers in the recent years due to its many applications. Indeed, they
play a major role in controlling the epidemic outbreak [1], increasing the publicity
on a new product [2], controlling the rumor spreading [3]. The most popular ap-
proach to uncover these central nodes is to quantify their influence using centrality
measures. Various centrality measures have been proposed to quantify the influ-
ence of nodes based on their topological properties. Degree centrality, betweenness
centrality, closeness centrality are one of the most basic centrality measures, yet
they are widely used.
In real-world networks, community structure is a very common and important
property [4 -- 7]. Although there is no formal definition of a community, it is often
apprehended as a group of nodes tightly connected that are loosely connected with
nodes in other communities. Previous works have shown that community struc-
ture has important effect on the spreading process in networks [8 -- 11]. However,
classical centrality measures [12] do not take into account the influence of this
major topological property on the spreading dynamics. In a modular network, we
can distinguish two types of links that support the diffusion process: the links
that connect nodes belonging to the same community (intra-community links or
strong ties) and the links that bridge the communities (inter-community links or
weak ties). The former exercise a local influence on the diffusion process (i.e, at
the community level), while the latter have a global influence (at the network
level). Therefore, we believe that this two types of links should be treated differ-
ently. Indeed, the intra-community links contribute to the diffusion in localized
densely connected areas of the networks, while the inter-community links allows
the propagation to remote areas of the network. Suppose that an epidemic starts
in a community, as it is highly connected, the intra-community links will tend to
confine the epidemic inside the community, while the inter-community links will
tend to propagate it to the other communities. As their role is quite different, we
propose to represent the centrality of modular networks by a two dimensional vec-
tor where the first component quantifies the intra-community (or local) influence
and the second component quantifies the inter-community (or global) influence of
each individual node in the network. To compute these components, we need to
split the original network into a local and a global network. The local network
is obtained by removing all the inter-community links from the original network.
The global network is obtained by removing all the intra-community links from the
original network. Note that if the original network is made of a single connected
component the global and local networks split into many connected components.
Therefore, care must be taken to adapt the centrality definition to networks with
multiple components. In the following, we restrict our attention to non-overlapping
Centrality in Modular Networks
3
community structure (i.e a node belongs to a single community). Furthermore, we
consider undirected and unweighted networks for the sake of simplicity, but results
can be easily extended to more general situations.
The proposed approach can be summarized as follows:
-- Choose a standard centrality measure.
-- Compute the local network by removing all the inter-community links from
the modular network.
-- Compute the Local component of the Modular centrality using the standard
centrality.
-- Compute the global network by removing all the intra-community links from
the modular network.
-- Compute the Global component of the Modular centrality using the standard
centrality.
As nodes need to be ranked according to their centrality values, it is necessary
to adopt a strategy based on a combination of the two components of the Modu-
lar centrality. Various strategies, that include different levels of information about
the community structure, may be used. As our main concern, in this paper, is
to highlight the multidimensional nature of centrality in modular networks rather
than devising optimal ranking methods, elementary strategies are evaluated. Two
straightforward combination strategies (the modulus and the tangent of the argu-
ment of the Modular centrality) and a weighted linear combination of the compo-
nents of the Modular centrality are investigated.
Experiments are conducted on modular synthetic networks in order to better
understand the relative influence of the local and Global component of the Modu-
lar centrality in the propagation process. Extensive comparisons with the standard
centrality measures show that Modular centrality measures provide more accurate
rankings. Simulations on real-world networks of diverse nature have also been
performed. As their community structure is unknown, a community detection al-
gorithm has been used. Results confirm that node rankings based on the Modular
centrality are more accurate than those made by the standard centrality measures
which have been designed for networks with no community structure.
The rest of the paper is organized as follows. Related modular-based measures
are discussed in the next section. In Section 3, a general definition of the Mod-
ular centrality is given. In this framework, we present the extensions to modular
networks of the most influential centrality measures (closeness, betweenness and
eigenvector centrality). The experimental setting is described in Section 4. We re-
port and analyze the results of the experiments performed on both synthetic and
real-world networks in Section 5. Finally, the main conclusions are presented in
Section 6.
2 Related works
Ranking the nodes according to their centrality constitutes the standard deter-
ministic approach to uncover the most influential nodes in a network. These
measures rely usually on various network topological properties. However, the
community structure of the network is rarely taken into consideration. Few re-
searchers have payed attention to this property encountered in many real-world
4
Zakariya Ghalmane et al.
networks [7 -- 11, 13 -- 18]. In this section, we give a brief overview of the main deter-
ministic methods that motivates our proposition.
a. Comm centrality. N. Gupta et al. [19] proposed a degree-based centrality mea-
sure for networks with non-overlapping community structure. It is based on a non-
linear combination of the number of intra-community links and inter-community
links. The goal is to select nodes that are both hubs in their community and
bridges between the communities. This measure gives more importance to commu-
nity bridges. Indeed, the number of inter-community links is raised to the power of
two. Comparison have been performed with deterministic and random immuniza-
tion strategies using the S.I.R epidemic model and both synthetic and real-world
networks. Nodes are immunized sequentially from each community in the decreas-
ing order of their centrality value in their respective community. Number of nodes
to be removed from a community are kept proportional to the community size.
Results show that the Comm strategy is more effective or at least works as well as
Degree and Betweenness centrality while using only information at the community
level.
b. Number of neighboring communities centrality. In a previous work [20],
we proposed to rank the nodes according to the number of neighboring commu-
nities that they reach in one hop. The reason for selecting these nodes is that
they are more likely to have a big influence on nodes belonging to various com-
munities. Simulation results on different synthetic and real-world networks show
that it outperforms Degree, Betweenness and Comm centrality in networks with a
community structure of medium strength (i.e when the average number of intra-
community links is of the same order than the number of inter-community links).
c. Community Hub-Bridge centrality. We also proposed the Community Hub-
Bridge centrality measure in [20]. It is based on the combination of the number
of intra-community links weighted by the size of the community and the inter-
community links weighted by the number of neighboring communities. This mea-
sure tends to select preferentially nodes that can be considered as hubs inside
large communities and bridges having many connections with various neighboring
communities. According to experimental results, on both synthetic and real-world
networks, this centrality measure is particularly suited to networks with strong
community structure (i.e, when there is few inter-community links as compared
to the number intra-community links). In this situation, it can identify effectively
the most influential spreaders as compared to Degree, Betweenness, Comm and
the Number of Neighboring Communities centrality measures. A variation of this
centrality measure called the Weighted Community Hub-Bridge centrality has also
been introduced. It is weighted such that, in networks with well-defined community
structure, more importance is given to bridges (inter-community links), while in
networks with weak community structure the hubs in the communities dominate.
The goal is to target the bridges or the hubs according to the community structure
strength. This measure has proved its efficiency as compared to the alternatives
particularly in networks with weak community structure.
d. K-sell with community centrality. Luo et al. proposed a variation of the
K-shell decomposition for modular networks [21]. They suggest that the intra-
Centrality in Modular Networks
5
community and the inter-community links should be considered separately in the
K-core decomposition process. Their method works as follows:
(i) After the removal of nodes with intra-community links, the K-shell decompo-
sition of the remaining nodes is computed. It is associated with an index of kW
core.
(ii) After the removal of nodes with inter-community links, the K-shell of the re-
maining nodes is computed. It is associated with an index of kS
(iii) A new measure is then calculated and assigned to each node based on the
linear combination of both kW
core in order to find nodes that are at the
same time bridges and hubs located in the core of the network.
Experiments have been performed using SIR simulations on Facebook friendship
networks at US Universities. Results show that this strategy is more efficient than
the classical K-shell decomposition, the Degree and the Betweenness centrality
measures.
core and kS
core.
e. Global centrality. In [22], M. Kitromilidis et al. propose to redefine the stan-
dard centrality measures in order to characterize the influence of Western artist.
Based on the idea that influential artists have connections beyond their artistic
movement, they propose to define the centrality of modular networks by consid-
ering only the inter-community links. In other words, an influential artist must
be related to multiple communities, rather than being strongly embedded in its
own community. Considering a painter collaboration network where edges between
nodes represent biographical connections between artists, they compared Between-
ness and Closeness centrality measures with their classical version. Results show
that the correlation values between the standard and modified centrality measures
are quite high. However, the modified centrality measures allows to highlight in-
fluential nodes who might have been missed as they do not necessary rank high in
the standard measures.
All these works suggest that it is of prime interest to disentangle the local influ-
ence from the global influence in order to characterize a node centrality in modular
networks. Indeed, these complementary types of influence may carry very different
meanings and be more or less important in different situations. This is the rea-
son why we propose to exploit the mesoscopic granularity level in order to extend
the definition of the centrality measures that are agnostic about the community
structure to modular networks. We propose to represent the centrality measures in
modular networks as a two dimensional vector made of its local and Global com-
ponent. If needed, these two components can be merged in a scalar value, but the
combination can be made in multiple ways according to complementary available
information about the network nature and topological properties.
3 Modular centrality
Our main objective is to take into account the community structure in order to
identify influential nodes. Indeed, in modular networks, a node has two types
of influence: a local influence which is linked to its community features and a
global influence related to its interactions with the other communities. Under this
assumption, we provide a general definition of centrality in modular networks. We
design a generic algorithm for computing the centrality of a node under this general
6
Zakariya Ghalmane et al.
definition. The Modular centrality extension can be naturally inferred from the
various existing definitions of centrality designed for networks without community
structure. To illustrate this process, we give the modular extensions of the most
influential centrality measures (Betweenness, Closeness, and Eigenvector).
3.1 Definitions
of the network Gl =(cid:83)m
3.1.1 Local component of the Modular centrality
Let's consider a network denoted as G(V, E), where V = {v1, v2, ...., vn} and
E = {(vi, vj) \ vi, vj ∈ V } denotes respectively the set of vertices and edges. Its
non-overlapping community structure C is a partition into a set of communities
C = {C1, ..Ck., Cm} where Ck is the kth community and m is the number of com-
munities. The local network Gl is formed by the union of all the disjoint modules
k=1 Ck. These components are obtained by removing all the
inter-community links between modules from the original network G. Each mod-
ule represents a community Ck denoted as Ck(Vk, Ek). Where Vk = {vk
i \ vi ∈ V }
and Ek = {(vk1
i refers to any node vi
belonging to the community Ck.
i ) as the local centrality of
the node vi ∈ Vk. It is computed separately in each module Ck of the local graph
Gl .
j ) \ vi, vj ∈ V and k1 = k2}, while vk
, vk2
For a selected centrality measure β, we define βL(vk
i
3.1.2 Global component of the Modular centrality
i , vq2
j )\ vi, vj ∈ V and q1 = q2}, while vq
p = C(cid:48) is the size of the set S, the global network is defined by Gg =(cid:83)p
Let's consider the network G(V, E), the global network Gg is formed by the union
of all the connected components of the graph that are obtained after removing
all the intra-community links from the original network G(V, E). Let's suppose
that S = {S1, ..Sq.., Sp} is the set of the revealed connected components and
q=1 Sq.
Each component Sq is denoted as Sq(Vq, Eq). Where Vq = {vq
i \ vi ∈ V } and
Eq = {(vq1
i refers to any node vi belonging
to the component Sq. In this network, there may be some isolated nodes (i.e, nodes
that are not linked directly to another community). These nodes are removed from
Gg in order to obtain a trimmed network formed only by nodes linked to different
communities by one hop. Consequently, the set of nodes of Gg is defined then by
Vg = {vi ∈ V \ N 1
vi is the neighborhood set of nodes reachable
in n hops. It is defined by N n
vi = {vj ∈ V \ vi (cid:54)= vj and dG(vi, vj) <= n}, dG is
the geodesic distance.
i ) as the global centrality
of the node vi ∈ Vq. It is computed over each connected component Sq included in
the global graph Gg. Remember that the global centrality measure of the removed
isolated nodes is set to 0.
For a selected centrality measure β, we define βG(vq
vi (cid:54)= 0}. Where N n
Centrality in Modular Networks
7
Fig. 1 A toy example representing the Local network (Gl) and the Global network
(Gg)associated to a a modular network (G) made of four non-overlapping communities.
3.1.3 Modular centrality
It is a vector with two components. The first component quantifies the local influ-
ence of the nodes in their own community through the local graph Gl, while the
second component measures the global influence of the nodes on the other com-
munities trough the connected components of the global graph Gg. The Modular
centrality of a node vi is given by:
BM (vi) = (βL(vk
i ), βG(vq
i ))
k ∈ {1, ..., m} and q ∈ {1, ..., p}
(1)
Where βL and βG represent respectively the local and global centrality of the
node vi.
3.2 Algorithm
The Modular centrality is computed as follows:
Step 1. Choose a standard centrality measure β.
Step 2. Remove all the inter-community edges from the original network G to ob-
tain the set of communities C forming the local network Gl.
Step 3. Compute the local measure βL for each node in its own community.
Step 4. Remove all the intra-community edges from the original network to reveal
the set of connected components S formed by the inter-community links.
Step 5. Form the global network Gg based on the union of all the connected com-
ponent. Isolated nodes are removed from this network and their global centrality
value is set to 0.
Step 6. Compute the global measure βG of the nodes linking the communities
based on each component of the global network.
Step 7. Add βL and βG to the Modular centrality vector BM .
The pseudo-code of the algorithm to compute the Modular centrality is given in
algorithm 1 .
C1C2C34236951871011121415161713C41819202122C1C2C34236951871011121415161713C41819202122S2S1426914161822=+GGlGg78
Zakariya Ghalmane et al.
Algorithm 1: Generic computation of the Modular centrality
Input : Graph G(V, E), Centrality measure β
Output: A map M (node : centrality vector)
1 Remove all the inter-community links from G to form the local network Gl
2 Remove all the intra-community links from G to form the global network Gg
3 Create and initialize an empty map M (node : BM )
4 BM (vi) = (βL(vk
i )) represent the centrality vector, where each node vi of the
network should be associated with its local and global value according to the selected
centrality measure β
i ), βG(vq
5 for each Ck ⊂ Gl, where k ∈ {1, ..., m} do
6
7
8
9
12
13
14
for each vk
i ∈ Vk do
Calculate βL(vk
i )
M.add(vi, BM (vi))
end
for each vq
i ∈ Vq do
Calculate βG(vi)
BM (vi).add(βG(vi))
10 end
11 for each Sq ⊂ Gg, where q ∈ {1, ..., p} do
end
15
16 end
17 for each vi ∈ V do
M.add(vi, BM (vi))
18
19 end
20 Return the map M
3.3 Modular extensions of standard centrality measures
In order to illustrate the process allowing to extend a given centrality defined for a
network without community structure to a modular network, we give as examples
the modular definitions of the Betweenness, Closeness and Eigenvector centrality.
3.3.1 Modular Betweeness centrality
The modular Betweeness centrality takes into account separately paths that start
and finish in the same community and those which starts and finish in different
communities. For a given node vi, it is represented by the following vector:
k ∈ {1, ..., m} and q ∈ {1, ..., p}
BM (vi) = (βL(vk
i ), βG(vq
(2)
i ))
Where:
βL(vk
i ) =
βG(vq
i ) =
(cid:88)
(cid:88)
vs,vt∈Ck
vs,vt∈Sq
σst(vi)
σst
σst(vi)
σst
(3)
(4)
βL measures the Betweenness centrality of nodes in their own community and βG
measures the Betweenness centrality of nodes linking the communities. σst is the
Centrality in Modular Networks
9
number of shortest paths connecting nodes vs and vt, while σst(vi) is the number
of shortest paths connecting nodes vs and vt and passing through vi.
3.3.2 Modular Closeness centrality
Modular Closeness centrality considers separately the shortest distances of nodes
originating from the same or from another community than the starting node vi.
It is defined as follows:
BM (vi) = (βL(vk
i ), βG(vq
i ))
k ∈ {1, ..., m} and q ∈ {1, ..., p}
Where:
βL(vk
i ) =
βG(vq
i ) =
vj∈Ck
1(cid:80)
1(cid:80)
vj∈Sq
dij
dij
(5)
(6)
(7)
βL and βG measure respectively the local and Global component of the Modular
Closeness centrality. dij is the length of the geodesic from node vi to node vj.
3.3.3 Modular Eigenvector centrality
Modular Eigenvector takes into account separately both the number and the im-
portance of the neighbors belonging to the same community and those belonging to
different communities to measure its centrality. The community based Eigenvector
of a node vi is defined by the following vector:
BM (vi) = (βL(vk
i ), βG(vq
i ))
k ∈ {1, ..., m} and q ∈ {1, ..., p}
Where:
(cid:88)
(cid:88)
vj∈Ck
vj∈Sq
1
λ
1
λ
aijβL(vk
j )
aijβL(vq
j )
βL(vk
i ) =
βG(vq
i ) =
(8)
(9)
(10)
βL and βG measure respectively the local and Global component of the Modular
Eigenvector centrality. A = (ai,j) is the network adjacency matrix, i.e. ai,j = 1 if
vertex vi is linked to vertex vj, 0 otherwise, and λ is a constant.
10
Zakariya Ghalmane et al.
Table 1 Standard Degree centrality, Global and Local Component of the Modular Degree
Centrality of the nodes in the toy example
Node ID 4
β
7
3
βL
βG
4
Node ID 9
3
β
2
βL
βG
1
11
7
7
0
10
3
3
0
18
5
3
2
14
3
2
1
22
5
3
2
15
3
3
0
1
4
4
0
17
3
3
0
2
4
2
2
19
3
3
0
3
4
4
0
21
3
3
0
16
4
2
2
6
2
1
1
5
3
3
0
12
2
2
0
7
3
2
1
20
2
2
0
8
3
3
0
13
1
1
0
3.4 Toy example
The toy example reported in Figure 1 allows to illustrate the two types of influence
that can occur in a modular network. For the sake of simplicity, we consider the
Degree centrality measure. In this case, v4 and v11 are the most influential nodes as
they have the highest degree value (β(v11) = β(v4) = 7). Even though they share
the same degree value the influence they have on the other nodes of the network
is not comparable. Indeed, their position in the network are quite different: v11 is
embedded in its community, while v4 is at the border of its community. Inspecting
the local and global networks give us a clear picture of their differences. As shown
in the local network Gl, node v11 is the most influential at the community level
since it is linked to all the of nodes of its community (βL(v2
11) = 7), while v4 is
only linked to 3 nodes of its community (βL(v1
4) = 3). Actually, both nodes v1
and v3 are more influential than node v4 in the community C1 with their higher
local Degree values. Looking at the Global network Gl, it appears clearly than
node v4 is the most influential node at the network level since it is connected to
4 nodes inside its component (βG(v1
4) = 4).These nodes belong to all the other
communities of the network (C1, C2 and C3). Therefore, v4 is more influential
than node v11 in the global network Gl because of its ability to reach the different
modules of the network as compared to v11 which is influential only locally (in the
community C2).
To sum up, it can be noticed from this example that when we consider the
Degree centrality, the community hubs are the most influential spreaders locally
due to their ability to reach a high number of nodes in their own communities. The
bridges which are linked to various communities are the most influential spreaders
globally as they allow to reach a high number of communities all over the network.
3.5 Modular centrality ranking strategies
In order to rank the nodes according to their centrality, it is necessary to derive a
scalar value from the Modular centrality vector. To do so, we can proceed in many
different ways. In order to highlight the essential features of centrality in modular
networks, we choose to consider three strategies. The first two are straightforward.
Indeed, a simple way to combine the components of the Modular centrality is to
use the modulus and the argument of this vector. The third strategy uses more
information about the community structure in order to see if this can be beneficial.
Centrality in Modular Networks
11
The modulus r of the modular vector BM of a node vi is defined by:
r(vi) = BM (vi) =
i ))2 + (βG(vq
(βL(vk
i ))2
k ∈ {1, ..., m} and q ∈ {1, ..., p}
(cid:113)
(11)
The argument ϕ of the modular vector BM of a node vi is defined as follows:
ϕ(vi) = arctan
k ∈ {1, ..., m} and q ∈ {1, ..., p}
(12)
(cid:19)
(cid:18) βG(vq
i )
βL(vk
i )
Rather than using the argument, we propose to use the tangent of the argument
because it as a higher range. It is defined by:
tan(ϕ(vi)) =
βG(vq
i )
βL(vk
i )
k ∈ {1, ..., m} and q ∈ {1, ..., p}
(13)
Note that in these ranking strategies the information used about the community
structure is very limited. As we expect that integrating more knowledge about
the community structure in the combination strategy of the Modular centrality
components may improve the efficiency of the ranking method, we also investigate
the so-called "Weighted Modular measure". It is based on a linear combination
of the components of the Modular centrality vector weighted by a measure of the
strength of the communities.
The Weighted Modular measure αW of a node vi is given by:
i ) + µCk ∗ βG(vq
i )
αW (vi) = (1 − µCk ) ∗ βL(vk
(14)
Where k ∈ {1, ..., m}, q ∈ {1, ..., p} and:
(cid:80)
(cid:80)
µCk =
vi∈Ck
kinter(vk
i )
k(vk
i )
vi∈Ck
(15)
i ) is the number of inter-community links of node vk
Where µCk is the fraction of inter-community links of the community Ck.
kinter(vk
degree of node vk
i .
The Weighted Modular measure works as follows:
i and k(vi) is the
-- A community Ck, where the intra-community links predominate is densely
connected and therefore it has a very well-defined community structure. If an
epidemic starts in such a cohesive community, it has more chance to stay con-
fined than to propagate trough the few links that allows to reach the other
communities of the network. In this case, priority must be given to local im-
munization. Consequently, more weight is given to the Local component of the
Modular centrality βL to target the most influential nodes in the community
since it is well separated from the other communities of the network.
-- A community Ck where the inter-community links predominate has a non-
cohesive community structure. It is more likely that an epidemic starting in
this community diffuses to the other communities trough the many links that
it shares with the other communities. Consequently, more weight is given to
the Global component of the Modular centrality measure βG in order to target
nodes that can propagate the epidemic more easily all over the network due to
the loose community structure of Ck.
12
Zakariya Ghalmane et al.
Table 2 LFR network parameters
Number of nodes
Average degree
Maximum degree
Exponent for the degree distribution
Exponent for the community size distribution
Mixing parameter
Community size range
4000
7
80
2.8
2
0.1, 0.4, 0.7
[15 200]
4 Experimental setting
In this section, we give some information about the synthetic and real-world
dataset used in the empirical evaluation of the centrality measures. The SIR sim-
ulation process is recalled, together with the measure of performance used in the
experiments.
4.1 Dataset
4.1.1 Synthetic networks
In order to generate artificial modular networks with controlled topological prop-
erties, the LFR benchmark is used [23]. It allows to generate small-world networks
with power-law distributed degree and community size. The input parameters of
the model are the number of nodes, the desired average and maximum degree, the
exponents for the degree and the community size distributions, and the mixing
coefficient. The mixing coefficient parameter µ value ranges from 0 to 1. It repre-
sents the average proportion of links between a node and the ones located outside
of its community. This parameter allows to control the strength of the community
structure. If its value is low, there is few links between the communities and they
are well separated from each other. A high value of µ indicates a very loose com-
munity structure. Indeed, in this case, a node share more links with nodes outside
its community than with nodes inside its community. Experimental studies have
shown that typical value of the degree distribution exponent in real-world net-
works vary in the range 2 ≤ γ ≤ 3. Networks can have different size going from
tens to millions of nodes. In addition, it is also difficult to characterize the average
and the maximal degree since they are very variable. Consequently, we choose for
these parameters some consensual values while considering also the computational
aspect of the simulations. They are reported in Table 2.
4.1.2 Real-world networks
Although the LFR model produces pretty realistic networks, uncontrolled prop-
erties such as transitivity and degree correlation can deviate significantly from
those observed in real-world networks [24]. Therefore, it is necessary to use real-
world networks in the evaluation process. In order to cover a wide range of situa-
tions, we selected networks from various origin: online social networks, collabora-
tion networks, technological networks, communication networks. All networks are
Centrality in Modular Networks
13
Table 3 Description of the structural properties of the real-world networks. N is the total
numbers of nodes, E is the number of edges. < k >, kmax are respectively the average and
the max degree. C is the average clustering coefficient. αth is the epidemic threshold of the
network.
Network
ego-Facebook
Caltech
Princeton
Georgetown
Email-Eu-core
Power grid
CR-QC
N
4039
620
5112
7651
986
4941
4158
E
88234
7255
28684
163225
25552
6594
13428
< k > kmax
1045
43.69
248
43.31
628
88.93
1235
90.42
33.24
347
19
2.66
5.53
81
C
0.605
0.443
0.298
0.268
0.399
0,107
0.529
αth
0.009
0.012
0.006
0.006
0.013
0.092
0.059
undirected and unweighted. Experiments are performed on their largest connected
component. The Louvain Algorithm is used to unveil the community structure of
these networks. We choose this greedy optimization method for its simplicity. Fur-
thermore, this popular algorithm has proved to be a good compromise between
efficiency and complexity when used in many different type of networks [25] [26].
- Social networks: Four Samples of the Facebook Network are used. The ego-
Facebook network collected from survey participants using the Facebook app. 1 [27]
and the Facebook friendship network at 3 US universities (Caltech, Princeton,
Georgetown) collected by Traud et al [28]. Nodes represent individuals (survey
participant or members of the University), and edges represent online friendship
links between two individuals. In the University network, in order to obtain data
that are relevant for the spread of epidemic infections, only the relationship of
individuals who live in the same dormitory or study the same major are considered.
- Communication network: The Email-Eu-core1 network has been gener-
ated using email data from a large European research institution. The dataset con-
tains only communication between institution members. Each node corresponds
to an email address and an edge is established between two nodes u and v, if at
least one email has been exchanged between address u and address v.
- Technological network: Power-Grid2 is a network containing information
about the topology of the Western States Power Grid of the United States. An
edge represents a power supply line. A node is either a generator, a transformator
or a substation.
- Collaboration network: GR-QC1 (General Relativity and Quantum Cos-
mology) collaboration network has been collected from the e-print arXiv and covers
scientific collaborations between authors of papers submitted to the General Rela-
tivity and Quantum Cosmology category. If an author i co-authored a paper with
author j, the graph contains an edge from i to j. If the paper is co-authored by k
authors this generates a completely connected (sub)graph on k nodes.
The basic topological properties of these networks are given in Table 3.
1http://snap.stanford.edu/data
2http://www-personal.umich.edu/~mejn/netdata/
14
Zakariya Ghalmane et al.
4.2 SIR simulations
To evaluate the efficiency of the centrality measures, we consider an epidemic
spreading scenario using the Susceptible-Infected-Recovered (SIR) model [29]. In
this setting, nodes can be classified into three classes: S(Susceptible), I(Infected)
and R(Recovered). Initially, all nodes are set as susceptible nodes. Then, a given
fraction f0 of the top-ranked nodes according to the centrality measure under
test are set to the state infected. After this initial setup, at each iteration, each
infected node affects one of its susceptible neighbors with probability α. Besides,
the infected nodes turn into recovered nodes with the recover probability σ. To
better characterize the spreading capability, the value of the transmission rate α
is chosen to be greater than the network epidemic threshold αth given by [30]:
αth =
< k >
< k2 > − < k >
(16)
Where < k > and < k2 > are respectively the first and second moments of the
degree distribution. The epidemic threshold values αth for the networks used in
this study are reported in Table 3. In all the experiments, we use the same value of
the transmission rate (α = 0.1). Naturally, it is much larger than the values of the
epidemic threshold αth of all the dataset. The value of the recover probability is
also constant (σ = 0.1). We choose this small value so that each infected node may
have many chances to infect its neighbors with the probability α before changing
to the recovered status. The process continues until there is no more infected node
in the network. Finally, when the spreading process stops, the number of nodes in
the state "Recovered" R is used to measure the spreading efficiency of the fraction
of the initially infected nodes. The larger the value of R, the more influential
the initially selected nodes. To ensure the effectiveness of the evaluation process,
results of the SIR simulations are averaged over 200 independent realizations. A
more detailed description of the SIR simulation process is given in algorithm 2.
4.3 Evaluation criteria
In order to compare the ranking efficiency of a centrality measure with the one
obtained by a reference centrality measure, we compute the relative difference of
the outbreak size. It is given by:
∆r =
(17)
Rm − Rs
Rs
Where Rm is the the final number of recovered nodes of the ranking method under
test, and Rs is the final number of recovered nodes for the reference method. Thus,
a positive value of ∆r indicates a higher efficiency of the method under test as
compared to the reference.
5 Experimental Results
Extensive experiments have been performed in order to evaluate the effectiveness
of the most popular Modular centrality extensions (Degree, Betweenness, Close-
ness and Eigenvector centrality) as compared to their standard definition. First,
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Select one infected node v from the infected list L Inf ected
for each node v(cid:48) neighbor of v do
if v(cid:48) is susceptible then
With a probability α set the node v(cid:48) as infected
L Inf ected.add(v(cid:48))
end
else
With a probability σ set the node v(cid:48) as recovered
L Inf ected.remove(v(cid:48))
nR ← nR + 1
end
end
Centrality in Modular Networks
15
Algorithm 2: Decription of the SIR simulation process
Input : Graph G(V, E),
Centrality measure: β,
Fraction of the initial spreaders: f0,
Transmission rate: α,
Recovery rate: σ,
The number of simulations: n
Output: The average number of the recovered nodes after the SIR simulations: rav,
The standard deviation: rdev
1 Rank the nodes according to the centrality measure β
2 Set all nodes as susceptible nodes
3 Compute nI the number of initially infected nodes: nI ← card(V ) ∗ f0
4 Select nI of the top ranked nodes and change their state to the infected state
5 Add the initially infected nodes to the infected list L Inf ected
6 Initialize the list of the numbers of recovered nodes nR obtained after each simulation:
L nbrR ← EmptyList()
7 for counter from 0 to n do
8
nR ← 0
while L Inf ected (cid:54)= N ull do
end
nR ← nR − nI
L nbrR.add(nR)
24
25 end
26 Compute the average number rav and the standard deviation rdev of the recovered
nodes over the n simulations based on the list L nbrR
27 Return rav, rdev
the local and Global component of the various Modular centrality measures are
compared to their standard counterpart. Next, the three ranking methods based on
the combination of the components of the Modular centrality are also evaluated.
These experiments are conducted on both synthetic and real-world networks.
5.1 Synthetic networks
Networks with different mixing parameter values have been generated in order to
better understand the effect of the community structure strength on the perfor-
mance of the various centrality measures. Figure 2 represents the relative difference
of the outbreak size as a function of the fraction of immunized nodes with the stan-
dard measure used as a reference. The mixing parameter values µ cover all the
16
Zakariya Ghalmane et al.
Fig. 2 The relative difference of the outbreak size ∆r as a function of the fraction of the
initial spreaders f0 for Synthetic networks. The Degree (a), Betweenness (b), Closeness (c)
and Eigenvector (d) centrality measures derived from the Modular centrality are compared
to the standard counterpart designed for networks with no community structure. Networks
are generated using the LFR algorithm with various µ values. For each µ value, five sample
networks are generated. The final epidemic sizes are obtained by averaging 200 SIR model
simulations per network for each initial spreading coverage value. Positive ∆r value means
higher efficiency of the measure under test as compared to the standard centrality.
0246810121416f0 (%)−20020406080100Ɗr (%)=0.10246810121416f0 (%)−1001020Δ04050Ɗr (%)=0.4(a) Degree centrality0246810121416f0 (%)−20−1001020Δ04050Ɗr (%)=0.7Local meas reGlobal meas retan(Arg)Mod l sWeighted mod lar meas re0246810121416f0 (%)−20020406080100Ɗr (%)=0.10246810121416f0 (%)−1001020Δ04050Ɗr (%)=0.4(b) Betweeness centrality0246810121416f0 (%)−20−1001020Δ04050Ɗr (%)=0.7Local meas reGlobal meas retan(Arg)Mod l sWeighted mod lar meas re0246810121416f0 (%)−20020406080100Ɗr (%)=0.10246810121416f0 (%)−1001020Δ04050Ɗr (%)=0.4(c) Closeness centrality0246810121416f0 (%)−20−1001020Δ04050Ɗr (%)=0.7Local meas reGlobal meas retan(Arg)Mod l sWeighted mod lar meas re0246810121416f0 (%)−20020406080100Ɗr (%)=0.10246810121416f0 (%)−1001020Δ04050Ɗr (%)=0.4(d) Eigenvector centrality0246810121416f0 (%)−20−1001020Δ04050Ɗr (%)=0.7Local meas reGlobal meas retan(Arg)Mod l sWeighted mod lar meas reCentrality in Modular Networks
17
range of community structure strength.
5.1.1 Evaluation of the local and the Global component of the Modular centrality
a. Strong community structure strength
In networks with well-defined community structure, the Local component of the
Modular centrality always outperforms the standard measures for all the centrality
measures as it is shown in the left panels of the Figure 2 (when µ = 0.1). The
gain is around 20% as compared to the standard measure for Closeness, Degree
and Eigenvector centrality. The smallest gain is for Betweenness centrality with
an average value of 10%. On the contrary, the Global component of the Modu-
lar centrality is always less performing than the standard measures. These results
clearly demonstrates that it is more efficient to immunize the influential nodes
inside the communities when there is few inter-community links in the networks.
Indeed, as there is few inter-community edges, the infection may die out before
reaching other communities. So, the local influence of nodes is more important
than global influence in networks with strong community structure.
b. Medium community structure strength
The middle panels of Figure 2 show the performance of the various ranking meth-
ods in networks with community structure of medium strength (µ = 0.4). In this
case, both the Global and Local components of the Modular centrality are always
more efficient than the standard centrality. The gain in performances of the Global
component of the Modular centrality is always greater than for the Local com-
ponent. Indeed, the Global component outperforms the standard measure with
a Gain around 12% for Betweenness, Closeness and Eigenvector centrality. The
largest gain is for the Degree centrality with an average value of 17%. The Local
component of the Modular centrality performs better than the standard measure
with a gain around 5% for Betweenness, Closeness and Eigenvector centrality and
around 12% for Degree centrality. These results send a clear message: In networks
with medium community structure strength, the global influence is more impor-
tant than the local influence. Indeed, with a greater number of inter-community
links, there is more options to spread the epidemics to the other communities of
the network.
c. Weak community structure strength
The right panel of Figure 2 reports the comparison between the Modular centrality
and the traditional centrality measures in networks with non-cohesive community
structure (µ = 0.7). It appears that the relative difference of the outbreak size
between the Global component of the Modular centrality and the standard cen-
trality is always positive while it is always negative for the Local component of the
Modular centrality. And this is true for all the centrality measures under test. In
fact, there is a gain around 5% using the Global component of the Modular cen-
trality, while the Local component performs worse than the traditional measure
with an average of 5% for the Degree, Betweenness, Closeness and Eigenvector
centrality measures. Consequently, we can conclude that in networks with a loose
community structure the global influence is dominant, even if the difference with
18
Zakariya Ghalmane et al.
the standard measure is not as important than for networks with a medium com-
munity structure. Indeed, in this situation (µ = 0.7), the inter-community edges
constitute the majority of edges in the network (around 70% of links lie between
the communities). In fact, as the community structure is not well defined, minor
differences are observed with a a network that has no community structure.
5.1.2 Evaluation of the ranking methods of the Modular centrality
Figure 2 reports also the relative difference of the outbreak size ∆r as a function of
the fraction of the initial spreaders f0 for the three ranking methods (Modulus and
Tangent of the argument of the Modular centrality, Weighted Modular measure)
and for the various centrality measure and community structure strength under
study. The first observation that can be made from these results is that combin-
ing the components of the Modular centrality is always more efficient than using
either a single component or the conventional centrality. This remark holds for all
the centrality measures studied and whatever the community structure strength.
Additionally, the ranking of the three combination methods in terms of efficiency
is always the same. The Weighted Modular measure ranks first. It is followed by
the Modulus and then the Tangent of the argument of the Modular centrality. We
believe that it is due to the fact that the Weighted Modular measure uses more
information about the topology of the community structure than its alternatives.
Indeed, the weights introduced in this measure allow tuning locally the relative
importance of the local and Global component for each community in the net-
work. Thus, the Weighted Modular measure can adapt to the structure of each
community in the network. As a result, it is more efficient than the other proposed
ranking methods. One of the main benefits of this result is to highlight the fact
that significant gains can result from improving the way the local and Global com-
ponent are combined and that there may be still room for improvement in this
direction. In other words, even more effective measures can be obtained if rele-
vant additional information about the community structure is used. Furthermore,
it is noticed that the ranking strategies show their best performance in networks
with well defined community structure. For instance, The Modulus of the Modu-
lar centrality outperforms the standard measure with a gain, on average, of 40%
in networks with strong community structure, 25% in networks with community
structure of medium strength and 20% in networks with unclear community struc-
ture for all the centrality measures. For the Weighted Modular measure, the gain
is around 42% in networks with strong community structure, 29% in networks
with community structure of medium strength and 25% in networks with unclear
community structure for all the centrality measures. The gain therefore decreases
as the community structure becomes more and more loose. The reason behind
that behavior is that the local centrality is typical of networks with a community
structure while the global centrality is also a feature of networks with no commu-
nity structure. As the mixing proportion increases, the differences with networks
without community structure become less and less important. Indeed, the global
network size increases until it tends to represent the major part of the original
network. In the limiting case, it is a network with no community structure and
the Modular centrality reduces to its Global component which is identical to the
classical centrality measures.
Centrality in Modular Networks
19
Table 4 The estimated mixing parameter µ and modularity Q of the real-world networks.
Network
µ
Q
Network
µ
Q
ego-Facebook
Power-grid
ca-GrQc
Princeton
0.03
0.834
0.034
0.934
0.095
0.86
0.354
0.753
Email-Eu-core
Caltech
Georgetown
0.42
0.569
0.448
0.788
0.522
0.662
5.2 Real-world networks
In this section, we report the results of the set of experiments on real-world net-
works. Experiments performed with synthetic networks have shown that the com-
munity structure strength plays a major role in determining the performance of
the various centrality measures. Therefore, we adopt the same presentation for
real-world networks in order to link the results of this set of experiments with
those obtained using synthetic networks. Once the community structure has been
uncovered using the Louvain algorithm, the mixing proportion parameter is com-
puted for each network. Estimated values are reported in Table 4. According to
these results we can classify the ego-Facebook network, Power Grid and the ca-
GrQc as networks with strong community structure. Princeton, Email-Eu-core and
Caltech have a community structure of medium strength while Princeton has a
weak community structure.
5.2.1 Evaluation of the local and Global component of the Modular centrality
a. Strong community structure strength
The relative difference of the outbreak size between the community based measures
and the standard measure is reported in Figure 3. To evaluate their performances
in networks with strong community structure, ego-Facebook, power grid and the
ca-GrQc networks are used. For these networks, the estimated mixing parameter
value ranges from to 0.03 to 0.095. In this figure, we notice that for all the central-
ity measures under test the standard measure outperforms the Global component
of the Modular centrality while it is less performing that its Local component.
Let's consider for example the Betweenness centrality. With a fraction of the ini-
tial spreaders equal to 8%, the gain in terms of the outbreak size for the Local
component of the Modular centrality as compared to the standard Betweenness is
19% for the ego-Facebook network, 14% for Power-Grid and and 9% for ca-QrGc.
Conversely, in the same situation, the loss associated with the use of the Global
component of the Modular centrality instead of the standard Betweenness ranges
from 4% to 11%.
In these networks, communities are densely connected and there are few links
lying between the communities. Therefore, in most cases, contagious areas are
found in the core of the communities and the spread of the epidemic may stop be-
fore even reaching the community perimeter. Thus, there is a low probability that
a bridge (inter-community link) propagates the epidemic to the other communities.
This is the reason why the Local component of the Modular centrality performs
always better than the Global component. Furthermore, we can also notice on
20
Zakariya Ghalmane et al.
Fig. 3 The relative difference of the outbreak size ∆r as a function of the fraction of initial
spreaders f0. The Degree (a), Betweenness (b), Closeness (c) and Eigenvector (d) centrality
measures derived from the Modular centrality are compared to the standard counterpart de-
signed for networks with no community structure. Real-world networks with strong community
structure (ego-Facebook, Power-Grid and ca-GrQc networks) are used. The estimated values
of their mixing coefficient is equal respectively to 0.03, 0.034 and 0.095.
0246810121416f0 (%) 20020406080Ɗr (%)ego-Facebook0246810121416f0 (%) 20020406080Ɗr (%)Power-Grid(a) Degree centrality0246810121416f0 (%) 20020406080Ɗr (%)ca-GrQcLocal measureGlobal measuretan(Δrg)ModulusWeighted modular measure0246810121416f0 (%) 20020406080Ɗr (%)ego-Facebook0246810121416f0 (%) 20020406080Ɗr (%)Power-Grid(b) Betweeness centrality0246810121416f0 (%) 20020406080Ɗr (%)ca-GrQcLocal measureGlobal measuretan(Δrg)ModulusWeighted modular measure0246810121416f0 (%) 20020406080Ɗr (%)ego-Facebook0246810121416f0 (%) 20020406080Ɗr (%)Power-Grid(c) Closeness centrality0246810121416f0 (%) 20020406080Ɗr (%)ca-GrQcLocal measureGlobal measuretan(Δrg)ModulusWeighted modular measure0246810121416f0 (%) 20020406080Ɗr (%)ego-Facebook0246810121416f0 (%) 20020406080Ɗr (%)Power-Grid(d) Eigenvector centrality0246810121416f0 (%) 20020406080Ɗr (%)ca-GrQcLocal measureGlobal measuretan(Δrg)ModulusWeighted modular measureCentrality in Modular Networks
21
Fig. 4 The relative difference of the outbreak size ∆r as a function of the fraction of initial
spreaders f0. The Degree (a), Betweenness (b), Closeness (c) and Eigenvector (d) central-
ity measures derived from the Modular centrality are compared to the standard counterpart
designed for networks with no community structure. Real-world networks with medium com-
munity structure (Princeton, Email-Eu-core and Caltech) are used. The estimated values of
their mixing coefficient is equal respectively to 0.354, 0.42 and 0.44.
0246810121416f0 (%)01020304050Ɗr (%)Princeton0246810121416f0 (%)01020304050Ɗr (%)Email-Eu-core(a) Degree centrality0246810121416f0 (%)01020304050Ɗr (%)CaltechLocal meas reGlobal meas retan(Δrg)Mod l sWeighted mod lar meas re0246810121416f0 (%)01020304050Ɗr (%)Princeton0246810121416f0 (%)01020304050Ɗr (%)Email-Eu-core(b) Betweeness centrality0246810121416f0 (%)01020304050Ɗr (%)CaltechLocal meas reGlobal meas retan(Δrg)Mod l sWeighted mod lar meas re0246810121416f0 (%)01020304050Ɗr (%)Princeton0246810121416f0 (%)01020304050Ɗr (%)Email-Eu-core(c) Closeness centrality0246810121416f0 (%)01020304050Ɗr (%)CaltechLocal meas reGlobal meas retan(Δrg)Mod l sWeighted mod lar meas re0246810121416f0 (%)01020304050Ɗr (%)Princeton0246810121416f0 (%)01020304050Ɗr (%)Email-Eu-core(d) Eigenvector centrality0246810121416f0 (%)01020304050Ɗr (%)CaltechLocal meas reGlobal meas retan(Δrg)Mod l sWeighted mod lar meas re22
Zakariya Ghalmane et al.
Fig. 5 The relative difference of the outbreak size ∆r as a function of the fraction of initial
spreaders f0. The Degree (a), Betweenness (b), Closeness (c) and Eigenvector (d) centrality
measures derived from the Modular centrality are compared to the standard counterpart de-
signed for networks with no community structure. A real-world networks with weak community
structure (Georgetown) is used. The estimated value of its mixing coefficient is equal to 0.522.
Figure 3 that when the mixing parameter value increases, (i.e, the community
structure gets weaker), the Local component of the Modular centrality gets less
efficient while the Global component performs better. This is due to the fact that
the Global component increases with the number of inter-community links.
b. Medium community structure strength
Figure 4 shows the relative difference of the epidemic outbreak size between the
community based measures and the standard centrality measure for real-world
networks with medium community structure strength. For that purpose, Prince-
ton, Email-Eu-core and Caltech networks are used since their estimated mixing
parameter values range from 0.354 to 0.448. Results are very clear. In all the situa-
tions, both the local and the Global component of the Modular centrality measures
outperform the standard centrality measure. In addition, there is still a slight ad-
vantage for the Global component on the Local component. To set these ideas on a
simple example, let us consider the Betweenness centrality with an initial fraction
of infected nodes equal to 8%. The Global component of the modular Betweenness
measure is more efficient than the traditional Betweenness with a gain of 12% for
the Princeton, 13% for Email-Eu-core and 15% for the Caltech network. These fig-
0246810121416f0 (%)−10010203040 r (%)DegreeLocal measureGlobal measuretan(Δrg)ModulusWeighted modular measure0246810121416f0 (%)−10010203040 r (%)BetweennessLocal measureGlobal measuretan(Δrg)ModulusWeighted modular measure0246810121416f0 (%)−10010203040 r (%)ClosenessLocal measureGlobal measuretan(Δrg)ModulusWeighted modular measure0246810121416f0 (%)−10010203040 r (%)EigenvectorLocal measureGlobal measuretan(Δrg)ModulusWeighted modular measureCentrality in Modular Networks
23
ures need to be compared to a gain of 8% for Princeton, 7% for Email-Eu-core and
3% for Caltech using the Local component of the Modular Betweenness instead
of the classical Betweenness centrality. One can also notice that the gap between
their respective performance gets bigger as the value of the mixing parameter in-
creases. Indeed, as the community structure gets weaker, the relative influence of
the Global component of the Modular centrality becomes more and more impor-
tant. In these networks, nodes have approximately as many internal links as there
are external links. Therefore, the epidemic can spreads easily to all the communi-
ties in the network through the large number of inter-community links. This is the
reason why the Global component of the Modular centrality outperforms always
the Local component. In addition to that, the community structure of the network
is still well preserved, which explains that the Modular centrality is more efficient
than the classical centrality.
c. Weak community structure strength
Figure 5 shows the relative difference of the epidemic outbreak size between the
modular based centrality measures and the standard centrality for the Georgetown
network. With a mixing parameter value equal to 0.522, this network is classified
as a network with a weak community structure. In all circumstances, the standard
measure performs better than the Local component of the Modular centrality
and it performs worse than its Global component. On average, there is a gain of
around 10% for the Global component compared to a loss of 5% for the Local
component of the four centrality measures under test. In this type of networks,
the inter-community links predominate, which translates into a greater influence of
the Global component of the Modular centrality. Indeed, the epidemic can spread
more easily into the various communities of the network through the big amount of
external links. Additionally, we notice that the relative difference of the outbreak
size between the Global component of the Modular centrality measure and the
standard measure decreases as compared to networks with a medium community
structure. Indeed, there is less and less topological differences between networks
with a weak community structure and networks that have no community structure
as the value of the mixing parameter increases.
5.2.2 Evaluation of the ranking methods of the Modular centrality
Figures 3 to 5 report also the relative difference of the epidemic outbreak size be-
tween the Modular centrality ranking methods and the standard centrality mea-
sures. The results are clear evidence of the efficiency of the Modular centrality.
Whatever the ranking strategy of the Modular centrality adopted, it outperforms
in all the situations the local and Global component of the Modular centrality
and the classical centrality. The improvements in terms of performance compared
to the classical centrality are quite significant. For instance, with a fraction of
initial spreaders equal to 8% the modulus of the Betweenness Modular centrality
allows a gain of 45% on the ego-Facebook network, 28% on Princeton and 24%
on Georgetown. As the ranking strategies use both the local and the global in-
formation of each node, they are more efficient than measures relying on either
local or global information taken separately. Furthermore, the Weighted Modular
measure is usually the most efficient measure in most cases. It uses the fraction of
24
Zakariya Ghalmane et al.
inter-community links as an additional information to target the most influential
spreaders in each community. It can give more or less weight to the local and the
Global component according to the individual community structure strength. This
explains its superiority over the other ranking measures. To summarize, these ex-
periments reveal that combining the components of the Modular centrality, allows
to design efficient ranking methods. In addition, using more relevant information
about the community structure at the community level allows to design even more
efficient ranking methods. Moreover, the ranking measures exhibit their best re-
sults in networks with strong community structure.
6 Conclusion
In this paper, we propose a generic definition of centrality measures in networks
with non-overlapping community structure. It is based on the fact that the intra-
community and inter-community links should be considered differently. Indeed, the
intra-community edges contribute to the diffusion in localized densely connected
areas of the network, while the inter-community links allows the global propaga-
tion to the various communities of the network. Therefore, we propose to represent
the centrality of modular networks by a two dimensional vector, where the first
component measures the local influence of a node in its community and the sec-
ond component quantifies its global influence on the other communities. Based
on this assumption, centrality measures defined for networks with no-community
structure can be easily extended to modular networks. Considering the most influ-
ential centrality measures as typical examples, we defined their modular extension.
Experiments based on an epidemic spreading scenario using both synthetic and
real-world networks have been conducted in order to better understand the in-
fluence of the two components of the Modular centrality. First of all, results on
synthetic and real-world networks are quite consistent. It appears that the Local
component is more effective in networks with a strong community structure while
the Global component takes the lead as the community structure gets weaker.
Comparison with the classic centrality always turns to the advantage of the Mod-
ular centrality. More precisely, in networks with strong community structure, the
Local component of the Modular centrality outperforms the Global component
and the standard centrality, while in networks with medium or weak community
structure the Global component performs better than its alternatives. Moreover,
it is also observed that combining both components of the Modular centrality in
order to rank the nodes according to their influence is always more efficient than to
use a single component. Furthermore, further gain can be obtained if the ranking
strategy incorporates more information about the community structure strength.
References
1. Wang, Z., Moreno, Y., Boccaletti, S., Perc, M.: Vaccination and epidemics in networked
populations, an introduction. Elsevier (2017)
2. Medo, M., Zhang, Y.-C., Zhou, T.: Adaptive model for recommendation of news. EPL
(Europhysics Letters) 88(3), 38005 (2009)
Centrality in Modular Networks
25
3. Zhang, Z.-K., Liu, C., Zhan, X.-X., Lu, X., Zhang, C.-X., Zhang, Y.-C.: Dynamics of
information diffusion and its applications on complex networks. Physics Reports 651, 1-34
(2016)
4. Fortunato, S., Hric, D.: Community detection in networks: A user guide. Physics Reports
659, 1-44 (2016)
5. Jebabli, M., Cherifi, H., Cherifi, C., Hamouda, A.: User and group networks on youtube:
A comparative analysis. In: Computer Systems and Applications (AICCSA), 2015
IEEE/ACS 12th International Conference Of, pp. 1-8 (2015). IEEE
6. Jebabli, M., Cherifi, H., Cherifi, C., Hammouda, A.: Overlapping community structure
in co-authorship networks: A case study. In: U-and e-Service, Science and Technology
(UNESST), 2014 7th International Conference On, pp. 26-29 (2014). IEEE
7. Salath´e, M., Jones, J.H.: Dynamics and control of diseases in networks with community
structure. PLoS computational biology 6(4), 1000736 (2010)
8. Saxena, R., Kaur, S., Bhatnagar, V.: Social centrality using network hierarchy and com-
munity structure. arXiv preprint arXiv:1806.08964 (2018)
9. Kumar, M., Singh, A., Cherifi, H.: An efficient immunization strategy using overlapping
nodes and its neighborhoods. In: Companion of the The Web Conference 2018 on The
Web Conference 2018, pp. 1269-1275 (2018). International World Wide Web Conferences
Steering Committee
10. Chakraborty, D., Singh, A., Cherifi, H.: Immunization strategies based on the overlapping
nodes in networks with community structure. In: International Conference on Computa-
tional Social Networks, pp. 62-73 (2016). Springer
11. Taghavian, F., Salehi, M., Teimouri, M.: A local immunization strategy for networks with
overlapping community structure. Physica A: Statistical Mechanics and its Applications
467, 148-156 (2017)
12. Lu, L., Chen, D., Ren, X.-L., Zhang, Q.-M., Zhang, Y.-C., Zhou, T.: Vital nodes identifi-
cation in complex networks. Physics Reports 650, 1-63 (2016)
13. Gupta, N., Singh, A., Cherifi, H.: Community-based immunization strategies for epidemic
control. In: Communication Systems and Networks (COMSNETS), 2015 7th International
Conference On, pp. 1-6 (2015). IEEE
14. Gong, K., Tang, M., Hui, P.M., Zhang, H.F., Younghae, D., Lai, Y.-C.: An efficient im-
munization strategy for community networks. PloS one 8(12), 83489 (2013)
15. Zhao, Z., Wang, X., Zhang, W., Zhu, Z.: A community-based approach to identifying in
uential spreaders. Entropy 17(4), 2228-2252 (2015)
16. Nadini, M., Sun, K., Ubaldi, E., Starnini, M., Rizzo, A., Perra, N.: Epidemic spreading in
modular time-varying networks. Scientific reports 8(1), 2352 (2018)
17. Chan, S.Y., Leung, I.X., Li`o, P.: Fast centrality approximation in modular networks. In:
Proceedings of the 1st ACM International Workshop on Complex Networks Meet Infor-
mation & Knowledge Management, pp. 31-38 (2009). ACM
18. Yoshida, T., Yamada, Y.: A community structure-based approach for network immuniza-
tion. Computational Intelligence 33(1), 77-98 (2017)
19. Gupta, N., Singh, A., Cherifi, H.: Centrality measures for networks with community struc-
ture. Physica A: Statistical Mechanics and its Applications 452, 46-59 (2016)
20. Ghalmane, Z., El Hassouni, M., Cherifi, H.: Identifying in uential spreaders of epidemics
on community networks. arXiv preprint arXiv:1806.05637 (2018)
21. Luo, S.-L., Gong, K., Kang, L.: Identifying in uential spreaders of epidemics on community
networks. arXiv preprint arXiv:1601.07700 (2016)
22. Kitromilidis, M., Evans, T.S.: Community detection with metadata in a network of bi-
ographies of western art painters. arXiv preprint arXiv:1802.07985 (2018)
23. Lancichinetti, A., Fortunato, S., Radicchi, F.: Benchmark graphs for testing community
detection algorithms. Physical review E 78(4), 046110 (2008)
24. Orman, G.K., Labatut, V., Cherifi, H.: Towards realistic artificial benchmark for commu-
nity detection algorithms evaluation. International Journal of Web Based Communities
9(3), 349-370 (2013)
25. Orman, G.K., Labatut, V., Cherifi, H.: On accuracy of community structure discovery
algorithms. arXiv preprint arXiv:1112.4134 (2011)
26. Orman, G.K., Labatut, V., Cherifi, H.: Comparative evaluation of community detection
algorithms: a topological approach. Journal of Statistical Mechanics: Theory and Experi-
ment 2012(08), 08001 (2012)
27. Leskovec, J., Mcauley, J.J.: Learning to discover social circles in ego networks. In: Advances
in Neural Information Processing Systems, pp. 539-547 (2012)
26
Zakariya Ghalmane et al.
28. Traud, A.L., Mucha, P.J., Porter, M.A.: Social structure of facebook networks. Physica A:
Statistical Mechanics and its Applications 391(16), 4165-4180 (2012)
29. Moreno, Y., Pastor-Satorras, R., Vespignani, A.: Epidemic outbreaks in complex hetero-
geneous networks. The European Physical Journal B-Condensed Matter and Complex
Systems 26(4), 521-529 (2002)
30. Wang, W., Liu, Q.-H., Zhong, L.-F., Tang, M., Gao, H., Stanley, H.E.: Predicting the
epidemic threshold of the susceptible-infected-recovered model. Scientific reports 6, 24676
(2016)
|
1710.07231 | 1 | 1710 | 2017-10-19T16:22:27 | Modeling Graphs Using a Mixture of Kronecker Models | [
"cs.SI",
"physics.soc-ph"
] | Generative models for graphs are increasingly becoming a popular tool for researchers to generate realistic approximations of graphs. While in the past, focus was on generating graphs which follow general laws, such as the power law for degree distribution, current models have the ability to learn from observed graphs and generate synthetic approximations. The primary emphasis of existing models has been to closely match different properties of a single observed graph. Such models, though stochastic, tend to generate samples which do not have significant variance in terms of the various graph properties. We argue that in many cases real graphs are sampled drawn from a graph population (e.g., networks sampled at various time points, social networks for individual schools, healthcare networks for different geographic regions, etc.). Such populations typically exhibit significant variance. However, existing models are not designed to model this variance, which could lead to issues such as overfitting. We propose a graph generative model that focuses on matching the properties of real graphs and the natural variance expected for the corresponding population. The proposed model adopts a mixture-model strategy to expand the expressiveness of Kronecker product based graph models (KPGM), while building upon the two strengths of KPGM, viz., ability to model several key properties of graphs and to scale to massive graph sizes using its elegant fractal growth based formulation. The proposed model, called x-Kronecker Product Graph Model, or xKPGM, allows scalable learning from observed graphs and generates samples that match the mean and variance of several salient graph properties. We experimentally demonstrate the capability of the proposed model to capture the inherent variability in real world graphs on a variety of publicly available graph data sets. | cs.SI | cs | Modeling Graphs Using a Mixture of Kronecker Models
Suchismit Mahapatra
Computer Science and Engineering
State University of New York at Buffalo
[email protected]
Varun Chandola
Computer Science and Engineering
State University of New York at Buffalo
[email protected]
privacy [4]. Applications include understanding malware
propagation in social networks [19], understanding fraud
in healthcare [5], etc. Graph generative models also allow
researchers to produce realistics simulations at desired scale
which are vital to understand issues such as handling scal-
ability challenges and modeling temporal evolution.
7
1
0
2
t
c
O
9
1
]
I
S
.
s
c
[
1
v
1
3
2
7
0
.
0
1
7
1
:
v
i
X
r
a
though stochastic,
Abstract -- Generative models for graphs are increasingly
becoming a popular tool for researchers to generate realistic
approximations of graphs. While in the past, focus was on
generating graphs which follow general
laws, such as the
power law for degree distribution, current models have the
ability to learn from observed graphs and generate synthetic
approximations. The primary emphasis of existing models
has been to closely match different properties of a single
observed graph. Such models,
tend to
generate samples which do not have significant variance in
terms of the various graph properties. We argue that in
many cases real graphs are sampled drawn from a graph
population (e.g., networks sampled at various time points,
social networks for individual schools, healthcare networks for
different geographic regions, etc.). Such populations typically
exhibit significant variance. However, existing models are not
designed to model this variance, which could lead to issues
such as overfitting. We propose a graph generative model that
focuses on matching the properties of real graphs and the
natural variance expected for the corresponding population.
The proposed model adopts a mixture-model strategy to expand
the expressiveness of Kronecker product based graph models
(KPGM), while building upon the two strengths of KPGM,
viz., ability to model several key properties of graphs and to
scale to massive graph sizes using its elegant fractal growth
based formulation. The proposed model, called x-Kronecker
Product Graph Model, or xKPGM, allows scalable learning
from observed graphs and generates samples that match the
mean and variance of several salient graph properties. We
experimentally demonstrate the capability of the proposed
model to capture the inherent variability in real world graphs
on a variety of publicly available graph data sets.
I. INTRODUCTION
Data occurs as graphs and networks in a wide variety of
applications, ranging from social sciences to biology. Graph
analysis methods are required to understand the structural
properties of graphs. One important class of graph analysis
methods deal with finding generative mechanisms and mod-
els that generate graphs with such structural properties. A
crucial application of these models is to generate synthetic
graphs which "match" the structural properties of real world
graphs. Given the limited availability of real world graph
data, mainly because of high cost and privacy concerns, such
synthetic (and anonymized) graphs are a valuable resource
for researchers to understand network behavior in domains
such as systems analysis (e.g., the Internet), bioinformatics,
and social sciences, while allowing for anonymity and
What should be the salient characteristics of such a
generative model? First, it should be able to capture the
properties of real-world graphs. Traditionally the focus has
been on general "laws" that are expected to be obeyed
by real world graphs, such as power laws for degree
distributions, small diameters, communities, etc. However,
to accurately represent the real world graph, matching on
local graph properties such as edges, transitive triangles,
etc.,
the model should be able to
scale to massive graph sizes, to be applicable in domains
where graphs tend to be big. Third, to allow generation
(simulation) of any sized synthetic graphs, the model should
be parametric and should allow learning of the parameters
from one or more observed graphs.
is important. Second,
Table I compares several existing graph generative models
in terms of which of the above characteristics. Note that
several models satisfy all three characteristics. However, we
argue that there is an additional characteristic that needs to
be incorporated into the generation models -- the ability to
model the natural variance in a population of graphs [14].
Real world graphs can be thought of as being generated
from a natural process. Graph models emulate this process to
generate similar synthetic graphs. We argue that graphs that
are generated by the same process exhibit a natural variance
in terms of the structural properties, and hence synthetic
graphs generated from a model should mirror the same
variance. Examples of such populations include, graphs
collected at different times, social networks for different
groups of people (e.g., schools), healthcare networks for
different spatial regions, etc. Moreno et al., empirically
demonstrated such variance in several social and email net-
work graph populations [14]. Figure 1 illustrates the variance
in the degree power law coefficient (α) for a population of
Autonomous Systems (AS) graphs. Observe that α exhibits
bounded variance and the empirical distribution is close to
the normal distribution. Similar behavior is observed for
many other graph properties (See Figure 2).
1. Learnable
2. Scalable Learning
3. Scalable Generation
4. Match Local Properties
5. Capture Variance
PA [3]
×
--
×
×
×
ERGM [25]
√
√
×
×
×
CL [1]
See note
√
--
×
×
BTER [20]
See note
√
--
√
×
KPGM [12]
√
√
√
√
×
mKPGM [16]
√
×
√
√
√
xKPGM
√
√
√
√
√
Table I: Comparison of existing graph generation models with the proposed xKPGM model. PA - Preferential Attachment,
ERGM - Exponential Random Graph Models, CL - Chung-Lu, BTER- Block Two Erdos-R´enyi, KPGM- Kronecker Product
Graph Model, mKPGM- Mixed KPGM, xKPGM- Proposed Model. Note: The CL and BTER models can be used to generate
a synthetic graph from a given real graph with approximately the same number of nodes, however it does not allow generation
of arbitrary sized synthetic graphs.
in the generative model. The tied-KPGM (tKPGM) and
the mixed-KPGM (mKPGM) are two variants proposed
to alleviate the issues with KPGM [14]. However, as we
demonstrate experimentally, these next generation models
are also not expressive enough to model the natural variance
in the data. Moreover,
the estimation process using the
simulated method of moments approach is expensive and not
scalable to learning from massive graphs.
To alleviate the lack of variation in existing models, we
propose a mixture based approach for graph generation
using Kronecker product. In particular, this paper makes the
following specific contributions:
Figure 1: Illustration of the variance in power law coefficient
(α) for a population of over 700 Autonomous Systems (AS)
graphs sampled at different time points. Few anomalous
samples were removed from the original population.
In summary, the research community needs a scalable
graph generative model which matches properties of real
graphs, including the variance exhibited by a population of
graphs. However, as shown in Table I, most existing graph
generators lack in at least one of the desired characteristics
listed above.
In particular,
the Kronecker Product Graph Model
(KPGM) [12] has been shown to satisfy some of the above
properties. The multiplicative nature of the model allows for
fast sampling of massive sized graphs and has been shown,
both analytically and empirically, to generate graphs that fol-
low many power-law characteristics for several global graph
properties. Moreover, a method of moments based approach
was proposed for parameter learning with KPGM [7], which
allows it to scale to massive graphs. However, recent papers
have identified few shortcomings of KPGM.
The single biggest argument made against KPGM is
that they lack the ability to capture the natural variabil-
ity observed in real world graphs [14], [21]. Researchers
have shown that the synthetic graphs sampled from KPGM
show little variation in terms of several graph properties.
The problem is attributed to the fractal nature of growth
1) We propose a mixture-model based Kronecker product
graph model (xKPGM). We also show that the existing
models are particular instantiations of the proposed
xKPGM model.
2) We analytically examine the expected properties of the
graph generated by the proposed model.
3) We derive expressions for the expectactions for several
salient graph properties for our model. Using these
expressions, we provide a method of moments based
parameter learning algorithm for the proposed model.
4) We propose a random subgraph based method to eval-
uate generative models for graphs.
5) We show, analytically and empirically, that xKPGM
matches the real graph properties and captures the nat-
ural variability in graphs more effectively than existing
Kronecker models and other graph generative models.
II. RELATED WORK
Generative models for graphs has been a widely studied
field for many decades. One of the earliest ones is the
Erdos-R´enyi model [18] which has obvious shortcomings
as it fails to capture properties of real-world graphs. More
recent models have focused on the preferential attachment
property of nodes, i.e., new nodes tend to form edges with
nodes with greater degree [3]. However, in such models,
the graph is grown one node at a time, which makes them
inherently serial and unscalable. Lately, there has been an
emphasis on models which can be learnt from observed
graphs. These include the Exponential Random Graph
Models (ERGM) (also referred to as p* models) [25]. ERGM
essentially defines a log linear model over all possible graphs
G, p(Gθ) ∝ exp(θT s(G), where G is a graph, and s is a
set of functions, that can be viewed as summary statistics for
the structural features of the network. Another popular and
well-known network models are Stochastic Block Models
(SBM) [24] in which each node belongs to a cluster and the
relationships between nodes are determined by their cluster
membership. While conventional SBM are defined for non-
overlapping community assignments, many overlapping or
mixed variants have also been introduced [2]. Another
relevant model is the Chung-Lu (CL) model [1] in which
the probability of an edge is proportional to the product
of the degrees of its end vertices. While CL model effec-
tively captures the degree distribution, it performs poorly
for other properties such as clustering coefficient. A recent
extension to CL model, called the Block Two-Level Erdos-
R´enyi (BTER) model [20] is shown to match both the degree
distribution and clustering coefficient on several graphs.
However the BTER model is not truly generative as it only
allows for creation of a synthetic graph which is exactly the
same size as the observed graph. For generating arbitrary
sized graphs one needs to provide parameters instead of
learning them.
Kronecker product based generative models are increas-
ingly becoming popular [12]. However, given their limited
expressiveness [14], [21], several variants have been pro-
posed [14], [15]. The most promising extension, mKPGM, is
able to capture the variance in a graph population, however,
the parameter estimation phase is expensive. We will be
discussing the original model and two variants in more detail
in the paper. There also have been other related papers
that improve KPGM in other ways, e.g., the Multiplicative
Attribute Graph Models [11].
III. BACKGROUND
In this section we introduce the various Kronecker product
based models that have been proposed for modeling large
graphs. For clarity, we will use the notation used in this
section for the subsequent sections of the paper.
A. Kronecker Product Graph Model
KPGM [12] is a fractal growth model. A graph G with N
nodes is obtained by first generating a N × N stochastic
matrix (containing entries between 0 and 1). The edge
between node i and j is independently (from other edges)
generated using a Bernoulli trial with the ijth entry from
the matrix. The generative algorithm starts with an initial
matrix P1 = Θ, which is b × b; typically b is set to 2 or 3,
e.g.:
(cid:34)
(cid:35)
P1 = Θ =
θ11
θ21
θ12
θ22
(1)
The algorithm takes repeated Kronecker product of P1 with
itself to generate a larger matrix. For example,
Pn = P1 ⊗ P1 ⊗ . . . ⊗ P1
(cid:123)(cid:122)
n times
(cid:125)
(cid:124)
(2)
(1−Pn[σ(u), σ(v)])
Note that the matrix Pn will have bn rows (and columns).
This matrix is then used to generate a graph G = (V, E)
with nodes V = {1, 2, . . . , N}. For each pair (u, v), where
1 ≤ u, v ≤ bn, a Bernoulli sample is generated with
parameter Pn[u, v]. If the sample is 1 (success), edge (u, v)
is added to E. We denote this process as a realization of Pn
to get the adjacency matrix, A (= R(Pn)).
The KPGM model can assign a probability to a given
graph G as long as the correspondence of nodes in G to
the rows of Pn are given (denoted by σ). Given the KPGM
model (P1 = Θ) and the correspondence function σ, the
probability of an observed graph G = (V, E) is given by:
P (GΘ, σ) =
Pn[σ(u), σ(v)]
(cid:89)
(cid:89)
(u,v)∈E
(u,v) /∈E
where Pn is derived from Θ using (2).
(3)
Given an observed graph G, two approaches for learning
the model parameters (Θ) have been proposed. The first is
an MLE approach that approximates computes the gradient
of the log-likelihood of the graph (See (3)) [12]. Since
the correspondence function σ is unknown, the learning
algorithm searches over the factorial possible permutations
using Metropolis-Hastings sampling and then uses a gradient
descent approach to update the parameters in Θ. The second
learning approach is based on method of moments [7]. This
method avoids the issue of searching over the factorial space
of permutations.
It has been shown that KPGM generates graphs which
match real networks in terms of several properties such
as skewed degree distribution, short network path length,
etc. Moreover, the model allows very fast sampling of large
graphs (O(E)). However, recent work has identified several
limitations with KPGM. Seshadri et al. [21] have shown
that graphs generated from KPGM have 50-75% isolated
vertices. Moreno et al. [14] have observed, both analytically
that graphs generated from KPGM do
and empirically,
not capture the variability observed in the real networks
expected to be generated from the same source. They have
attributed this shortcoming to: (i) use of independent edge
probabilities, (ii) fractal expansion, and (iii) small number of
model parameters. In fact, after several Kronecker products,
most entries in the eventual stochastic matrix tend to become
homogeneous. This results in a lack of variance since all
sampled graphs appear similar.
Moreno et al. [14] investigated several simple approaches
to induce variability in KPGM generated graphs. These
include using larger initiator matrices and sampling Θ from
a distribution instead of using a point estimate. None of
these variations induced significant variability in the sampled
graphs. The same authors make the following key observa-
tion:
Observation 1: For a graph G = (V, E) generated
by KPGM, V ar(E) ≤ E[E], independent of n.
The authors empirically observed that in real networks, the
estimated variance of the number of edges across multiple
variations of the same graph (across time) is significantly
greater than the mean. Thus KPGM cannot generate graphs
with large variance.
B. Tied Kronecker Product Graph Model
Moreno et al. [14] proposed a generalization of KPGM
that allows larger variance in the properties of the graphs
sampled from the model by inducing edge dependence
in the generation process. In the generative process, an
adjacency matrix is realized after each iteration from the
current matrix Pt, denoted as R(Pt). The next stochastic
matrix, Pt+1 is obtained by performing a Kronecker product
of the realized adjacency matrix and the initiator matrix,
i.e., Pt+1 = R(Pt) ⊗ P1. Note that for KPGM, only one
realization is done (after the nth iteration). Thus, the final
adjacency matrix can be obtained using recursive realizations
and Kronecker products, i.e.,
A = R(. . . R(R(P1) ⊗ P1) . . .)
(4)
(cid:124)
(cid:123)(cid:122)
n realizations
(cid:125)
The above model is called tied KPGM or tKPGM since the
realization at every step can also be thought of as tying
the Bernoulli parameters. The authors show analytically that
the variance for the expected number of edges in graphs
generated using tKPGM is higher than KPGM, in fact the
variance was higher than desired which motivated the variant
discussed next.
C. Mixed Kronecker Product Graph Model
The mixed KPGM or mKPGM variation allows the graph
to grow as KPGM (without realizations) for first l steps and
then acts as tKPGM for remaining n− l steps. mKPGM has
an additional parameter l which denotes the extent of tying
in the model. Note that for l = 1, mKPGM is equivalent to
tKPGM and for l = n, mKPGM is equivalent to KPGM.
IV. NATURAL VARIABILITY IN REAL GRAPHS
A vital requirement for any graph generative model is the
ability of the model to capture the variability across multiple
observed samples. In fact, both tKPGM and mKPGM were
motivated due to the limited ability of previous models to
capture this variability. Most generative graph models have
focused on capturing the properties observed for a single
instance. But such models are not equipped to model a set
of graphs, assumed to be sampled from the same statistical
distribution. In many real world applications, one can obtain
Name
as [23]
ca-astroPh [23]
elegans [6]
hep-ph [23]
netscience [17]
protein [10]
Description
CAIDA AS Relationship
Graph
Collaboration
network
of Arxiv Astro Physics
C.
elegans metabolic
network
Citation network from
Arxiv HEP-PH
Coauthorship
of scientists
Protein interaction net-
work for Yeast
network
Nodes
Edges
6,474
13,233
18,772
396,160
453
4,596
34,546
421,578
1,589
5,484
1,870
4,480
Table II: Publicly available graph data sets used in the
evaluation. More details available at http://www.cse.buffalo.
edu/∼chandola/research/bigdata2015graphs/info.html.
multiple samples of graphs which would exhibit variance in
the different properties. For example, a set of social networks
of students for different colleges, or a set of citation networks
collected for different decades or disciplines. We show one
example in Figure 1 where we consider daily AS networks
across several years. In general, obtaining such populations
to study the variance is challenging.
In this paper, we address this challenge by generating
random subgraphs of a given graph. For a given large graph,
the idea is to extract subgraphs using a sampling strategy
such that the properties of the original graph are preserved
in the subgraph. Several such methods have been proposed in
the literature [9], [13], [22]. In this paper we use a variant of
the forest fire model to generate subgraphs. In this method, a
random node is chosen and the neighborhood of the chosen
node is traversed in a breadth first approach. Each outgoing
edge from the node is added to the sample with a certain
probability. The nodes at the end of the chosen edges are
then further "burnt" and the "fire" is further spread.
To illustrate the variability we consider several publicly
available real world graphs listed in Table II. For each graph
in Table II, we sample 200 subgraphs (number of nodes were
typically 4 times less than the original number of nodes)
using the forest-fire approach and measure characteristics
of each subgraph. The empirical distribution for several
characteristics are shown in Figure 2. We study the following
five important characteristics: (i) power law coefficient (α) of
the degree distribution (ii) number of edges, (iii) number of
triangles, (iv) average path length, and (v) average clustering
coefficient. The empirical distributions show that for most
of the characteristics, the population of subgraphs exhibit
significant variation. Moreover, the variation itself is not
completely arbitrary, but in most cases, resembles standard
distributions such as Gaussian or exponential.
V. PROPOSED xKPGM MODEL
Existing Kronecker product based models are inadequate
in capturing the natural variance that exists in graph popu-
·10−3
1.5
1
0.5
as
·10−4
1.5
1
0.5
2
2.5
3
3.5
4
1,800 2,000 2,200 2,400 2,600 2,800 3,000 3,200
0.2
0.4
Degree Coefficient
Edges
0.6
0.8
Triangles
1
1.2
·104
·10−5
ca-astroPh
·10−6
4
3
2
1
0
1
0.5
0
2
2.2
2.4
2.6
Average Path Length
4
2
0
2
1.5
1
0.5
0
4
6
Degree Coefficient
5
2.4
2.8
2.6
3.2
Average Path Length
3
7
3
4
5
6
Edges
7
8
·104
0.5
1.5
1
Triangles
2
·106
2.2
·10−3
8
6
4
2
0
elegans
·10−3
1
0.5
0
40
30
20
10
0
3
3.5
4.5
Degree Coefficient
4
5
100
150
200
250
Edges
300
350
0
500
1,000
1,500
Triangles
2,000
2,500
1.78
1.8
1.82
1.84
1.86
Average Path Length
·10−4
hep-ph
·10−5
4
3
Degree Coefficient
5
6
2
1.5
1
0.5
0
2
1
0
1.5
1
0.5
0
0.4
0.6
0.8
1
Edges
1.2
1.4
·104
0
0.5
1
1.5
Triangles
2
2.5
·105
·10−2
netscience
·10−3
3
2
1
0
s
e
l
p
m
a
S
f
o
n
o
i
t
c
a
r
F
s
e
l
p
m
a
S
f
o
n
o
i
t
c
a
r
F
s
e
l
p
m
a
S
f
o
n
o
i
t
c
a
r
F
s
e
l
p
m
a
S
f
o
n
o
i
t
c
a
r
F
s
e
l
p
m
a
S
f
o
n
o
i
t
c
a
r
F
s
e
l
p
m
a
S
f
o
n
o
i
t
c
a
r
F
0.8
0.6
0.4
0.2
0.6
0.4
0.2
0
1
0.5
0
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
1.2
1
0.8
0.6
0.4
0.2
0
3
2
2.5
3
3
3
2
1
0
30
20
10
0
0.5
3.4
0.3
0.2
Average Clustering Coefficient
0.4
0.6
0.5
0.7
0.54
0.52
0.6
Average Clustering Coefficient
0.56
0.58
0.5
0.4
0.9
Average Clustering Coefficient
0.6
0.7
0.8
0.3
0.25
Average Clustering Coefficient
0.35
0.45
0.4
0.5
0.55
0.7
0.76
Average Clustering Coefficient
0.72
0.74
4
3
2
1
0
10
8
6
4
2
0
30
20
10
0
20
15
10
5
3
2.5
4
Average Path Length
3.5
1
0.8
0.6
0.4
0.2
0
2
0.8
0.6
0.4
0.2
0
1,400 1,500 1,600 1,700 1,800 1,900 2,000
1
Triangles
3
2
Average Path Length
4
5
5
4
Degree Coefficient
6
7
560
580
600
Edges
620
·10−2
1.5
1
0.5
protein
·10−3
8
6
4
2
1.5
1
0.5
4
6
Degree Coefficient
5
7
300
320
340
Edges
360
380
50
100
150
Triangles
200
4
4.5
5
5.5
Average Path Length
4 · 10−26 · 10−28 · 10−2
Average Clustering Coefficient
0.12
0.1
0.14
Figure 2: Empirical distribution of graph characteristics for the graphs listed in Table II. The histogram is obtained by taking
multiple random sub-graph samples and measuring five properties of the sub-graph.
lations. To address this issue, we propose a mixture-model
based approach which allows capturing this variance. We
call the proposed model xKPGM, where the 'x' signifies that
all variants of KPGM discussed in Section III are specific
instantiations of xKPGM.
The key idea behind xKPGM is to use k (k ≥ 1) initiator
matrices of possibly different sizes. The graph generation
follows similar iterative expansion as seen in other models
discussed in Section III with the difference that at any itera-
tion one of the k initiator matrices is randomly chosen for the
Kronecker product by drawing a sample from a Multinomial
distribution parameterized by a k length probability vector
i πi = 1). Similar to mKPGM, there is a parameter
l (1 ≤ l ≤ k) such that for first l iterations no realization
(or tying) is performed while from iteration l + 1, parameter
tying through realizations is employed.
π ((cid:80)k
To illustrate the impact of using multiple initiator matrices
instead of a single matrix, we generate multiple synthetic
graphs using different generative models. We use the fol-
lowing two initiator matrices:
(cid:33)
(cid:32)
Θ1 =
0.95 0.60
0.60 0.20
Θ2 =
0.99 0.20
0.20 0.70
(5)
(cid:32)
(cid:33)
These exact matrices have been used in previous papers [14]
for conducting empirical simulations for mKPGM and other
variants. The mean and the variance for the number of edges
across the simulations is shown in Figure 3 which illustrates
that the variability (in terms of the number of edges) for
samples generated by mKPGM is low for higher values of
l (≥ 6). In fact, the variance becomes negligible for KPGM
(l = 10). For very low values of l the variability is very
high. On the other hand, xKPGM generates samples with
much more stable variability across l. We observe that for
xKPGM, the variance is generally higher when π = 0.5,
though it also depends on the individual initiator matrices.
We observe similar behavior for other properties (clustering
coefficient, etc.) as well.
A. xKPGM Sampling Algorithm
The steps for sampling a graph in xKPGM are shown in
Algorithm 1. Note that the algorithm needs following inputs:
k initialization matrices, Θ1, Θ2, . . . , Θk, a k length vector
π, the number of iterations n, and the level of tying l. The
number of rows (and columns) for each matrix Θi is denoted
as bi.
B. Interchangeability in Kronecker Products
We make use of the following important result [8] for
Kronecker matrices. For two matrices A and B:
A ⊗ B = M (B ⊗ A)N
(6)
where M and N are permutation matrices which merely
change the order of rows and columns, respectively. In other
words, the above result means that the Kronecker product
2
s
e
g
d
E
f
o
r
e
b
m
u
N
e
g
a
r
e
v
A
s
e
g
d
E
f
o
r
e
b
m
u
N
e
g
a
r
e
v
A
6,000
4,000
2,000
8,000
6,000
4,000
2,000
0
2
mKPGM (Θ1)
mKPGM (Θ2)
4
8
Tying Parameter l
6
10
xKPGM (π = 0.5)
xKPGM (π = 0.8)
4
8
Tying Parameter l
6
10
Figure 3: Variation of number of edges for synthetic graphs
with 210 nodes generated by mKPGM and xKPGM for
varying levels of tying (l). Note that l = 1 indicates purely
tied model (tKPGM) and l = 10 indicates purely untied
model (KPGM). The error bars are computed by generating
2000 samples for each value of l.
is commutative as long as we allow changing of labels of
nodes, which is irrelevant in our case. Since in Algorithm 1,
the order of rows and columns is not important, one can use
this result in the purely untied setting.
Observation 2: In Algorithm 1, the graph generated
using any arbitrary sequence of initialization matrices
is equivalent to the following canonical sequence:
(Θ1 ⊗ Θ1 . . .)
⊗ . . . ⊗ (Θk ⊗ Θk . . .)
⊗ (Θ2 ⊗ Θ2 . . .)
(cid:125)
(cid:124)
(cid:123)(cid:122)
(cid:125)
(cid:124)
(cid:123)(cid:122)
nk times
(cid:125)
(cid:124)
(cid:123)(cid:122)
n1 times
n2 times
The above observation allows us to arrive at several im-
portant results later, because it simplifies the analysis, es-
pecially, in the untied setting for xKPGM, where arbitrary
sequences of initialization matrices can be represented using
the above canonical sequence. In fact, the next result follows
from this observation.
C. Generating Graphs of Arbitrary Sizes
i
.
i=1 bnπi
The input n determines the eventual size of the graph in
terms of the number of nodes (V). For a simple case where
all initialization matrices are of the same size (bi = b,∀i),
the size of the graph will be bn. In general, expected number
of nodes will be(cid:81)k
Note that existing Kronecker based models are limited to
generating graphs with number of nodes as exact powers of
b (typically set to 2 or 3). On the other hand, xKPGM can
generate graphs with number of nodes, which in principle,
need not be restricted to the exact powers of b. Thus, by
using initialization matrices of varying sizes, xKPGM can
generate graphs with more number of possibilities for the
number of nodes. For example, if we use two initialization
matrices of sizes 2 and 3 and if N can be factorized as 2a3b,
a+b and generate a
then one can set π1 = a
graph using Algorithm 1 with N expected number of nodes.
a+b and π2 = b
Algorithm 1 Graph Generation Algorithm for xKPGM
Input: Θ1, Θ2, . . . , Θk, π, n, l
Output: Adjacency matrix A
1 P ← 1
2 foreach t = 1 to l do
3
// Untied Phase
i ∼ M ultinomial(π)
P ← P ⊗ Θi
// Tied Phase
4 foreach t = l + 1 to n do
A ← R(P);
5
i ∼ M ultinomial(π)
6
P ← A ⊗ Θi
7 A ← R(P)
return A
// R - Realization
D. Relationship to Existing Models
If k = 1 and l = 1, xKPGM is equivalent to tKPGM.
Similarly, for k = 1 and l = n, xKPGM is equivalent
to KPGM. For k = 1 and for all other values of l
(1 ≤ l < n) xKPGM is equivalent to mKPGM. Thus all
existing Kronecker product based graph models are specific
instantiations of xKPGM.
Kronecker product models have been analyzed in terms
of the expected number of edges for the generated samples.
In Section VI, we provide similar expressions for other
graph properties as well. In Table III, we list the expressions
for the expectation and variance for the number of edges
for xKPGM and compare them with other models. The
derivation is omitted in the interest of space though the
key is to use the Observation 2 along with the fact that
the expectation of an edge between a pair of nodes is equal
to the corresponding value in the final stochastic matrix.
VI. PROPERTIES OF xKPGM GRAPHS
In this section we provide expressions for expectations
of four key properties for graphs, viz., i) edges, ii) hairpins
(or 2-stars), iii) tripins (or 3-stars), and iv) triangles. These
four properties provide an understanding of local structure of
the samples. Moreover, we will be using the expressions to
estimate the model parameters in Section VII. For simplicity
we assume that all k initiator matrices are of size 2 × 2
and are of the following form: Θk =
. The
(cid:32)
(cid:33)
ak
bk
bk
ck
derivation for expected values in the purely untied (l = n)
setting closely follows the line of argument taken for pure
KPGM [7] (Section 3) and makes use of Observation 2. The
expressions are provided in Table IV.
Note that the expression for E[E] here is slightly different
from a similar expression in Table III. The reason is that in
Table IV we do not count the self-loops and count each edge
only once.
VII. PARAMETER ESTIMATION
The parameters of xKPGM are the elements in the k
initiator matrices and the vector π = π1, π2, . . . , πk. We
describe a method of moments based approach to estimate
these parameters from a given observed graph. The graph
is characterized using a set of statistics (or moments). In
this paper we have used the same moments as used in
the past for KPGM estimation (edges, hairpins, tripins, and
triangles) [7]. The idea is to find the model parameters such
that the expected moments for the model match closely
with the moments computed from the observed graph within
an optimization procedure. Each moment is denoted as Fi
and the computed moment for an observed graph G is
denoted as F ∗
i . The estimation method searches for the
parameters Θ1, Θ2, . . . , π which minimize the following
objective function:
f (Θ, F∗) =
wi
F(cid:88)
i=1
(cid:18) F ∗
i − E[FiΘ]
F ∗
i
(cid:19)2
(7)
where wi indicates a weight assigned to the ith moment. In
this paper we have used equal weights, however, they can be
used to assign more emphasis on certain moments. Note that
the above objective function can be easily extended to learn
from multiple graphs by replacing the observed moment Fi
in (7) with the average moment value across all p observed
graphs, i.e., (cid:101)Fi = 1
p
(cid:80)G FiG.
For xKPGM in a purely untied setting (l = n), we have
expressions for each of the moments as functions of the
parameters (See Table IV). We plugin these expressions into
a gradient based optimizer (e.g., fmincon function available
in Matlab) to get the optimal parameter values.
Note that the above estimation algorithm can be extended
to more general settings of purely untied xKPGM such as
Model
KPGM
tKPGM
mKPGM
xKPGM (purely tied)
E[E]
Sn
Θ
Sn
Θ
Sn
Θ
(π1SΘ1 + π2SΘ2 )n
xKPGM (untied)
Sπ1n
Θ1
Sπ2n
Θ2
var[E]
Θ − Sn
Sn
Θ2
Θ − 1)
Sn−1
Θ (Sn
Θ − 1)
Sn−1
Θ (Sn−l
(π1(SΘ1 − SΘ2
− Sπ1n
SΘ2 )2)(cid:80)2(n−1)
j=1
Sπ2n
Θ2
Sπ1n
Θ1
Θ2
1
SΘ−SΘ2
SΘ−1
SΘ−SΘ2
Θ − Sl
SΘ−1 + (Sl
) + π2(SΘ2 − SΘ2
(π1SΘ1 + π2SΘ2 )j
1
2
Sπ2n
Θ2
2
Θ2 )S2(n−l)
) + π1π2(SΘ1 −
Θ
1
2
and SΘ2
denote the sum of squares of values of Θ, Θ1 and Θ2.
Table III: Comparison of E[e] and var[e] for Kronecker models. SΘ, SΘ1 and SΘ2 denote the sum of values of Θ, Θ1 and
Θ2. SΘ2, SΘ2
2E[E] = (cid:81)n
2E[H] = (cid:81)n
6E[T] = (cid:81)n
− 3(cid:81)n
+ 5(cid:81)n
6E[∆] = (cid:81)n
i=1(ai + 2bi + ci)πin −(cid:81)n
i=1((ai + bi)2 + (bi + ci)2)πin − 2(cid:81)n
i=1((ai + bi)3 + (bi + ci)3)πin − 3(cid:81)n
i (ai + ci))πin + 4(cid:81)n
i )πin − 3(cid:81)n
i=1(ai(ai + bi) + ci(ci + bi))πin −(cid:81)n
i ))πin − 6(cid:81)n
i ))πin + 2(cid:81)n
i=1(ai(ai + bi)2 + ci(bi + ci)2)πin
i + 2b3
i )πin + 2(cid:81)n
i )πin + 2(cid:81)n
i + c3
i + c3
i + 3b2
i + c2
i + bi(a2
i + b2
i (ai + ci) + c3
i=1(a3
i=1(ai(a2
i )πin
i + b3
i (ai + ci) + 2b3
i=1(ai + ci)πin
i + b2
i ) + ci(b2
i + c2
i=1(a3
i + c2
i + c3
i + bi(a2
i )πin
i=1(a3
i=1(a2
i + 2b2
i + c2
i=1(a2
i + c2
i )πin
i=1(a3
i=1(a3
i ) + b2
i=1(a3
i=1(a3
i )πin
i + c3
i + c3
Table IV: Expressions for E - num. edges, H - num. hairpins, T - num. tripins and ∆ - num. of triangles
using initiator matrices of larger sizes (> 2 and using initia-
tor matrices with different sizes, by deriving the appropriate
expressions similar to the ones listed in Table IV. For the
tied setting (l < n), obtaining such closed form expressions
is challenging. However, one could use the simulated method
of moments approach which was originally proposed for
mKPGM [16].
IX. EXPERIMENTAL RESULTS
We present results on several publicly available network
data sets (See Table II). The evaluation has two objectives.
We first show that the parameters learnt for xKPGM using
the algorithm sketched in Section VII allow a more accurate
modeling of the observed graph, compared to other Kro-
necker based models.
VIII. COMPUTATIONAL COMPLEXITY
A. Parameter Estimation
Generating a graph of size N using the learnt initiator
matrices using Algorithm 1 requires n = log2 N Kronecker
products and l
intermediate realization followed by N 2
bernoulli trials for the final realization. In the original KPGM
paper [12], the authors propose a sampling strategy which
is linear in the number of edges, however, that method
requires one to specify the number of edges desired in the
graph. For xKPGM the generation is dominated by the final
O(N 2) realization step. However, given that the realizations
are independent, efficient distributed implementations can be
devised.
The parameter estimation using the method of moments
allows scalable training. The only compute intensive phase
is the computation of the moments for the observed graph,
which is done once. The objective function can be computed
in O(1) time, independent of the size of the observe graph.
In contrast,
the simulated method of moments, used by
mKPGM, requires computation of the moments for the
generated graph multiple times at each iteration of the
gradient descent, making it unscalable to large graphs. The
number of iterations required by the fmincon minimizer will
depend on the number of model parameters, which increases
linearly with the number of initiator matrices (k).
For each graph in Table II, we estimate parameters using
Matlab fmincon with 5000 initial values with constraints that
elements of the initiator matrices are between 0 and 1 and
ai > ci. We train xKPGM with two initiator matrices of
size 2 × 2 and other models (KPGM, tKPGM, mKPGM)
using one initator matrix of size 2 × 2, using the objective
function in (7) and the four moments listed in Table IV. For
mKPGM and tKPGM, we use implementation provided by
the authors [16]1. For KPGM, we used the direct optimiza-
tion method [7].
B. Matching Moments
The objective function values (see (7)) for the different
methods are shown in Figure 4. For every data set, xKPGM
gives the best estimation in terms of the objective function,
especially for ca-astroPh, netscience, protein, and hep-ph
data sets. The relative performance of other models varies
across the different data sets. In general, we observe that
the objective function value improves as the tying level (l)
decreases and is best when l = 1, i.e., tKPGM.
1https://www.cs.purdue.edu/homes/smorenoa/mKPGM.zip
KPGM tKPGM mKPGM xKPGM
2.5
2
1.5
1
0.5
0
n
o
i
t
c
n
u
F
e
v
i
t
c
e
j
b
O
as
ca-astroPh
elegans
hep-Ph
netscience
protein
Figure 4: Comparing xKPGM with other models in terms of
the objective function value obtained after training.
C. Impact of Number of Initiator Matrices
To understand how the choice of k, i.e., the number of
initiator matrices, impacts the performance of the model,
we compared the objective function obtained by training
the xKPGM model using different values of k. The results
for three graphs are shown in Figure 5. In all three cases,
increasing k from 1 to 2 results in a significant improvement
in the objective function. For two of the graphs (netscience
and protein), increasing k beyond 2 does not show any
further improvements. However, for the as graph, higher
values of k show improvement in the objective function.
as
netscience
protein
n
o
i
t
c
n
u
F
e
v
i
t
c
e
j
b
O
1.5
1
0.5
0
1
2
3
4
Number of Initiator Matrices - k
Figure 5: Performance of xKPGM using different number of
initiator matrices (k). Note that k = 1 is KPGM.
(a) Power Law Coefficient of Degree Distribution
(b) Average Path Length
(c) Average Clustering Coefficient
Figure 6: Distribution of network characteristics for samples
using the models trained on cit-hepPh data. The first plot
in each row is the distribution for the subgraph population
discussed in Section IV.
D. Variability of Generated Samples
The second set of experiments attempt to understand the
variability in the samples generated by the xKPGM and other
Kronecker models. For each model, we use the estimated
parameters and generate 200 samples with the same sample
size that was used to generate the subgraphs in Section IV.
For each sample we measure five salient properties similar
to Figure 2 and plot the distribution across the samples.
The distributions for cit-hepPh is shown in Figure 62. In the
results shown in Figure 6, both KPGM and mKPGM exhibit
almost negligible variability for almost all of the network
properties. In fact, it is evident that the variability increases
as we decrease l from n (KPGM) to 1 (tKPGM). xKPGM
shows most variability, and in many cases approximately
matches the variability of the subgraph population (degree
distribution, average clustering coefficient).
E. Comparison with BTER
As noted earlier, the BTER model allows generating a
synthetic graph which approximates an observed graph.
However, by design, BTER can generate graphs of approx-
imately the same size (nodes and edges) as the observed
graph. Using the available implementation3, we observed
that while BTER matches the degree distribution and the
2Results for other data sets available at: http://www.cse.buffalo.edu/
∼chandola/research/bigdata2015graphs/allresults.pdf due to lack of space.
3http://www.sandia.gov/∼tgkolda/feastpack
clustering coefficient, the generated graphs show minimal
variation for a set of samples generated using the same
observed graph. For example, for the ca-astroPH graph, 200
simulations using BTER resulted in graphs with number of
edges in the range: 196156± 208 and the average clustering
coefficient in the range: 0.3265 ± 0.0013.
X. CONCLUSIONS
We propose a new generative model, xKPGM, for graphs
based on mixture of Kronecker models. The model induces
variability by incorporating multiple initiator matrices strung
together using a random multinomial trial, while retaining
the strong features of KPGM, such as scaling to massive
graphs. We provide analytical expressions for various char-
acteristics of the generated graphs which allows us to esti-
mate the parameters using a method of moments approach.
The mixture approach allows us to devise a scalable method
of moments based learning method (similar to KPGM) while
achieving better variance (similar to mKPGM).
We show, both analytically and through experiments, that
xKPGM is able to learn a model which best matches the
moments of the observed graph (See Figure 4) and also
induces variability (See Figure 6) which aligns with the
natural variability observed in real graphs (See Figure 2).
To better evaluate the variability of generative graph models
we have come up with a sub-graph based method. Using this
method we show that the proposed model provides a robust
variance across multiple graph properties. We also provide
comparisons with the state of art generative models and show
that xKPGM outperforms them both in terms of matching
the graph properties and the variance in the population.
ACKNOWLEDGEMENTS
This work was supported by NSF grant CNS:1409551.
Access to computing resources was facilitated by an AWS
in Education Grant award.
REFERENCES
[1] W. Aiello, et. al., "A random graph model for power law
graphs," Experiment. Math., 10(1), 53 -- 66, 2001.
[2] E. M. Airoldi, et. al. Mixed membership stochastic block-
models. J. Mach. Learn. Res., 9:1981 -- 2014, 2008.
[3] A.-L. Barabasi and R. Albert. Emergence of scaling in
random networks. Science, 286(5439):509 -- 512, 1999.
[4] J. Casas-Roma, et al., "An algorithm for k-degree anonymity
on large networks," in ASONAM, 2013.
[5] V. Chandola, et. al., "Knowledge discovery from massive
healthcare claims data," in KDD, 2013.
[7] D. F. Gleich and A. B. Owen. Moment-based estimation of
stochastic kronecker graph parameters. Internet Mathematics,
8(3):232 -- 256, 2012.
[8] H. V. Henderson and S. R. Searle. The vec-permutation
matrix, the vec operator and kronecker products: a review.
Linear and Multilinear Algebra, 9(4):271 -- 288, 1981.
[9] C. Hubler, et. al. Metropolis algorithms for representative
subgraph sampling. In ICDM, 2008.
[10] H. Jeong, et. al. Lethality and centrality in protein networks.
Nature, 411:41 -- 42, 2001.
[11] M. Kim and J. Leskovec. Multiplicative attribute graph model
Internet Mathematics, 8(1-2):113 --
of real-world networks.
160, 2012.
[12] J. Leskovec, et. al. Kronecker graphs:An approach to mod-
eling networks. J. Mach. Lear. Res., 11:985 -- 1042, 2010.
[13] J. Leskovec and C. Faloutsos. Sampling from large graphs.
In Proceedings of the SIGKDD pages 631 -- 636, 2006.
[14] S. Moreno, et. al. Tied kronecker product graph models to
capture variance in network populations. In IEEE Communi-
cation, Control, and Computing (Allerton), 2010.
[15] S. Moreno, et. al. Block kronecker product graph model. In
Workshop on Mining and Learning from Graphs, 2013.
[16] S. I. Moreno, et. al. Learning mixed kronecker product graph
In SIGKDD,
models with simulated method of moments.
pages 1052 -- 1060, 2013.
[17] M. E. J. Newman. Finding community structure in networks
using the eigenvectors of matrices. Phys. Rev. E, 74:36 -- 104,
2006.
[18] P. Erdos and A. R´enyi. On the evolution of random graphs.
In Publication of the Mathematical Institute of the Hungarian
Academy of Sciences, pages 17 -- 61, 1960.
[19] A. Sanzgiri, A. Hughes, and S. Upadhyaya, "Analysis of
malware propagation in Twitter," in IEEE SRDS, 2013.
[20] C. Seshadhri, et. al., "Community structure and scale-free
collections of erdos-r´enyi graphs," CoRR, 2011.
[21] C. Seshadhri, et. al. An in-depth analysis of stochastic
Kronecker graphs. Journal of the ACM, 60(2), 2013.
[22] H. Sethu and X. Chu. A new algorithm for extracting a small
representative subgraph from a very large graph. CoRR, 2012.
[23] SNAP: Stanford network analysis platform.
stanford.edu/data/index.html.
http://snap.
[24] T. A. Snijders and K. Nowicki. Estimation and prediction for
stochastic blockmodels for graphs with latent block structure.
Journal of Classification, 14(1):75 -- 100, 1997.
[6] J. Duch and A. Arenas. Community detection in complex
networks using extremal optimization. Physical Review E,
72:027104, 2005.
[25] S. Wasserman and P. Pattison. Logit models and logistic
regressions for social networks. Psychometrika, 61(3):401 --
425, 1996.
|
1702.05354 | 2 | 1702 | 2017-10-23T18:46:51 | Algorithms for Online Influencer Marketing | [
"cs.SI"
] | Influence maximization is the problem of finding influential users, or nodes, in a graph so as to maximize the spread of information. It has many applications in advertising and marketing on social networks. In this paper, we study a highly generic version of influence maximization, one of optimizing influence campaigns by sequentially selecting "spread seeds" from a set of influencers, a small subset of the node population, under the hypothesis that, in a given campaign, previously activated nodes remain "persistently" active throughout and thus do not yield further rewards. This problem is in particular relevant for an important form of online marketing, known as influencer marketing, in which the marketers target a sub-population of influential people, instead of the entire base of potential buyers. Importantly, we make no assumptions on the underlying diffusion model and we work in a setting where neither a diffusion network nor historical activation data are available. We call this problem online influencer marketing with persistence (in short, OIMP). We first discuss motivating scenarios and present our general approach. We introduce an estimator on the influencers' remaining potential -- the expected number of nodes that can still be reached from a given influencer -- and justify its strength to rapidly estimate the desired value, relying on real data gathered from Twitter. We then describe a novel algorithm, GT-UCB, relying on upper confidence bounds on the remaining potential. We show that our approach leads to high-quality spreads on both simulated and real datasets, even though it makes almost no assumptions on the diffusion medium. Importantly, it is orders of magnitude faster than state-of-the-art influence maximization methods, making it possible to deal with large-scale online scenarios. | cs.SI | cs | Algorithms for Online Influencer Marketing
Paul Lagr´ee1, Olivier Capp´e2, Bogdan Cautis1, and Silviu Maniu1
1LRI, Universit´e Paris-Sud, Universit´e Paris-Saclay
2LIMSI, CNRS, Universit´e Paris-Saclay
7
1
0
2
t
c
O
3
2
]
I
S
.
s
c
[
2
v
4
5
3
5
0
.
2
0
7
1
:
v
i
X
r
a
Abstract
Influence maximization is the problem of finding influential users, or nodes, in a graph so as
to maximize the spread of information. It has many applications in advertising and marketing
on social networks. In this paper, we study a highly generic version of influence maximization,
one of optimizing influence campaigns by sequentially selecting "spread seeds" from a set of
influencers, a small subset of the node population, under the hypothesis that, in a given campaign,
previously activated nodes remain "persistently" active throughout and thus do not yield further
rewards. This problem is in particular relevant for an important form of online marketing,
known as influencer marketing, in which the marketers target a sub-population of influential
people, instead of the entire base of potential buyers. Importantly, we make no assumptions
on the underlying diffusion model and we work in a setting where neither a diffusion network
nor historical activation data are available. We call this problem online influencer marketing
with persistence (in short, OIMP). We first discuss motivating scenarios and present our general
approach. We introduce an estimator on the influencers' remaining potential – the expected
number of nodes that can still be reached from a given influencer – and justify its strength to
rapidly estimate the desired value, relying on real data gathered from Twitter. We then describe
a novel algorithm, GT-UCB, relying on upper confidence bounds on the remaining potential.
We show that our approach leads to high-quality spreads on both simulated and real datasets,
even though it makes almost no assumptions on the diffusion medium. Importantly, it is orders
of magnitude faster than state-of-the-art influence maximization methods, making it possible to
deal with large-scale online scenarios.
Keywords:Influencer marketing, information diffusion, online social networks, influence maxi-
mization, online learning, multi-armed bandits.
1
Introduction
Advertising based on word-of-mouth diffusion in social media has become very important in the
digital marketing landscape. Nowadays, social value and social influence are arguably the hottest
concepts in the area of Web advertising and most companies that advertise in the Web space must
have a "social" strategy. For example, on widely used platforms such as Facebook or Twitter,
promoted posts are interleaved with normal posts on user feeds. Users interact with these posts by
actions such as "likes" (adoption), "shares" or "reposts" (network diffusion). This represents an
unprecedented utility in advertising, be it with a commercial intent or not, as products, news, ideas,
movies, political manifests, tweets, etc, can propagate easily to a large audience [40, 41].
Motivated by the need for effective viral marketing strategies, influence estimation and influence
maximization have become important research problems, at the intersection of data mining and
1
social sciences [12]. In short, influence maximization is the problem of selecting a set of nodes from a
given diffusion graph, maximizing the expected spread under an underlying diffusion model. This
problem was introduced in 2003 by the seminal work of Kempe et al. [21], through two stochastic,
discrete-time diffusion models, Linear Threshold (LT) and Independent Cascade (IC). These models
rely on diffusion graphs whose edges are weighted by a score of influence. They show that selecting
the set of nodes maximizing the expected spread is NP-hard for both models, and they propose
a greedy algorithm that takes advantage of the sub-modularity property of the influence spread,
but does not scale to large graphs. A rich literature followed, focusing on computationally efficient
and scalable algorithms to solve influence maximization. The recent benchmarking study of Arora
et al. [2] summarizes state-of-the-art techniques and also debunks many influence maximization
myths. In particular, it shows that, depending on the underlying diffusion model and the choice of
parameters, each algorithm's behavior can vary significantly, from very efficient to prohibitively slow,
and that influence maximization at the scale of real applications remains an elusive target.
Importantly, all the influence maximization studies discussed in [2] have as starting point a
specific diffusion model (IC or LT), whose graph topology and parameters – basically the edge
weights – are known. In order to infer the diffusion parameters or the underlying graph structure,
or both, [15, 16, 14, 18, 33, 11] propose offline, model-specific methods, which rely on observed
information cascades. In short, information cascades are time-ordered sequences of records indicating
when a specific user was activated or adopted a specific item.
There are however many situations where it is unreasonable to assume the existence of relevant
historical data in the form of cascades. For such settings, online approaches, which can learn the
underlying diffusion parameters while running diffusion campaigns, have been proposed. Bridging
influence maximization and inference, this is done by balancing between exploration steps (of yet
uncertain model aspects) and exploitation ones (of the best solution so far), by so called multi-armed
bandits techniques, where an agent interacts with the network to infer influence probabilities [38, 10,
42, 37]. The learning agent sequentially selects seeds from which diffusion processes are initiated in
the network; the obtained feedback is used to update the agent's knowledge of the model.
Nevertheless, all these studies on inferring diffusion networks, whether offline or online, rely on
parametric diffusion models, i.e., assume that the actual diffusion dynamics are well captured by
such a model (e.g., IC). This maintains significant limitations for practical purposes. First, the
more complex the model, the harder to learn in large networks, especially in campaigns that have a
relatively short timespan, making model inference and parameter estimation very challenging within
a small horizon (typically tens or hundreds of spreads). Second, it is commonly agreed that the
aforementioned diffusion models represent elegant yet coarse interpretations of a reality that is much
more complex and often hard to observe fully. For examples of insights into this complex reality, the
topical or non-topical nature of an influence campaign, the popularity of the piece of information
being diffused, or its specific topic were all shown to have a significant impact on hashtag diffusions
in Twitter [11, 19, 32].
Our contribution Aiming to address such limitations, we propose in this paper a large-scale
approach for online and adaptive influence maximization, in which the underlying assumptions for
the diffusion processes are kept to a minimum (if, in fact, hardly any).
We argue that it can represent a versatile tool in many practical scenarios, including in particular
the one of influencer marketing, which, according to Wikipedia, can be described as follows: "a
form of marketing in which focus is placed on influential people rather than the target market as a
whole, identifying the individuals that have influence over potential buyers, and orienting marketing
activities around these influencers". For instance, influential users may be contractually bound by a
sponsorship, in exchange for the publication of promoted posts on their online Facebook or Twitter
2
accounts. This new form of marketing is by now extensively used in online social platforms, as is
discussed in the marketing literature [13, 1, 6].
More concretely, we focus on social media diffusion scenarios in which influence campaigns consist
of multiple consecutive trials (or rounds) spreading the same type of information from an arbitrary
domain (be it a product, idea, post, hashtag, etc)1. The goal of each campaign is to reach (or activate)
as many distinct users as possible, the objective function being the total spread. These potential
influencees – the target market – represent the nodes of an unknown diffusion medium / online
network. In our setting – as, arguably, in many real-world scenarios – the campaign selects from a
known set of spread seed candidates, so called influencers, a small subset of the potentially large and
unknown target market. At each round, the learning agent picks among the influencers those from
which a new diffusion process is initiated in the network, gathers some feedback on the activations,
and adapts the subsequent steps of the campaign. Only the effects of the diffusion process, namely
the activations (e.g., purchases or subscriptions), are observed, but not the process itself. The agent
may "re-seed" certain influencers (we may want to ask a particular one to initiate spreads several
times, e.g., if it has a strong converting impact). This perspective on influence campaigns imposes
naturally a certain notion of persistence, which is given the following interpretation: users that were
already activated in the ongoing campaign – e.g., have adopted a product or endorsed a political
movement – remain activated throughout that campaign, and thus will not be accounted for more
than once in the objective function.
We call this problem online influencer marketing with persistence (in short, OIMP). Our solution
for it follows the multi-armed bandit idea initially employed in Lei et al. [24], but we adopt instead
a diffusion-independent perspective, whose only input are the spread seed candidates, while the
population and underlying diffusion network – which may actually be the superposition of several
networks – remain unknown. In our bandit approach, the parameters to be estimated are the values
of the influencers – how good is a specific influencer –, as opposed to the diffusion edge probabilities of
a known graph as in [24]. Furthermore, we make the model's feedback more realistic by assuming that
after each trial, the agent only gathers the set of activated nodes. The rationale is that oftentimes,
for a given "viral" item, we can track in applications only when it was adopted by various users,
but not why. A key difference w.r.t. other multi-armed bandit studies for influence maximization
such as [38, 10, 42, 37] is that these look for a constant optimal set of seeds, while the difficulty with
OIMP is that the seemingly best action at a given trial depends on the activations of the previous
trials (and thus the learning agent's past decisions).
The multi-armed bandit algorithm we propose, called GT-UCB, relies on a famous statistical
tool known as the Good-Turing estimator, first developed during WWII to crack the Enigma machine,
and later published by Good in a study on species discovery [17]. Our approach is inspired by the
work of Bubeck et al. [8], which proposed the use of the Good-Turing estimator in a context where
the learning agent needs to sequentially select experts that only sample one of their potential nodes at
each trial. In contrast, in OIMP, when an influencer is selected, it may have a potentially large spread
and may activate many nodes at once. Our solution follows the well-known optimism in the face of
uncertainty principle from the bandit literature (see [7] for an introduction to multi-armed bandit
problems), by deriving an upper confidence bound on the estimator for the remaining potential for
spreading information of each influencer, and by choosing in a principled manner between explore
and exploit steps.
In Section 6 we evaluate the proposed approach on publicly available graph datasets as well a
large snapshot of Twitter activity we collected. The proposed algorithm is agnostic with respect to
the choice of influencers, who in most realistic applications will be selected based on a combination of
1Repeated exposure, known also as the "effective frequency", is a crucial concept in marketing strategies, online or
offline.
3
graph-based and external considerations. We describe however in Section 6.1 several heuristics that
may be used to automatically extract good candidates for the influencer set, when a social network
graph is available. This choice of influencers also makes it possible to compare the results obtained by
our method to those of the baseline methods from the literature (see above), which require knowledge
of the graph and of the diffusion model and, in some cases, of the influence probabilities.
Comparison with previous publication We extend in this article a preliminary study published
in Lagr´ee et al. [22], introducing the following new contributions, which allow us to give a complete
picture on our model and algorithmic solutions:
• A more detailed discussion on the motivation behind our work, in relation to new forms of
online marketing, such as influencer marketing.
• An empirical analysis over Twitter data, which comes to support the assumptions behind our
choice of estimators for the remaining potential in each influencer.
• A detailed theoretical analysis and justification for the upper confidence bounds on which our
algorithm GT-UCB relies.
• Theoretical guarantees on the performance of GT-UCB, formulated in terms of waiting time,
a notion that is better suited in our bandit framework than the usual one of regret.
• An adaptation of GT-UCB (denoted Fat-GT-UCB) and the corresponding theoretical analysis,
for scenarios in which influencers may experience fatigue, i.e., a diminishing tendency to activate
their user base as they are re-seeded throughout a marketing campaign.
• A broader experimental analysis involving the two datasets previously used in [22], as well as
a new set of experimental results in a completely different scenario, involving real influence
spreads from Twitter, for both GT-UCB and Fat-GT-UCB.
To the best of our knowledge, our approach is the first to show that efficient and effective influence
maximization can be done in a highly uncertain or under-specified social environment, along with
formal guarantees on the achieved spread.
2 Setting
The goal of the online influencer marketing with persistence is to successively select (or activate)
a number of seed nodes, in order to reach (or spread to) as many other nodes as possible. In this
section, we formally define this problem.
2.1 Background
Given a graph G = (V, E), the traditional problem of influence maximization is to select a set of
seed nodes I ⊆ V , under a cardinality constraint I = L, such that the expected spread – that is,
the number of activated nodes – of an influence cascade starting from I is maximized. Formally,
denoting by the random variable S(I) the spread initiated by the seed set I, influence maximization
aims to solve the following optimization problem:
E[S(I)].
arg max
I⊆V,I=L
4
Figure 1: Three influencers with associated activation probabilities pk(u).
As mentioned before, a plethora of algorithms have been proposed to solve the influence maximiza-
tion problem, under specific diffusion models. These algorithms can be viewed as full-information
and offline approaches: they choose all the seeds at once, in one step, and they have the complete
diffusion configuration, i.e., the graph topology and the influence probabilities.
In the online case, during a sequence of N (called hereafter the budget) consecutive trials, L seed
nodes are selected at each trial, and feedback on the achieved spread from these seeds is collected.
2.2 Influence maximization via influencers
The short timespan of campaigns makes parameter estimation very challenging within small horizons.
In other cases, the topology – or even the existence – of a graph is too strong an assumption. In
contrast to [24], we do not try to estimate edge probabilities in some graph, but, instead, we assume
the existence of a known set of spread seed candidates – in the following referred to as the influencers
– who are the only access to the medium of diffusion. Formally, we let [K] := {1, . . . , K} be a set
of influencers up for selection; each influencer is connected to an unknown and potentially large
base (the influencer's support) of basic nodes, each with an unknown activation probability. For
illustration, we give in Figure 1 an example of this setting, with 3 influencers connected to 4, 5, and
4 basic nodes, respectively.
Now, the problem boils down to estimating the value of the K influencers, which is typically much
smaller than the number of parameters of the diffusion model. The medium over which diffusion
operates may be a diffusion graph but we make no assumption on that, meaning that the diffusion
may also happen in a completely unknown environment. Finally, note that by choosing K = V
influencers, the classic influence maximization problem can be seen as a special instance of our
setting.
We complete the formal setting by assuming the existence of K sets Ak ⊆ V of basic nodes such
that each influencer k ∈ [K] is connected to each node in Ak. We denote pk(u) the probability for
influencer k to activate the child node u ∈ Ak. In this context, the diffusion process can be abstracted
as follows.
Definition 1 (Influence process). When an influencer k ∈ [K] is selected, each basic node u ∈ Ak is
sampled for activation, according to its probability pk(u). The feedback for k's selection consists of
all the activated nodes, while the associated reward consists only of the newly activated ones.
Remark Limiting the influence maximization method to working with a small subset of the node
base may allow to accurately estimate their value more rapidly, even in a highly uncertain environment,
hence the algorithmic interest. At the same time, this is directly motivated by marketing scenarios
involving marketers who may not have knowledge of the entire diffusion graph, only having access
5
pk(u)pk(u)uInfluencersBasicNodesto a few influential people who can diffuse information (the influencers in our setting), or may
simply prefer such a two-step flow of diffusion for various reasons, such as establishing credibility.
Moreover, despite the fact that we model the social reach of every influencer by 1-hop links to the
to-be-influenced nodes, these edges are just an abstraction of the activation probability, and may
represent in reality longer paths in an underlying unknown real influence graph G.
2.3 Online influencer marketing with persistence
We are now ready to define the online influencer marketing with persistence task.
Problem 1 (OIMP). Given a set of influencers [K] := {1, . . . , K}, a budget of N trials, and a
number 1 ≤ L ≤ K of influencers to be activated at each trial, the objective of the online influencer
marketing with persistence (OIMP) is to solve the following optimization problem:
(cid:91)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) .
arg max
In⊆[K],In=L,∀1(cid:54)n(cid:54)N
E
S(In)
1(cid:54)n(cid:54)N
As noticed in [24], the offline influence maximization can be seen as a special instance of the
online one, where the budget is N = 1. Note that, in contrast to persistence-free online influence
maximization – considered, e.g., in [38, 42] – the performance criterion used in OIMP displays
the so-called diminishing returns property: the expected number of nodes activated by successive
selections of a given seed is decreasing, due to the fact that nodes that have already been activated
are discounted. We refer to the expected number of nodes remaining to be activated as the remaining
potential of a seed. The diminishing returns property implies that there is no static best set of
seeds to be selected, but that the algorithm must follow an adaptive policy, which can detect that
the remaining potential of a seed is small and switch to another seed that has been less exploited.
Our solution to this problem has to overcome challenges on two fronts: (1) it needs to estimate the
potential of nodes at each round, without knowing the diffusion model nor the activation probabilities,
and (2) it needs to identify the currently best influencers, according to their estimated potentials.
Other approaches for the online influence maximization problem rely on estimating diffusion
parameters [24, 38, 42] – generally, a distribution over the influence probability of each edge in the
graph. However, the assumption that one can estimate accurately the diffusion parameters – and
notably the diffusion probabilities – may be overly ambitious, especially in cases where the number
of allowed trials (the budget) is rather limited. A limited trial setting is arguably more in line with
real-world campaigns: take as example political or marketing campaigns, which only last for a few
weeks.
In our approach, we work with parameters on nodes, instead of edges. More specifically, these
parameters represent the potentials of remaining spreads from each of the influencer nodes. We
stress that this potential can evolve as the campaign proceeds. In this way, we can go around the
dependencies on specific diffusion models, and furthermore, we can remove entirely the dependency
on a detailed graph topology.
3 Algorithm
In this section, we describe our UCB-like algorithm, which relies on the Good-Turing estimator to
sequentially select the seeds to activate at each round, from the available influencers.
6
3.1 Remaining potential and Good-Turing estimator
A good algorithm for OIMP should aim at selecting the influencer k with the largest potential for
influencing its children Ak. However, the true potential value of an influencer is a priori unknown to
the decision maker.
In the following, we index trials by t when referring to the time of the algorithm, and we index
trials by n when referring to the number of selections of the influencer. For example, the t-th spread
initiated by the algorithm is noted S(t) whereas the n-th spread of influencer k is noted Sk,n.
Definition 2 (Remaining potential Rk(t)). Consider an influencer k ∈ [K] connected to Ak basic
nodes. Let S(1), . . . , S(t) be the set of nodes that were activated during the first t trials by the seeded
influencers. The remaining potential Rk(t) is the expected number of new nodes that would be
activated upon starting the t + 1-th cascade from k:
(cid:88)
u∈Ak
(cid:40)
u /∈ t(cid:91)
i=1
(cid:41)
Rk(t) :=
1
S(i)
pk(u),
where 1{·} denotes the indicator function.
Definition 2 provides a formal way to obtain the remaining potential of an influencer k at a given
time. The optimal policy would simply select the influencer with the largest remaining potential at
each time step. The difficulty is, however, that the probabilities pk(u) are unknown. Hence, we have
to design a remaining potential estimator Rk(t) instead. It is important to stress that the remaining
potential is a random quantity, because of the dependency on the spreads S(1), . . . , S(t). Furthermore,
due to the diminishing returns property, the sequence (Sk,n)n≥1 is stochastically decreasing.
Following ideas from [17, 8], we now introduce a version of the Good-Turing statistic, tailored to
our problem of rapidly estimating the remaining potential. Denoting by nk(t) the number of times
influencer k has been selected after t trials, we let Sk,1, . . . , Sk,nk(t) be the nk(t) cascades sampled
independently from influencer k. We denote by Uk(u, t) the binary function whose value is 1 if node
u has been activated exactly once by influencer k – such occurrences are called hapaxes in linguistics
– and Zk(u, t) the binary function whose value is 1 if node u has never been activated by influencer k.
The idea of the Good-Turing estimator is to estimate the remaining potential as the proportion of
hapaxes in the nk(t) sampled cascades, as follows:
(cid:88)
(cid:89)
l(cid:54)=k
Rk(t) :=
1
nk(t)
u∈Ak
Uk(u, t)
Zl(u, t).
Albeit simple, this estimator turns out to be quite effective in practice.
If an influencer is
connected to a combination of both nodes having high activation probabilities and nodes having low
activation probabilities, then successive traces sampled from this influencer will result in multiple
activations of the high-probability nodes and few of the low-probability ones. Hence, after observing
a few spreads, the influencer's potential will be low, a fact that will be captured by the low proportion
of hapaxes. In contrast, estimators that try to estimate each activation probability independently
will require a much larger number of trials to properly estimate the influencer's potential.
To verify this assumption in reality, we conducted an analysis of the empirical activation proba-
bilities from a Twitter dataset. Specifically, we used a collection of tweets and re-tweets gathered
via crawling in August 2012. For each original tweet, we find all corresponding retweets, and, for
each user, we compute the empirical probability of a retweet occurring – this, in our case, is a
proxy measure for influence probability. Specifically, for every user v "influenced" by u, i.e., v
7
Figure 2: (left) Twitter empirical retweet probabilities. (right) Sample of 50 empirical retweet
probabilities.
retweeted at least one original tweet from u – we compute the estimated diffusion probability:
pu,v = u's tweets retweeted by v /tweets by u. In Fig. 2 (left), we show the survival function of
resulting empirical probabilities in a log-log plot. We can see that most probabilities are small – the
9th decile has value 0.045.
In Fig. 2 (right), we simulated the activation probabilities of a set of 50 nodes whose activation
probabilities are chosen randomly from the Twitter empirical probabilities. Most of the sampled
values are low, except a few relatively high ones. Using this sample as the activation probabilities of
an hypothetical influencer node, we observe on Fig. 3 (left) the cumulative influence spread. The
curve first shows a steep increase until approximately 20 rounds, where users with high probabilities
of conversion have already been activated, while remaining ones are difficult to activate.
In Fig. 3 (right), we compare the Good-Turing estimator to a Bayesian estimator that maintains
a posterior (through a Beta distribution) on the unknown activation probabilities, updating the
posterior after each trial, similarly to [24]. In the Bayesian approach, the remaining potential can be
estimated by summing over the means of the posterior distributions corresponding to nodes that
have not been activated so far. On Fig. 3 (right), the curves are averaged over 200 runs, and the
shaded regions correspond to the 95% quantiles. Clearly, the Good-Turing estimator is much faster
than its Bayesian counterpart in estimating the actual remaining potential. Varying the number
of nodes – here equal to 50 – shows that the time needed for the Bayesian estimator to provide a
reliable estimate of the remaining potential is proportional to the number of nodes, whereas it grows
only sub-linearly for the Good-Turing estimator.
Remark While bearing similarities with the traditional missing mass concept, we highlight one
fundamental difference between the remaining potential and the traditional missing mass studied
in [8], which impacts both the algorithmic solution and the analysis. Since at each step, after selecting
an influencer, every node connected to that influencer is sampled, the algorithm receives a larger
feedback than in [8], whose feedback is in [0, 1]. However, on the contrary to [8], the hapaxes of
p(u), which
corresponds to the expected number of basic nodes an influencer activates or re-activates in a cascade,
will prove to be a crucial ingredient for our problem.
an influencer (Uk(u, t))u∈Ak are independent. Interestingly, the quantity λk :=(cid:80)
u∈Ak
8
10−410−310−210−1100Retweetprobability10−510−410−310−210−1100Survivalfunction00.0250.050.0750.10.1250.15RetweetprobabilityFigure 3: (left) Influence spread against number of rounds. (right) Bayesian estimator against
Good-Turing estimator.
3.2 Upper confidence bounds
Following principles from the bandit literature, the GT-UCB algorithm relies on optimism in the
face of uncertainty. At each step (trial) t, the algorithm selects the highest upper-confidence bound
on the remaining potential – denoted by bk(t) – and activates (plays) the corresponding influencer
k. This algorithm achieves robustness against the stochastic nature of the cascades, by ensuring
that influencers who "underperformed" with respect to their potential in previous trials may still be
selected later on. Consequently, GT-UCB aims to maintain a degree of exploration of influencers, in
addition to the exploitation of the best influencers as per the feedback gathered so far.
ALGORITHM 1: – GT-UCB (L = 1)
Require: Set of influencers [K], time budget N
1: Initialization: play each influencer k ∈ [K] once, observe the spread Sk,1, set nk = 1
2: For each k ∈ [K]: update the reward W = W ∪ Sk,1
3: for t = K + 1, . . . , N do
4:
5:
6:
7:
8:
9: end for
10: return W
Compute bk(t) for every influencer k
Choose k(t) = arg maxk∈[K] bk(t)
Play influencer k(t) and observe spread S(t)
Update cumulative reward: W = W ∪ S(t)
Update statistics of influencer k(t): nk(t)(t + 1) = nk(t)(t) + 1 and Sk,nk(t) = S(t).
influencer is chosen at each step.
Algorithm 1 presents the main components of GT-UCB for the case L = 1, that is, when a single
The algorithm starts by activating each influencer k ∈ [K] once, in order to initialize its Good-
Turing estimator. The main loop of GT-UCB occurs at lines 3-9. Let S(t) be the observed spread at
trial t, and let Sk,s be the result of the s-th diffusion initiated at influencer k. At every step t > K,
we recompute for each influencer k ∈ [K] its index bk(t), representing the upper confidence bound
on the expected reward in the next trial. The computation of this index uses the previous samples
Sk,1, . . . , Sk,nk(t) and the number of times each influencer k has been activated up to trial t, nk(t).
Based on the result of Theorem 1 – whose statement and proof are delayed to Section 4 –, the upper
9
01020304050Trial0510152025#Activations5101520Trial03691215#nodesRemainingpotentialGTestimatorBayesestimatorconfidence bound is set as:
(cid:17)(cid:115)
√
(cid:16)
bk(t) = Rk(t) +
where Rk(t) is the Good-Turing estimator and λk(t) :=(cid:80)nk(t)
nk(t)
1 +
2
s=1
spread from influencer k.
λk(t) log(4t)
+
log(4t)
3nk(t)
,
(1)
Sk,s
nk(t) is an estimator for the expected
Then, in line 5, GT-UCB selects the influencer k(t) with the largest index, and initiates a cascade
from this node. The feedback S(t) is observed and is used to update the cumulative reward set W .
We stress again that S(t) provides only the Ids of the nodes that were activated, with no information
on how this diffusion happened in the hidden diffusion medium. Finally, the statistics associated to
the chosen influencer k(t) are updated.
3.3 Extensions for the case L > 1
Algorithm 1 can be easily adapted to select L > 1 influencers at each round. Instead of choosing
the influencer maximizing the Good-Turing UCB in line 5, we can select those having the L largest
indices. Note that k(t) then becomes a set of L influencers. A diffusion is initiated from the associated
nodes and, at termination, all activations are observed. Similarly to [37], the algorithm requires
feedback to include the influencer responsible for the activation of each node, in order to update the
corresponding statistics accordingly.
4 Analysis
In this section, we justify the upper confidence bound used by GT-UCB in Eq. 1 and provide a
theoretical analysis of the algorithm.
4.1 Confidence interval for the remaining potential
In the following, to simplify the analysis and to allow for a comparison with the oracle strategy, we
assume that the influencers have non intersecting support. This means that each influencer's remaining
potential and corresponding Good-Turing estimator does not dependent on other influencers. Hence,
for notational efficiency, we also omit the subscript denoting the influencer k. After selecting the
n . We note that
the non-intersecting assumption is for theoretical purposes only – our experiments are done with
influencers that can have intersecting supports.
influencer n times, the Good-Turing estimator is simply written Rn =(cid:80)
λ =(cid:80)
The classic Good-Turing estimator is known to be slightly biased (see Theorem 1 in [28] for
example). We show in Lemma 1 that our remaining potential estimator adds an additional factor
u∈A p(u) to this bias:
u∈A
Un(u)
Lemma 1. The bias of the remaining potential estimator is
(cid:20)
(cid:21)
− λ
n
, 0
.
E[Rn] − E[ Rn] ∈
10
Proof.
E[Rn]−E[ Rn] =
u∈A
(cid:88)
(cid:88)
(cid:34)(cid:88)
u∈A
E
u∈A
= − 1
n
= − 1
n
(cid:104)
p(u)(1 − p(u))n−1(cid:105)
p(u)(1 − p(u))n − n
n
p(u) × np(u)(1 − p(u))n−1
(cid:35)
(cid:20)
(cid:80)
∈
−
(cid:21)
, 0
u∈A p(u)
n
p(u)Un(u)
Since λ is typically very small compared to A, in expectation, the estimation should be relatively
accurate. However, in order to understand what may happen in the worst-case, we need to characterize
the deviation of the Good-Turing estimator:
Theorem 1. With probability at least 1 − δ, for λ =(cid:80)
u∈A p(u) and βn :=(cid:0)1 +
2(cid:1)(cid:113) λ log(4/δ)
n
√
+
1
3n log 4
δ , the following holds:
−βn − λ
n
≤ Rn − Rn ≤ βn.
Note that the additional term appearing in the left deviation corresponds to the bias of our
estimator, which leads to a non-symmetrical interval.
Proof. We prove the confidence interval in three steps: (1) Good-Turing estimator deviation, (2) re-
maining potential deviation, (3) combination of these two inequalities to obtain the final confidence
interval.
Here, the child nodes are assumed to be sampled independently, which is a simplification compared
to the classic missing mass concentration results that relies on negatively associated samples [28, 27].
On the other hand, since we may activate several nodes at once, we need original concentration
arguments to control the increments of both Rn and Rn.
(1) Good-Turing deviations. Let Xn(u) := Un(u)
(cid:88)
u∈A
v :=
E[Xn(u)2] =
1
n2
(cid:88)
n . We have that
E[Un(u)] ≤ λ
n
.
u∈A
Applying Bennett's inequality (Theorems 2.9, 2.10 in [5]) to the independent random variables
Moreover, clearly the following holds: Xn(u) ≤ 1
n .
{Xn(u)}u∈A yields
(cid:32)
(cid:114)
(cid:33)
P
Rn − E[ Rn] ≥
2λ log(1/δ)
n
+
log(1/δ)
3n
≤ δ.
(2)
The same inequality can be derived for left deviations.
Rn =(cid:80)
(2) Remaining potential deviations. Remember that Zn(u) denotes the indicator equal
to 1 if u has never been activated up to trial n. We can rewrite the remaining potential as
u∈A Zn(u)p(u). Let Yn(u) = p(u)(Zn(u) − E[Zn(u)]) and q(u) = P(Zn(u) = 1) = (1 − p(u))n.
11
For some t > 0, we have next that
−t (cid:89)
etYn(u)(cid:105)
E(cid:104)
P(Rn − E[Rn] ≥ ) ≤ e
(cid:16)
= et (cid:89)
−t (cid:89)
u∈A
≤ e
u∈A
q(u)etp(u)(1−q(u)) + (1 − q(u))e
−tp(u)q(u)(cid:17)
exp(p(u)t2/(4n)) = exp(cid:0)−t + t2/(4n)λ(cid:1) .
The first inequality is well-known in exponential concentration bounds and relies on Markov's
inequality. The second inequality follows from [4] (Lemma 3.5).
Then, choosing t = 2n
λ , we obtain
u∈A
(cid:32)
(cid:114)
(cid:33)
P
Rn − E[Rn] ≥
λ log(1/δ)
n
≤ δ.
(3)
We can proceed similarly to obtain the left deviation.
(3) Putting it all together. We combine Lemma 1 with Eq. (2), (3), to obtain the final result.
4 to ensure that both the left and right bounds for the Good-Turing
Note that δ is replaced by δ
estimator and the remaining potential are verified.
4.2 Theoretical guarantees
We now provide an analysis of the waiting time (defined below) of GT-UCB, by comparing it to the
waiting time of an oracle policy, following ideas from [8]. Let Rk(t) be the remaining potential of
influencer k at trial number t. This differs from Rk,n, which is the remaining potential of influencer
k once it has been played n times.
Definition 3 (Waiting time). Let λk = (cid:80)
p(u) denote the expected number of activations
obtained by the first call to influencer k. For α ∈ (0, 1), the waiting time TU CB(α) of GT-UCB
represents the round at which the remaining potential of each influencer k is smaller than αλk.
Formally,
u∈Ak
TU CB(α) := min{t : ∀k ∈ [K], Rk(t) ≤ αλk}.
The above definition can be applied to any strategy for influencer selection and, in particular,
to an oracle one that knows beforehand the α value that is targeted, the spreads (Sk,s)k∈[K],1≤s≤t
sampled up to the current time, and the individual activation probabilities pk(u), u ∈ Ak. A policy
having access to all these aspects will perform the fewest possible activations on each influencer. We
denote by T ∗(α) the waiting time of the oracle policy. We are now ready to state the main theoretical
property of the GT-UCB algorithm.
λmin ≥ 13, for any α ∈(cid:2) 13
λmin , 1(cid:3), if we define τ∗ := T ∗(cid:0)α − 13
λmin
(cid:1), with probability at least 1 − 2K
λmax
Theorem 2 (Waiting time). Let λmin := mink∈[K] λk and let λmax := maxk∈[K] λk. Assuming that
the following holds:
TUCB(α) ≤ τ
∗ + Kλmax log(4τ
∗ + 11Kλmax) + 2K.
The proof of this result is given in Appendix B. Unsurprisingly, Theorem 2 says that GT-UCB
must perform slightly more activations of the influencers than the oracle policy. With high probability
12
– assuming that the best influencer has an initial remaining potential that is much larger than the
number of influencers – the waiting time of GT-UCB is comparable to T ∗(α(cid:48)), up to factor that is
only logarithmic in the waiting time of the oracle strategy. α(cid:48) is smaller than α – hence T ∗(α(cid:48)) is
larger than T ∗(α)– by an offset that is inversely proportional to the initial remaining potential of the
worst influencer. This essentially says that, if we deal with large graphs, and if the influencers trigger
reasonably large spreads, our algorithm is competitive with the oracle.
5 OIMP with influencer fatigue
In our study of the OIMP problem so far, a key assumption has been that the influencers have
a constant tendency to activate their followers. This hypothesis may not be verified in certain
situations, in which the moment influencers promote products that do not align with their image
(misalignement) or persist in promoting the same services (weariness). In such cases, they can expect
their influence to diminish [34, 23]. To cope with such cases of weariness, we propose in this section
an extension to GT-UCB that incorporates the concept of influencer fatigue.
In terms of bandits, the idea of our extension is similar in spirit to the one of Levine et al. [25]: a
new type of bandits – called rotting bandits – where each arm's value decays as a function of the
number of times it has been selected. We also mention the work of Louedec et al. [26] in which the
authors propose to take into account the gradual obsolescence of items to be recommended while
allowing new items to be added to the pool of candidates. In this latter work, the item's value is
modeled by a decreasing function of the number of steps elapsed since the item was added to the
pool of items, whereas in our work – and in that of [25] –, the value is a function of the number of
times the item has been selected.
5.1 Model adaptation
The OIMP problem with influencer fatigue can be defined as follows.
Problem 2 (OIMP with influencer fatigue). Given a set of influencers [K], a budget of N trials,
a number 1 ≤ L ≤ K of influencers to be activated at each trial, the objective of online influencer
marketing with persistence (OIMP) and with influencer fatigue is to solve the following optimization
problem:
(cid:91)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ,
arg max
In⊆[K],In=L,∀1(cid:54)n(cid:54)N
E
S(In)
1(cid:54)n(cid:54)N
knowing that, at the s-th selection of an influencer k ∈ [K], the probability that k activates some
basic node u is:
for γ : N∗ → (0, 1] a known non-increasing function and p(u) ∈ [0, 1].
ps(u) = γ(s)p(u),
Our initial OIMP formulation can be seen as a special instance of the one with influencer fatigue,
where the non-increasing function γ – referred to as the weariness function in the following – is the
constant function n (cid:55)→ 1. We follow the same strategy to solve this new OIMP variant, by estimating
the remaining potential of a given influencer by an adaptation of the Good-Turing estimator. What
makes the problem more complex in this setting is the fact that our hapax statistics must now take
into account the round at which they occured.
13
5.2 The Fat-GT-UCB algorithm
As we did previously, to simplify the analysis, we assume that the influencers have non intersecting
support. We redefine the remaining potential in the setting with influencer fatigue as
Rk(t) :=
1{u never activated}γ(nk(t) + 1)p(u),
(cid:88)
u∈Ak
where p(u) is the probability that the influencer activates node u, independently of the number of
spreads initiated by the influencer. Again, the remaining potential is equal to the expected number
of additional conversions upon starting the t + 1-th cascade from k. The Good-Turing estimator
adapted to the setting with influencer fatigue is defined as follows:
(cid:88)
U γ
nk(t)(u),
Rk(t) =
1
nk(t)
u∈Ak
k,n(u) :=(cid:80)
(cid:17)(cid:115)
(cid:16)
√
1 +
2
γ(i)
1≤i≤n
1{Xk,1(u) = . . . = Xk,i−1(u) = Xk,i+1(u) = . . . = Xk,n(u) = 0, Xk,i(u) =
where U γ
1} γ(n+1)
. In short, if i is the round at which a hapax has been activated, we reweight it by the
factor γ(n + 1)/γ(i) since we are interested in its contribution at the n + 1-th spread initiated by the
influencer. We provide a formal justification to this estimator by computing its bias in Appendix C.
Following the same strategy and principles from the bandit literature, the Fat-GT-UCB adapta-
tion of GT-UCB selects at each step (trial) t the highest upper-confidence bound on the remaining
potential – denoted by bk(t) – and activates (plays) the corresponding influencer k. The upper
confidence bound can now be set as follows (the full details can also be found in Appendix C – see
Theorem 4):
bk(t) = Rk(t) +
λk(t) log(4t)
nk(t)
+
log(4t)
3nk(t)
,
(4)
where Rk(t) is the Good-Turing estimator and
λk(t) :=
γ(nk(t) + 1)
nk(t)
nk(t)(cid:88)
s=1
Sk,s
γ(s)
is an estimator for the expected spread from influencer k.
6 Experiments
We conducted experiments on two types of datasets: (i.) two graphs, widely-used in the influence
maximization literature, and (ii.) a crawled dataset from Twitter, consisting of tweets occurring
during August 2012. All methods are implemented 2 in C++ and simulations are done on an Ubuntu
16.04 machine with an Intel Xeon 2.4GHz CPU 20 cores and 98GB of RAM.
6.1 Extracting influencers from graphs
GT-UCB does not make any assumptions about the topology of the nodes under the scope of
influencers. Indeed, in many settings it may be more natural to assume that the set of influencers is
2The code is available at https://github.com/smaniu/oim.
14
given and that the activations at each trial can be observed, while the topology of the underlying
graph G remain unknown. In other settings, we may start from an existing social network G, in
which case we need to extract a set of K representative influencers from it. Ideally, we should choose
influencers that have little intersection in their "scopes of influence" to avoid useless seed selections.
While this may be interpreted and performed differently, from one application to another, we discuss
next some of the most natural heuristics for selecting influencers which we use in our experiments.
MaxDegree. This method selects the K nodes with the highest out-degrees in G. Note that by
this criterion we may select influencers with overlapping influence scopes.
Greedy MaxCover. This strategy follows the well-known greedy approximation algorithm for
selecting a cover of the graph G. Specifically, the algorithm executes the following steps K times:
1. Select the node with highest out-degree
2. Remove all out-neighbors of the selected node
To limit intersections among influencer scopes even more, nodes reachable by more than 1 hops may
be removed at step (2).
DivRank [29]. DivRank is a PageRank-like method relying on reinforced random walks, with
the goal of producing diverse high-ranking nodes, while maintaining the rich-gets-richer paradigm.
We adapted the original DivRank procedure by inverting the edge directions. In doing so, we get
influential nodes instead of prestigious ones. By selecting the K highest scoring nodes as influencers,
the diversity is naturally induced by the reinforcement of random walks. This ensures that the
influencers are fairly scattered in the graph and should have limited impact on each other.
Influence maximization approximated algorithms. The fourth method we tested in our
experiments assigns uniformly at random a propagation probability to each edge of G, assuming the
IC model. Then, a state-of-the-art influence maximization algorithm – PMC in our experiments – is
executed on G to get the set of K influencers having the highest potential spread.
6.2 Graph datasets
Similarly to [24], we tested our algorithm on HepPh and DBLP, two publicly available collaboration
networks. HepPh is a citation graph, where a directed edge is established when an author cited at
least one paper of another author. In DBLP undirected edges are drawn between authors which have
collaborated on at least one indexed paper. The datasets are summarized in Table 1. We emphasize
that we kept the datasets relatively small to allow for comparison with computation-heavy baselines,
even though GT-UCB easily scales to large data, as will be illustrated in Section 6.3.
Table 1: Summary of the datasets.
Dataset
HepPh DBLP Twitter
# of nodes
# of edges
34.5K 317K 11.6M
2.1M 38.4M
422K
Diffusion models. In the work closest to ours, Lei et al. [24] compared their solution on the
Weighted Cascade instance of IC, where the influence probabilities on incoming edges sum up to
1. More precisely, every edge (u, v) has weight 1/dv where dv is the in-degree of node v. In this
experimental study, and to illustrate that our approach is diffusion-independent, we added two other
diffusion scenarios to the set of experiments. First, we included the tri-valency model (TV), which
associates randomly a probability from {0.1, 0.01, 0.001} to every edge and follows the IC propagation
15
(a) HepPh (WC – Impact of K)
(b) HepPh (WC – Influencer extrac-
tion)
(c) DBLP (WC – Impact of K)
(d) DBLP (WC – Influencer extrac-
tion)
Figure 4: Impact of K and the influencer extraction criterion on influence spread.
model. We also conducted experiments under the Linear Threshold (LT) model, where the edge
probabilities are set like in the WC case and where thresholds on nodes are sampled uniformly from
[0, 1].
Baselines. We compare GT-UCB to several baselines. Random chooses a random influencer
at each round. MaxDegree selects the node with the largest degree at each step i, where the
degree does not include previously activated nodes. Finally, EG corresponds to the confidence-bound
explore-exploit method with exponentiated gradient update from [24]; it is the state-of-the-art method
for the OIMP problem (code provided by the authors). We use this last baseline on WC and TV
weighted graphs and tune parameters in accordance to the results of their experiments: Maximum
Likelihood Estimation is adopted for graph update and edge priors are set to Beta(1, 20). Note that
EG learns parameters for the IC model, and hence is not applicable for LT. These baselines are
compared to an Oracle that knows beforehand the diffusion model together with probabilities. At
each round, it runs an influence maximization approximated algorithm – PMC for IC propagation,
SSA for LT. Note that previously activated nodes are not counted when estimating the value of a
node with PMC or SSA, thus, making Oracle an adaptive strategy.
All experiments are done by fixing the trial horizon N = 500, a setting that is in line with many
real-world marketing campaigns, which are fairly short and do not aim to reach the entire population.
Choice of the influencers. We show in Fig. 4b and 4d the impact of the influencer extraction
criterion on HepPh and DBLP under WC model. We can observe that the spread is only slightly
affected by the extraction criterion: different datasets lead to different optimal criteria. On the
16
100200300400500Trial0.00.20.50.81.01.21.51.8In(cid:131)uenceSpread×104K102050100200100200300400500Trial0.00.20.50.81.01.21.5In(cid:131)uenceSpread×104MaxCoverPMCDivRankMaxDegree100200300400500Trial0.01.02.03.04.0In(cid:131)uenceSpread×104K102050100200100200300400500Trial0.01.02.03.04.0In(cid:131)uenceSpread×104MaxCoverMaxDegreePMCDivRankHepPh network, DivRank clearly leads to larger influence spreads. On DBLP, however, the extraction
method has little impact on resulting spreads. We emphasize that on some other graph and model
combinations we observed that other extraction routines can perform better than DivRank. In
summary, we note that GT-UCB performs consistently as long as the method leads to influencers
that are well spread over the graph. In the following, for each graph, we used DivRank as the
influencer extraction criterion in accordance with these observations.
In Fig. 4a and 4c, we measure the impact of the number of influencers K on the influence spread.
We can observe that, on DBLP, a small number of influencers is sufficient to yield high-quality results.
If too many influencers (relative to the budget) are selected (e.g. K = 200), the initialization step
required by GT-UCB is too long relative to the full budget, and hence GT-UCB does not reach its
optimal spread – some influencers still have a large remaining potential at the end. On the other
hand, a larger amount of influencers leads to greater influence spreads on HepPh: this network is
relatively small (34.5K nodes), and thus half of the nodes are already activated after 400 trials. By
having more influencers, we are able to access parts of the network that would not be accessible
otherwise.
Figure 5: DBLP (WC) – Execution time.
GT-UCB vs. baselines. We evaluate the execution time of the different algorithms in Fig. 5.
As expected, GT-UCB largely outperforms EG (and Oracle). The two baselines require the
execution of an approximated influence maximization algorithm at each round. In line with [2], we
observed that SSA has prohibitive computational cost when incoming edge weights do not sum up
to 1, which is the case with both WC and TV. Thus, both Oracle and EG run PMC on all our
experiments with IC propagation. GT-UCB is several orders of magnitude faster: it concentrates
most of its running time on extracting influencers, while statistic updates and UCB computations
are negligible.
In Fig. 6, we show the growth of the spread for GT-UCB and baselines. For each experiment,
GT-UCB uses K = 50 if L = 1 and K = 100 if L = 10. First, we can see that MaxDegree is a
strong baseline in many cases, especially for WC and LT. GT-UCB results in good quality spreads
across every combination of network and diffusion model. Interestingly, on the smaller graph HepPh,
we observe an increase in the slope of spread after initialization, particularly visible at t = 50 with
WC and LT. This corresponds to the step when GT-UCB starts to select influencers maximizing
bk(t) in the main loop. It shows that our strategy adapts well to the previous activations, and chooses
good influencers at each iteration. Interestingly, Random performs surprisingly well in many cases,
17
100200300400500Trial10−1100101102103104Runningtime(s)OracleEG-CBRandomMaxDegreeGT-UCB(a) HepPh (WC – L = 1)
(b) DBLP (WC – L = 1)
(c) DBLP (WC – L = 10)
(d) HepPh (TV – L = 1)
(e) DBLP (TV – L = 1)
(f) DBLP (TV – L = 10)
(g) HepPh (LT – L = 1)
(h) DBLP (LT – L = 1)
(i) DBLP (LT – L = 10)
Figure 6: Growth of spreads against the number of rounds.
especially under TV weight assignment. However, when certain influencers are significantly better
than others, it cannot adapt to select the best influencer unlike GT-UCB. EG performs well on
HepPh, especially under TV weight assignment. However, it fails to provide competitive cumulative
spreads on DBLP. We believe that EG tries to estimate too many parameters for a horizon T = 500.
After reaching this time step, less than 10% of all nodes for WC, and 20% for TV, are activated.
This implies that we have hardly any information regarding the majority of edge probabilities, as
most nodes are located in parts of the graph that have never been explored.
6.3 Experiments on Twitter
We continue the experimental section with an evaluation of GT-UCB on the Twitter data, introduced
as a motivating example in Section 3. The interest of this experiment is to observe actual spreads,
instead of simulated ones, over data that does not provide an explicit influence graph.
18
100200300400500Trial0.00.51.01.52.0In(cid:131)uenceSpread×104OracleEG-CBRandomMaxDegreeGT-UCB100200300400500Trial0.01.02.03.04.0In(cid:131)uenceSpread×104100200300400500Trial0.00.20.50.81.01.21.51.8In(cid:131)uenceSpread×105100200300400500Trial0.01.02.03.04.05.0In(cid:131)uenceSpread×103OracleEG-CBRandomMaxDegreeGT-UCB100200300400500Trial0.00.20.40.60.81.0In(cid:131)uenceSpread×105100200300400500Trial0.00.20.40.60.81.01.2In(cid:131)uenceSpread×105100200300400500Trial0.00.51.01.52.0In(cid:131)uenceSpread×104OracleRandomMaxDegreeGT-UCB100200300400500Trial0.01.02.03.04.05.0In(cid:131)uenceSpread×104100200300400500Trial0.00.51.01.52.0In(cid:131)uenceSpread×105Figure 7: Twitter spread against rounds: (left) L = 1 (right) L = 10.
From the retweeting logs, for each active user u – a user who posted more than 10 tweets – we
select users having retweeted at least one of u's tweets. By doing so, we obtain the set of potentially
influenceable users associated to active users. We then apply the greedy algorithm to select the
users maximizing the corresponding set cover. These are the influencers of GT-UCB and Random.
MaxDegree is given the entire reconstructed network (described in Table 1), that is, the network
connecting active users to re-tweeters.
To test realistic spreads, at each step, once an influencer is selected by GT-UCB, a random cascade
initiated by that influencer is chosen from the logs and we record its spread. This provides realistic,
model-free spread samples to the compared algorithms. Since Twitter only contains successful
activations (re-tweets) and not the failed ones, we could not test against EG, which needs both kinds
of feedback.
In Fig. 7, we show the growth of the diffusion spread of GT-UCB against MaxDegree and
Random. Again, GT-UCB uses K = 50 if L = 1 and K = 100 if L = 10. We can see that GT-UCB
outperforms the baselines, especially when a single node is selected at each round. We can observe
that MaxDegree performs surprisingly well in both experiments. We emphasize that it relies on
the knowledge of the entire network reconstructed from retweeting logs, whereas GT-UCB is only
given a set of (few) fixed influencers.
6.4 Influencer fatigue
We conclude the experimental section with a series of experiments on Twitter data and taking into
account influencer fatigue.
In a similar way to Section 6.3, we compute the set of potentially influenceable users (the support)
associated to all active users – the set of all users who retweeted at least one tweet from the active
user. We then choose 20 influencers as follows: we take the 5 best influencers, that is, the 5 active
users with the largest support; then, the 51st to 55th best influencers, then, the 501st to 505th best
influencers, and finally the 5 worst influencers. By doing so, we obtain a set of 20 influencers with
diverse profiles, roughly covering the possible influencing outcomes. Ideally, a good algorithm that
takes into account influencer fatigue, would need to focus on the 5 best influencers at the beginning,
but would need to move to other influencers when the initially optimal ones start to lose influence
due to fatigue.
We compare Fat-GT-UCB to GT-UCB, which does not use the influence fatigue function, and
19
100200300400500Trial0.01.02.03.04.0In(cid:131)uenceSpread×104RandomMaxDegreeGT-UCB100200300400500Trial0.00.51.01.52.02.53.03.5In(cid:131)uenceSpread×105RandomMaxDegreeGT-UCBFigure 8: Fat-GT-UCB vs competitors on Twitter logs with (left) γ1, (right) γ2.
to the Random baseline. As in Section 6.3, when an algorithm selects an influencer, we can choose a
random spread from the logs (belonging to the selected influencer), and we can now simulate the
fatigue by removing every user in the spread with probability γ(n), where n is the number of times
the influencer has already been played.
√
We show the results of this comparison in Fig. 8. We tested with two different weariness functions,
namely γ1(n) = 1/n and γ2(n) = 1/
n. We can see that, in both scenarios, Fat-GT-UCB performs
the best, showing that our UCB-like approach can effectively handle the notion of influencer fatigue
in the OIMP problem. Unsurprisingly, GT-UCB performs better with weariness function γ2 than is
does with γ1: the former has a lower diminishing impact and thus, the penalty of not incorporating
fatigue is less problematic with γ2.
7 Other related work
We have already discussed in Section 1 the main related studies in the area of influence maximization.
For further details, we refer the interested reader to the recent survey in [2], which discusses the
pros and cons of the best known techniques for influence maximization. In particular, the authors
highlight that the Weighted Cascade (WC) instance of IC, where the weights associated to a node's
incoming edges must sum to one, leads to poor performance for otherwise rather fast IC algorithms.
They conclude that PMC [31] is the state-of-the-art method to efficiently solve the IC optimization
problem, while TIM+ [36] and IMM [35] – later improved by [30] with SSA – are the best current
algorithms for WC and LT models.
Other methods have been devised to handle the prevalent uncertainty in diffusion media, e.g.,
when replacing edge probability scores with ranges thereof, by solving an influence maximization
problem whose robust outcome should provide some effectiveness guarantees w.r.t. all possible
instantiations of the uncertain model [20, 9].
Methods for influence maximization that take into account more detailed information, such as
topical categories, have been considered in the literature [11, 3, 39]. Interestingly, [32] experimentally
validates the intuition that different kinds of information spread differently in social networks, by
relying on two complementary properties, namely stickiness and persistence. The former can be
seen as a measure of how viral the piece of information is, passing from one individual to the next.
The latter can be seen as an indicator of the extent to which repeated exposures to that piece of
20
100200300400500Trial0.01.02.03.04.05.0Cumrewards×103Fat-GT-UCBGT-UCBRandom100200300400500Trial0.00.20.40.60.81.01.2Cumrewards×104Fat-GT-UCBGT-UCBRandominformation impact its adoption, and it was shown to characterize complex contagions, of controversial
information (e.g., from politics).
8 Conclusion
We propose in this paper a diffusion-independent approach for online and adaptive influencer
marketing, whose role is to maximize the number of activated nodes in an arbitrary environment,
under the OIMP framework. We focus on scenarios motivated by influencer marketing, in which
campaigns consist of multiple consecutive trials conveying the same piece of information, requiring
as only interfaces with the "real-world" the identification of potential seeds (the influencers) and the
spread feedback (i.e., the set of activated nodes) at each trial. Our method's online iterations are
very fast, making it possible to scale to very large graphs, where other approaches become infeasible.
The efficiency of GT-UCB comes from the fact that it only relies on an estimate of a single quantity
for each influencer – its remaining potential. This novel approach is shown to be very competitive on
influence maximization benchmark tasks and on influence spreads in Twitter. Finally, we extend our
method to scenarios where, during a marketing campaign, the influencers may have a diminishing
tendency to activate their user base.
Acknowledgments
This work was partially supported by the French research project ALICIA (grant ANR-13-CORD-
0020).
References
[1] In Duncan Brown and Nick Hayes, editors, Influencer Marketing. Butterworth-Heinemann,
Oxford, 2008.
[2] A. Arora, S. Galhotra, and S. Ranu. Debunking the myths of influence maximization: An
in-depth benchmarking study. In SIGMOD. ACM, 2017.
[3] N. Barbieri, F. Bonchi, and G. Manco. Topic-aware social influence propagation models. Knowl.
Inf. Syst., 37(3):555–584, 2013.
[4] D. Berend and A. Kontorovich. On the concentration of the missing mass.
In Electronic
Communications in Probability, pages 1–7, 2013.
[5] S. Boucheron, G. Lugosi, P. Massart, and M. Ledoux. Concentration inequalities : a nonasymp-
totic theory of independence. Oxford university press, 2013.
[6] D. Brown and S. Fiorella. Influence Marketing: How to Create, Manage, and Measure Brand
Influencers in Social Media Marketing. Always learning. Que, 2013.
[7] S. Bubeck and N. Cesa-Bianchi. Regret analysis of stochastic and nonstochastic multi-armed
bandit problems. Foundations & Trends in ML, 2012.
[8] S. Bubeck, D. Ernst, and A. Garivier. Optimal discovery with probabilistic expert advice: finite
time analysis and macroscopic optimality. Journal of Machine Learning Research, 14(1):601–623,
2013.
21
[9] W. Chen, T. Lin, Z. Tan, M. Zhao, and X. Zhou. Robust influence maximization. In SIGKDD,
pages 795–804, 2016.
[10] W. Chen, Y. Wang, Y. Yuan, and Q. Wang. Combinatorial multi-armed bandit and its extension
to probabilistically triggered arms. JMLR, 17(1), 2016.
[11] N. Du, L. Song, H. Woo, and H. Zha. Uncover topic-sensitive information diffusion networks. In
AISTATS, pages 229–237, 2013.
[12] D. Easley and J. Kleinberg. Networks, Crowds, and Markets - Reasoning About a Highly
Connected World. Cambridge University Press, 2010.
[13] Paul Gillin. The New Influencers: A Marketer's Guide to the New Social Media. Quill Driver
Books, Sanger, CA, 2007.
[14] M. Gomez-Rodriguez, D. Balduzzi, and B. Scholkopf. Uncovering the temporal dynamics of
diffusion networks. In ICML, pages 561–568, 2011.
[15] M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence.
ACM Trans. Knowl. Discov. Data, 5(4), February 2012.
[16] M. Gomez-Rodriguez, J. Leskovec, and B. Scholkopf. Structure and dynamics of information
pathways in online media. In WSDM, pages 23–32, 2013.
[17] I. J. Good. The population frequencies of species and the estimation of population parameters.
Biometrika, 40(3-4):237, 1953.
[18] A. Goyal, F. Bonchi, and L. Lakshmanan. Learning influence probabilities in social networks.
In WSDM, pages 241–250, 2010.
[19] P. Grabowicz, N. Ganguly, and K. Gummadi. Distinguishing between topical and non-topical
information diffusion mechanisms in social media. In ICWSM, pages 151–160, 2016.
[20] X. He and D. Kempe. Robust influence maximization. In SIGKDD, pages 885–894, 2016.
[21] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximizing the spread of influence through a social
network. In SIGKDD, pages 137–146. ACM, 2003.
[22] Paul Lagr´ee, Olivier Capp´e, Bogdan Cautis, and Silviu Maniu. Effective large-scale online
influence maximization. In ICDM, 2017.
[23] Kamiu
Lee.
Influencer
marketing
2.0:
Key
trends
in
2017.
https://influence.bloglovin.com/influencer-marketing-2-0-key-trends-in-2017-a5fb97424cd,
2017.
[24] S. Lei, S. Maniu, L. Mo, R. Cheng, and P. Senellart. Online influence maximization. In SIGKDD,
2015.
[25] Nir Levine, Koby Crammer, and Shie Mannor. Rotting bandits.
In Advances in Neural
Information Processing Systems 30 (NIPS), 2017.
[26] Jonathan Louedec, Laurent Rossi, Max Chevalier, Aur´elien Garivier, and Josiane Mothe.
Algorithme de bandit et obsolescence : un mod`ele pour la recommandation. 2016.
22
[27] D. McAllester and L. Ortiz. Concentration inequalities for the missing mass and for histogram
rule error. JMLR, 4:895–911, 2003.
[28] D. McAllester and R. Schapire. On the convergence rate of good-turing estimators. In COLT,
pages 1–6, 2000.
[29] Q. Mei, J. Guo, and D. Radev. Divrank: The interplay of prestige and diversity in information
networks. In SIGKDD, 2010.
[30] H. T. Nguyen, M. T. Thai, and T. N. Dinh. Stop-and-stare: Optimal sampling algorithms for
viral marketing in billion-scale networks. In SIGMOD, 2016.
[31] N. Ohsaka, T. Akiba, Y. Yoshida, and K. Kawarabayashi. Fast and accurate influence maxi-
mization on large networks with pruned monte-carlo simulations. In AAAI, 2014.
[32] D. Romero, B. Meeder, and J. Kleinberg. Differences in the mechanics of information diffusion
across topics: Idioms, political hashtags, and complex contagion on twitter. In WWW, pages
695–704, 2011.
[33] K. Saito, R. Nakano, and M. Kimura. Prediction of information diffusion probabilities for
independent cascade model. In KES, pages 67–75, 2008.
[34] Cole
Sletten.
fatigue.
https://www.forbes.com/sites/onmarketing/2017/01/24/how-to-prepare-brands-for-influencer-
fatigue, 2017.
influencer
brands
for
How
to
prepare
[35] Y. Tang, Y. Shi, and X. Xiao. Influence maximization in near-linear time: A martingale approach.
In SIGMOD, pages 1539–1554, 2015.
[36] Y. Tang, X. Xiao, and Y. Shi. Influence maximization: Near-optimal time complexity meets
practical efficiency. In SIGMOD, pages 75–86, 2014.
[37] S. Vaswani, B. Kveton, Z. Wen, M. Ghavamzadeh, L. Lakshmanan, and M. Schmidt. Diffusion
independent semi-bandit influence maximization. In ICML, 2017.
[38] S. Vaswani, V.S. Lakshmanan, and M. Schmidt. Influence maximization with bandits. In
Workshop NIPS, NIPS '15, 2015.
[39] S. Wang, X. Hu, P. Yu, and Z. Li. Mmrate:
inferring multi-aspect diffusion networks with
multi-pattern cascades. In SIGKDD, pages 1246–1255, 2014.
[40] D. Watts. Six Degrees: The Science of a Connected Age. W. W. Norton, NY, 2003.
[41] D. Watts and P. Dodds.
Influentials, networks, and public opinion formation. Journal of
Consumer Research, 34(4):441–458, 2007.
[42] Z. Wen, B. Kveton, and M. Valko. Influence maximization with semi-bandit feedback. Technical
report, 2016.
23
Lemma 2 (Bennett's inequality (Theorem 2.9 and 2.10 [5])). Let X1, . . . , Xn be independent
random variables with finite variance such that Xi ≤ b for some b > 0 for all i ≤ n. Let
A Useful Lemmas
S :=(cid:80)n
This implies that, P(cid:16)
i=1 (Xi − E[Xi]) and v :=(cid:80)n
(cid:112)2v log 1/δ + b
E[X 2
log E(cid:2)etS(cid:3) ≤ v
S >
i=1
3 log 1/δ
i ]. Writing φ(u) = eu − u − 1, then for all t > 0,
b2 φ(bt) ≤
(cid:17) ≤ δ.
2(1 − bt/3)
vt2
.
Lemma 3 (Lemma 7 – [4]). Let n ≥ 1, λ ≥ 0, p ∈ [0, 1] and q = (1 − p)n. Then,
qeλp(1−q) + (1 − q)e
−λpq ≤ exp(pλ2/(4n))
qeλp(q−1) + (1 − q)eλpq ≤ exp(pλ2/(4n))
(5)
(6)
B Analysis of the Waiting Time of GT-UCB Algorithm
Proof. Denote by Xs(x) := Us−1(x)
can easily verify that
Lemma 4. For any s ≥ 3, P(cid:16) Rs ≤ Rs−1 − λ
s−1 − Us(x)
e(s−2) −(cid:113) 2λ
s−1 . We can rewrite Rs−1 − Rs =(cid:80)
(cid:18) 1
v(x) := E(cid:2)Xs(x)2(cid:3) = p(x)(1 − p(x))s−2
(cid:32)
(cid:114) 2λ
Rs−1 − Rs ≥ E(cid:104) Rs−1 − Rs
s−1 log(1/δ) − 1
(cid:19)
− 1 − p(x)
≤ p(x)
s − 1
s ≤ 1
Let t > 0. By applying Lemma2, one obtains
s − 1
(cid:33)
(cid:105)
3(s−1) log(1/δ)
(cid:17) ≤ δ.
≤ δ.
P
λ
+
3(s − 1)
e(s−2) , that is, E[ Rs−1 − Rs] ≤
We conclude remarking that E[Xs(x)] = p(x)2(1 − p(x))s−2 ≤ p(x)
e(s−2) .
log(1/δ) +
s − 1
log(1/δ)
λmin ≥ 13. Then, for any α ∈(cid:2) 13
λmin , 1(cid:3), if we define τ∗ := T ∗(cid:0)α − 13
Theorem 3 (Waiting time). Denote λmin := mink∈[K] λk and λmax := maxk∈[K] λk. Assume that
1 − 2K
λmax ,
(cid:1), with probability at least
λmin
x∈A Xs(x) and
(7)
1
s
.
TUCB(α) ≤ τ
∗ + Kλmax log(4τ
∗ + 11Kλmax) + 2K.
Proof. Let us define the following confidence bounds:
(cid:114)
(cid:114)
b+
k,s(t) := (1 +
−
k,s(t) := (1 +
b
√
√
2)
2)
−
k,t(t) :=
c
λ
e(s − 2)
+
3λk log(2t)
s
3λk log(2t)
(cid:114) 6λk log(t)
s
s − 1
+
+
log(2t)
s
,
log(2t)
s
+
λk
s
, and
+
log(t)
s − 1
.
24
Let S > 0. Using these definitions, we introduce the following events:
(cid:110)∀k ∈ [K],∀t > S,∀s ≤ t, Rk,s − b
(cid:110)∀k ∈ [K],∀s ≥ S, Rk,s ≥ Rk,s−1 − c
(cid:111)
−
k,s(t)
,
F :=
G :=
E := F ∩ G.
k,s(t) ≤ Rk,s ≤ Rk,s + b+
−
k,s(t)
(cid:111)
,
Using Theorem 1, Lemma 4 and a union bound, one obtains P(E) ≥ 1 − 2K
S (by setting δ ≡ 1
t3 ).
Indeed,
P(cid:0) ¯E(cid:1) ≤ P( ¯F) + P( ¯G) ≤ 2
K(cid:88)
(cid:88)
(cid:88)
k=1
t>S
s≤t
(cid:88)
t>S
1
t3 = 2K
1
t2 ≤ 2K
S
.
In the following, we work on the event E. Recall that we want to control TU CB(α), the time at
which every influencer attains a remaining potential smaller than α following GT-UCB strategy. We
aim at comparing TU CB(α) to T ∗(α), the same quantity following the omniscient strategy. With
that in mind, one can write:
TU CB(α) = min(cid:8)t : ∀k ∈ [K], Rk,Nk(t) ≤ αλk
(cid:9) ,
∗(α) =
T
∗
k (α), where T
T
k (α) = min{s : Rk,s ≤ αλk} .
∗
K(cid:88)
k=1
Following ideas from [8], we can control TU CB(α) by comparing it to U (α) defined below, and
which replaces the remaining potential by an upper bound on the estimator of the remaining potential
(the Good-Turing estimator). Indeed, recall that we can control this on event F.
(cid:110)
t ≥ 1 : ∀k ∈ [K], Rk,Nk(t) + b+
(cid:111)
k,Nk(t)(t) ≤ αλk
.
U (α) = min
Let S(cid:48) ≥ S. On event E, one has that TU CB(α) ≤ max(S(cid:48), U (α)). If U (α) ≥ S(cid:48), one has
Rk,Nk(U (α)) ≥ Rk,Nk(U (α)) − b
−
k,Nk(U (α))(U (α))
k,Nk(U (α))(U (α)) − c
≥ Rk,Nk(U (α))−1 − b
−
−
k,Nk(U (α))(U (α))
k,Nk(U (α))(U (α)) − c
−
−
k,Nk(U (α))(U (α))
(we are on event F and U (α) > S(cid:48) ≥ S)
(where are on event G)
k,Nk(U (α))−1(U (α))
(cid:17) − b
≥(cid:16)
αλk − b+
The third inequality's justification is more evolved. Let t be the time such that Nk(t) = Nk(U (α))− 1
and Nk(t + 1) = Nk(U (α)). This implies that k is the chosen expert at time t, that is, the one
maximizing the GT-UCB index. Moreover, since t < U (α), one knows that this index is greater
than αλk.
If Nk(U (α)) ≥ S(cid:48) + 2, some basic calculations lead to
Rk,Nk(U (α)) ≥ αλk − 11
λk log(2U (α))
S(cid:48)
− 3 log(2U (α))
S(cid:48)
− 3λk
2S(cid:48)
We denote by λmax := maxk λk. If we take S(cid:48) = λmax log(2U (α)), we can rewrite the previous
inequality as
(cid:114)
Rk,Nk(U (α)) ≥ αλk − 11 − 3
λmax − 3
2
25
Thus, by definition of T ∗
k (α), and if λmax > 6, one gets
α − 13
λk
Nk,U (α) ≤ T
∗
k
(cid:18)
Finally, if we denote by λmin = mink λk, we obtain that
U (α) ≤ K(S
(cid:48) + 2) + T
We now apply Lemma 5. We obtain that
(cid:19)
∗(cid:18)
(cid:48) + 2.
+ S
(cid:19)
.
α − 13
λmin
∗ + Kλmax log (8K + 4τ
U (α) ≤ 2K + τ
We conclude with TU CB(α) ≤ max(S(cid:48), U (α)).
Lemma 5 (Lemma 3 from [8]). Let a > 0, b ≥ 0.4, and x ≥ e, such that x ≤ a + b log x. Then one
has
∗ + 11Kλmax) + 2K.
∗ + 10Kλmax) ≤ τ
∗ + Kλmax log (4τ
Moreover, we add that if b ≥ 3, then x ≤ a + b log(2a + 5b).
x ≤ a + b log(2a + 4b log(4b)).
C Confidence intervals in the influencer fatigue setting
In this section, we consider a single influencer and omit its index k. We recall that we make the
assumption that influencers have non-intersecting support. Thus, after selecting the influencer n
times, the remaining potential can be rewritten
(cid:88)
u∈A
Rn =
1{u never activated }pn+1(u),
– n + 1 because this is the remaining potential for the n + 1th spread – and the corresponding
Good-Turing estimator is
n (u) =(cid:80)n
where U γ
1{X1 = . . . = Xi−1 = Xi+1 = . . . = Xn = 0, Xi = 1} γ(n+1)
γ(i)
.
i=1
(cid:88)
u∈A
1
n
Rn =
U γ
n (u),
Estimator bias. Lemma 6 shows that the estimator of the remaining potential for the influencer
fatigue setting is hardly biased.
Lemma 6. Denoting λ =(cid:80)
u∈A p(u), the bias of the remaining potential estimator is
E[Rn] − E[ Rn] ∈
−γ(n + 1)
(cid:20)
(cid:21)
λ
n
, 0
.
Proof. We have that
E[U γ
n (u)] =
n(cid:88)
i=1
pi(u)
(cid:89)
j(cid:54)=i
(1 − pj(u))
γ(n + 1)
γ(i)
= pn+1(u)
26
n(cid:88)
(cid:89)
i=1
j(cid:54)=i
(1 − pj(u)).
We now can compute the bias of the estimator:
E[Rn] − E[ Rn] =
=
1
n
1
n
(1 − pj(u)) − n(cid:88)
i=1
(cid:89)
j(cid:54)=i
(1 − pj(u))
n(cid:88)
n(cid:89)
(cid:89)
n(cid:88)
n(cid:88)
j(cid:54)=i
i=1
i=1
j=1
i=1
pn+1(u)
u∈A
(cid:88)
(cid:88)
(cid:88)
(cid:34)(cid:88)
u∈A
u∈A
E
u∈A
= − 1
n
= − 1
n
pn+1(u)
(1 − pj(u))[1 − pi(u) − 1]
(cid:89)
(cid:35)
j(cid:54)=i
∈
pn+1(u)
pi(u)
pn+1(u)Un(u)
(1 − pj(u))
(cid:80)
(cid:20)
−
n
u∈A pn+1(u)
(cid:21)
, 0
Note that the random variable Un(u) correspond to the hapax definition given in the original OIMP
problem, that is, Un(u) = 1{u activated exactly once}.
Unsurprisingly, we obtain the same bias for the case where γ is constant equal to 1 (no fatigue).
Confidence Intervals. To derive an optimistic algorithm, we need confidence intervals on the
remaining potential. We operate in three steps:
u∈A
U γ
n (u)
n . We have next that
=
i=1
i=1
(1 − pj(u))
pi(u)
E[U γ
pn+1(u)
n (u)2] =
(1 − pj(u))
(cid:89)
(cid:89)
j(cid:54)=i
1. Good-Turing deviations: Remember that Rn =(cid:80)
Thus, we have that v :=(cid:80)
n(cid:88)
n(cid:88)
E(cid:104) U γ
(cid:32)
Rn − E(cid:104) Rn
(cid:105) ≥
where λn := γ(n)(cid:80)
2. Remaining potential deviations: Remember that Rn =(cid:80)
The same inequality can be derived for left deviations.
j(cid:54)=i
≤ np(u)γ(n + 1).
2λn+1 log(1/δ)
(cid:105) ≤
u∈A p(u).
u∈A pn+1(u)
(cid:114)
n (u)2
n2
1
3n
(cid:80)
u∈A
P
n
.
n
γ(n + 1)2
γ(i)2
γ(n + 1)
γ(i)
(cid:33)
Applying Bennett's inequality to the independent random variables {X γ
n(u)}u∈A yields
+
log(1/δ)
≤ δ,
(8)
u∈A Zn(u)pn+1(u) where Zn(u) =
1{u never activated} = 1{X1(u) = ··· = Xn(u) = 0}. We denote Yn(u) = pn+1(u)(Zn(u) −
27
u∈A
P (Rn − E[Rn] ≥ ) ≤ e
i=1(1 − ps(u)). We have that
E[Zn(u)]) and qn(u) = P(Zn(u) = 1) =(cid:81)n
etYn(u)(cid:105)
E(cid:104)
(cid:16)P(Zn(u) = 1)etpn+1(u)(1−qn(u)) + P(Zn(u) = 0)e
−tpn+1(u)qn(u)(cid:17)
(cid:16)
(cid:18) pn+1(u)t2
(cid:80)
u∈A pn+1(u) ),
−t (cid:89)
−t (cid:89)
−t (cid:89)
−t (cid:89)
qn(u)etpn+1(u)(1−qn(u)) + (1 − qn(u))e
Minimizing on t, we obtain (for t =
(cid:19)
≤ e
u∈A
u∈A
u∈A
= e
= e
exp
4n
2n
−tpn+1(u)qn(u)(cid:17)
(by Eq. 9 in Lemma 7)
P (Rn − E[Rn] ≥ ) ≤ exp
(cid:18)
(cid:80)
−2n
u∈A pn+1(u)
(cid:19)
.
We can proceed similarly to obtain the left deviation.
Putting it all together, we obtain the following confidence intervals in Theorem 4, which can be
used in the design of the optimistic algorithm Fat-GT-UCB.
Theorem 4. With probability at least 1 − δ, for λn = γ(n)(cid:80)
(cid:113) λn+1 log(4/δ)
+ 1
3n log 4
δ , the following holds:
n
u∈A p(u) and βn := (cid:0)1 +
2(cid:1) ×
√
Lemma 7 (Adaptation of Lemma 3.5 in [4]). Let n ≥ 1, p ∈ [0, 1], γ : N → [0, 1] a non-increasing
function and t ≥ 0. We denote pn = γ(n)p and qn =(cid:81)
i≤t(1 − pi).
−βn − λ
n
≤ Rn − Rn ≤ βn.
(a) qnetpn(1−qn) + (1 − qn)e
−tpnqn ≤ exp
(b) qnetpn(qn−1) + (1 − qn)etpnqn ≤ exp
(cid:19)
(cid:18) pnt2
(cid:19)
(cid:18) pnt2
4n
4n
(9)
(10)
(cid:19)
.
t2p2
n
n = (1 − pn)n. Clearly, qn ≤ q(cid:48)
n.
Proof. Let q(cid:48)
(a) Using Theorem 3.2 in [4] with p ≡ qn and t ≡ tpn, we have that,
1 − 2qn
(cid:18)
qnetpn(1−qn) + (1 − qn)e
−tpnqn ≤ exp
4 log((1 − qn)/qn)
So it suffices to show that
(1 − 2qn)t2p2
n/4 log((1 − qn)/qn) ≤ pnt2/4n,
or equivalently,
(1 − 2qn)pn log((1 − qn)/qn) ≤ log(1 − pn)/ log(q
(cid:48)
n).
28
Rearranging, we obtain,
L(qn, q
(cid:48)
n) :=
(1 − 2qn) log(1/q(cid:48)
n)
log((1 − qn)/qn)
≤ 1/ log(1 − pn)
pn
:= R(pn).
As is [4], we show that L ≤ 1 ≤ R. The second inequality is true (see [4]).
the left-hand side is negative and thus, L(qn, q(cid:48)
right-hand side as L(qn, q(cid:48)
in [4]. This concludes the proof.
The left-hand side can be written L(qn, q(cid:48)
n) ≤ (1−2qn) log(1/qn)
log((1−qn)/qn)
n). Clearly, L2(q(cid:48)
n) ≥ 0. If L1(qn) ≤ 0,
n) = L1(qn)L2(q(cid:48)
n) ≤ 1. Else, L1(qn) ≥ 0, we can upper bound the
(because qn ≤ q(cid:48)
n), which is proven to be less than 1
(b) It is shown in the proof Lemma 3.5 (b) in [4] that
(cid:105) ≤ 1
t2p2
n
t2pn
4 log qn/ log(1 − pn)
=: R(qn).
(cid:104)
L(t) :=
1
t2p2
n
log
−tpn(1−qn) + (1 − qn)etpnqn
qne
It suffices to show that R(qn) ≤ R(q(cid:48)
n) to obtain the desired inequality. This is true because
0 ≤ log(1 − pn)
log qn
≤ log(1 − pn)
log q(cid:48)
n
.
29
|
1707.05213 | 5 | 1707 | 2018-12-23T00:38:21 | Balance of thrones: a network study on Game of Thrones | [
"cs.SI"
] | TV dramas constitute an important part of the entertainment industry, with popular shows attracting millions of viewers and resulting in significant revenues. Finding a way to explore formally the social dynamics underpinning these show has therefore important implications, as it would allow us not only to understand which features are most likely to be associated with the popularity of a show, but also to explore the extent to which such fictional world have social interactions comparable with the real world. To begin tackling this question, we employed network analysis to systematically and quantitatively explore how the interactions between noble houses of the fantasy drama TV series Game of Thrones change as the show progresses. Our analysis discloses the invisible threads that connected different houses and shows how tension across the houses, as measure via structural balance, changes over time. To boost the impact of our analysis, we further extended our analysis to explore how different network features correlate with viewers engagement and appreciation of different episodes. This allowed us to derive an hierarchy of features that are associated with the audience response. All in all, our work show how network models may be able to capture social relations present in complex artificial worlds, thus providing a way to qualitatively model social interactions among fictional characters, hence allowing a minimal formal description of the unfolding of stories that can be instrumental in managing complex narratives. | cs.SI | cs | Balance of thrones: a network study on Game of
Thrones
Dianbo Liu1,2,3,* and Luca Albergante2,4,5,6,7
1Computer Science and Artificial Intelligence Lab, Massachusetts Institute of Technology, Cambridge,MA,USA
2School of Life Sciences, University of Dundee, Dow Street, Dundee, UK
3The Broad Institute of MIT and Harvard,Cambridge,MA,USA
4Computational and Systems Biology of Cancer, Institut Curie, Paris, France
5PSL Research University, Paris, France
6Institut National de la Sant´e et de la Recherche M´edicale U900, Paris, France
7Mines ParisTech, Paris, France
*Corresponds to: [email protected]
ABSTRACT
TV dramas constitute an important part of the entertainment industry, with popular shows attracting millions of viewers and
resulting in significant revenues. Finding a way to explore formally the social dynamics underpinning these show has therefore
important implications, as it would allow us not only to understand which features are most likely to be associated with the
popularity of a show, but also to explore the extent to which such fictional world have social interactions comparable with the
real world. To begin tackling this question, we employed network analysis to systematically and quantitatively explore how the
interactions between noble houses of the fantasy drama TV series Game of Thrones change as the show progresses. Our
analysis discloses the invisible threads that connected different houses and shows how tension across the houses, as measure
via structural balance, changes over time. To boost the impact of our analysis, we further extended our analysis to explore
how different network features correlate with viewers engagement and appreciation of different episodes. This allowed us to
derive an hierarchy of features that are associated with the audience response. All in all, our work show how network models
may be able to capture social relations present in complex artificial worlds, thus providing a way to qualitatively model social
interactions among fictional characters, hence allowing a minimal formal description of the unfolding of stories that can be
instrumental in managing complex narratives.
8
1
0
2
c
e
D
3
2
]
I
S
.
s
c
[
5
v
3
1
2
5
0
.
7
0
7
1
:
v
i
X
r
a
1
Introduction
Network modeling is a powerful tool to represent interactions between different agents (usually called nodes), which can
represent either physical or abstract entities1, 2. Once, a network has been constructed, it can be used to formally explore the
different features observed, and hence to quantitatively assess the modes of interaction among the agents. Social sciences have
a long history of using networks to explore human interactions3, with the classical experiment of Milgram, paving the way to
popular concepts like social hubs and six degrees of separation between individuals.
While many theoretical approaches focused on studying the structures of networks with only one type of interaction (e.g.,
network of friends), in a few cases authors considered more rich models, where each interaction is associated with one of
more interaction types. One of such theories is behind the concept of structural balance4 -- 7. In this theory, the nodes represent
individuals that can form positive or negative relationships with the others. Using a theoretical approach it is also possible to
show that the system will converge toward two ideal states: either all the individual display a positive attitude or the individuals
forms two camps displaying a negative attitude towards each other8.
Network analysis has been extensively applied in the field of social sciences9, but its application to the study of dynamical
changes of a social network over time are more limited, partly due to the complexity of controlling confounding factors such as
uncontrollable external event. We therefore sought to explore the potential of network modeling to explore the isolated fictional
world where the popular American fantasy drama TV series Game of Thrones takes place. The series has been adapted from
George Martin's novel A Song of Ice and Fire10 and has multiple interconnected plot lines and we decided to focus on the story
arc unfolding on the fictional continent "Westeros" where noble houses of the "Seven Kingdoms" fight for the "Iron Throne" or
independence. In employing network analytics to explore the structures and dynamics of the popular TV show, we assessed
whether network theory could be used to quantify the changes associated with the evolution of the story and to gain insight into
the reaction of the viewers to such changes11 -- 14.
Results
0.1 Constructing a social network of houses
Instead of focusing on individual characters of the drama, we decided to model the interactions among large meta-entities, such
as major noble houses, armies, religious groups and other groups with significant political influences. Networks of relationships
among the meta-entities were built for each episode in the first six seasons of the Game of Thrones TV series, in such a way to
explore the changes episode by episode. To provide a more focused interpretation, the analysis was restricted to interactions
that took places in 'Westeros', a frictional isolated continent where most of the actions are localized. Hence, events that took
places beyond 'the wall' and to the east of 'the Narrow Sea' were not taken into consideration.
The complicated relationships among the meta-entities were abstracted and represented using a signed networks. Each node
indicates a meta-entity and each edge represents a political relationship between two entities (Figure 1). A edge was marked as
either positive (colored in blue in the figures) -- if the two entities were on friendly terms during the episode -- or negative
(colored in red in the figures) -- if the relationship was hostile. Only political relationship involving actual interactions were
taken into account. If two entities were indifferent to each other or did not have real interactions, no edge was drawn between
the two nodes.
0.2 Large-scale properties of the networks
As a first step in exploring structural patterns in the relationships among the meta-entities, large-scale network properties were
considered, starting with degree-based measures. The degree of a node in a network is the number of direct edges connecting
this note to the others and is related with the importance of a node in the network15, as node with larger degree interact with
more entities. When the degree of all of the nodes was derived for the network associated with each episode (Figure 2A), we
found that the political entities taking part in most of the story lines, such as 'House of Stark' and 'House of Lannister', are
associated with nodes possessing a very high degrees throughout a large part of the episodes considered. This is intuitively
understandable as a highly active house, or army, is more likely to have interactions with others.
To further this analysis, and find potentially less obvious connections between the houses, we considered the correlation
of degrees among different entities(Figure 2B) and across episodes(Figure 2C). Degree correlation among houses suggested
similarity in dynamics of importances in the story. First of all, it is interesting to note a predominance of positive correlations
in both representations. From the meta-entities points of view, this supports the ideas that most meta-entities tend to adjust
the number of interaction in a coordinated way, suggesting the idea that the proportion of total number of interactions remain
somewhat stable over the episodes. While from the episode point of view, this indicates that, across episodes, the number of
interactions distribute in a somewhat proportional way.
Looking at the dendrograms accompanying the plots it is also possible to observe a number of strongly defined clusters.
One example is the strong correlation between the degrees of the 'House of Frey' and 'House of Tully'. In the show, these
two houses were geologically located close to each other and had complicated political interactions, this justifying the finding.
Another interesting observation is the high correlation between the "the Sparrows" and "Laddy Melisandre", both of which
were representatives of religious group and were heavily involved in political conflicts, which suggested that some common
patterns of how religions influenced on the progresses of the story.
Looking at the correlation episode-wise, our analysis highlights how the different episodes from the same season tend to be
closed together in term of clustering (see row annotations of Figure 2C). Overall, this suggests that different seasons mostly
contained episodes with coherent importance groups, as expected from the flow of the story. Looking at the data from a more
general point of view, we can also observe cross-season connections. For example, season 3 to 5 were quite similar to each
other (see the lower half of the heatmap) while season 1 occupy a rather independent place.
Network theory employs the notion of centrality to measure the extent to which a node is situated at the center of the network
and hence is structurally positioned to influence, either directly or indirectly, a large part of the network. One classical measures
of centrality is betweenness centrality, which measures the number of shortest path passing trough a node15. According to our
analysis, major political entities in the story had high betweenness centrality scores throughout the episodes, as expected. On
the other hand political entities that are geologically isolated by 'the narrow sea' or 'the wall' generally had lower betweenness
centrality scores, e.g. 'the Night's Watch'(Figure 2D). As we did for the degree, we computed the correlation of the betweenness
centrality score between each house and each episode (Figure 2E and 2F). Two medium-size clusters emerged from the analysis
with the bigger one containing the 'House of Lannister' and the political entities that had strong interactions with it (Figure 2E).
Additionally, most episodes in season 3 to 5 formed again a big cluster, consistent with degree analysis.
Assortativity measures the tendency of nodes to connect to similar nodes in the network15, 16 and can be considered for
different properties. For example, Assortativity by degree is the tendency of a node to be directly connected to others with
similar degrees and assortativity by betweenness centrality is the tendency of a node to be directly connected to others with
similar betweenness centrality. In both scenarios, negative assortative scores were observed in most of the episodes (Figure 2G
and Figure2H), indicating that nodes with similar properties tended not to be connected. Not all the entities were present in all
the episodes of the first six seasons. Presence and absence of the entities were summarized in figure 2I.
0.3 Changes of relationships correlated with number of votes and ratings from viewers
Figures 2A and 2D suggested that substantial changes were present in the topological structure of the network as the story
progressed, and hence that the interactions among the meta-entities changed perceivably across episodes. To further investigate
this issue and better interpret the results of our analysis, we classified network changes from one episode to the next into three
categories: 1) 'relationship establishment' (a new edges was added, indicating the establishment of a new relationship), 2)
'relationship flipping' (the sign of a edges was changed, indicating that allies became enemies or enemies became allies), and 3)
'relationship disruption' (an edge was removed, indicating a previously present relationship was removed due to either two
entities ceasing to interact or to the removal of one, or both, of the interacting entities). The establishment of a new relationship
was the most frequent change, followed by flipping and disruption (3A and C). It is also worth mentioning that while most new
relationships were formed between existing political entities (87.5% of the changes), relationship disruption was mostly due to
the elimination of entities (Figure 3 3B).
0.4 Dynamics of structural balance of the network were different from real social networks
Although a network representation is a powerful way to describe the structure of a system of interacting entities, the actual
dynamics of the system depends on many specificities that are abstracted away when a network is produced. Nonetheless, it
is sometime possible to associate certain types of dynamics with particular network structures17 -- 20. In the context of social
interaction, the theory of structural balance has been used to formally explore how positive (e.g., friendship) and negative (e.g.,
hate) interactions can produce situations that are more or less balanced due to the psychological stress of the interacting agents.
Structural balance is grounded in social psychology theories pioneered by Heider in 1940s4 and has been previously used to
study the evolution of human interactions in different contexts8.
Structural balance is based on classifying triads (i.e., a groups of three entities that interact with each other), into balanced
and unbalanced depending on the sign of the interactions. More formally, given two meta-entities of 'Game of Thrones' i and j,
we associate a value to the edge Si j connecting the two entities so that Si j = 1 if they are allies and Si j = −1 if they are enemy.
Then, a triad consisting of three meta-entities i , j and k is balanced if Si j · S jk · Sik = 1 and imbalanced if Si j · S jk · Sik = −1. The
idea of balanced is based on the intuitive notion that if all of the members of the triad are allied (all edge are positive) or two
members of the triad are allied against the third one (exactly one edge is positive), then the situation is balanced and there is not
pressure for the members of the triad to change mode of interaction. In all the other cases, at least one of the member is under a
pressure that will produce an imbalance and hence a likely change8. A network is said to be balanced if each constituent triad is
balanced (Figure 4).
It was suggested that in social and political networks, relationships change to minimize the number of imbalanced triads8.
However, such trend seems to be absent in the network of Game of Thrones. The number and percentage of imbalanced
3/11
triads through the first 6 seasons seemed to fluctuate over time with an average value of 4.75 which corresponded to about 30
percentages of all triads (Figure 5A and 5B). This phenomenon can be interpreted as a strategy by the author, directors and
screenwriters to keep the story engaging, since in a balanced network, no political entity would be pressured to change and the
story would potentially stall. Interestingly, a temporary tendency towards balance was observed at the beginning of the show
when two dominating alliances initiated a total war against each other ('the War of Five Kings'). However this balance was
broken as with the story progresses (or perhaps was broken to allow the story to progress).
The change of friendly relationship to hostile or the introduction of hostile interaction between previous non-interacting
entities were the most common expedients to introduce imbalance in the networks (Figure 5B), while the level of imbalance
was reduced mainly by eliminating hostile interactions via the disappearance of political entities (Figure 5C).
The average numbers of imbalanced triads each house was contributing to over the evolution of the story were also
considered (Figure 5D). Hub of imbalance, and thus thus instability, can be identified by our analysis. These hubs were
associated with houses that are involved in many stories lines of the TV series, such as 'Stark' and 'Lannister'. To better assess
this result, we also explored to which extent, the result observed was compatible with randomized networks (i.e. network
obtained by shuffling interaction between the entities while maintaining the degree of each entity unvaried). This analysis
suggests that most of the entities were taking part in a number of imbalanced triads that is lower than expected by chance alone
and hence that the story introduced a controlled mix of balanced and imbalanced triads, in such a way to prevent the system
from being overwhelmed by tensions, due to a large number of imbalanced triads, and to avoid creating a completely balanced
systems, which would have no pressure to change.
0.5 Strategy to introduce unpredictability
Unpredictable twists in the storyline of a TV show are common expedients to keep viewers engaged and introduce new plot
elements. Using our analytical framework, we sought to quantify the extent to which this is happening in Game of Thrones. To
this end, we classified triads into different types according to types of interaction present (Figure 4). Establishment, elimination
and change of type of all triads present in at least one episode of the show are summarized in Figure 6A. Triads of type 3,
corresponding to balanced situations where two allies are hostile towards a common enemy, were the most frequently affected
by changes, with ¿47% of triad formation, ¿86% of triad state changes and ¿40% of triad disappearance.
One possible explanation for this finding is that triads of type 3 can be transformed into any of the two imbalanced triads
by changing the type of only one edge. Therefore, this type of triads provides a balance starting point that can subsequently
be used to introduce imbalance in a more soft way. Hence type 3 triads can be used to start a story arc and potentially to let
it die. Indeed, we found that a large number of type 3 triads get destroyed, which was a good proxy for the end of a subplot.
Moreover, we can see that many triads changed from, and into, type 3, indicating that the interaction mode supported by this
triad was a common intermediate step (Figure 6A).
Since triads of type 2 and 3 can be both changed into two different types, we reasoned that they could be used as proxy of
the unpredictability of the story (as in both cases two choices are possible, in addition to the removal of the triad). To better
quantify the level of unpredictability as previously defined, we introduced an unpredictability score defined as
U =
T3 + T2
∑i Ti
where Ti is the number of triads of state i. U takes values between 0 and 1, indicating, respectively, low and high unpredictability.
Our analysis suggests that unpredictability peaks in season 2 during "the War of Five Kings" which were two major wars
happened in Game of Thrones.
0.6 Correlation between network properties and viewers' responses
Up to this point, a number of network topological and dynamic features of the Game of Thrones network have been explored.
One question that could be asked is whether these network properties could be used to dissect viewers' responses to the TV
show and therefore estimate how interesting the story is.
Viewers' votes and ratings were both taken into consideration in this study. Number of votes and viewers' ratings are
organized for each episode (Figure ?? a and c). Spearman partial correlation was conducted to understand potential correlation
between votes or ratings with a variety of network properties. Number of nodes, number of edges , number of edge changes ,
percentage of imbalanced triads , number of triads and assortativity were included into this analysis. P values of association of
votes with different network properties are 0.66, 0.99,0.79 ,0.29, 0.68, 0.0017 respectively. The correlation coefficients are
-0.059,0.00041 ,-0.036 ,0.14 ,-0.056 ,0.41 (Figure ?? b). This indicated that network assortativity has a significant positive
correlation with number of vote for each episode. P values of association of ratings with the network properties are 0.064,
0.42,0.88 ,0.98,0.93, 0.14 respectively. The correlation coefficients are -0.25 ,0.11, 0.020, -0.0033, 0.011,0.20 (Figure ?? d).
This shows that larger numbers of nodes of the interaction networks likely correlates with lower ratings.
4/11
1 Discussion
Structures and dynamics of complex systems or stories consisting of many entities and relationships are usually difficult to
understand and simplified model can be very effective in exploring the key properties of such systems. In this article we
followed this philosophy and employed network modeling to quantify structural changes over the story arc of the Game of
Thrones TV show by capturing both topological and dynamics changes in a systematic way.
The relationship network was abstracted at the level of noble houses or political entities to rely on a high level representation
that limits the uncertainty associated with single characters. Degree distribution and centrality of the network were shown
to be an efficient way to identify important political entities. The fact that the major houses of the story, such as "House of
Lannister" and "House of Stark", had much higher numbers of connections than others is consistent with findings in other
networks and provides a formal way to asses their importance in the unfolding of the story. The negative assortativity observed
in the network has structural similarities to natural systems such as marine food web, with minor entities gravitating around
major players. Such structure is also quite dissimilar to human systems such as co-authorship networks. Overall, this seems
to suggest a somewhat fractal organization of the story that allows the authors to concentrate on story arcs tightly associated
with major players, while allowing a large number of minor plots entangled with the mayor story. Hence allowing a multilevel
story-telling that can be engaging for different viewer types and may contribute to boost the interest in the show.
In addition to static topologies, the dynamics of the network was tracked through the 60 episodes composing the first six
seasons of the show. The positive correlation identified between number of edges changes per episode and viewer's votes
suggested that dramatic changes in relationships between houses can make the series more attractive to audiences, perhaps as a
consequence of the reorganization in the balance of powers.
Furthermore, since the edges of the network can be associated with an positive or negative interaction between the entities,
the theory of structural balance can be employed to explore how different types of three-body interactions contribute to the
evolution of the story. This dynamic analysis allows us to explore the preferred story-telling structures in a formally sound
way, highlighting the different importances of the various interaction modes and suggesting effective ways to unfold story in a
natural, but still engaging, way. To our best knowledge, this is the very first time structural balance theory was used to explore
the dynamics of fiction and TV series.
The results from partial correlation analysis suggest that assortivity and number of nodes correlated with viewer's responses.
The assortativity coefficient measures the tendency of nodes to connect to similar nodes in the network. Its correlation with
number of votes possibly reflects clustering of similar houses in sense of interaction patterns raise population of the show
among audiences. On the other hand, the negative correlation between number of nodes and ratings potentially suggest that an
over complex story is not favored by the viewers.
Writing a novel or a TV show is a complex process that requires skills and imagination. Successful authors are able to create
stories that stimulate the interest of the readers or viewers, by engaging fictional worlds with their own life. By employing a
mathematical approaches to analyze such fictional stories, we were able to show how formal methods can be used to provides
new perspectives that complement more classical text analysis. All in all, our works suggest that the methods developed in the
context of network theory can complement the tool sets already available to story writers to plan and explore how the dynamics
of interaction among single fictional entities contribute to the complex web of relationships that support unforgivable stories.
Methods
1.1 Construction of relationship network
Each major political entity located on 'Westeros' or possessing strong connections with entities on 'Westeros' was modeled
as node in a network. If a house split into more than political entities, they were considered different nodes. One example is
the 'House of Baratheon', that split into one army led by Stannis and another army led by Renny. If two nodes have actually
interactions with each other, a edge is included between them. All the edges are associated with a color indicating the type of
interaction. Friendly relationships were marked as positive (blue) and hostile relationships were marked as negative (red)(Figure
1). If two entities did not interacted directly, no edge was included between the corresponding nodes. For certain edges, where
the relationships were complicated, only the effects of real actions were taken into consideration.
1.2 Dynamics of the the network
Changes of nodes and edges were tracked at the resolution of each episode and statuses of nodes and episodes at the end of each
episode were compared. Network analysis in this article were conducted using igraph package in R environment (version3.4).
1.3 Number of votes and rating from viewers
The votes and rating from viewers were downloaded from IMdb http://www.imdb.com/title/tt0944947/eprate
on August the 2nd, 2017. Both quantities were normalized by dividing over the mean of each season. This was done to account
for potential variation in popularity of the show across seasons.
5/11
1.4 Network randomization
To estimate the expected number of imbalanced triad each node was entangled in, signs of edges in each episode were randomly
shuffled. A total of 30 different randomized networks were combined to calculate the expected number of imbalanced triads.
1.5 Data and code availability
The network data and the code used to write the article are available at https://github.com/kaiyuanmifen/
BalanceOfThrones.
References
1. Newman, M. E. The structure and function of complex networks. SIAM review 45, 167 -- 256 (2003).
2. Newman, M., Barabasi, A.-L. & Watts, D. J. The structure and dynamics of networks (Princeton University Press, 2011).
3. Barabasi, A.-L. Linked: How everything is connected to everything else and what it means. Plume Ed. (2002).
4. Heider, F. Attitudes and cognitive organization. The J. psychology 21, 107 -- 112 (1946).
5. Cartwright, D. & Harary, F. Structural balance: a generalization of heider's theory. Psychol. review 63, 277 (1956).
6. Harary, F. & Kabell, J. A. A simple algorithm to detect balance in signed graphs. Math. Soc. Sci. 1, 131 -- 136 (1980).
7. Kunegis, J. et al. Spectral analysis of signed graphs for clustering, prediction and visualization. In Proceedings of the 2010
SIAM International Conference on Data Mining, 559 -- 570 (SIAM, 2010).
8. Antal, T., Krapivsky, P. L. & Redner, S. Social balance on networks: The dynamics of friendship and enmity. Phys. D:
Nonlinear Phenom. 224, 130 -- 136 (2006).
9. Waumans, M. C., Nicod`eme, T. & Bersini, H. Topology analysis of social networks extracted from literature. PloS one 10,
e0126470 (2015).
10. Martin, G. R. A Song of Ice and Fire (Bantam, 1997).
11. Facchetti, G., Iacono, G. & Altafini, C. Computing global structural balance in large-scale signed social networks. Proc.
Natl. Acad. Sci. 108, 20953 -- 20958 (2011).
12. Marvel, S. A., Kleinberg, J., Kleinberg, R. D. & Strogatz, S. H. Continuous-time model of structural balance. Proc. Natl.
Acad. Sci. 108, 1771 -- 1776 (2011).
13. Antal, T., Krapivsky, P. L. & Redner, S. Dynamics of social balance on networks. Phys. Rev. E 72, 036121 (2005).
14. Beveridge, A. & Shan, J. Network of thrones. Math Horizons 23, 18 -- 22 (2016).
15. Newman, M. Networks: an introduction (Oxford university press, 2010).
16. Newman, M. E. Assortative mixing in networks. Phys. review letters 89, 208701 (2002).
17. Alon, U. An Introduction to Systems Biology: Design Principles of Biological Circuits (Chapman & Hall/CRC Mathemati-
cal and Computational Biology) (Chapman and Hall/CRC, 2006), 1 edn.
18. May, R. M. Qualitative stability in model ecosystems. Ecology 54, 638 -- 641 (1973). DOI 10.2307/1935352.
19. Albergante, L., Blow, J. J. & Newman, T. J. Buffered qualitative stability explains the robustness and evolvability of
transcriptional networks. eLife 3, e02863 (2014). DOI 10.7554/eLife.02863.
20. Liu, D., Albergante, L. & Newman, T. J. Universal attenuators and their interactions with feedback loops in gene regulatory
networks. Nucleic Acids Res. 45, 7078 -- 7093 (2017). DOI 10.1093/nar/gkx485. /oup/backfile/content_public/
journal/nar/45/12/10.1093_nar_gkx485/1/gkx485.pdf.
Acknowledgements
We would like to thank Timothy Newman, Rana Al Mamun, and Sam Palmer for interesting discussions and insights.
Author contributions statement
DL constructed the networks, provided original concepts, developed the code to perform the analysis, and wrote the manuscript.
LA provided original concepts, supervised the work, and wrote the manuscript.
6/11
Figure 1. Network of relationships among meta-entities in Game of Thrones. This network models the last episode of season
six. Only activities on the 'Westeros' continent were taken into consideration.
7/11
Figure 2. Large Scale Properties of the networks. (A) Node degree (connections to other node) of each noble houses/political
entity in season 1-6 of Game of Thrones. (B) Correlation between the node degrees by house across the the episodes. (C)
Correlation between the node degrees by episode across houses. (D) Betweenness centrality of each houses/political entity. (E)
Correlation of betweenness centrality by episode across the the houses. (F) Correlation of betweenness centrality by house
across the the episodes. (G) Changes of assortativity by degree over the first six seasons of the TV series. (H) Changes of
assortativity by betweenness over the first six seasons of the TV series. (I) Presence(red) and absence(blue) of different entities
over time.
Figure 3. Changes of edges in the network overtime.(A) Formation of new edges was more frequent than flipping signs and
removal of edges. (B) Most new edges were formed between existing nodes (blue). Most edge removals were coupled with
elimination of political entities (brown). (C) Changes of edges in each episode.
8/11
Figure 4. Structural balance. The complex network of Game of Thrones can be divided into a large number of constituent
triads. If everyone is allied or if any two members are allied against a common enemy, the triad is balanced. If everyone is
hostile to others or a single entity is allied to two entities that are enemies with each other, then the triad is imbalanced. A
network is balanced if each constituent triad is balanced8
9/11
Figure 5. Structural balance of the network. (A) Number of different types of triads (upper panel) and number of imbalanced
triads over time (lower panel).(B) Percentage of balanced (upper panel) and imbalanced triads (upper and lower panel) over
time. (C) Contribution of different types of edge changes to the increase in the number of imbalanced triads. "+" stands for
positive edge , '-' for negative 'edge', and '0' represents the absence of relationship. (D) Contribution of different types of edge
changes to the decrease in the number of imbalanced triads. (E) Average number of imbalanced triads per episode for each
entity. Red bars indicate the real data extracted from 'Game of Thrones' and blue bars indicate the expected number of
imbalanced triads from randomised networks. Error bars indicate standard deviation.
10/11
Figure 6. Statistics of dynamics of triads.(A)Summary of all triads changes in the first six seasons. A large percentage of
changes involved triads of state 3(B)Changes of levels of unpredictability of the network over time. The level reached 100%
during the "the War of Five Kings"
11/11
|
1812.00076 | 1 | 1812 | 2018-11-30T22:18:45 | Scalable Graph Learning for Anti-Money Laundering: A First Look | [
"cs.SI",
"cs.AI",
"cs.LG"
] | Organized crime inflicts human suffering on a genocidal scale: the Mexican drug cartels have murdered 150,000 people since 2006, upwards of 700,000 people per year are "exported" in a human trafficking industry enslaving an estimated 40 million people. These nefarious industries rely on sophisticated money laundering schemes to operate. Despite tremendous resources dedicated to anti-money laundering (AML) only a tiny fraction of illicit activity is prevented. The research community can help. In this brief paper, we map the structural and behavioral dynamics driving the technical challenge. We review AML methods, current and emergent. We provide a first look at scalable graph convolutional neural networks for forensic analysis of financial data, which is massive, dense, and dynamic. We report preliminary experimental results using a large synthetic graph (1M nodes, 9M edges) generated by a data simulator we created called AMLSim. We consider opportunities for high performance efficiency, in terms of computation and memory, and we share results from a simple graph compression experiment. Our results support our working hypothesis that graph deep learning for AML bears great promise in the fight against criminal financial activity. | cs.SI | cs |
Scalable Graph Learning for Anti-Money
Laundering: A First Look
Mark Weber
Jie Chen
Toyotaro Suzumura
MIT-IBM Watson AI Lab
MIT-IBM Watson AI Lab
MIT-IBM Watson AI Lab
IBM Research
IBM Research
IBM Research
[email protected]
[email protected]
[email protected]
Aldo Pareja
Tengfei Ma
Hiroki Kanezashi
MIT-IBM Watson AI Lab
MIT-IBM Watson AI Lab
MIT-IBM Watson AI Lab
IBM Research
IBM Research
IBM Research
[email protected]
[email protected]
[email protected]
Tim Kaler
Charles E. Leiserson
Tao B. Schardl
MIT-IBM Watson AI Lab
MIT-IBM Watson AI Lab
MIT-IBM Watson AI Lab
MIT CSAIL
[email protected]
MIT CSAIL
[email protected]
MIT CSAIL
[email protected]
Abstract
Organized crime inflicts human suffering on a genocidal scale: the Mexican drug
cartels have murdered 150,000 people since 2006; upwards of 700,000 people per
year are "exported" in a human trafficking industry enslaving an estimated 40 mil-
lion people. These nefarious industries rely on sophisticated money laundering
schemes to operate. Despite tremendous resources dedicated to anti-money laun-
dering (AML) only a tiny fraction of illicit activity is prevented. The research
community can help. In this brief paper, we map the structural and behavioral
dynamics driving the technical challenge. We review AML methods, current and
emergent. We provide a first look at scalable graph convolutional neural networks
for forensic analysis of financial data, which is massive, dense, and dynamic. We
report preliminary experimental results using a large synthetic graph (1M nodes,
9M edges) generated by a data simulator we created called AMLSim. We con-
sider opportunities for high performance efficiency, in terms of computation and
memory, and we share results from a simple graph compression experiment. Our
results support our working hypothesis that graph deep learning for AML bears
great promise in the fight against criminal financial activity.
1 Anti-Money Laundering in 2018
Anti-money laundering (AML) is the task of preventing criminals from moving illicit funds through
the financial system. AML is generally viewed through the lens of regulatory compliance because
the burden of forensic analysis falls primarily on financial institutions, which are responsible for
meeting Know Your Customer (KYC) standards, monitoring transactions, shutting down or restrict-
ing accounts deemed suspect, and submitting timely Suspicious Activities Reports (SARs) to law
enforcement agencies. In the United States, these requirements are primarily stipulated in the Bank
Secrecy Act (1970) and the Patriot Act (2001), with enforcement chiefly by the Financial Crimes En-
NeurIPS 2018 Workshop on Challenges and Opportunities for AI in Financial Services: the Impact of Fairness,
Explainability, Accuracy, and Privacy, Montréal, Canada. This is a non-archival publication - the authors may
submit revisions and extensions of this paper to other publication venues.
forcement Network (FinCEN). Global costs of AML compliance run in the tens of billions of dollars
and have been growing at about 15% per year since 2004 [KMPG, 2014]. Penalties for failed AML
compliance are severe: in 2018, the Commonwealth Bank of Australia unhappily set a new record
with a USD $530 million fine for AML violations involving its "Intelligent Deposit Machines" (a
cautionary reminder that calling things "intelligent" does not make them so) [BBC, 2018].
Meanwhile we are rapidly becoming a cashless society engaged in global economic exchange. The
advent of cryptocurrency has catalyzed a paradigm shift in peer-to-peer transactions and extrana-
tional financial governance. Cryptocurrencies present new challenges but also new opportunities for
AML, and these vary across type (e.g. forensic insight into Bitcoin's public ledger is much better
than trying to track traditional cash, but more privacy-preserving cryptocurrencies like Zcash are far
more difficult to monitor).
Thus, we observe two rival, converging forces: 1) the increasing difficulty of AML in the age of
globalization and cryptocurrency; 2) the acceleration of advanced forensic tools in the age of big
data and artificial intelligence. Our aim is to ensure the second outpaces the first.
1.1 A pressing societal problem
Amidst the legal and econometric detail, the real societal problem too often fades into the back-
ground: tens of millions of innocent people are suffering under the malice of drug cartels, human
trafficking rings, and terrorist organizations. Moreover, the resulting AML efforts of governments
become a force for financial exclusion as financial institutions pass along high compliance costs to
customers and turn more people away; low-income people, immigrants, and refugees are hit the
hardest [Mitchell, 2012].
1.2 The bad guys are winning
Today, we are woefully ineffective at preventing money laundering. Europol estimates only 1% of
illicit funds are confiscated [Europol, 2017]. To understand why, we consider both the technical and
behavioral challenges, as well as the current methods for addressing them.
Technically, we have a needle-in-a-haystack problem of entity classification and hidden pattern dis-
covery in massive, dynamic, high dimensional, time-series transaction data sets with high noise-to-
signal ratios, combinatorial complexity, and non-linearity. Data sets are often fragmented, inaccu-
rate, incomplete, and/or inconsistent, within as well as across organizations. Synthesizing informa-
tion from multimodal data streams is difficult to automate, and so it falls to resource-constrained
human analysts. Behaviorally, the heavy hand of compliance (i.e. the cost asymmetry of a false pos-
itive versus a false negative) motivates over-reporting, leading to a secondary needle-in-a-haystack
problem for resource-constrained government law enforcement.
A recent Reuters survey of c-suite executives at 2,373 large global organizations provides color
on how these challenges play out for stakeholders. An estimated 5% of reviewed transactions are
filed as Suspicious Activities Reports (SARs) and only 10% of those receive a meaningful investi-
gation by law enforcement. Thus 0.5% of criminal activity alerts lead to action. Each organization
transacts with thousands of third-party vendors and millions of clients, with finance and insurance
companies comprising the upper fractiles of the distribution. Internal monitoring is just as impor-
tant; respondents estimated 58% of financial crimes involving human trafficking were internal to
their own organizations [Reuters, 2018].
2 Review of current methods
AML procedure follows five key steps: (1) installation of a compliance organization within the
company including formal AML training for employees, often with external support from special-
ized firms such as Promontory; (2) development and execution of Know Your Customer (KYC)
on-boarding and profile maintenance procedures; (3) account activity oversight and constraints via
transaction monitoring systems (TMS); (4) manual review of flagged accounts and transactions; (5)
filing of Suspicious Activities Reports (SARs) to law enforcement and corresponding restrictive
action against suspect accounts. We consider Steps 2 and 3: transaction monitoring and evaluation.
2
2.1 Transaction Monitoring
Transaction monitoring systems are predominantly rules-based thresholding protocols tuned for vol-
ume and velocity of transactions with tiered escalation procedures. For example, a U.S. bank might
outsource Level 1 (our term) transaction monitoring to a company in India, which flags all trans-
actions above $10,000 for review, including "near misses" such as a transaction of $9,999 and/or
transaction series such as five transactions of $2,000 each in a 24 hour window. A Level 2 analyst
performs a preliminary review of each flag and decides whether or not to escalate to the bank's
headquarters back in the U.S. There, a Level 3 analyst, in coordination with the compliance team,
will conduct a more thorough analysis using sophisticated techniques to determine whether or not a
SAR need be filed and the account in question suspended.
2.2 Forensic Analysis
Suspiciousness heuristics govern the initial review of a flagged account. These include political
exposure, geographic dynamics, round numbers, transaction type and properties (e.g. if the transac-
tion is a purchase of an asset, how liquid is the asset and how stable is it as a store of value?), and
behavioral logic (e.g., something does not add up).
For example, "Account A" is flagged for a transaction of $9,500, a "near-miss" on the $10,000
rule. The Level 2 analyst pulls up the KYC profile and sees the account belongs to U.S. senator
(a Politically Exposed Person or "PEP" in AML parlance) has been credited by a foreign account
in the Bahamas, a money-laundering hotspot. The analyst pulls up more transaction activity and
also sees a $4,000 credit from XYZ Corporation, which the analyst cannot find record of in a quick
Google search (why is a PEP on a mystery corporate's payroll?). The Level 2 analyst deems this
transaction/account suspicious and escalates to the Level 3 analyst for further review.
In this toy scenario, suspiciousness is obvious; reality is far more difficult. First, the aforementioned
needle-in-the-haystack problem, compounded by the threat of fines, produces high false positive
rates. Second, the manual suspiciousness heuristics above do not scale well with time and human
resource constraints (analysts are often significantly backlogged). Third, criminals can be quite
sophisticated in masking the true nature of their transactions with complicated account layering,
multi-hop transactions, and other techniques. More sophisticated AML methods are needed to meet
these challenges.
Graph analytics have emerged as an increasingly important tool for AML analysis because money
laundering involves cash flow relationships between entities i.e. network structures. Multiple graph
types can be constructed. For example, a graph can be formulated where a single account is repre-
sented as a vertex and a single transaction between two accounts is represented as an edge. Another
approach is to represent a group of accounts as a vertex (e.g. such as those under a holding company,
or such as those inferred to share an owner via clustering) and define an edge as the aggregate trans-
action volume with a neighboring node over a period of time. The latter is the predominant method
for forensic analysis of cryptocurrency activity, involving a combination of 1) address clustering
using multiple-input and change heuristics, and 2) address tagging with attribution data gathered
from public sources [Paquet-Clouston et al., 2018]. In the traditional financial system, where KYC
rules assist with entity identification, classical graph algorithms such as cycle detection, PageRank,
degree distribution, egonet, and label propagation are used to identify anomalies, relationships, and
other features of the network that may be deemed suspicious. Working with private bank data, we
have found these methods can reduce false positives by 20 -- 30% when performed by expert analysts.
Natural Language Processing (NLP) is a newer tool with emergent potential for AML. Han et al.
[2018] recently demonstrated how NLP processing of unstructured, heterogeneous data from online
sources can be used in combination with transaction monitoring systems and private bank data to
produce suspiciousness scores and visualizations to augment human forensic analysis. In this pre-
liminary framework, the authors tap open data streams such as news articles, social media, financial
reports, and fraud databases. Then, cross-referencing with the private bank data such as KYC and
transaction activity, they use a sequential combination of sentiment analysis, name entity recogni-
tion, and relation extraction to build knowledge graphs and relation graphs pertinent to the flagged
account. The authors report positive stakeholder feedback on their stated objective to reduce aver-
age investigation times by 30%. We find this work compelling, but in need of more powerful and
efficient graph methods to support the effective and efficient analysis of such graphs at scale.
3
Graph learning using deep neural networks is a new method with great promise for the complex
pattern and feature discovery central to the AML challenge, as well as for the aforementioned mul-
timodal constructions of various graph types. We explore this in more detail in the next section.
3 Deep learning for massive, dynamic graph data
The proliferation of graph analytics in AML illuminates the potential for ever more powerful graph
methods such as graph learning, an emerging sub-field of machine learning.
3.1 Scalable Graph Convolutional Networks (GCN)
Deep learning has achieved remarkable success on Euclidean data, including images, audio, and
video. Deep learning for graph structured data, however, has lagged due to the scalability challenges
of dealing with combinatorial complexity and non-linearity inherent to graphs of any meaningful
size and density. But this is changing.
Recently, a proliferation of graph neural network models have emerged [Bruna et al., 2014,
Defferrard et al., 2016, Li et al., 2016, Hamilton et al., 2017, Gilmer et al., 2017], and several have
made major strides toward scalability with promising experimental efficiency results [Chen et al.,
2018, Ying et al., 2018]. We prioritize FastGCN [Chen et al., 2018] in the next section, as it was
demonstrated on benchmark data sets to surpass peer methods GCN and GraphSAGE by as much
as two orders of magnitude without sacrificing accuracy.
3.2 Graph learning for AML
The challenge of AML involves high dimensional, massive graph data mapping billions of relation-
ships (edges) between millions of entities (nodes). In AML transaction monitoring, a node entity
might be a single account or a set of associated accounts (either known or inferred via clustering to
operate as one). A node could also represent another graph from a previous step in a time series.
The known properties are those explicitly defined in the data, such as information collected in stan-
dard Know Your Customer (KYC) processes or multi-modal data mined from public or partner
information streams, as well as the observable transactions and any associated flags or SARs filed.
The unknown, hidden properties (such as covert criminal relationships and activity) are the subject
of the forensic inquiry; i.e., what more can we ascertain about an entity than the human eye or clas-
sical graph analytics can detect? In the language of deep learning, we begin with an initial, often
quite limited, attribute vector of a node entity, and we aim to arrive at a much more characteristic
feature representation with a higher degree of confidence.
The principle challenge is scalability as an inverse function of graph size, and in AML the graph size
is massive and aways increasing (new accounts and interactions are added constantly, producing an
ever-growing graph, or graphs within graphs).
3.3 Preliminary testing of graph convolutional networks for AML
We have conducted preliminary experiments using graph learning models for AML. We detail one
such experiment here:
Synthetic data: Since transaction data and customer profiles are privacy sensitive, we created a pro-
totype data simulator called AMLSim (to be described in detail in a forthcoming paper). AMLSim
is a multi-agent simulation platform tailored for an AML problem, where each agent behaves as a
bank account transferring money to other agent accounts, and where a small number of agents con-
duct nefarious activity modeled on real-world patterns. AMLSim constructs data in two steps: (1)
generate a graph via NetworkX1 based on a given degree distribution; (2) generate a time-series of
transactions via PaySim [Lopez-Rojas et al., 2016], based on transaction distributions and dynamics
observed in real data. We draw on domain expertise to define for the simulator a list of known sus-
picious patterns. This procedure allows one to generate a massive dynamic graph of arbitrary size
that contains semi-realistic suspicious activities. While meaningful accuracy measures require real
1https://networkx.github.io
4
data, the structurally congruous synthetic data from AMLSim provides a helpful sandbox for agile
research on scalability, explainability, and other requirements.
Graph topology: For this experiment, we used AMLSim to simulate an AML graph with 1M nodes
and 9M edges. Each vertex represents an account with attributes including account number, account
type (e.g. business type), owner name, and date/time created. Each edge has a transaction ID,
amount, and time stamp. The data is sparsely labeled with flagged transactions (i.e. transactions that
violate volume and velocity rules) and SARs (full analysis has confirmed suspiciousness).
Deep learning task: Using the SARs and escalated alerts as labels, the task is semi-supervised
learning of a predictive model to (a) predict the suspiciousness of a given target node, and (b) identify
other potential bad actors in the transaction network via direct or indirect connections to nodes
known to be suspicious. To do this, we conduct feature extraction via graph embedding, then convert
these features into downstream machine learning tasks.
is a workstation with In-
Preliminary experimental results: The evaluation environment
tel(R) Xeon(R) CPU E5-2697 v4 @ 2.30GHz,
total 72 cores (18 cores, 4 sockets) and
1TB DDR4 2400MHz memory. We ran the original, still popularly used deep graph model,
GCN [Kipf and Welling, 2017], with batched training. GCN took 611 seconds to converge in 32
epochs. Next we ran an improved variant, FastGCN [Chen et al., 2018], which reduces the training
cost through neighborhood sampling. FastGCN took 386 seconds to converge in the same number of
epochs. The hyperpameters we used include 128 hidden units, a 0.01 learning rate, and 400 samples
in FastGCN. Overall, FastGCN was nearly twice as fast as GCN for this synthetic graph. Projected
with a linear scaling, with billion-scale AML graphs (e.g., 1B nodes and 9B edges) the training time
would estimate to a few days. We hypothesize the development of high-performance code could im-
prove the training time by additional orders of magnitude for faster turnover given graph dynamism
with frequent transaction updates.
Table 1: Graph learning on AMLSim data (1M nodes, 9M edges)
Method
Epochs Training time
GCN
FastGCN
32
32
611 seconds
386 seconds
Workstation: Intel(R) Xeon(R) CPU E5-2697 v4 @ 2.30GHz, 72 cores, 1TB DDR4 2400MHz memory
3.4 Optimizing for speed and storage with high-performance computing
Deep learning methods for identifying money laundering must be efficient in order to be useful.
Financial institutions handle million transactions per second and require timely identification of
suspicious activities. The efficiency is explored from both the computation and the memory angle.
Sparse computation on graphs: Systems performing inference using deep neural networks for de-
tecting suspicious activities need the ability to update the graph and node representations sparsely in
response to the addition of new transactions. Without dynamic sparse recomputation, a newly added
transaction cannot be classified until the entire graph is recomputed. Such a long delay is unaccept-
able for latency-sensitive applications. Efficient techniques for performing sparse dynamic compu-
tation have been developed for a variety of common graph algorithms including PageRank, loopy
belief propagation, coordinate descent, co-EM, alternating least squares, singular-value decomposi-
tions, and matrix factorizations. For each of these algorithms, sparse dynamic recomputation can
significantly enhance performance in practice.
Memory-efficient graph representations: Storagewise, the parallelism and locality of graph-based
deep learning algorithms can benefit from graph reordering in a variety of ways. These algorithms
typically perform iterative updates on data associated with a vertex, based on data associated with
adjacent vertices. An effective reordering of the graph vertices can improve the data locality of
these algorithms, allowing them to use the machine's memory system more efficiently.
In ad-
dition, reordering schemes can improve the compressibility of the graph using difference-coding
techniques [Blandford and Blelloch, 2002]. Finally, many efficient and scalable techniques for
processing graphs in parallel, including chromatic scheduling [Kaler et al., 2016], DAG schedul-
ing [Hasenplaugh et al., 2014, Gruevski et al., 2018], and serial blocking [Gruevski et al., 2018],
5
benefit from effective graph reorderings, because reordered graph layouts can be leveraged to dra-
matically reduce synchronization overheads.
Preliminary experimental results: We used the graph compressor, Ligra+ [Shun et al., 2015], and
experimented with the simulated AML graph as well as a few deep learning benchmark graphs
used in Kipf and Welling [2017]. Ligra+ is a compression system that achieves reduced space usage
while maintaining competitive or even improved performance with respect to running the algorithms
on uncompressed graphs on multicore machines. The compression results are reported in Table 2.
We see a compression ratio as high as 2x, although larger graphs appear to be more challenging to
compress. This finding opens up the opportunity for memory-efficient deep neural network training
and inference leveraging compression and reordering techniques.
Table 2: Graph compression with Ligra+
Graph
Size
Compressed Size
Cora
59 Kb
61 Kb
Citeseer
Pubmed
461 Kb
AMLSim 21 Mb
28 Kb
29 Kb
252 Kb
13 Mb
4 Summary
In summary, we have motivated the challenge of anti-money laundering not only in terms of legal
compliance, but in terms of meaningful societal impact. The human suffering from organized crime
such as drug cartel violence and human trafficking is immense, as are the higher order negative ef-
fects such as costly penalties for banks and financial exclusion for innocent people on the margins.
We have encouraged the technical research community to help financial institutions and law enforce-
ment harness artificial intelligence technologies to fight this problem. We have reviewed current
AML methods and provided a first look at deep learning for transaction monitoring and analysis.
We have shared preliminary experimental results using synthetic AML data generated from AML-
Sim. Lastly, we have reviewed some computational considerations involved in implementing graph
learning for AML at scale.
6
References
BBC. Commonwealth bank offers to pay record fine in laundering case, June 2018.
D. Blandford and G. Blelloch. Index compression through document reordering. In Data Compres-
sion Conference, 2002.
Joan Bruna, Wojciech Zaremba, Arthur Szlam, and Yann LeCun. Spectral networks and locally
connected networks on graphs. In ICLR, 2014.
Jie Chen, Tengfei Ma, and Cao Xiao. Fastgcn: Fast learning with graph convolutional networks via
importance sampling. In ICLR, 2018.
Michaël Defferrard, Xavier Bresson, and Pierre Vandergheynst. Convolutional neural networks on
graphs with fast localized spectral filtering. In NIPS, 2016.
Europol. From suspicion to action -- converting financial intelligence into greater operational impact.
Financial Intelligence Group, 2017.
Justin Gilmer, Samuel S. Schoenholz, Patrick F. Riley, Oriol Vinyals, and George E. Dahl. Neural
message passing for quantum chemistry. In ICML, 2017.
Pregrad Gruevski, William Hasenplaugh, David Lugato, and James Thomas. Laika: Efficient in-
place scheduling for 3d mesh graph computations. In Proceedings of the 30th ACM Symposium
on Parallelism in Algorithms and Architectures, 2018.
William L. Hamilton, Rex Ying, and Jure Leskovec.
Inductive representation learning on large
graphs. In NIPS, 2017.
Jingguang Han, Utsab Barman, Jeremiah Hayes, Jinhua Du, Edward Burgin, and Dadong Wan.
Nextgen aml: Distributed deep learning based language technologies to augment anti money
laundering investigation.
In Proceedings of ACL 2018, System Demonstrations, pages 37 -- 42.
Association for Computational Linguistics, 2018.
William Hasenplaugh, Tim Kaler, Tao B. Schardl, and Charles E. Leiserson. Ordering heuristics for
parallel graph coloring. In Proceedings of the 26th ACM symposium on Parallelism in algorithms
and architectures, 2014.
Tim Kaler, William Hasenplaugh, Tao B. Schardl, and Charles E. Leiserson. Executing dynamic
data-graph computations deterministically using chromatic scheduling. ACM Trans. Parallel Com-
put., 3(1), 2016.
Thomas N. Kipf and Max Welling. Semi-supervised classification with graph convolutional net-
works. In ICLR, 2017.
KMPG. Global anti-money laundering survey 2014, 2014.
Yujia Li, Daniel Tarlow, Marc Brockschmidt, and Richard Zemel. Gated graph sequence neural
networks. In ICLR, 2016.
Edgar Lopez-Rojas, Ahmad Elmir, and Stefan Axelsson. Paysim: A financial mobile money simu-
lator for fraud detection. In 28th European Modeling and Simulation Symposium, 2016.
Daniel J. Mitchell. World bank study shows how anti-money laundering rules hurt the poor. Forbes,
April 2012.
Masarah Paquet-Clouston, Bernhard Haslhofer, and Benoit Dupont. Ransomware payments in the
bitcoin ecosystem. CoRR, abs/1804.04080, 2018. URL http://arxiv.org/abs/1804.04080.
Reuters. Revealing the true cost of financial crime: 2018 survey report, 2018.
Julian Shun, Laxman Dhulipala, and Guy E. Blelloch. Smaller and faster: Parallel processing of
compressed graphs with ligra+. In Proceedings of the 2015 Data Compression Conference, 2015.
Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L. Hamilton, and Jure Leskovec.
Graph convolutional neural networks for web-scale recommender systems. In KDD, 2018.
7
|
1604.08507 | 1 | 1604 | 2016-04-28T16:41:29 | Graph Decompositions Analysis and Comparison for Cohesive Subgraphs Detection | [
"cs.SI",
"cs.DM",
"cs.DS"
] | Massive networks have shown that the determination of dense subgraphs, where vertices interact a lot, is necessary in order to visualize groups of common interest, and therefore be able to decompose a big graph into smaller structures. Many decompositions have been built over the years as part of research in the graph mining field, and the topic is becoming a trend in the last decade because of the increasing size of social networks and databases. Here, we analyse some of the decompositions methods and also present a novel one, the Vertex Triangle k-core. We then compare them and test them against each other. Moreover, we establish different kind of measures for comparing the accuracy of the decomposition methods. We apply these decompositions to real world graphs, like the Collaboration network of arXiv graph, and found some interesting results. | cs.SI | cs | Graph Decompositions Analysis and Comparison
for Cohesive Subgraphs Detection
Etienne CALLIES
X2011 - École Polytechnique
[email protected]
Tomás YANY ANICH
X2011 - École Polytechnique
[email protected]
6
1
0
2
r
p
A
8
2
]
I
S
.
s
c
[
1
v
7
0
5
8
0
.
4
0
6
1
:
v
i
X
r
a
Abstract-Massive networks have shown that the de-
termination of dense subgraphs, where vertices interact
a lot, is necessary in order to visualize groups of com-
mon interest, and therefore be able to decompose a big
graph into smaller structures. Many decompositions
have been built over the years as part of research in
the graph mining field, and the topic is becoming a
trend in the last decade because of the increasing size
of social networks and databases. Here, we analyse
some of the decompositions methods and also present a
novel one, the Vertex Triangle k-core. We then compare
them and test them against each other. Moreover, we
establish different kind of measures for comparing
the accuracy of the decomposition methods. We apply
these decompositions to real world graphs, like the
Collaboration network of arXiv graph, and found some
interesting results.
Index Terms-Graph decomposition, massive net-
works, community detection and evaluation, k-core,
triangle k-cores, vertex triangle k-core.
I. INTRODUCTION
Graphs representing real data are nowadays evolv-
ing at a speed we can hardly control. They are
bigger than before, they grow up faster and they
are more complex as well. The information boom
in the last decade has been a crucial motivation
for understanding and analysing in a more efficient
way large graphs. Social networks, for example, are
represented with graphs that can go up to billions
of vertices, and more. Therefore, it is compulsory
to build new tools that would allow us to identify
smaller structures, denser subgraphs or at least more
connected vertices that could represent communities
inside this big pool: the graph itself.
In fact, clustering is an important problem in graph
mining. How to determine if there are, and which
are they, groups inside a large graph? Learning this
represent a considerable issue in two senses: how to
identify and calculate in an effective and efficient way
this dense subgraphs, and how to determine if the
results are accurate as we would expect, i.e. if they in
fact reveal real communities. Once we have answered
this, we can no longer preoccupy ourselves with the
big and complex graph, but more with its smaller
decompositions which represent better and denser
communities. This could be useful, for instance, for
targeted advertising, news clustering and others.
Many methods, that we will review, have been
presented over the last few years. We no longer found
graph's description in the vertices' degree1. Today,
we need better tools that could make the difference
between kinds of communities –if we are talking
about social graphs– or clusters, in the general case.
In this paper we will review some of the principal
modern decompositions techniques, analyse their
algorithms, compare them and evaluate them. The
computing time will be important in our task since
we need algorithms not only to be good, but also to
be efficient. Our contributions lie on the regrouping
and side by side comparison between existing, and
an innovative, decomposition techniques, and on a
novel metric for evaluation of the detected important
subgraphs.
We will be working with a simple undirected graph
G = (V,E) where V is the set of vertices and E the
set of edges. Moreover, we will consider the degree
dG(v) of a vertex v ∈ V to be the number of edges
e ∈ E incident to the vertex itself. Some others
assumptions and definitions will be explained when
needed.
1It can be shown that high degree nodes can coexist with low
degree nodes.
2
II. GRAPH DECOMPOSITIONS
We would begin with some important definitions
that, although are typical among the computer science
community, are always necessary to clarify.
Definition 1. A graph G is said to be complete when
every of its vertices is connected to each other, i.e.,
∀(x,y) ∈ V 2,x (cid:54)= y,∃e ∈ E with e = {x,y}.
When we are thinking of finding the most con-
nected subgraph inside a graph, we are somehow
thinking on the clique problem, i.e., finding cliques
in a graph G. The definition of a clique might in
fact vary according to the literature, so we prefer to
establish the one we think it is the most used.
Definition 2. Let G(cid:48) ⊂ G be a subgraph of a graph
G. We say that G(cid:48) is a clique if it is a complete
subgraph of G. We say that G(cid:48) is a clique of degree
k if it is a clique where each vertex has degree k
Our quest should be then to find maximal size
cliques in a graph G, in a way, to solve the clique
problem. This presents two majors issues, as said by
[1], cliques of small size are too numerous for having
any kind of special interest, and those cliques which
are big enough for being interesting are too rare to
find. The second problem is the complexity of the
clique problem: listing every possible size clique –if
there are any– can be computed in exponential time.
Therefore, finding other kind of interesting sub-
graphs of a graph, which could represent dense and
almost complete structure, without being a clique,
appear to be an important task, and a useful one,
especially if we can show that this task can be
computed in polynomial time. We will here review
some of the most known decomposition one can find
in literature.
We will use Figure 1 as our canonic example
through the whole paper.
A. k-core
As defined in [2], we use the following notations.
Definition 3. Let G be a simple undirected graph. We
define ∆(G) = minv∈V dG(v), the minimum degree
of a vertex in G.
Figure 1. Simple undirected graph G0
Figure 2. k-core decomposition of G0
We can immediately notice that this approach is
more relaxed than the clique's one. In fact, k-cores
are restrained subgraphs, but not as much as cliques.
We ask them to be as connected as we want them
to –varying the k– but we don't ask them to be the
most connected. Nevertheless, k-cores represent very
connected structures, as said in [3], they are "seedbeds,
within which cohesive subsets can precipitate out".
Therefore their study become important as we will
see in the following parts of this paper. Moreover,
some interesting analysis can be done for each vertex
of a graph when a k-core decomposition is made.
Definition 5. Let v ∈ V be a vertex of a graph G.
The core number of v is the highest k for which v
belongs to the k-core of G.
This last definition will be very important in our
examples because it will allow us to considerate what
we will call levels in a decomposition.
Definition 6. Given a graph decomposition, we call
level the set of vertices having the same core number.
Having this definition set, we can define what a
k-core is.
Definition 4. Let G(cid:48) ⊂ G be a subgraph of a graph
G. We say that G(cid:48) is the k-core of G if it is the
maximum size subgraph of G where ∆(G(cid:48)) ≥ k.
Figure 2 shows a k-core decomposition over the
initial graph G0. The numbers next to the vertices
represent the core number. Different colours here
represent different levels.
Remark 7. Some interesting assets can be detected
in k-cores. In fact, as shown in [4], k-cores have the
following properties:
• k-cores are nested, i.e., let k < k(cid:48) and G,G(cid:48)
k-core and k'-core of a graph G ⇒ G(cid:48) ⊆ G.
• k-cores can have more than one connected
component.
Proposition 8. If we consider a connected k-core
G(cid:48) = (V (cid:48),E(cid:48)) of a graph G = (V,E) and we define
n =(cid:12)(cid:12){v,v ∈ V (cid:48)}(cid:12)(cid:12) then, if k = n − 1, G(cid:48) is a clique.
Proof: If k = n − 1 then each vertex on the
k-core is connected to all of its neighbours. This is
the definition of a clique.
Remark 9. It is clear that if the k-core has more than
one connected component then the result can be apply
to each one of them.
This last proposition show us that a k-core is very
close to a clique, without being specifically a clique
itself. Knowing this, we will develop in the following
parts of this paper some measures for the difference
between a deduced subgraph and a clique, and see
how close were we to find a proper clique. Actually,
with the definition of a clique of degree k given before,
it is trivial that, if such clique of degree k exists in a
graph G, then it will be a subset of a k-core G(cid:48) of
G.
B. Generalized cores
The idea behind k-cores can be extended. When we
talked about k-cores we were considering the function
∆(G) as the minimum degree of a vertex in a graph
G. What if we consider another different function to
which we ask some properties? This generalization
as seen in [4] can allow us to define more general
decompositions than k-cores.
Definition 10. Let Z = {z : z ⊆ V }. Let p : V ×
Z → R be a function. We say that p is a vertex
property function, or a p-function.
We can now define the notion of p-core at level t,
p = (V t
which come to extend the idea of k-core.
Definition 11. Let Gt
a graph G. We say that Gt
if and only if
• ∀v ∈ V t
• V t
p : t ≤ p(v,V t
p )
p is a maximal subset with this property
p ,Et
p) be a subgraph of
p is a p-core at level t ∈ R
Remark 12. We can notice that the function used for
the k-core decomposition is in fact a particular p-
3
function, where for v ∈ V,U ⊆ V we have p(v,U ) =
minv∈U dU (v).
As said before, we need to ask some particular
properties to this p function so it can be coherent
with what we expect from decompositions.
Definition 13. Let p be a vertex property function. We
say that p is monotone if and only if for U ⊂ U(cid:48) ⊂ V
and ∀v ∈ U we have p(v,U ) ≤ p(v,U(cid:48)).
This definition allow us to enunciate an important
property for decompositions.
Proposition 14. Let p be a monotone function. p-
cores are nested, i.e., for t2 < t1 ⇒ V t1
p ⊆ V t2
p
p are the vertices of the p-core at
where V t1
level t1 and t2 respectively.
p and V 2
Proof: Let t2 < t1,v ∈ V t1
p ). But, by definition, V t2
p
p . By definition we
p ). Besides, t2 < t1. Therefore,
is the maximal
p ⊆
have t1 ≤ p(v,V t1
t2 < p(v,V t1
subset U such that t2 ≤ p(v,U ). Therefore V t1
p .
V t2
Example 15. Many functions can be chosen for
constructing p-core at level t graphs.
get the k-cores defined before.
• p1(v,V (cid:48)) = dG(cid:48)(v). With this function one can
• p2(v,V (cid:48)) = number of different cycles of length
3 (triangles) going through v. We will analyse
this particular function in a future part of this
paper.
following p-functions: p3(v,V (cid:48)) = din
p4(v,V (cid:48)) = dout
• For a directed graph G we can consider the
G(cid:48)(v) and
G(cid:48) (v).
C. Triangle k-core and k-truss
Triangle k-cores and k-trusses –which we will show
are the same– are very important decompositions for
our analysis. In fact, latest studies [5], [6] have shown
that in order to look up for connected subgraphs inside
a graph we need to search for vertices that not only
are connected between them, but that have common
neighbours. This last feature is actually represented
through triangle k-cores and k-trusses.
Definition 16. We call a triangle a cycle of length 3
inside a graph. Let G(cid:48) be a subgraph of a graph G.
We say that G(cid:48) is triangle k-core of G if each edge
of G(cid:48) is contained within at least k triangles in G(cid:48)
itself.
We define as well what a k-truss is.
4
Figure 3. Triangle k-core decomposition of G0
Figure 4. Vertex triangle k-core decomposition of G0
Definition 17. Let G(cid:48) be a subgraph of a graph G.
We say that G(cid:48) is a k-truss of G if each edge of G(cid:48)
connects two vertices who have at least k−2 common
neighbours.
Figure 3 shows the triangle k-core decomposition
in our graph G0.
Proposition 18. A k-truss is a triangle (k − 2)-core.
Proof: In a k-truss, in order to have k − 2
common neighbours, every edge must be reinforced
by at least k − 2 pairs of edges: they form therefore
k − 2 triangles.
Although some literature has been written for one
and the other kind of decomposition, we have just
shown that they get the same result at the end. Because
of this, we will be working the whole time with the
triangle k-core term.
Proposition 19. Triangle k-core are nested sub-
graphs, i.e., k2 < k1 ⇒ triangle k1-core ⊆ triangle
k2-core.
Proof: Let e ∈ Ek1, i.e. e is contained within k1
triangles. Since k2 < k1, e is also contained in k2
triangles. So e ∈ Ek2.
Proposition 20. If G has a clique of degree k > 1
then it is contained within a (k + 1)-truss, i.e. within
a triangle (k − 1)-core.
Proof: Let C = (VC,EC) be a clique of degree
k > 1 and K = (Vk,Ek) a (k+1)-truss within a graph
G = (V,E). Since each vertex in C has degree k, then
VC = k + 1. Therefore, for each e ∈ EC, e = {u,v},
u and v will be neighbours with every other vertex in
C, in particular, they will share (k + 1) − 2 common
neighbours. With this we have EC ⊆ Ek. Since a
graph can be reduced to its edges set, when isolated
vertices don't exist, we have just shown that C ⊆ K.
D. Vertex triangle k-core
We wanted to find another decomposition following
the philosophy behind the triangle k-core decom-
position. Therefore, instead of considering triangles
around an edge, we will look for triangles around a
vertex. With this, we have the same idea as mentioned
before: we try to identify dense subgraphs in terms
of vertices having common neighbours.
Definition 21. Let G(cid:48) be a subgraph of a graph G.
We say that G(cid:48) is a vertex triangle k-core if every
vertex in G(cid:48) is contained in at least k triangles.
Proposition 22. Vertex triangle k-core are nested
subgraphs.
Proof: Using the proposition 14 we just have to
show that p(v,U ) = number of triangles through v,
is a monotone function.
Let U1 ⊆ U2 ⊆ V . Since U2 has more vertices than
U1 we have two options: whether this new vertices
are creating triangles going through v and therefore
p(v,U1) < p(v,U2), whether they are not creating any
new triangle going through v and therefore p(v,U1) =
p(v,U2). In any case, we have p(v,U1) ≤ p(v,U2).
Figure 4 shows the vertex triangle k-core decom-
position of G0. We notice immediately that this
decomposition is different from the (edge) triangle
k-core decomposition.
Remark 23. The maximum core number for vertex
triangle decomposition is (n−1)(n−2)
whereas for the
(edge) triangle decomposition it goes up to n − 2.
Moreover, for the k-core decomposition it goes only
up to n − 1.
2
III. ALGORITHMS
Once we have described the possible decomposi-
tions one can apply to a graph, we would like to
review the principal algorithms that are associated
with these subgraphs detection. We chose to do it
in a separate part because although definitions and
properties are always valid, algorithms can change
during time and can in particular be improved (in
the best scenario). We will review algorithms for
k-core, triangle k-core and vertex triangle k-core.
For any further analysis we could make, these three
decomposition are the only ones to think of.
The general procedure for each algorithm will be
the same. In fact, since we will be asking to vertices
–or edges– to have some properties, the method will
almost always be to delete those vertices or edges that
do not fulfil the condition we are asking. Repeating
this process will get us to the final subgraph we are
looking for. But the idea for us will be to actually
memorize the core number for each vertex, therefore
our result will not be a subgraph but a numbering
over the graph vertices.
In our study we consider the complexity as the
evolution of the number of elementary operations in
relation to the number of vertices in the input graph
G = (V,E). The complexity is said quadratic (resp.
cubic) if the number of operations grows like n2 (resp.
n3) where n = V is the number of vertices.
A. k-core
One of the great advantages of k-core decompo-
sition is it easy way to compute it. The idea of
the algorithm will be to take a graph G and delete
recursively all vertices of degree less than k. With
them, we delete as well every edge incident with the
concerned vertices.
In order to evaluate the complexity of the algo-
rithm, we will first consider the initialization, then
the emptying of unprocessedVertices which contain
vertices unprocessed by default, and also neighbours
vertices added after a remove.
Initialization. The calculation of degree is
quadratic in terms of vertices, because it is linear
in terms of edges.
Copied in unprocessedVertices. The k number
goes from 0 to n − 1. There are therefore in all no
more than n2 vertices copied in unprocessedVertices.
Unprocessed after a remove. When a vertex is
removed, all its neighbours are added to unprocessed-
Vertices. There are therefore in total no more than n2
vertices added to unprocessedVertices after a remove.
⇒ Global complexity: O(n2)
5
Algorithm 1 k-core decomposition algorithm
forall the v ∈ V do
d(v) ← # of edges that contain v
end
k ← 0
while V (cid:54)= ∅ do
k ← k + 1
unprocessedV ertices = copy(V )
while unprocessedV ertices (cid:54)= ∅ do
Vertex v = pop(unprocessedV ertices)
if d(v) < k then
forall the neighbours w of v do
d(w) ← d(w) − 1
unprocessedV ertices.add(w)
end
v.coreNumber← k − 1
remove v from V
end
end
end
B. Triangle k-core
Triangle k-cores are a bit more difficult to compute
than k-cores since we have to considerate triangles
through edges. Nevertheless, the general form of the
algorithm remains similar.
Initialization. The calculation of degree is
quadratic, and the calculation of triangle(f) for an
edge f is linear, so globally cubic complexity.
Copied in unprocessedEdges. The k number goes
from 0 to n − 2. There are therefore in total no more
than n3 edges copied in unprocessedEdges.
Unprocessed after a remove. When an edge is
removed, all other edges which formed a triangle with
the removed edge are added to unprocessedEdges.
The number of such edges is not more than twice the
number of vertices. There are therefore in total no
more than n3 edges added to unprocessedEdges after
a remove.
⇒ Global complexity: O(n3)
C. Vertex triangle k-core
Vertex triangle k-core are almost as difficult to
compute as (edge) triangle k-core, with the advantage
we only go through vertices and never look for edges.
Initialization. The calculation of triangle(v) is
quadratic for a vertex v, so globally cubic complexity.
Copied in unprocessedVertices. The k number
goes from 0 to (n−1)(n−2)
. There are therefore in total
no more than n3 edges copied in unprocessedVertices.
2
Algorithm 2 Triangle k-core decomposition algo-
rithm
forall the v ∈ V do
d(v) ← # of edges that contain v
Algorithm 3 Vertex triangle k-core decomposition
algorithm
forall the v ∈ V do
triangle(v) ← # of triangles that contain v
6
end
forall the e ∈ E do
triangle(e) ← # of triangles that contain e
end
k ← 0
while E (cid:54)= ∅ do
k ← k + 1
unprocessedEdges = copy(E)
while unprocessedEdges (cid:54)= ∅ do
Edge e = pop(unprocessedEdges)
if triangle(e) < k then
forall the triangle t of e do
for both other edges f of t do
triangle(f ) ← triangle(f ) − 1
unprocessedEdges.add(f )
end
end
k ← 0
while V (cid:54)= ∅ do
k ← k + 1
unprocessedV ertices = copy(V )
while unprocessedV ertices (cid:54)= ∅ do
Vertex v = pop(unprocessedV ertices)
if triangle(v) < k then
forall the triangle v of t do
for both other vertices w of t do
triangle(w) ← triangle(w)− 1
unprocessedV ertices.add(w)
end
end
v.coreNumber← k − 1
remove v from V
What should a "good" graph decomposition look
like? If you consider the core with the highest k, that
we will call the best community, we would expect it
to be limited in terms of vertices. The cohesiveness of
the best community should be close to the one of the
clique composed by the same vertices. But finding a
good community is not all, the graph decomposition
should list wider communities –not as good and small
as the best one–, but still interesting enough for
being analysed. The speed and the regularity of the
increase (resp. decrease) of the number of vertices
while decreasing (resp. increasing) the level number,
is fundamental for our analysis.
In our study, we focused on these two aspects : the
best community and the core size decrease. A few
examples of graph decompositions is enough to notice
the most important point of this whole study. No graph
decomposition –of the three we are trying to compare–
is better than the other in any case. We cannot assert
anything in absolute terms about the best community
size, neither can we about the core size decrease. For
a big set of graphs we calculate several individual
measures. Then average values of these metrics are
analysed and compared. The measures we made are
detailed in the corresponding paragraphs. First we
precise on which graphs we run our decompositions
end
for both vertices v of e do
d(v) ← d(v) − 1
if d(v) = 0 then
v.coreNumber← k − 1
end
remove e from E
end
end
end
end
end
end
end
Unprocessed after a remove. When a vertex is
removed, all other vertices which formed a triangle
with the removed vertex are added to unprocessed-
Vertices. There are therefore in total no more than n3
vertices added to unprocessedVertices after a remove.
⇒ Global complexity: O(n3)
IV. EXPERIMENTAL EVALUATION
How to compare two graph decompositions? What
do we measure? How can we assert that a decom-
position is better than another one? Once we have
decided our comparison criteria, on which and on how
many graphs do we run tests? In this part, we propose
to answer this questions according to certain criteria
we chose. This doesn't necessarily mean that we got
the best and unique answer –which we think doesn't
actually exists– but that we analysed the problem
within a perspective.
7
best community size increases. It has to be mentioned
that the classical density, i.e. the number of vertices
divided by the number of edges, is not relevant for
this study, because with this definition a clique could
have a lower density than a subgraph in which it is
included, which is a situation we do not want.
Figure 5. Best level size comparison
in order to compare them.
A. Graph samples
Exhaustive Graph. The first possibility is to
2) =
generate all graphs with n vertices. There are 2(n
2n(n−1)/2 graphs with n vertices. We made it for 5
vertices –1024 graphs– and for 6 vertices –32,768
graphs– but for 7 vertices –2,097,152 graphs– it
exceeds the capacity of our software.
(cid:1) = n(n−1)
of vertices n, there are(cid:0)n
Random Graph. To avoid memory issues, we
decided to test on random graph. Given a number
possible edges.
We add each edge to the graph with a probability of
1/2. We construct 10,000 graphs this way. We did the
study for many different n, but we kept the results
for 9, 15, 25 and 45 vertices.
2
2
Real Graph. Real graphs are as "random" as those
we built. For example, in social network there is a high
probability of having the friend of someone's friend be
their friend. In other words, there is a high probability
of a triangle. We have tested our algorithms on several
real graphs. We had some memory issues, due to the
kind of Java objects we use in our algorithms. The
biggest real graph we managed to decompose in the
three shown ways, and the only one we analysed, is
called ca-HepPh which can found in [8]. It is the graph
of Collaboration network of arXiv in High Energy
Physics, it contains 12,008 nodes and 118,489 edges.
B. Best community
Figure 6. Best level clique-density comparison
In order to discuss about graph decomposition
algorithm efficiency for finding the best community,
we define two kinds of accuracy measures.
Definition 24. We define the best level size as the
number of vertices with the highest core number.
Remark 25. For the three decompositions of the
preceding example G0, the best level size is 5.
Definition 26. We define best level clique-density
as the number of edges divided by the number of
possible edges in the best community, i.e.
.
n
(n−1
2 )
Example 27. In the example G0, the best community
is a clique, so the density is 1.
Expected. A "good" graph decomposition should
have a little best level size mean and higher best level
density. It is obvious that both ideas are equivalent.
The best communities given by different decompo-
sition are nested. Thus the density decreases as the
Results. As seen in Figure 5, the vertex triangle
decomposition seems to be the decomposition that
finds the shortest community, on average, in very
small graphs; triangle k-core in wider but still small
graphs; finally vertex triangle again. The k-core
decomposition finds bigger communities in small
graphs but the gap is not as significant when the
size increases. Unfortunately, on all tests we have
done on real graphs, the best community was the
same with the three decompositions, and was always
a clique. We tried to increase the number of vertices
in random tests, but the hierarchy on finding the best
community on average was always the same: first the
vertex triangle, then the triangle k-core, and then k-
core at the end. As for the clique-density (Figure 6), it
is higher when the community size is smaller, which
is the case for the vertex triangle decomposition.
Regarding the search of the best communities, both
triangle decompositions are better than k-core. But
it is still questionable to assert that vertex triangle
k-core is better than (edge)-triangle k-core.
the number of not empty levels increases. For these
two reasons we calculate RMS, and we expected it
to be low for "good" decomposition.
8
C. Core size decrease
After considering the best community, we should
observe the rest of the vertices.
Definition 28. We call a core the set of vertices that,
given an integer k, have core number ≤ k.
In how many and which levels are held the
remaining vertices? Are they well distributed into
all k-levels or abruptly bonded together in only few
levels? Which graph decomposition enables the most
regular core size decrease? We decided to proceed
with the following measures :
Highest core number. In the preceding example
it is 4 for k-core (Figure 2), 3 for triangle k-core
(Figure 3) and 6 for vertex triangle (Figure 4).
Definition 29. We define the level number as the
quantity of not empty levels.
Remark 30. In the example for G0 it is 3 for k-core, 4
for triangle k-core and 5 for vertex triangle. It can be
seen graphically as the number of different colours.
Definition 31. We define the Root Mean Square
(RMS) as the quadratic mean of the distribution of
the vertices in the different levels
n(k)2
n2
(cid:115)(cid:88)
k
Figure 7. Highest core number comparison
Figure 8. Level number comparison
where n(k) is the number of vertices in the k-core
subgraph and n is the total number of vertices.
Remark 32. In the example for G0 it is 0.63 for
k-core, 0.61 for triangle k-core and 0.59 for vertex
triangle.
Expected. The highest core number is not an
effective measure. The reason is that
the vertex
triangle decomposition lets a lot of empty levels. If
you consider only not empty levels, the core number
for these levels rises quadratically. However, the
level number tells about the possibility of vertex
segmentation. More levels means more different ways
to choose the wideness of communities. It is quite
useless to have very small levels or very big levels,
in terms of size. Ideally, the levels have all the same
size. On the one hand, the RMS is minimal when it is
the case. On the other hand, the RMS is lower when
Figure 9. Root Mean Square comparison
Results. As provided, the highest core number, as
seen in Figure 7, is bigger on average in the vertex
triangle decomposition than the other two, because
the best core number evolution is quadratic for it
and linear for the other two. What was not obvious
is that the highest core number for triangle k-core
is significantly lower than the k-core. As for the
level number, as seen in Figure 8, it is clearly the
vertex triangle decomposition which has the best. If
the triangle k-core is better in that way than the k-
core in small graphs, the real graph confirms that
the tendency goes on the other way while graph size
increases. Triangle k-core decomposition offers far
less different levels than the k-core decomposition.
Our study has not made it clear about the root
mean square. Considering the random tests, it appears
that both triangle decompositions are fighting for the
first place for RMS, as seen in Figure 9, with a
slight advantage for vertex triangle. This tendency
is confirmed when random tests are done with more
than 45 vertices. The real graph shows it differently.
Vertex triangle is still leading, but challenged by k-
core, and triangle k-core RMS values are far bigger.
Given these results we ran test on other real graphs
to check that it was not an isolated characteristic
of the chosen graph. Maybe the fact that triangle k-
core decomposition has less levels, explains its bigger
RMS.
Figure 10. Core size decrease for random 15 vertices graph
9
the average over 10,000 graphs. Figure 11 show as
well the core size decrease as k increases, for the
real arXiv graph, with the difference that we don't
considerate k if there are no vertices with exactly k
as their core number.
Considering these curves of core size decrease, the
vertex triangle decomposition (green curve) seems to
have the slowest and most regular decrease, on both
random and real graphs. As for k-core and triangle
k-core, it is difficult to tell. The core size for k-core
is bigger for little k but decreases abruptly. It is more
useful to decrease slowly for high k, in order to
distinguish good and very good communities rather
than bad and very bad ones.
Regarding core size decrease, the best decomposi-
tion is the vertex triangle decomposition in various
aspects. It has more levels, quite regularly filled,
which enables to select a community with a more
precise size. The k-core and triangle k-core are both
bad at it, but the triangle k-core is more regular in
its core size decrease.
D. Algorithm execution time
In order to verify the complexity of the three
algorithms, we ran them on random graphs with
different number of vertices. The way of constructing
random graph is the same as described in IV-A. For
a number of vertices, the program creates randomly
1000 graphs and the three algorithms calculate the
decompositions. The mean is done on the 1000
execution time. These means established for number
of vertices from 10 to 40, are reported in Figure 12.
Figure 11. Distinct core size decrease for arXiv graph
Figure 12. Execution time for the three algorithms
Figure 10 show the decrease of core size while
k increases. For this last, values are considered as
As expected, both triangle decompositions take
far more time than k-core. To check whether the
complexity is cubic for triangle decompositions and
quadratic for k-core decomposition, the figures 13 and
14 show the evolution of execution times of algorithms
divided by their complexity (O(n2) or O(n3)).
10
triangle k-core, better than the (edge) triangle k-core:
core size decrease for vertex triangle k-core is more
regular and it converges to a smaller community. In
a future, some new p-functions for generalized core
decomposition could perhaps give us better results.
ACKNOWLEDGMENT
We thank our professor Michalis Vazirgiannis,
and his postdoctoral researcher Fragkiskos Malliaros,
who proposed the subject and provided insight and
expertise that greatly assisted the research, although
they may not agree with all of the interpretations of
this paper.
REFERENCES
[1] J. Cohen, "Trusses: Cohesive Subgraphs for Social Network
Analysis", Technical Report (National Security Agency),
2009.
[2] C. Giatsidis, D.M. Thilikos & M.Vazirgiannis, "Evaluating
Cooperation in Communities with the k-core Structure",
ASONAM 2011, pp. 87–93.
[3] S.B. Seidman, "Network Structure and Minimum Degree",
Social Networks, vol. 5, pp. 269–287, 1983.
[4] V. Batagelj & M. Zaveršnik, "Generalized Cores", ACM,
2002.
[5] J. Wang & J. Cheng, "Truss Decomposition in Massive
Networks", VLDB Conf., 2012.
[6] Y. Zhang & S. Parthasarathy, "Extracting Analysing and
Visualizing Triangle k-core Motifs within Networks", ICDE
Conf., 2012.
[7] V. Batagelj & M. Zaveršnik, "An O(m) Algorithm for Cores
Decomposition of Networks", 2002.
[8] arXiv.
(2003, April). High Energy Physics
- Phe-
nomenology collaboration network [Online]. Available:
http://snap.stanford.edu/data/ca-HepPh.html
Figure 13. Quadratic Verification
Figure 14. Cubic Verification
The k-core decomposition algorithm is definitely
quadratic, but both triangle algorithms we used are
a little more than cubic. It can be explained by
the fact we used ArrayList Java objects for a more
comfortable implementation, whose basic operations
are not executed in constant time.
V. CONCLUSIONS
We have shown that k-core decomposition are
efficient but not very precise: it can be computed
in a quadratic time –versus cubic time for the others
decompositions– but the core size decrease is not very
regular. Sacrificing complexity for results, we got a
far more useful decomposition using the novel vertex
|
1908.09120 | 3 | 1908 | 2019-09-02T05:50:59 | Intellectual and social similarity among scholarly journals: an exploratory comparison of the networks of editors, authors and co-citations | [
"cs.SI",
"cs.DL"
] | This paper explores, by using suitable quantitative techniques, to what extent the intellectual proximity among scholarly journals is also a proximity in terms of social communities gathered around the journals. Three fields are considered: statistics, economics and information and library sciences. Co-citation networks (CC) represent the intellectual proximity among journals. The academic communities around the journals are represented by considering the networks of journals generated by authors writing in more than one journal (interlocking authorship: IA), and the networks generated by scholars sitting in the editorial board of more than one journal (interlocking editorship: IE). For comparing the whole structure of the networks, the dissimilarity matrices are considered. The CC, IE and IA networks appear to be correlated for the three fields. The strongest correlations is between CC and IA for the three fields. Lower and similar correlations are obtained for CC and IE, and for IE and IA. The CC, IE and IA networks are then partitioned in communities. Information and library sciences is the field where communities are more easily detectable, while the most difficult field is economics. The degrees of association among the detected communities show that they are not independent. For all the fields, the strongest association is between CC and IA networks; the minimum level of association is between IE and CC. Overall, these results indicate that the intellectual proximity is also a proximity among authors and among editors of the journals. Thus, the three maps of editorial power, intellectual proximity and authors communities tell similar stories. | cs.SI | cs |
Intellectual and social similarity among scholarly journals: an
exploratory comparison of the networks of editors, authors and
co-citations
Alberto Baccini1 ∗
Lucio Barabesi1
Mahdi Khelfaoui2
Yves Gingras2
1Department of Economics and Statistics, University of Siena, Italy
2Université du Quebec à Montreal, Canada
Abstract
This paper explores, by using suitable quantitative techniques, to what extent the intellectual
proximity among scholarly journals is also a proximity in terms of social communities gathered
around the journals. Three fields are considered: statistics, economics and information and
library sciences. Co-citation networks (CC) represent the intellectual proximity among journals.
The academic communities around the journals are represented by considering the networks
of journals generated by authors writing in more than one journal (interlocking authorship:
IA), and the networks generated by scholars sitting in the editorial board of more than one
journal (interlocking editorship: IE). For comparing the whole structure of the networks, the
dissimilarity matrices are considered. The CC, IE and IA networks appear to be correlated for
the three fields. The strongest correlations is between CC and IA for the three fields. Lower
and similar correlations are obtained for CC and IE, and for IE and IA. The CC, IE and IA
networks are then partitioned in communities.
Information and library sciences is the field
where communities are more easily detectable, while the most difficult field is economics. The
degrees of association among the detected communities show that they are not independent. For
all the fields, the strongest association is between CC and IA networks; the minimum level of
association is between IE and CC. Overall, these results indicate that the intellectual proximity
is also a proximity among authors and among editors of the journals. Thus, the three maps of
editorial power, intellectual proximity and authors communities tell similar stories.
Keywords: Interlocking editorship network; Gatekeeper; Interlocking authorship network;
Co-citation network; generalized distance correlation; communities in network.
∗Alberto Baccini is the recipient of a grant by the Institute For New Economic Thinking Grant ID INO17-
00015. The funders had no role in study design, data collection and analysis, decision to publish, or preparation
of the manuscript. The authors are very grateful to the two reviewers for their very useful comments.
1
1
Introduction
The main objects analyzed in this paper are scholarly journals and communities gathered around
them. Scholarly journals have grown in relevance as outlet for communicating research results in
the social sciences and humanities (Kulczycki, Engels, Pölönen, Bruun, Dušková, Guns, Nowot-
niak, Petr, Sivertsen, Istenič Starčič, and Zuccala 2018), following a trend that began in the
natural sciences a century earlier (Csiszar 2018). Over the last two decades, in the context of
the publish-or-perish environment, where academic careers of scholars depend more and more
on the "quality" of the journals in which they have published their articles, journals have gained
a new importance as brands(Heckman and Moktan 2018). It is therefore hardly surprising that
the interest of scientometric scholars for journals mainly focused on the building of indicators,
such as the Impact Factor, to be used for evaluative purposes (Todeschini and Baccini 2016).
The analysis of scholarly journals as social institutions of science appears a bit less developed.
Indeed, scholarly journals connect members of academic communities (Potts, Hartley, Mont-
gomery, Neylon, and Rennie 2017). Editorial boards of journals constitute a first layer of such a
community. They act as gatekeepers of science: they are, directly or indirectly, responsible for
the refereeing processes, they decide which papers are worth publishing in their journals (Crane
1967; Hoenig 2015). The stronger the link between the prestige of journals and the career ad-
vancement of scholars, the stronger the academic power exercised by the members of an editorial
board. From this point of view, it is possible to consider editorial boars as engines of academic
power. A possible way for studying the role of editors consists in observing the presence of
the same editors on the boards of different journals. The network of journals generated by the
presence of the same person on the editorial board of more than one journal is called an Inter-
locking Editorship network (IE) (Baccini, Barabesi, and Marcheselli 2009; Baccini 2009; Baccini
and Barabesi 2011; Baccini and Barabesi 2014). Thus, if two journals share the same persons
on their editorial boards, it can be assumed that they have at least similar or complementary
editorial policies, since they are managed by similar groups of scholars (Baccini, Barabesi, and
Marcheselli 2009). From another perspective, editors have the power to drift the paper selection
processes toward decisions favoring department colleagues, or disciples, and so on (Laband and
Piette 1994; Klein and DiCola 2004). In this sense the IE network can be used to try to identify
some kind of favoritism in the refereeing processes (Erfanmanesh and Morovati 2017), or for
illustrating the self-referentiality of national communities of scholars (Baccini 2009).
A second social community gathered around scholarly journals is constituted by the authors
of the published articles. While many studies exist about authorship and co-authorship, only a
few are focused on the communities of authors of specific journals (Potts, Hartley, Montgomery,
Neylon, and Rennie 2017).
In turn, it is possible to work analogously to the IE network by
considering the journal network generated by the scholars authoring papers in different journals.
The network among journals generated by the crossed presence of the same authors in different
journals could be called the Interlocking Authorship (IA) network. To the best of our knowledge,
this kind of network has been rarely explored (Brogaard, Engelberg, and Parsons 2014; Ni,
Sugimoto, and Cronin 2013; Ni, Sugimoto, and Jiang 2013). In the IA network, the proximity
2
between two journals can be considered proportional to the number of common authors. Such a
proximity is, in some sense, intellectual since it is based on the choices made by authors on where
to publish their papers, and on decisions of the editors to accept or not to publish those papers.
The community of authors around a journal thus reflects to a certain degree the contents of the
journal and the activity of the gatekeepers of the journal. If two journals are in proximity, it
can be supposed that they have similar contents and that their editorial policies are similar or
complementary.
Scholarly journals contribute to the definition of the intellectual landscapes of research fields.
Co-citation analysis is probably the best known instrument for studying the intellectual proxim-
ity among authors, papers and journals (Small 1973). For instance, if two authors are frequently
cited together in many different papers, this suggest that these two persons are somehow intel-
lectually connected by the topic or methodology of their work. Similarly, two different journals
often cited together in the same paper suggest that these journals are connected. The more
often they are cited together the stronger the link between these authors or journals. We thus
obtain a network connecting the journals based on their being often cited together. Let us call
this network CC as it is based on a different measure than those obtained through IE and IA.
In this paper we consider the IE, IA, CC networks of journals summarily described above
and we compare the degree of proximity of journals in the three networks. The first intuitive
question is to what extent these three networks are similar. If two journals are well connected
in the CC network, that is if they have a strong intellectual proximity, does a similar proximity
exists in the IA or IE network? The basic idea is to explore to what extent the social proximity
among journals observed in the network of the editorial boards is similar to the social/intellectual
proximity observed in the IA network and in the intellectual proximity in the CC network.
This question is explored by considering the IE, IA and CC networks in three fields: eco-
nomics (EC), statistics (STAT), and information and library science (ILS). Two reasons justify
the choice of the three fields. The first one is practical: for the three fields data on the edi-
torial boards of journals were already available because they had been collected by two of the
authors in a previous research project. Data on editorial boards have to be collected by hand.
Hence, their availability is a big advantage. The second reason is that scholars in the three fields
differ in the way they use scholarly journals as outlet for publishing research results. While
in statistics journals articles are largely dominant, scholars in economics and in information
and library sciences continue to write book chapters and books (Kulczycki, Engels, Pölönen,
Bruun, Dušková, Guns, Nowotniak, Petr, Sivertsen, Istenič Starčič, and Zuccala 2018). Hence
the similarity analysis considered three different scholarly communication contexts.
For each field we compare the three networks as a whole by using suitable statistical tech-
niques. Subsequently, for each field, we partition the three networks in "communities of journals"
and we analyze the coherence of these communities between pairs of networks.
The paper is organized as follow. Section 2 contains the technical definitions used in the rest
of the paper and the description of the methodology adopted for empirical analysis. Section 3
contains the outcome of the analysis. Section 4 discusses the results and Section 5 concludes by
3
suggesting further steps of the present research.
2 Journal networks data
The journal networks considered here are all one-mode (Wasserman and Faust 1994). In an IE
network, nodes are scholarly journals and the edge between two journals indicates that at least
one scholar sits in the board of the two. Each edge can be weighted by the number of common
editors between the linked journals. Analogously, in the IA networks, the edges between journals
are generated by common authors and the weight of the edge is the number of common authors.
Finally in a CC network, the edge between journals is generated by the fact that the two journals
are cited together at least in one article; the weight of the edge is the number of articles citing
the two journals together.
We have constructed the three networks (IE, IA, CC) for the three fields for a total of nine
networks. For IE networks, as anticipated, we used three existing databases, each containing
the journal editorial boards in a given year. Details on their collection and normalization can
be found in the papers referenced below. Moreover, IA and CC networks were constructed by
using Web of Science (WoS) data for a five years time-period starting from the year for which
the IE was recorded. The raw data for the nine one-mode networks can be downloaded from
https://doi.org/10.5281/zenodo.3350797.
For economics, we considered a set of 169 journals listed in the EconLit database, and indexed
in the Journal Citation Reports for the year 2006. The IE network (Figure 1) was extracted
from the database collected by Baccini and Barabesi (2010) for the year 2006. The IA (Figure
2) and CC (Figure 3) networks for economic journals were built on WoS data, by considering
respectively the authors of and the references in the papers published in the journals in the years
2006-2010.
For the field of statistics, the set includes the 79 journals listed in the category "Statistics
and probability" of the Journal Citation Reports for the year 2005. IE data (Figure 4) are the
ones collected in Baccini, Barabesi and Marcheselli (2009) for the year 2006. Similarly, for the
discipline of statistics, IA (Figure 5) and CC (Figure 6) networks were built using WoS data, by
considering papers published in the years 2006-2010.
Finally, for the domain of information and library sciences, the set includes the 59 journals
listed in the category "Information science and library science" of the Journal Citation Reports
for the year 2008. IE data (Figure 7) are the ones collected in Baccini and Barabesi (2011) for
the year 2010. Again, IA (Figure 8) and CC (Figure 9) networks were built on WoS data, by
considering papers published in the years 2010-2014.
In Figures 1-9 the size of a node is proportional to its degree and the width of an edge
is proportional to the value of the link.
In the IE network, for example, the size of a node
is proportional to the number of journals to which it is linked; the width of the link between
two nodes is proportional to the number of their common editors. For each field, the visual
comparison of the three networks is hardly informative. For instance, it is apparent that for
all three fields, the IE networks are less connected than the IA and CC networks. Also, in the
4
Table 1: Generalized distance correlations between networks
Networks
co-citation vs editor
co-citation vs author
editor vs author
Rd
√
P-value
√
P-value
√
P-value
Rd
Rd
Statistics
Information and library sciences
Economics
0.5947
0.00001
0.6431
0.00001
0.5985
0.00001
0.5386
0.00058
0.6389
0.00001
0.4969
0.00382
0.5228
0.00001
0.7518
0.00001
0.5112
0.00001
center of the networks there are not always the same journals; and a journal may have a different
size in the three networks. We therefore need a better way of comparing networks.
3 Dissimilarities among networks
For each network, it is possible to build a pseudo-measure of the distance among journals by
calculating a matrix of dissimilarities. The Jaccard index was adopted as a dissimilarity measure
(for more details on the Jaccard index, see e.g. Levandowsky and Winter (1971)). More precisely,
if A and B represent the sets containing the members of the editorial boards of two journals,
the Jaccard dissimilarity is defined as
J(A, B) =
A ∪ B − A ∩ B
A ∪ B
(1)
As an example, in the IE network, the similarity among journals is proportional to the number
of common editors in their boards. Hence, the minimum dissimilarity J(A, B) = 0 is reached
when two journals have exactly the same editorial board, i.e. all the editors of a journal are
also the editors of the other and vice versa. The maximum dissimilarity J(A, B) = 1 is reached
when two journals have no editors in common.
In order to compare the three dissimilarity
matrices arising from co-citation, editorial board and author networks for each discipline, we
adopt the generalized distance correlation Rd suggested by Omelka and Hudecová (2013) on
the basis of the seminal proposal by Székely et al. (2007). It should be remarked that such a
correlation index avoids the drawbacks emphasized by Dutilleul et al. (2000) when the classical
Mantel coefficient is assumed instead (Omelka and Hudecova 2013). Hence, we considered the
three possible couples of networks and we computed the corresponding values of
Rd for each
discipline. It is worth noting that Rd is somehow similar to the squared Pearson correlation
coefficient - and hence
Rd should be interpreted as a generalization of the usual correlation
coefficient. More precisely, Rd is defined in the interval [0, 1], in such a way that values close
to zero indicate no or very weak association, while larger values suggest a stronger association,
which is perfect for Rd = 1 - and similar considerations obviously hold for
Rd (for more details,
see e.g. Omelka and Hudecová (2013)). The generalized distance correlation was evaluated in
the R-computing environment (R Core Team 2018) by using the R function dcor in the package
energy (Rizzo and Székely 2018). These values of
√
Rd are reported in Table 1.
√
√
√
5
√
From the analysis of Table 1, the dependence between the considered dissimilarity matrices
is apparent. Indeed, the observed values of
Rd are greater than (or nearly equal to) the value
0.5 for each combination of networks in the three disciplines. Moreover, the permutation test for
assessing independence, as proposed by Omelka and Hudecová (2013), was also carried out. The
statistical details of the permutation test are rather involved, even if they are clearly explained
by Omelka and Hudecová (2013). Loosely speaking, the rationale behind the test stems from the
fact that, under the null hypothesis of independence, the generalized distance correlation should
not be affected by a random permutation of the rows and the corresponding columns of the
"centred" distance matrices. The permutation principle is widely adopted in order to carry out
nonparametric inference, since assumptions are minimal and practical implementation is often
straightforward (see e.g. Lehmann and Romano (2005), Section 10). The permutation test of
independence was in turn implemented by using the package energy (Rizzo and Székely 2018).
The significance of the test statistic was computed by means of the R function dcov.test (for more
details Omelka and Hudecová (2013)). On the basis of the achieved P-values given in Table 1,
the independence hypotheses can be rejected at the significance level α = 0.01. Since the three
statistical tests within each discipline are obviously dependent, we also consider the Bonferroni
procedure in order to control the familywise error rate (for more details, see e.g. Bretz, Hotorn
and Westfall (2011)). Thus, by assuming such a procedure and a global significance level given by
α = 0.01, the marginal independence hypotheses may be rejected if the corresponding P-values
are less than α/3 = 0.0033, which is the case for all the considered tests - except the editorial
board and author networks for information and library sciences. However, it is worth remarking
that - even in this case - the corresponding P-value is just slightly larger than the threshold.
Hence, the co-citation, editorial board and author networks display structures which may be
considered associated for each considered discipline - at least on the basis of the considered
dissimilarity matrices.
4 Correlations among communities of journals
The proximity among journal networks can be explored by focusing on communities of journals.
The first step consists in detecting communities inside each network; the second in verifying
the degree of association between the communities detected in different networks of the same
field. A non-overlapping community of nodes of a network is a set of nodes densely connected
internally and only sparsely connected with external nodes. Each network is partitioned in
communities by using the Louvain algorithm (Blondel, Guillaume, Lambiotte, and Lefebvre
2008) as implemented in the software Pajek (de Nooy, Mrvar, and Batagelj 2018). It consists
in the optimization of the modularity of the network (Newman 2004; Newman and Girvan
2004). The quality of the partition is quantitatively measured by modularity values. Table 2
reports the values of modularities and the resolution parameters adopted for optimization. The
resolution parameter is used to control the size of the communities detected; higher values of
the parameter produce larger number of communities and viceversa. Table 2 also reports the
number of communities detected.
6
Table 2: Main features of networks and communities
Information and library sciences
Economics
Density
Average degree
Isolated journals
Resolution
Modularity
n. communities
E-I unweighted
E-I weighted
n. non-isolated communities
Statistics
CC
0.671
52.379
IA
0.91
70.962
IE
0.0935
5.423
CC
0.644
37.356
0
1
3
3
0
1
4
4
9
1
14
5
0
1
3
3
IE
0.121
9.443
4
1
0.4
10
6
0.108
0.171
0.528
0.266
0.444
0.09
0.218
-0.04
-0.309
0.22
-0.141
0.41
-0.02
-0.425
-0.651
0.201
-0.355
0.108
-0.202
0.322
0.131
0.435
0.038
IE
0.07
11.751
CC
0.566
95.053
IA
0.744
125.001
7
1
16
9
0
1
4
4
0
1
5
5
IA
0.764
44.339
0
0.8
0.329
3
3
0.2
-0.328
For all the pairs of the networks inside each research field, the association between the result-
ing communities is then analyzed by using statistical techniques as available in Pajek (de Nooy,
Mrvar, and Batagelj 2018). All the indicators considered are adopted under an exploratory
approach. χ2 statistics provide an index aiming to assess the degree of independence of the par-
titions of each pair of networks. Cramér's V is a measure of association giving a value between 0
(no association) and +1 (perfect association) (Cramér 1946). Rajski's coherence (Legendre and
Legendre 1998) is presented in three variants, all defined in [0,1] range: a symmetrical version in-
dicating the coherence between each pair of classification; and two asymmetrical versions called
in Table 3 "Rajski's right" and "Rajski's left". When the communities in the IE-CC networks
are considered, Rajski's left indicates the extent to which the first communities classification
IE is able to predict the second communities classification CC; Rajski's right indicates instead
the extent to which the second classification is able to predict the first. Finally, the adjusted
Rand index measures the degree of association between partitions and is bounded between ±1
(Hubert and Arabie 1985). All indices are reported in Table 3.
For the three fields analyzed here, we observe that the IE is the least dense network and
the network with the lowest average degree. For the three fields, the CC networks are in the
intermediate position for density and average degree, and finally the IA networks have the highest
values of density (0.91 for statistics) and average degree (Wasserman and Faust 1994).
In general, the community detection algorithm was more successful in sparser networks: for
the three fields, the values of modularity are indeed the highest for the IE network, intermediate
for CC and lowest for IA. In the IE networks many detected communities are actually isolated
journals, i.e.
journals with no common editors with other considered journals. In every case,
the number of communities detected in the IE networks is always bigger than the number of
communities detected in the other networks.
Information and library sciences is the field where the communities are more easily detectable
and more clearly defined, as shown by the highest modularity values and by the lowest values
of the E-I indices (Table 2) (de Nooy, Mrvar, and Batagelj 2018).
In particular for the IA
network, communities were detected by adopting a resolution value of 0.8. This resolution was
preferred to the value of 1 adopted for all the other networks, because the resulting communities
exhibited better E-I indices1. The E-I index was calculated as the difference between the number
1With a value of resolution of 1 the IA network is partitioned in 4 communities, with modularity 0.257, E-I
unweighted= 0.255 and E-I weighted=−0.083.
7
s
e
i
t
i
n
u
m
m
o
c
n
e
e
w
t
e
b
s
e
x
e
d
n
i
n
o
i
t
a
i
c
o
s
s
A
:
3
e
l
b
a
T
A
I
-
C
C
9
3
6
.
0
9
2
2
.
0
1
5
3
.
0
8
9
3
.
0
5
6
2
.
0
s
c
i
m
o
n
o
c
E
A
I
-
E
I
5
1
6
.
0
7
0
2
.
0
1
3
4
.
0
4
8
2
.
0
2
.
0
)
2
1
(
9
2
.
7
0
2
)
0
6
(
4
3
.
5
5
2
)
5
4
(
8
5
.
9
9
1
C
C
E
I
-
7
2
6
.
0
1
7
1
.
0
8
9
3
.
0
2
3
2
.
0
7
4
1
.
0
s
e
c
n
e
i
c
s
y
r
a
r
b
i
l
d
n
a
n
o
i
t
a
m
r
o
f
n
I
A
I
-
C
C
)
4
(
8
6
.
8
6
A
I
-
E
I
C
C
E
I
-
)
6
2
(
1
5
.
0
8
)
6
2
(
5
4
.
5
7
3
6
7
.
0
4
3
4
.
0
7
1
6
.
0
4
9
5
.
0
3
0
5
.
0
6
2
8
.
0
1
0
3
.
0
9
7
6
.
0
1
5
3
.
0
3
0
3
.
0
9
9
7
.
0
9
7
2
.
0
4
2
6
.
0
6
3
3
.
0
6
9
2
.
0
A
I
-
C
C
)
6
(
5
8
.
0
8
5
1
7
.
0
2
1
3
.
0
4
2
5
.
0
5
3
4
.
0
4
4
4
.
0
A
I
-
E
I
s
c
i
t
s
i
t
a
t
S
8
0
7
.
0
1
9
2
.
0
7
2
5
.
0
4
9
3
.
0
6
4
3
.
0
C
C
E
I
-
9
5
6
.
0
7
0
2
.
0
8
4
4
.
0
8
7
2
.
0
9
4
2
.
0
)
7
2
(
8
8
.
8
1
1
)
8
1
(
9
5
.
8
6
)
.
f
.
d
(
2
χ
V
s
'
r
é
m
a
r
C
s
'
i
k
s
j
a
R
t
h
g
i
r
s
'
i
k
s
j
a
R
t
f
e
l
s
'
i
k
s
j
a
R
x
e
d
n
i
d
n
a
R
.
j
d
A
8
of edges within communities and the number of edges between communities; that difference is
then divided for the total number of edges of the network. The weighted version of the index is
calculated by considering the value of the edges. The range of the index is between -1 (all edges
are inside communities) and 1 (all edges are between communities). The χ2 values show that the
detected communities for the three networks are not independent. The association between the
partitions of communities as measured by Cramér's V is high. The highest level of association as
measured by the adjusted Rand's index is found between communities detected in the CC and
IA networks. Rajski's right indicates that the communities detected in the IE network predict
well the communities detected in the other networks.
The field of statistics is in an intermediate position: the values of modularity are very low
for CC and IA networks, nevertheless the resulting partitions have negative values of the E-I
weighted indices. Communities in the IE network are more easily detectable and more clearly
defined than in the IA and especially in the CC network. Also in this field, the χ2 values show
that the detected communities for the three networks are not independent. The association
between the partitions of communities is a bit higher between CC and IA than for the other
pairs of networks. Also in this case Rajski's right indicates that the communities of the IE
network predict well the communities in the other two networks.
For the case of economics, community detection is particularly problematic, i.e. small changes
of the value of the resolution parameter changed substantially the number of detected commu-
nities and the values of the indicators considered. For CC and IA, the community detection
procedure results in very low values of modularity and in positive values of E-I. Only for the IE
network the modularity is around 0.5 and the value of the E-I weighted index is less than zero.
Also in this field the χ2 values show that detected communities for the three networks are not
independent. The association between the partitions of communities is the lowest of the three
fields analyzed in this paper. Rajski's right indicates also for economics that the communities in
the IE network predict the communities in the other two networks, but the values of the index
are the lowest of the three.
5 Discussion and conclusions
The main aim of this paper was to explore, by using suitable quantitative techniques, to what
extent the intellectual proximity among scholarly journals is also a proximity in terms of social
communities gathered around the journals.
For representing the intellectual proximity among journals we have used the CC network.
For having information about the academic communities around journals, we have considered
the networks of journals generated by authors writing in more than one journal as well as the
networks generated by scholars sitting in the editorial board of more than one journal. The first
step of the exploratory analysis consisted of comparing the whole structure of the networks on
the basis of dissimilarity matrices. The CC, IE and IA networks appear to be associated for all
the three considered fields. The second step consisted of partitioning the IE, IA and CC networks
in communities and then in verifying the degree of association among the detected communities.
9
The results of that analysis show that the communities detected in the three networks are not
independent for the three research fields considered. The results of both approaches are coherent
in showing that the strongest correlations between networks is between CC and IA for the three
fields. Lower and similar correlations were obtained for CC and IE, and for IE and IA. When
communities are considered, the strongest association between communities is between CC and
IA networks; the minimum level of association is between IE and CC.
To the best of our knowledge, the only similar analysis was performed by Ni, Sugimoto and
Cronin (2013) in their investigation of scholarly communication. They focused on information
and library sciences, by considering networks of journals generated by common authors, co-
citation, common topics and common editors. They descriptively compared clusters of journals
between networks and calculated a correlation between pairs of matrices by using the quadratic
assignment procedure. Their results appears to be coherent with the ones presented here since
they estimated statistically significant correlations for networks of journals based on authors,
co-citation and editors.
Overall, the results of our analysis show that the intellectual proximity is also a proximity
among authors and, more surprisingly, among editors of the journals. This leads to the question
of whether the structures obtained could ever be independent if the same set of people were
predominantly involved in the editorial boards, the publishing of papers, and the citing of
papers. In that case the structures are just a consequence of the existence of a publishing and
gatekeeping élite in the considered research fields.2 This is a topic worth to be investigated by
considering the dual-networks that we used for generating the nine one mode networks analyzed
in this paper. At the current state of knowledge, it is only possible to affirm that the map of
editorial power, the map of intellectual proximity and the map of author communities tell similar
stories. The fact that the results are comparable for the three fields studied suggests that the
method presented here is more generally applicable to any scientific field and that there should
be in general a coherence among journals at the three scales of 1) editorial boards, 2) authors
choice of publications and 3) co-citations.
References
Baccini, A. (2009). Italian economic journals. a network-based ranking and an exploratory
analysis of their influence on setting international professional standards. Rivista Italiana
degli Economisti 14 (3), 491 -- 511.
Baccini, A. and L. Barabesi (2010). Interlocking editorship. a network analysis of the links
between economic journals. Scientometrics 82 (2), 365 -- 389.
Baccini, A. and L. Barabesi (2011). Seats at the table: The network of the editorial boards
in information and library science. Journal of Informetrics 5 (3), 382 -- 391.
Baccini, A. and L. Barabesi (2014). Gatekeepers of economics: the network of editorial boards
in economic journals. In A. Lanteri and J. Vromen (Eds.), The Economics of Economists,
2We owe this observation to one of the two reviewers.
10
pp. 104 -- 150. Cambridge: Cambridge University Press.
Baccini, A., L. Barabesi, and M. Marcheselli (2009). How are statistical journal linked? a
network analysis. Chance 22 (3), 34 -- 43.
Blondel, V. D., J.-L. Guillaume, R. Lambiotte, and E. Lefebvre (2008, oct). Fast unfolding
of communities in large networks. Journal of Statistical Mechanics: Theory and Experi-
ment 2008 (10), P10008.
Bretz, F., T. Hothorn, and P. Westfall (2011). Multiple Comparisons Using R. Boca Raton:
CRC Press.
Brogaard, J., J. Engelberg, and C. A. Parsons (2014). Networks and productivity: Causal
evidence from editor rotations. Journal of Financial Economics 111 (1), 251 -- 270.
Cramér, H. (1946). Mathematical Methods of Statistics. Princeton: Princeton University Press.
Crane, D. (1967). The gatekeepers of science: Some factors affecting the selection of articles
of scientific journals. American Sociologist 32 (2), 195 -- 201.
Csiszar, A. (2018). The Scientific Journal. Authorship and Politicis of Knwoledge in the Nine-
teenth Century. Chicago: Chicago University Press.
de Nooy, W., A. Mrvar, and V. Batagelj (2018). Exploratory Social Network Analysis with Pa-
jek. Revised and expanded edition for updated software. Cambridge: Cambridge University
Press.
Dutilleul, P., J. D. Stockwell, D. Frigon, and P. Legendre (2000). The mantel test versus pear-
son's correlation analysis: Assessment of the differences for biological and environmental
studies. Journal of Agricultural, Biological, and Environmental Statistics 5 (2), 131 -- 150.
Erfanmanesh, M. and M. Morovati (2017). Interlocking editorships in scientific journals. Sci-
ence and Engineering Ethics 2017.
Heckman, J. J. and S. Moktan (2018). Publishing and promotion in economics: The tyranny
of the top five. National Bureau of Economic Research Working Paper Series No. 25093.
Hoenig, B. (2015). Gatekeepers in social science. In J. D. Wright (Ed.), International En-
cyclopedia of the Social and Behavioral Sciences (Second Edition), pp. 618 -- 622. Oxford:
Elsevier.
Hubert, L. and P. Arabie (1985). Comparing partitions. Journal of Classification 2 (1), 193 --
218.
Klein, D. B. and T. DiCola (2004). Institutional ties of journal of development economics
authors and editors. Econ Journal Watch 1 (2), 319 -- 330.
Kulczycki, E., T. C. E. Engels, J. Pölönen, K. Bruun, M. Dušková, R. Guns, R. Nowotniak,
M. Petr, G. Sivertsen, A. Istenič Starčič, and A. Zuccala (2018). Publication patterns in
the social sciences and humanities: evidence from eight european countries. Scientomet-
rics 116 (1), 463 -- 486.
11
Laband, D. N. and M. J. Piette (1994). Favoritism versus search for good papers: Empirical ev-
idence regarding the behavior of journal editors. The Journal of Political Economy 102 (1),
194 -- 203.
Legendre, P. and L. Legendre (1998). Numerical Ecology. Amsterdam: Elsevier Science.
Lehmann, E. and J. Romano (2005). Testing Statistical Hypotheses. New York, Springer.
Levandowsky, M. and D. Winter (1971). Distance between sets. Nature 234 (5323), 34 -- 35.
Newman, M. E. J. (2004, Jun). Fast algorithm for detecting community structure in networks.
Phys. Rev. E 69, 066133.
Newman, M. E. J. and M. Girvan (2004, Feb). Finding and evaluating community structure
in networks. Phys. Rev. E 69, 026113.
Ni, C., C. R. Sugimoto, and B. Cronin (2013). Visualizing and comparing four facets of
scholarly communication: producers, artifacts, concepts, and gatekeepers. Scientomet-
rics 94 (3), 1161 -- 1173.
Ni, C., C. R. Sugimoto, and J. Jiang (2013). Venue-author-coupling: A measure for identifying
disciplines through author communities. Journal of the American Society for Information
Science and Technology 64 (2), 265 -- 279.
Omelka, M. and S. Hudecova (2013). A comparison of the mantel test with a generalised
distance covariance test. Environmetrics 24 (7), 449 -- 460.
Potts, J., J. Hartley, L. Montgomery, C. Neylon, and E. Rennie (2017). A journal is a club: a
new economic model for scholarly publishing. Prometheus 35 (1), 75 -- 92.
R Core Team (2018). R: A Language and Environment for Statistical Computing. Vienna,
Austria.
Rizzo, M. and G. Székely (2018). E-statistics: Multivariate inference via the energy of data.
R package 'energy' version 1.7-5.
Small, H. (1973). Co-citation in the scientific literature: A new measure of the relationship
between two documents. Journal of the American Society for Information Science 24,
265 -- 269.
Székely, G. J., M. L. Rizzo, and N. K. Bakirov (2007). Measuring and testing dependence by
correlation of distances. The Annals of Statistics 35 (6), 2769 -- 2794.
Todeschini, R. and A. Baccini (2016). Handbook of Bibliometric Indicators. Quantitative Tools
for Studying and Evaluating Research. Weinheim (Germany): Wiley-VCH.
Wasserman, S. and K. Faust (1994). Social Network Analysis: Method and Application. Cam-
bridge: Cambridge University Press.
12
s
l
a
n
r
u
o
j
c
i
m
o
n
o
c
e
f
o
k
r
o
w
t
e
n
p
i
h
s
r
o
t
i
d
e
g
n
i
k
c
o
l
r
e
t
n
I
:
1
e
r
u
g
i
F
13
s
l
a
n
r
u
o
j
c
i
m
o
n
o
c
e
f
o
k
r
o
w
t
e
n
p
i
h
s
r
o
h
t
u
a
g
n
i
k
c
o
l
r
e
t
n
I
:
2
e
r
u
g
i
F
14
s
l
a
n
r
u
o
j
c
i
m
o
n
o
c
e
f
o
k
r
o
w
t
e
n
n
o
i
t
a
t
i
c
-
o
C
:
3
e
r
u
g
i
F
15
s
l
a
n
r
u
o
j
l
a
c
i
t
s
i
t
a
t
s
f
o
k
r
o
w
t
e
n
p
i
h
s
r
o
t
i
d
e
g
n
i
k
c
o
l
r
e
t
n
I
:
4
e
r
u
g
i
F
16
s
l
a
n
r
u
o
j
l
a
c
i
t
s
i
t
a
t
s
f
o
k
r
o
w
t
e
n
p
i
h
s
r
o
h
t
u
a
g
n
i
k
c
o
l
r
e
t
n
I
:
5
e
r
u
g
i
F
17
s
l
a
n
r
u
o
j
l
a
c
i
t
s
i
t
a
t
s
f
o
k
r
o
w
t
e
n
n
o
i
t
a
t
i
c
-
o
C
:
6
e
r
u
g
i
F
18
s
l
a
n
r
u
o
j
s
e
c
n
e
i
c
s
y
r
a
r
b
i
l
d
n
a
n
o
i
t
a
m
r
o
f
n
i
f
o
k
r
o
w
t
e
n
p
i
h
s
r
o
t
i
d
e
g
n
i
k
c
o
l
r
e
t
n
I
:
7
e
r
u
g
i
F
19
s
l
a
n
r
u
o
j
s
e
c
n
e
i
c
s
y
r
a
r
b
i
l
d
n
a
n
o
i
t
a
m
r
o
f
n
i
f
o
k
r
o
w
t
e
n
p
i
h
s
r
o
h
t
u
a
g
n
i
k
c
o
l
r
e
t
n
I
:
8
e
r
u
g
i
F
20
s
l
a
n
r
u
o
j
s
e
c
n
e
i
c
s
y
r
a
r
b
i
l
d
n
a
n
o
i
t
a
m
r
o
f
n
i
f
o
k
r
o
w
t
e
n
n
o
i
t
a
t
i
c
-
o
C
:
9
e
r
u
g
i
F
21
|
1501.05921 | 1 | 1501 | 2015-01-23T19:19:19 | The Spatial Structure of Transnational Human Activity | [
"cs.SI",
"physics.soc-ph"
] | Recent studies have shown that the spatial structures of animal displacements and local-scale human motion follow L\'{e}vy flights. Whether transnational human activity (THA) also exhibits such a pattern has however not been thoroughly examined as yet. To fill this gap, this article examines the planet-scale spatial structure of THA (a) across eight types of mobility and communication and (b) in its development over time. Combining data from various sources, it is shown that the spatial structure of THA can indeed be approximated by L\'{e}vy flights with heavy tails that obey power laws. Scaling exponent and power-law fit differ by type of THA, being highest in refuge-seeking and tourism and lowest in student exchange. Variance in the availability of resources and opportunities for satisfying associated needs appears to explain these differences. Over time, the L\'{e}vy-flight pattern remains intact and remarkably stable, contradicting the popular idea that socio-technological trends lead to a "death of distance." Longitudinal change occurs only in some types of THA and predominantly at short distances, indicating regional shifts rather than globalization. | cs.SI | cs | The Spatial Structure of
Transnational Human Activity∗
Emanuel Deutschmann
Bremen International Graduate School of Social Sciences
School of Humanities and Social Sciences, Jacobs University Bremen
[email protected]
Draft version, November 8, 2018
Abstract
Recent studies have shown that the spatial structures of animal displacements and local-scale
human motion follow Lévy flights. Whether transnational human activity (THA) also exhibits
such a pattern has however not been thoroughly examined as yet. To fill this gap, this article
examines the planet-scale spatial structure of THA (a) across eight types of mobility and
communication and (b) in its development over time. Combining data from various sources,
it is shown that the spatial structure of THA can indeed be approximated by Lévy flights with
heavy tails that obey power laws. Scaling exponent and power-law fit differ by type of THA,
being highest in refuge-seeking and tourism and lowest in student exchange. Variance in the
availability of resources and opportunities for satisfying associated needs appears to explain
these differences. Over time, the Lévy-flight pattern remains intact and remarkably stable,
contradicting the popular idea that socio-technological trends lead to a "death of distance."
Longitudinal change occurs only in some types of THA and predominantly at short distances,
indicating regional shifts rather than globalization.
Keywords: transnationalism, mobility, communication, Lévy flight, power law, globalization
1.
Introduction
A hungry shark searching for prey in the ocean will frequently move short distances, interrupted
by random changes of direction that are only occasionally followed by moves over longer
distances. Sorting the displacement lengths covered in this journey by size and frequency
results in a distribution with a long tail that obeys a power law1. Such mobility patterns,
so-called Lévy flights2, have been shown to occur not only in the foraging movements of sharks
and other marine predators like sea turtles and penguins (Sims et al., 2008), but also in the
motion of smaller species like plankton (Bartumeus et al., 2003). For humans, Lévy-like patterns
have been found in local (Gonzalez, Hidalgo and Barabasi, 2008; Song et al., 2010; Rhee et al.,
2011), and nation-wide mobility (Brockmann, Hufnagel and Geisel, 2006). Whether planet-scale
human activity also follows a Lévy flight has however not been thoroughly examined to date.
While this natural-scientific strand of research on Lévy flights has largely omitted the global
sphere as yet, the social-scientific literature that deals with the global sphere has conversely
not taken the findings of the Lévy-flight debate into account. On the contrary, it is dominated
by the idea that technological and socioeconomic trends have led to a diminishing or even
vanishing role of physical distance in structuring human activity. Symptomatic are shibboleths
∗I am grateful to the participants of the BIGSSS Colloquium at Jacobs University Bremen for invaluable comments
on an earlier version of this paper, to the World Tourism Organization for generously granting me access to their data
on global tourism flows and to Lea Kliem for assistance in compiling the online friendship matrix used in this study.
5
1
0
2
n
a
J
3
2
]
I
S
.
s
c
[
1
v
1
2
9
5
0
.
1
0
5
1
:
v
i
X
r
a
like "demise of geography" (Toffler, 1970), "time-space compression" (Harvey, 1989), "end of
geography" (O'Brien, 1992), "collapse of space" (Kirsch, 1995), "death of distance" (Cairncross,
1997), and "flat world" (Friedman, 2007). Although a third stream of research has argued that
such statements are exaggerated and that geographic space (still) structures social relations,
a rigorous empirical analysis of the association between physical distance and planet-scale
human activity is also missing in the social sciences.
The persistence of this research gap and the stark contrast between the natural- and social-
scientific positions is astonishing given that many problems humanity is facing today, from
health epidemics like H5N1 and Ebola to climate change and terrorism, are heavily intertwined
with transnational human mobility and communication. Driven by the hope that a better
understanding of how people move around the world can contribute to solving such pressing
social problems, a group of researchers has recently challenged the scientific community to
get active and "to collect large-scale human mobility traces" (Hui et al., 2010). The aim of
this article is to respond to this call and to fill in some missing pieces, namely to add the
global-scale analysis to the natural-scientific Lévy-flight debate, and the Lévy-flight analysis
to the social-scientific globalization debate. In specific, we search for answers to the following
research questions:
1. Does the spatial structure of transnational human activity follow a Lévy-flight?
2. Does the spatial structure differ by type of activity, and if yes -- why?
3. Has the spatial structure of transnational human activity changed over time?
To do so, data on five types of mobility (asylum-seeking, migration, refuge-seeking, student mo-
bility, tourism) and three types of communication (phone calls, online friendships, remittances)
from a range of sources was standardized to cover the same set of 196 sending and receiving
countries (i.e. 38,220 country dyads). In total, the structure of approximately 1.8 million valued
ties across 47 network matrices at various time points between 1960 and 2010 are analyzed,
involving, inter alia, 1.7 billion tourist trips and 240 billion international phone call minutes.
While the online friendship dataset for instance is entirely new and thus original in itself, the
major innovation of this study is to link the hitherto disconnected natural- and social-scientific
debates by conducting the first encompassing comparative analysis of the spatial structure of
transnational human activity (a) at a planet-wide scale, (b) across various types of mobility and
communication, and (c) over time.
This article is organized as follows: in the next section, we review the existing literature and
theories concerning the spatial structure of human (and non-human) activity. We then set out
our own conceptual approach. Next, the data and methods are described. Finally, we present
the results, focusing first on the current spatial structure, then move to examining longitudinal
trends, and finally compare our results to theoretical scenarios and results from other studies.
We conclude with a summary of our findings and a discussion of their implications.
2. Theory and state of research
The literature on the spatial structure of human activity can be described as consisting of
three separate streams: (a) the Lévy-flight debate, (b) the geography-is-dead debate, and
(c) the distance-decay debate. In the following, we briefly review these streams of research,
highlighting their achievements and deficits.
2.1. The Lévy-flight debate
The Lévy-flight debate is carried out mainly by natural and complexity scientists and began
with research that showed that the motion patterns of many non-human species, from mammals
2
like spider monkeys (Ramos-Fernández et al., 2004) to marine predators like sharks, sea turtles
and penguins (Sims et al., 2008) and much smaller organisms like plankton (Bartumeus et al.,
2003), follow power laws. While some of the early alleged Lévy-flight diagnoses (e.g. for
albatrosses) turned out not to hold upon closer scrutiny (Buchanan, 2008), the debate remains
vital and was recently expanded to human mobility. Lévy-like mobility patterns have now been
found in studies that followed the GPS traces of volunteers on university campuses, theme
parks, state fairs, and in cities (Rhee et al., 2011; Noulas et al., 2012), the movements of mobile
phones (Gonzalez, Hidalgo and Barabasi, 2008; Song et al., 2010), and the traces of banknotes in
the United States (Brockmann, Hufnagel and Geisel, 2006).
The theoretical argument for the Lévy-flight pattern is -- at least for animal motion -- the
optimization of food search. It has been shown that in environments where food is scarce,
a power-law distribution of flight lengths with a scaling exponent β=2 is the optimal search
strategy (Viswanathan et al., 1999). For human mobility, though, the existing papers contain
little theoretical reflection as to why the Lévy flight should apply (e.g. whether the goals humans
pursue in their everyday life are readily equitable with foraging). Another critical point is that
in contrast to the random walk that underlies the Lévy-flight model, humans do not actually
move into random directions. It is more likely that the directions are determined by needs
humans seek to fulfil (Noulas et al., 2012) or the information they have about their environment
(Miller, 1972). Yet, while this discrepancy has repeatedly been recognized (Rhee et al., 2011;
Song et al., 2010), little has been done to overcome it. The biggest shortcoming of the Lévy-flight
debate however are its current scale and data restrictions: US-dollar bills for instance can only
be used in the United States and "it remains unclear whether the observed properties are
specific to the US or whether they represent universal features" (Brockmann and Theis, 2008,
p. 33). Two recent studies (Cheng et al., 2011; Noulas et al., 2012) have shown that log-ins to
location sharing services (LSS) like Foursquare follow a Lévy-flight pattern on a global scale.
Yet, LSS require smartphone access and are used only by a small, well-off minority of the world
population. Mainstream forms of planet-scale mobility and communication (including poverty-
driven ones) are disregarded by the Lévy-flight debate as yet, as is potential longitudinal change.
2.2. The geography-is-dead debate
The idea of a decline and eventual vanishing of the role of space in structuring human interaction
has a long history and takes many facets. Already in the mid-19th century, Marx and Engels
argued that "[i]n place of the old local and national seclusion and self-sufficiency, we have
intercourse in every direction, universal interdependence of nations" (1948, p. 12). Later, Marx
coined the term "annihilation of space by time" to describe the tendency of capital (and in its
wake all parts of society) to "tear down every spatial barrier to intercourse" (1973, p. 539). In
1962, McLuhan argued that the "new electronic interdependence recreates the world in the
image of a global village" (1962, p. 31). A decade later, Toffler coined the term "demise of
geography" arguing that in contrast to the nomads of the past who were bound by place, "the
new nomads of today leave the physical structure behind" (1970, p. 91). Similarly, O'Brien
argued for an "end of geography" (1992) in financial markets, while Cairncross maintained
that "[t]he death of distance as a determinant of the cost of communicating will probably be
the single most important force shaping society in the first half of the next century" (1997, p.
1). Friedman stated that we recently entered a new era of globalization which "is shrinking
the world from a size small to a size tiny and flattening the playing field" (2007, p. 10). The
central characteristic of this new era, he argued, was "the newfound power for individuals
to collaborate and compete globally" (Ibid). Numerous other terms, such as "time-space
compression" (Harvey, 1989), "collapse of space" (Kirsch, 1995), and "shrinking world" (Allen
and Hamnett, 1995) have been proposed to describe this phenomenon.
The recurrent argument in this debate is that technological innovations, declining costs
3
and massive growth of transport and communication infrastructure lead to a world in which
physical distance plays a smaller or even no role at all anymore, first and foremost for flows
of money and messages, but also for the movement of commodities and individuals. The
geography-is-dead debate in its current and past forms has largely been driven by theoretical
arguments with little empirical grounding. Yet its arguments have been highly influential in the
social sciences and popular in the public sphere. It is completely detached from the Lévy-flight
debate, but another stream of more empirics-oriented research, the distance-decay debate, has
-- explicitly and implicitly -- referred to it critically.
2.3. The distance-decay debate
This third stream of research acknowledges the (continuing) salience of distance in structuring
human activity, however usually without analyzing the precise shape of this relation as in the
Lévy-flight debate. Most studies do not go beyond the notion that physical proximity (still)
matters. A typical statement, which became known as Tobler's First Law of Geography, is:
"Everything is related to everything else, but near things are more related than distant things"
(Tobler, 1970, p. 236). Other central terms are the "principle of least effort" (Zipf, 1949) and
"distance decay". "Distance decay" is used in a wide range of fields from criminology, where it
is known that offenders tend to commit crimes in proximity to their residency (Rengert, Piquero
and Jones, 1999), to eco-geography, where studies found that biological similarity decreases
with geographical distance (Soininen, McDonald and Hillebrand, 2007). In military science, the
continued importance of the "loss of strength gradient" has been emphasized (Webb, 2007).
Several studies on international trade and transport costs have explicitly criticized the idea of a
"death of distance" as exaggerated (Kano, Kano and Takechi, 2013), unfounded (Leamer and
Levinsohn, 1995), or even maintained the opposite: that instead of diminishing or disappearing,
the effect of distance on trade rather increased during the 20th century (Disdier and Head,
2008).3
With respect to human mobility, Ravenstein (1885) already studied the "laws of migration"
using census data from England in the 19th century. Although his contemporaries thought that
the term "laws" was inappropriate (Ibid, p. 233), he realized that the large majority of migrants
only moved short distances while few migrants moved long distances. Later, Stouffer (1940)
presented graphically a spatial distribution of family movements in Cleveland that featured a
heavy tail. Concerning transnational human activity, the central structuring role of geographical
distance has been recognized in a number of empirical studies. For transactions like diplomatic
exchange and mail flows, geographic proximity was described as "the most compelling force
of attraction in the international system" (Brams, 1966, p. 889), "a very pronounced influence
and constraint on the pattern of West European communications and interactions" (Clark and
Merritt, 1987, p. 226) and "one of the major factors in global communication networks" (Choi,
1995, p. 181). McKercher, Chan and Lam (2008) used the concept of "distance decay" in relation
to international tourism. Focusing on 41 countries, they show that 80 percent of all international
travel occurs to countries within 1,000km distance. Pertaining to the supposedly placeless
digital world, a recent study on the spatial structure of the internet found an effect of physical
distance in the form of a power law with a cutoff (Tranos and Nijkamp, 2013), while another
study only reported that the structure of transnational Facebook friendships was "apparently
influenced by geography" (Ugander et al., 2011, p. 13). Takhteyev, Gruzd and Wellman (2012,
p. 78) showed a distribution of Twitter messages by geographical distance in which distance
clearly mattered, however again without analyzing this relation further.
Two explanations have been put forward as to why human mobility is affected by geographic
space (cf. Miller, 1972; Noulas et al., 2012). The first one, the gravity hypothesis, is inspired by
Newton's law of gravity and states that costs connected to distance itself are responsible for
fewer long distance movements (cf. Deutsch and Isard, 1961; Zhou, 2011). The second one, the
4
intervening opportunities hypothesis, argues that it is not the costs of distance itself that matter,
but intervening opportunities that allow to fulfill one's needs already at close distances, making
long-distance mobility unnecessary (cf. Stouffer, 1940; Freymeyer and Ritchey, 1985).
While in many ways more differentiated than the geography-is-dead debate, an encompass-
ing analysis of the precise shape of the relation between distance and various types of human
activity on a global scale is also missing in this stream of research. Moreover, to our knowledge
no study has tracked change in the spatial structure of human mobility and communication
over time.
3. Conceptual approach
Our aim is to analyze and compare the spatial structure of various types of transnational
human activity (THA). We use THA as an umbrella term for transnational human mobility
(THM), which denotes activities in which individuals cross nation-state borders physically, and
transnational human communication (THC), which comprises communicative acts across nation-
state borders that do not necessarily involve physical mobility. Starting from the Lévy-flight
debate, we first test to which extent various types of THA feature a probability distribution
whose tail follows a power-law function of the form
P(r) ∝ r−β,
(1)
where P(r) is the probability of a displacement length r to occur and β is the scaling
exponent. A larger β means that the curve is steeper, i.e. relatively more activity occurs at
short distances, whereas a smaller β denotes a flatter relation, i.e. relatively more activity takes
place over longer distances. We expect β and the fit of this power-law function (measured
as R2) to vary by type of THA. For THM, the logic of our argument, which is inspired by
the distance-decay debate (and in specific the intervening opportunities hypothesis), is the
following: if we accept the assumptions that
1. THM is associated with type-specific goals,
2. the availability of opportunities for goal-attainment varies by goal
3. the average amount of resources available to attain goals varies by type of THM,
4. humans aim at spending as little of their resources as necessary to attain their goals,
then the spatial structure of a specific type of THM i can be expected to be determined by
two factors: the availability of opportunities for attainment of the goals associated with i and
the resources available on average to the individuals engaging in i. The broader the availability
of opportunities for goal-attainment, the higher is the likelihood for individuals to stop their
movement at closer locations (and thus the higher R2 and β), because their needs are already
fulfilled to a satisfying extent and any further movement would only diminish the stack of
resources without leading to additional benefits. Similarly, the higher the average amount of
resources available to the group of people engaging in a particular type of THM, the less they
will be physically bound by the costs of THM (and thus the lower R2 and β), ceteris paribus.
The real world is of course more complex, but still this simple model may help to obtain a first
explanation for systematic differences between spatial structures of various THM types.
Our considerations allow to delineate specific expectations for the five types of THM under
study (Table 1). Major goals commonly associated with refuge- and asylum-seeking are mere
survival, fulfillment of basic needs and security. These goals can usually be fulfilled in many
places, oftentimes already in neighboring countries just outside a warzone. The resource
stock available to refugees and asylum-seekers tends to be rather low. As a result, the spatial
structure of refuge- and asylum-seeking is expected to feature a high power-law fit and scaling
5
Table 1: Theoretical expectations concerning THM
Major goal(s)
Ubiquity
Resources Power-
High
High
fit
law
(R2)
High
Low
Medium Medium-
high
Scaling
exponent
(β)
Large
Medium-
high
Refugees
and
asylum-seekers
Tourists
Migrants
Students
Survival, fulfilment of
basic needs, security
Entertainment, pleas-
ant environment/ busi-
ness opportunities
Economic well-being
Education, distinction
Medium Medium Medium Medium
Low
Small
High
Low
exponent. Tourists are often interested in a pleasant, entertaining environment (if on holidays)
or in business opportunities (if on business trips). Both are widely available in many countries
around the world (and easier to pursue in closer ones, e.g. due to cultural similarity), but tourists
are likely to possess more resources on average than refugees. Therefore, R2 and β should still
be high for tourism but slightly lower than for refuge-seeking. Migrants are often interested in
improving their economic well-being, which is quite stratified globally and although moving
short distances may already result in relative improvements, moving a bit further may in many
cases still lead to additional benefits. Migrants are also likely to possess more resources on
average than refugees, so that overall we expect a medium R2 and β. International students
tend to aim for excellent education and social distinction, which is best available only in a
small number of institutions in a select number of countries, as the global university system is
highly stratified (Barnett and Wu, 1995). In theoretical terms, this stratification leads to a lack
of intervening opportunities: students cannot just go to neighboring countries but have to reach
England or the US to attain their goals. Therefore -- and because international students will
also be comparatively well-situated on average -- we expect low R2- and β-values for student
exchange.
For THC, our argument is inspired by the geography-is-dead debate. First of all, the spatial
structure of THC will to some extent be a function of THM, as people will often communicate
with friends, kin or business partners that have gone abroad. Yet, over and above, there may
be variance inherent to the specific type of THC that depends on its technological standard
and usage cost structure. This argument can easily be explained by comparing phone calls
with online friendships. The two networks are similar in that both should to a certain extent
resemble THM. Yet, they are different in that the monetary costs of international telephone
communication are relatively high and increase with distance (Cairncross, 1997, p. 6), while
the material costs of online friendships are low and independent of distance: for someone
from Switzerland, having an online friendship with an Austrian is as cheap as having one
with an Australian, but calling Australia by phone is far more expensive than calling Austria.
Accordingly, we expect the spatial structure of online friendships to be "flatter" and more
detached from the power-law pattern (reflected in lower β and R2 values) than the spatial
structure of phone calls. Remittances are special in that they are additionally influenced by
economic power and we refrain from formulating a specific hypothesis about its spatial structure
ex ante.
In the longitudinal part of the analysis, we build on the geography-is-dead debate's argu-
ments in expecting the world to become "flatter" with globalization, and thus the type-specific
R2- and β-values to decline over time. In a final analytical step, we contrast the empirical THA
distribution with three ideal geography-is-dead scenarios.
6
Table 2: Types of THA used
THA Type
THM Asylum seekers
Migrants
Refugees
Students
Tourists
Individual
weight
(%)
0.1
16.9
0.8
0.2
82.0
THC Online friendships
Phone calls
Remittances
33.3
33.3
33.3
Combined
weight
(%)
Available
years
Data source(s)
60
40
UNHCR (2013)
2010
1960-2010 World Bank, UN (2012)
2000-2010 UNHCR (2013)
1960-2010
1995-2010 UNWTO (2014)
PINA, UNESCO (2013)
n.d.
1983-1995
2010
Facebook (2012)
PINA, ITU
World Bank
4. Research design
4.1. Data
This study is based on directed network matrices for eight types of THA at various time
points between 1960 and 2010 as well as an undirected matrix for geographic distance, all
of which were standardized4 to cover the same set of 196 sending and receiving countries
(full list available upon request). Each of the 53 THA matrices thus contains information
on 196 × 196 − 196 = 38, 220 country dyads. For the measurement of geographic distance we
draw on CEPII's GeoDist dataset (Mayer and Zignago, 2011). We use the weighted geodesic
distance (distwces), which provides the average distance between countries based on the spatial
distribution of the population in the countries' 25 largest cities. Table 2 provides a summary of
the eight types of THA under study.
Of the eight types of THA, five involve physical mobility (THM): asylum-seeking, migration,
refuge-seeking, student exchange, and tourism. Data on asylum- and refuge-seeking was obtained
from UNHCR. According to the 1951 Refugee Convention (as broadened by a 1967 Protocol), a
refugee is defined as a person who:
"owing to well-founded fear of being persecuted for reasons of race, religion,
nationality, membership of a particular social group or political opinion, is outside
the coun-try of his nationality and is unable or, owing to such fear, is unwilling to
avail himself of the protection of that country; or who, not having a nationality and
being outside the country of his former habitual residence as a result of such events,
is unable or, owing to such fear, is unwilling to return to it." (UNHCR, 2014a)
An asylum-seeker in turn is "someone who says he or she is a refugee, but whose claim has
not yet been definitively evaluated" (UNHCR, 2014b). Data on migration was extracted from
the World Bank's Global Bilateral Migration Dataset for the years 1960 to 2000 (Özden et al.,
2011), supplemented by United Nations data for the year 2010 (UN, 2012). The latter source
defines migrants as "foreign-born" persons, or, where data on place of birth is unavailable, as
"foreign citizens" (UN, 2012, p. 3). Information on transnational student mobility was obtained
from Princeton's International Networks Archive (PINA)5 for the years 1960 to 1998 and from
UNESCO for the years 2000 to 2010. UNESCO defines international students as "[s]tudents
who have crossed a national or territorial border for the purposes of education and are now
7
enrolled outside their country of origin" (UNESCO, 2010, p. 264). Data on tourism, available
from 1995 to 2010, was obtained from the World Tourism Organization (UNWTO), according
to which "[a] visitor (domestic, inbound or outbound) is classified as a tourist (or overnight
visitor) if his/her trip includes an overnight stay" (UNWTO, 2008). Here, we are interested in
"arrivals of non-resident tourists at national borders, by country of residence"6. Note that this
definition does not premise any specific visiting purpose and may thus include business travel
just as holiday trips.
Three types of THA under study represent indirect communication (THC): online friend-
ships, phone calls, and remittances. Online friendships are based on Facebook data which was
retrieved from an interactive graph that is available online (Facebook, 2012) and converted into
a network matrix. For each country c, this matrix contains the five countries with which c's
population has most Facebook friendships with, ranked from 5 (highest number of Facebook
friendships) to 1 (fifth-highest number of Facebook friendships). Data on international phone
calls (measured in million minutes) from 1983 to 1995 originates from the International Telecom-
munication Union (ITU) and was retrieved from PINA (cf. Louch, Hargittai and Centeno,
1999). Information on remittances was obtained from the World Bank (cf. Ratha and Shaw,
2007). Remittances can be defined as "current private transfers from migrant workers who
are considered residents of the host country to recipients in the workers' country of origin"
(WorldBank, 2011, p. xvi). We regard remittances as a type of THC because they are transfers
between individuals that "often involve related persons" (IMF, 2005, p. 75) and can thus be
understood as expressions of support or solidarity, and ultimately as a form of communication.
In addition to analyzing these eight activity types individually, we are also interested in
getting an idea of what the spatial structure of THA looks like as a whole. The multiplexity of
human mobility and communication, i.e. the variety of ways in which people interact, needs to
be addressed as concentrating on single activity types alone may lead to biases (Stopczynski
et al., 2014). To do so, we link the activity types in three indices. First, a THM index, in which
the cell values of the 2010 matrices of the five types of mobility are added up. This simple
procedure is reasonable because all mobility networks are based on the same unit of analysis
(individuals moving between countries). As shown in Table 2, the weight in the THM index
differs drastically by mobility type, with tourists and migrants making up for 82.0 and 16.9
percent, respectively, whereas asylum seekers, refugees7, and students taken together account
for only 1.1 percent of all THM. Second, a THC index is created from the latest available matrix
of the three forms of communication under study. This is less straightforward as the units
differ between the types of THC (remittances are in US-Dollar, phone calls in minutes, etc.). We
deal with this issue by normalizing the units and calculating the average value across the three
types of THC, giving each of them the same weight. Third, we create a THA index by adding
the standardized values of THM and THC, giving a weight of .6 to the former and a weight
of .4 to the latter. The purpose of these factors is to account for the fact that physical mobility
requires more effort than indirect communication and should therefore receive more weight.
The overall indices should be understood as only providing a tentative impression of THM,
THC, and THA as a whole, because (a) we do not include all conceivable activity types, (b) the
size of the weighting factors in the latter two indices is to a certain extent arbitrary, and (c) not
all elements date from the same year (although our finding of long-term stability [see below]
indicates that older data can readily be used as a proxy). Despite these shortcomings, we think
that our indices constitute a significant first step to covering the multiplex nature of THA.
4.2. Methods
In order to determine the spatial structure of THA, we compare the empirically observed
probability density functions of distances r (in km) to the ideal pattern of a power-law distri-
bution and describe to which extent the two are similar. To do so, we use the curvefit module in
8
Figure 1: Probability density functions of THA and their power-law fit
9
Stata, which provides a goodness-of-fit measure (R2) and other relevant parameters like the
scaling exponent β.
While the potential step lengths and directions are continuous in real physical space, here
they are limited to a specific set based on the grid of the world's nation-states. In order to solve
the issue that not every conceivable distance actually exists in this real-world set of country
dyads (leading to spurious gaps) while some country pairs coincidentally feature the very same
distance (resulting in spurious spikes), individual observations had to be binned first, i.e. step
lengths that lie close to each other needed to be aggregated (cf. Buchanan, 2008). After trial
computations with lower and higher step lengths, we decided to use a bin width of 500km as a
reasonable compromise between inflating the variance and overly flattening the distribution.
The binning results in a reduction of data points, i.e. the 38,220 original observations in each
matrix are pooled into 39 meta-observations. In fitting the power law, we focus on the tail of
the binned distribution (i.e. the part to the right of the global maximum, which lies at 500km
for most activity types). This is necessary because activity at short distances (i.e. left of the
global maximum) is artificially restricted as we focus on transnational activity alone and cannot
capture the huge amount of activity occurring within countries.
As a robustness check, we partially repeated the analysis with Kernel-weighted local poly-
nomial smoothing using an Epanechnikov-kernel function and the ROT-bandwidth estimator,
which minimizes the conditional weighted mean integrated squared error. This procedure, in
which the number of observations remains at 38,220, leads to similarly high power-law fits
(results available upon request). Due to space restrictions, we only present the findings from
the more parsimonious binning method.
5. Results
We first examine the spatial structure of THA today, then turn to the analysis of longitudinal
trends, and finally compare our findings to theoretical scenarios and results from other studies.
5.1. The spatial structure of transnational human activity today
Fig. 1 shows the probability density distributions of all types of THA under study at the latest
available point in time. The dots represent binned empirical observations, whereas the solid
lines depict power-law curves that are fitted to the tails of the empirical distributions. The
goodness-of-fit is indicated by the R2 in the upper right corner (0=no fit, 1=perfect fit), by
which the subgraphs are sorted. The scaling exponent β, placed below the R2, indicates the
steepness of the power-law curve. To additionally illustrate the power-law fit, the insets show
the distributions and curves on logarithmic axes (on which the power law takes the form
of a straight line along which the observations should cluster), for displacement lengths of
r ≤ 15, 000km.
Concerning THM (Fig. 1A), the power-law fit is highest for refuge-seeking (R2=.996), and
just slightly lower for tourism (R2=.982), asylum-seeking (R2=.951), and migration (R2=.931).
Only for student exchange does the power law not fit the empirical distribution well (R2=.799).
The spatial structure of student exchange differs from that of the other THA types in that there
is a second peak at middle-range distances (approx. 7,000-14,000km). A closer look at the data
reveals that this peak results mainly from large flows between three country pairs (China -- US,
India -- US, and Australia -- UK), which fits our assumption about the role of the global university
system's heavy stratification and the related lack of intervening opportunities. The scaling
exponent β is highest for refuge-seeking (β=2.13), medium-high for tourism (β=1.62), medium
for migration (β=1.47), and small for asylum-seeking (β=1.19) and student exchange (β=0.73).
Apart from the unexpected low β for asylum-seekers8, the theoretically expected order holds,
indicating that type-specific goal-attainment opportunities and available resources help predict
10
spatial structures of human mobility across nation-state borders. THM as a whole also clearly
follows a power law (R2=.977, β=1.51).
Regarding THC (Fig. 1B), the power-law fit and scaling exponent are highest for online
friendships (R2=.968, β=1.19), lower for phone calls (R2=.897, β=1.13), and smallest for re-
mittances (R2=.886, β=0.95). The smaller scaling exponent for analogue phone calls in 1995
compared to digital Facebook friendships in the late 2000s is clearly at odds with the popular
argument that lower communication costs lead to a "death of distance", or at least to a flatter
probability density distribution -- surprisingly, our data suggests the opposite.
With respect to THA as a whole (Fig. 1C), we again find an excellent power-law fit (R2=.974,
β=1.21), indicating that most human activity beyond nation-state borders today only spans rela-
tively short distances and genuinely global mobility and communication is still extremely rare.
Contrary to popular notions about the detachment of human activity from spatial constraints
in the age of globalization in the geography-is-dead debate, the forces of physical space seem
to be intact. But is THA today, compared to the past, at least somewhat more globalized? To
answer this question, we now turn to analyzing trends over time.
5.2. Developments over time
To investigate longitudinal trends, we look at four different indicators: the overall amount of
THA (Fig. 2A), the percentage of THA that takes place at relatively short distances (Fig. 2B), the
power-law fit (Fig. 2C), as well as the scaling exponent β (Fig. 2D).
Fig. 2A illustrates that almost all types of THA have seen massive growth over the years.
The number of transnationally mobile students (depicted by triangles) grew exponentially from
255,000 in 1960 to 2.9 million in 2010, an 11.5-fold increase. Transnational phone-call minutes
(depicted by crosses9) increased from 12.4 billion in 1983 to 56.6 billion in 1995, rising 4.6-fold in
little more than a decade. Similarly, the number of transnational tourists (depicted by diamonds)
rapidly grew from 457.6 million in 1995 to 987.3 million in 2010, an increase of 115.8 percent.
The number of migrants (depicted by squares) was estimated to be 91.2 million in 1960 and
more than doubled (plus 123.6 percent) to 204.0 million in 2010. Only the number of refugees
(depicted by circles) does not follow a clear direction over time. All in all, the amount of THA
has increased dramatically10 over the last decades.
By contrast, Fig. 2B-C show a remarkable degree of over-time stability when it comes to
the spatial structure of THA. Fig. 2B illustrates the percentage of THA that takes place at
displacement lengths of r ≤ 5, 000km, i.e. at distances shorter than about 1⁄4 of the largest
possible distance between two countries. For comparison: the driving distance between Seattle
and Miami is 5,400km. We are thus talking about relatively short distances at the planet scale.
The graph reveals two things: (a) the percentage of mobility and communication that takes
place below this threshold varies between types of THA, and (b) it remains strongly attached to
these type-specific levels over time. For students, the percentage of stays abroad at distances of
r ≤ 5, 000km remained at about 50.3 percent (standard deviation σ = 2.6 percent) over a period
of fifty years. Similarly, in every decade from 1960 to 2010, about 77.7 percent (σ = 1.8 percent)
of migrants moved these relatively short distances. At nine measured time points between
1995 and 2010, the fraction of tourists that went such short distances varied closely around 86.2
percent (σ = 0.9 percent). For refugees, the share was about 90.2 percent (σ = 2.5 percent). Only
phone calls (mean: 71.9 percent, σ = 2.7 percent) appear to witness a slow but constant drop --
yet the development of refuge-seeking during the 2000s shows how quickly such a trend can
reverse. Overall, the consistently low standard deviations highlight the robustness of the spatial
structure of THA over time. Similarly, the power-law fit (Fig. 2C) remains remarkably stable.
For phone calls, it remains solid at about .886 (σ = .014). In the case of migration, it varies
steadily around .950 (σ = .023). Tourism and refuge-seeking remain at the ceiling, with fits of
.986 (σ = .005) and .986 (σ = .009) respectively. For student exchange there are some ups and
11
e
m
i
t
r
e
v
o
s
d
n
e
r
T
:
2
e
r
u
g
i
F
12
Figure 3: Log-log plots of THA over time
downs, but all in all the power-law fit oscillates around .768 (σ = .052). Thus, the power-law fit
is another indicator of the startling long-term stability of the spatial structure of THA.
Per contra, Fig. 2D shows a mixed picture when it comes to the development of the scaling
exponent β, i.e. the "flatness of the world". For tourists and migrants (which together represent
98.9 percent of all THM) a steady drop in the size of β can be observed. For migration, this
decrease is first visible in the 1980s, after two decades of absolute stability. With respect to
phone calls, we see only a slight gradual decrease over time. Concerning refugees, β first drops
between 2000 and 2004, but then increases again until 2010. For students on the other hand, the
scaling exponent remains more or less stable at a low level. This finding of partial stability and
partial flattening can be examined more closely in log-log plots (Fig. 3).
The graphs in Fig. 3 show the best-fitting power-law lines (which form straight lines here, as
both axes are logarithmic) for the spatial structures of the four types of THA with a clear β-value
trend, at various points in time. To visualize both absolute growth and relative shifts, the
y-axes now show the actual amount of mobility and communication taking place. Remarkable
differences become apparent: for students and phone calls (Fig. 3A-B), the fitted power-law
13
curves form parallel lines that just move upwards on the y-axes as the number of students and
phone-call minutes increases over time. In other words, student exchange and phone calls grow
at more or less the same rate at all distances over time, thus retaining their spatial structures'
shapes. For tourists and migrants (Fig. 3C-D) however, the picture looks different. Here, the
lines still move upwards, but also become flatter over the years. This difference shows that no
universal trends hold for all types of THA, underlining the fruitfulness of our comparative
approach.
At first sight, there appears to be a contradiction between the over-time stability observed
in Fig. 2B and the shifts unveiled in Fig. 3C-D. Are at least some types of THA "globalizing"
over time or not? The seeming paradox can be resolved by reminding oneself that the straight
lines in Fig. 3 are only imaginary -- in reality (i.e. on regular axes) they form heavily bended
curves. Shifts that are meaningful in size only occur within the short-distance range (i.e. at
displacement lengths of r ≤ 5, 000km), leaving the share of long-distance THA practically unaf-
fected. Therefore, these changes should rather be taken as signs of regionalization (i.e. gradual
extensions of the spatial reach of THA at a regional scale) than as evidence for globalization. At
the planet-wide scale, stability prevails -- even for tourism and migration (as visible in Fig. 2B).
5.3. Relation of our results to theoretical scenarios and other studies
So far, we have mainly adhered to the Lévy-flight debate's approach in our analysis and only
made allusions to the geography-is-dead debate en passant in the longitudinal analysis by
assuming a "flattening" world. In this last analytical step, we examine what would happen if the
geography-is-dead debate's statements were understood in a stricter sense and distance played
no role at all anymore. To do so, Fig. 4 compares the empirically observed spatial structure of
THA (our overall index, depicted by the solid line) to various hypothetical scenarios.
The first one, the strict geography-is-dead scenario, shows what the distribution would look like
if the probability of activity to occur would literally be the same at all distances (a "flat world"
in Friedman's terms). The second one, the distance scenario, refines this assumption by taking
the actual geographic distribution of country dyads in the world into account. As short and
long distances are empirically less common than middle-range distances, the relation would be
reverse-u-shaped if the amount of activity was the same between each of the 38,220 existing
country pairs (reminiscent of Marx and Engels's "universal interdependence of nations"). The
third one, the population scenario, is a further refinement that takes into consideration that
countries differ by population. It shows what would happen if each individual in each country
had the same chance of going to any other country independent of its geographic location (akin
to Toffler's new nomads who "leave the physical structure behind").
It immediately becomes apparent that none of the three scenarios comes anywhere near the
actual data. In reality, far more THA occurs at short distances and far less at longer distances
than the geography-is-dead hypothesis in its strict sense would suggest. The dotted power-law
line, which we include here again for comparison, shows that the Lévy-flight is much better
at realistically representing the spatial structure of THA than any geography-is-dead scenario.
Again, we find that distance is not dead at all.
Finally, we are also able to compare our findings to those of other studies at lower geographic
scales and for different species. Concerning local human mobility, Gonzalez, Hidalgo and
Barabasi (2008) report a scaling exponent of β=1.75, while Brockmann, Hufnagel and Geisel
(2006) specify β=1.59 for national human mobility in the US. Our value for transnational human
mobility is only slightly lower with β=1.51 and practically identical to the β=1.50 reported by
Noulas et al. (2012) for the global structure of LSS log-ins, which may be taken as an indicator
of robustness. For a set of marine predators, Sims et al. (2008) found β=2.12, whereas for spider
monkeys, Ramos-Fernández et al. (2004) name β=2.18. This consistent ranking of the scaling
exponents could indicate that while mobility follows a Lévy-flight pattern at all geographical
14
Figure 4: The relation of empirical THA to theoretical scenarios
scales and across many species, the scaling exponent is smaller (i.e.
longer distances are
relatively more common) in humans than in non-human species and at higher geographic scales
than at lower geographic scales. With due caution not to over-interpret these numbers (which
are known to be susceptible to fluctuation), we leave this impression to further scrutiny by
future research.
6. Summary and conclusion
Starting from contradicting propositions of largely disconnected debates in the natural and social
sciences, this article comparatively analyzed the worldwide spatial structure of transnational
human activity (THA) across eight different types of mobility and communication and in its
development over time. Four findings should be highlighted:
1. Contrary to popular social scientific accounts, geography is not "dead". The large majority
of THA still occurs at short distances and truly global mobility and communication con-
tinues to be scarce. The spatial structure of THA is similar to that of animal displacements
and local-scale human motion in that it can be approximated by Lévy flights with heavy
tails that obey power laws.
2. Scaling exponent and power-law fit differ by type of mobility, being highest in refuge-
seeking and tourism and lowest in student exchange. This pattern suggests that the
availability of opportunities for attaining type-specific goals as well as the resource stock
disposable on average to the individuals engaging in a specific mobility type play a role
in determining the precise shape of the spatial structure.
3. For communication, we observe that distance is stronger in determining online friend-
ships in the late 2000s than analogous phone calls more than a decade earlier. This
finding is completely at odds with Cairncross's popular argument that declining costs of
communication lead to a "death of distance".
4. Despite dramatic increases in the absolute amount of transnational mobility and com-
munication over the years, the Lévy-flight pattern remains intact and remarkably stable
over time. Longitudinal change occurs only for some types of THA and predominantly at
15
short distances, indicating shifts at the regional level rather than globalization.
Overall, our findings suggest that geography still shapes the patterns of planet-scale human
activity -- be it physical mobility or indirect communication. Where humans interact across
nation-state borders, they are very likely to do so with neighboring countries and within the
world regions they live in. The discrepancy between our findings and popular accounts of
globalization -- from McLuhan's "global village" to Friedman's "flat world" -- may indicate
that we as humans tend to overestimate our capability to transcend nature. Despite the profound
technological, socio-economic and infrastructural revolutions that took place during the last
half century -- from the end of the bipolar world system after the fall of the iron curtain to the
rise of mass tourism and the dawn of the internet age -- the overall patterns of human mobility
remain largely unchanged, bound to the same natural laws as the motion of all kinds of species,
from plankton to penguin.
With this study, we aimed at filling a gap in the Lévy-flight debate by conducting an encom-
passing analysis of the spatial structure of planet-scale human activity, and at complementing
the geography-is-dead debate by subjecting some of its propositions to a rigorous empirical test.
Now we can say that our findings fit the Lévy-flight model well, whereas the death-of-distance
arguments turned out not to hold under closer scrutiny for individual human mobility and
communication. This result underlines the need for sociologists to engage in research trends
beyond the boundaries of their own discipline. We deem further exchange concerning this topic
across natural- and social-scientific camps highly desirable.
There are many paths future empirical research could take: for one thing, it should be
gainful to abandon the global perspective to comparatively examine the spatial structure by
world region or separately for the world system's center and periphery. Another productive
next step would be to compare the over-time stability of THA with the longitudinal systemic
stability found in other domains, e.g. in the tripartite global wealth structure (Babones, 2005).
Furthermore, future research should aim at going beyond the Lévy-flight debate's simplistic
assumption of a random walker. As the directions of human activity are actually not random
(Rhee et al., 2011; Song et al., 2010), it needs to be scrutinized which factors (economic, political,
legal, cultural, etc.) influence where humans go. Our analysis of the role of opportunities for
type-specific goal-attainment and the average amount of available resources may be seen as
a sketchy first step into this direction that needs to be further expanded.11 Finally, it would
be desirable to link our insights with other fields of research that are heavily intertwined with
THA, from global food supplies and transportation to electricity transmission and the spread of
epidemics. We share the hope of Hui et al. (2010) that new insights into how we as humans
move and communicate worldwide may eventually help tackle such pressing global problems.
Notes
1. A power law describes the relationship between two quantities, where one quantity varies
at the power of the other. Mathematically, the power-law relation between two quantities y
and x can be defined as y = ax−β, where a is a prefactor and β is the scaling exponent. Power
laws are common in the social and natural world and have been shown to exist in phenomena
as diverse as the gamma-ray intensity of solar flares (Clauset, Shalizi and Newman, 2009),
the sizes of strike waves (Biggs, 2005), and the distribution of accusations between detainees
(Deutschmann, 2014).
16
2. A Lévy flight is a random walk (i.e. a succession of steps into random directions) in which
the step-lengths feature a heavy-tailed probability distribution. For a precise mathematical
definition, cf. Shlesinger and Klafter (1986). In empirical research, Lévy flights are diagnosed
by "showing that the power-law distribution holds" (Buchanan, 2008, p. 715).
3. In contrast to the Lévy-flight debate's assumption of a non-linear power-law relation, these
economic studies seem to assume a linear relation (e.g., when describing the influence of
distance on trade in the form of a single "distance coefficient" or "elasticity"), as such mean
effect sizes would otherwise be rather meaningless.
4. The set of 196 countries in the standardized matrices was obtained by excluding countries
that were not contained in the original datasets of all types of THM under study. For some types
of THC, the original set of countries was smaller and the matrices were artificially expanded. We
decided to follow this inclusive approach as a more exclusive one would have resulted in a small,
limited remainder of countries that would hardly allow speaking of a planet-scale analysis
anymore. We set missing values to zero in all matrices, thereby following the example of Reyes
(2013, p. 154), who showed the robustness of this approach for the UNWTO tourism dataset and
finds that alternative procedures like multiple imputation lead to similar outcomes. In order
to make the student and phone-call matrices from earlier years comparable with recent ones,
historic states were replaced with their currently existing "equivalents". For example, Dahomey
was equated with Benin, Upper Volta with Burkina Faso, and so on (full list of equations
available upon request). This procedure does obviously not do justice to the complexity of
historic developments, but what matters for the purposes of this article is a similar geographic
location, not precise historic equivalence. The World Bank migration data, which also goes back
to 1960, already comes in the form of currently existing states for all years in its original format.
5. Available at http://www.princeton.edu/~ina/, accessed 13/08/2013.
6. For a few countries this category is unavailable. In order not to lose these countries, the
category "arrivals of non-resident visitors at national borders" was used in these instances. In
cases where both these categories are missing, the category "arrivals of tourists in all types of
accommodation establishments" was used instead.
7. In some countries' census statistics, refugees are also counted as migrants, while in others
they are not (UN, 2012). The UN tries to account for this by including refugees in "most
developing countries" as migrants in the migration dataset (Ibd). It is therefore possible that
refugees are sometimes counted twice. However their small relative weight (0.8 percent) shows
that this issue has little practical consequences for the overall THM index.
8. The unexpected values for asylum-seeking should not be overinterpreted as the number
of asylum-seekers is relatively low, making the structure susceptible to rather meaningless
fluctuations.
9. For phone calls, post-1995 values are extrapolated by fitting an exponential trend line
(R2=.998) of the form y = 1E + 10e0.13x, where x is 1 in 1983, 2 in 1984, etc. This assumption of
exponential growth, which leads to an estimate of 380.9 billion minutes for 2010, is conservative
given that TeleGeography (2014, p. 2) estimates the international call volume to exceed 400
billion minutes in 2010.
10. One may want to consider that the world population also increased over time: in the 196
countries under study, it grew from 3.0 billion in 1960 to 6.9 billion in 2010 (short-dashed line in
Fig. 2A). Student mobility, tourism and phone calls grew at a faster rate, but, contrary to what
catchphrases like "age of migration" (Castles and Miller, 2005) suggest, the relative strength of
migrants as a share of the world population decreased during the 1960s, '70s, '80s, and '90s,
and only in 2010 reached the level it had in 1960.
11. In fact, this paper is part of a larger project in which this question is tackled.
17
References
Allen, John and Chris Hamnett. 1995. A Shrinking World?: Global Unevenness and Inequality.
Oxford: Oxford University Press.
Babones, Salvatore J. 2005. "The country-level income structure of the world-economy." Journal
of World-Systems Research 11(1):29 -- 55.
Barnett, George A and Reggie Yingli Wu. 1995. "The international student exchange network:
1970 & 1989." Higher Education 30(4):353 -- 368.
Bartumeus, Frederic, Francesc Peters, Salvador Pueyo, Celia Marrasé and Jordi Catalan. 2003.
"Helical Lévy walks: adjusting searching statistics to resource availability in microzooplank-
ton." Proceedings of the National Academy of Sciences 100(22):12771 -- 12775.
Biggs, Michael. 2005. "Strikes as forest fires: Chicago and Paris in the late nineteenth century."
American Journal of Sociology 110(6):1684 -- 1714.
Brams, Steven J. 1966. "Transaction flows in the international system." The American Political
Science Review 60(4):880 -- 898.
Brockmann, Dirk and Fabian Theis. 2008. "Money circulation, trackable items, and the emer-
gence of universal human mobility patterns." Pervasive Computing, IEEE 7(4):28 -- 35.
Brockmann, Dirk, Lars Hufnagel and Theo Geisel. 2006. "The scaling laws of human travel."
Nature 439(7075):462 -- 465.
Buchanan, Mark. 2008. "The mathematical mirror to animal nature." Nature 453(7196):714 -- 716.
Cairncross, Frances. 1997. The Death of Distance: How the Communications Revolution is Changing
our Lives. Boston, MA: Harvard Business School Press.
Castles, Stephen and Mark Miller. 2005. The Age of Migration. New York: Palgrave Macmillan.
Cheng, Zhiyuan, James Caverlee, Kyumin Lee and Daniel Z Sui. 2011. "Exploring millions of
footprints in Location Sharing Services." ICWSM 2011:81 -- 88.
Choi, Young. 1995. "The effect of social and physical distance on the global communication
networks." International Communication Gazette 54(2):163 -- 192.
Clark, Cal and Richard Merritt. 1987. European community and intra-European communications:
The evidence of mail flows. In Communication and Interaction in Global Politics, ed. Claudio
Cioffi-Revilla, Richard Merritt and Dina Zinnes. Newbury Park, CA: Sage Publications
pp. 209 -- 235.
Clauset, Aaron, Cosma Rohilla Shalizi and Mark EJ Newman. 2009. "Power-law distributions
in empirical data." SIAM review 51(4):661 -- 703.
Deutsch, Karl W and Walter Isard. 1961. "A note on a generalized concept of effective distance."
Behavioral Science 6(4):308 -- 311.
Deutschmann, Emanuel. 2014. "Between Collaboration and Disobedience: The Behavior of the
Guantánamo Detainees and its Consequences." Journal of Conflict Resolution ahead-of-print,
doi: 10.1177/0022002714545331.
Disdier, Anne-Célia and Keith Head. 2008. "The puzzling persistence of the distance effect on
bilateral trade." The Review of Economics and Statistics 90(1):37 -- 48.
18
Facebook. 2012. "Mapping the World's Friendships.".
URL: http: // www. facebookstories. com/ stories/ 1574
Freymeyer, Robert H and P Neal Ritchey. 1985. "Spatial Distribution of Opportunities and
Magnitude of Migration An Investigation of Stouffer's Theory." Sociological Perspectives
28(4):419 -- 440.
Friedman, Thomas L. 2007. The World is Flat. New York: Picador.
Gonzalez, Marta C, Cesar A Hidalgo and Albert-Laszlo Barabasi. 2008. "Understanding
individual human mobility patterns." Nature 453(7196):779 -- 782.
Harvey, David. 1989. The Condition of Postmodernity. Oxford: Blackwell.
Hui, Pan, Richard Mortier, Michal Piórkowski, Tristan Henderson and Jon Crowcroft. 2010.
Planet-scale human mobility measurement. In Proceedings of the 2nd ACM International Work-
shop on Hot Topics in Planet-scale Measurement. ACM.
IMF. 2005. Balance of Payments and International Investment Position Manual. Fifth Edition. Wash-
ington: International Monetary Fund.
Kano, Kazuko, Takashi Kano and Kazutaka Takechi. 2013. "Exaggerated death of distance:
Revisiting distance effects on regional price dispersions." Journal of International Economics
90(2):403 -- 413.
Kirsch, Scott. 1995. "The incredible shrinking world? Technology and the production of space."
Environment and Planning D 13:529 -- 529.
Leamer, Edward E and James Levinsohn. 1995. International trade theory: the evidence. In
Handbook of International Economics, ed. Gene Grossman and Kenneth Rogoff. New York:
Elsevier pp. 1339 -- 1394.
Louch, Hugh, Eszter Hargittai and Miguel Angel Centeno. 1999. "Phone calls and fax machines:
the limits to globalization." Washington Quarterly 22(2):83 -- 100.
Marx, Karl. 1973. Grundrisse: Introduction to the Critique of Political Economy. New York: Random
House.
Marx, Karl and Friedrich Engels. 1948. Manifesto of the Communist Party. New York: International
Publishers.
Mayer, Thierry and Soledad Zignago. 2011. "Notes on CEPII's distances measures: The GeoDist
database." CEPII Working Paper 2011-25 .
McKercher, Bob, Andrew Chan and Celia Lam. 2008. "The impact of distance on international
tourist movements." Journal of Travel Research 47(2):208 -- 224.
McLuhan, Marshall. 1962. The Gutenberg Galaxy. Toronto: University of Toronto Press.
Miller, Edward. 1972. "A note on the role of distance in migration: Costs of mobility versus
intervening opportunities." Journal of Regional Science 12(3):475 -- 478.
Noulas, Anastasios, Salvatore Scellato, Renaud Lambiotte, Massimiliano Pontil and Cecilia
Mascolo. 2012. "A tale of many cities: universal patterns in human urban mobility." PloS one
7(5):e37027.
O'Brien, Richard. 1992. Global Financial Integration: The End of Geography. New York: Council on
Foreign Relations Press.
19
Özden, Çaglar, Christopher R Parsons, Maurice Schiff and Terrie L Walmsley. 2011. "Where on
earth is everybody? The evolution of global bilateral migration 1960 -- 2000." The World Bank
Economic Review 25(1):12 -- 56.
Ramos-Fernández, Gabriel, José L Mateos, Octavio Miramontes, Germinal Cocho, Hernán
Larralde and Barbara Ayala-Orozco. 2004. "Lévy walk patterns in the foraging movements of
spider monkeys (Ateles geoffroyi)." Behavioral Ecology and Sociobiology 55(3):223 -- 230.
Ratha, Dilip and William Shaw. 2007. South-South Migration and Remittances. Number 102 World
Bank Publications.
Ravenstein, Ernest George. 1885. "The laws of migration." Journal of the Statistical Society of
London pp. 167 -- 235.
Rengert, George F, Alex R Piquero and Peter R Jones. 1999. "Distance decay reexamined."
Criminology 37(2):427 -- 446.
Reyes, Victoria. 2013. "The structure of globalized travel: A relational country-pair analysis."
International Journal of Comparative Sociology 54(2):144 -- 170.
Rhee, Injong, Minsu Shin, Seongik Hong, Kyunghan Lee, Seong Joon Kim and Song Chong.
2011. "On the levy-walk nature of human mobility." IEEE/ACM Transactions on Networking
(TON) 19(3):630 -- 643.
Shlesinger, Michael F and Joseph Klafter. 1986. Lévy walks versus Lévy flights. In On Growth
and Form, ed. Harry Stanley and Nicole Ostrowsky. Dordrecht: Martinus Nijhoff pp. 279 -- 283.
Sims, David W, Emily J Southall, Nicolas E Humphries, Graeme C Hays, Corey JA Bradshaw,
Jonathan W Pitchford, Alex James, Mohammed Z Ahmed, Andrew S Brierley, Mark A Hindell
et al. 2008. "Scaling laws of marine predator search behaviour." Nature 451(7182):1098 -- 1102.
Soininen, Janne, Robert McDonald and Helmut Hillebrand. 2007. "The distance decay of
similarity in ecological communities." Ecography 30(1):3 -- 12.
Song, Chaoming, Tal Koren, Pu Wang and Albert-László Barabási. 2010. "Modelling the scaling
properties of human mobility." Nature Physics 6(10):818 -- 823.
Stopczynski, Arkadiusz, Vedran Sekara, Piotr Sapiezynski, Andrea Cuttone, Mette My Madsen,
Jakob Eg Larsen and Sune Lehmann. 2014. "Measuring large-scale social networks with high
resolution." PloS one 9(4):e95978.
Stouffer, Samuel A. 1940. "Intervening opportunities: a theory relating mobility and distance."
American Sociological Review 5(6):845 -- 867.
Takhteyev, Yuri, Anatoliy Gruzd and Barry Wellman. 2012. "Geography of Twitter networks."
Social Networks 34(1):73 -- 81.
TeleGeography. 2014. "TeleGeography Report: Executive Summary.".
URL:
telegeography-report-database/ index. html
http: // www. telegeography. com/ research-services/
Tobler, Waldo R. 1970. "A computer movie simulating urban growth in the Detroit region."
Economic Geography pp. 234 -- 240.
Toffler, Alvin. 1970. Future shock. Random House LLC.
Tranos, Emmanouil and Peter Nijkamp. 2013. "The Death of Distance Revisited: Cyber-Place,
Physical and Relational Proximities." Journal of Regional Science 53(5):855 -- 873.
20
Ugander, Johan, Brian Karrer, Lars Backstrom and Cameron Marlow. 2011. "The anatomy of
the facebook social graph." arXiv preprint arXiv:1111.4503 .
UN. 2012. "Trends in International Migrant Stock: Migrants by Destination and Origin.
Documentation and Methodology.".
URL: http: // esa. un. org/ MigOrigin/
UNESCO. 2010. Global Education Digest 2010: Comparing Education Statistics Across the World.
Montreal: UNESCO Institute for Statistics.
UNESCO. 2013. "Inbound Internationally Mobile Students by Country of Origin.".
URL: http: // data. uis. unesco. org/ Index. aspx? queryid= 171
UNHCR. 2013. "Population Statistics Reference Database, United Nations High Commissioner
for Refugees.".
UNHCR. 2014a. "About Refugees.".
URL:
article&id= 179&Itemid= 54
http: // unhcr. org. au/ unhcr/ index. php? option= com_ content&view=
UNHCR. 2014b. "Asylum-seekers.".
URL: http: // www. unhcr. org/ pages/ 49c3646c137. html
UNWTO. 2008. International Recommendations for Tourism Statistics 2008. Madrid: UNWTO.
UNWTO. 2014. Compendium of Tourism Statistics Dataset. Madrid: UNWTO, data updated on
12/01/2014.
Viswanathan, GM, Sergey V Buldyrev, Shlomo Havlin, MGE Da Luz, EP Raposo and H Eugene
Stanley. 1999. "Optimizing the success of random searches." Nature 401(6756):911 -- 914.
Webb, Kieran. 2007. "The Continued Importance of Geographic Distance and Boulding's Loss
of Strength Gradient." Comparative Strategy 26(4):295 -- 310.
WorldBank. 2011. Migration and Remittances Factbook 2011, Second Edition. Washington: World
Bank.
Zhou, Min. 2011. "Intensification of geo-cultural homophily in global trade: Evidence from the
gravity model." Social Science Research 40(1):193 -- 209.
Zipf, George Kingsley. 1949. Human Behavior and the Principle of Least Effort. Addison-Wesley
Press.
21
|
1904.04626 | 1 | 1904 | 2019-04-09T12:43:33 | Distributed Computation of Top-$k$ Degrees in Hidden Bipartite Graphs | [
"cs.SI",
"cs.DC"
] | Hidden graphs are flexible abstractions that are composed of a set of known vertices (nodes), whereas the set of edges are not known in advance. To uncover the set of edges, multiple edge probing queries must be executed by evaluating a function $f(u,v)$ that returns either true or false, if nodes $u$ and $v$ are connected or not respectively. Evidently, the graph can be revealed completely if all possible $n(n-1)/2$ probes are executed for a graph containing $n$ nodes. However, the function $f()$ is usually computationally intensive and therefore executing all possible probing queries result in high execution costs. The target is to provide answers to useful queries by executing as few probing queries as possible. In this work, we study the problem of discovering the top-$k$ nodes of a hidden bipartite graph with the highest degrees, by using distributed algorithms. In particular, we use Apache Spark and provide experimental results showing that significant performance improvements are achieved in comparison to existing centralized approaches. | cs.SI | cs |
Distributed Computation of Top-k Degrees
in Hidden Bipartite Graphs
Panagiotis Kostoglou1, Apostolos N. Papadopoulos1, and
Yannis Manolopoulos2
1 Aristotle University of Thessaloniki, Greece,
panakost,[email protected],
2 Open University of Cyprus, Cyprus,
[email protected]
Abstract. Hidden graphs are flexible abstractions that are composed of
a set of known vertices (nodes), whereas the set of edges are not known
in advance. To uncover the set of edges, multiple edge probing queries
must be executed by evaluating a function f (u, v) that returns either true
or false, if nodes u and v are connected or not respectively. Evidently,
the graph can be revealed completely if all possible n(n − 1)/2 probes
are executed for a graph containing n nodes. However, the function f ()
is usually computationally intensive and therefore executing all possible
probing queries result in high execution costs. The target is to provide
answers to useful queries by executing as few probing queries as possible.
In this work, we study the problem of discovering the top-k nodes of
a hidden bipartite graph with the highest degrees, by using distributed
algorithms. In particular, we use Apache Spark and provide experimental
results showing that significant performance improvements are achieved
in comparison to existing centralized approaches.
Keywords: Graph mining · Hidden networks · Top-k degrees.
1
Introduction
Nowadays, graphs are frequently used to model real-life problems in many diverse
application domains, such as social network analysis, searching and mining the
Web, pattern mining in bioinformatics and neuroscience. Graph mining is an
active and growing research area, aiming at knowledge discovery from graph
data [4,1]. In its simplest form, a graph G(V, E) is defined by a set of nodes (or
vertices) V and a set of edges (or links) E. Each edge e ∈ E connects a pair of
nodes. In this work, we focus on simple bipartite graphs, where the set of nodes
is composed of two subsets B (the black nodes) and W (the white nodes), such
as V = B ∪ W and B ∩ W = ∅. Moreover, all edges of G connect nodes from B
and nodes of W , meaning that the two endpoints of an edge belong to different
node subsets.
Bipartite graphs have many interesting applications in diverse fields. For
example, a bipartite graph may be used to represent product purchases by cus-
tomers. In this case, an edge exists between a product p and a customer c when
2
P. Kostoglou et al.
p was purchased by c. As another example, in an Information Retrieval or Text
Mining application a bipartite graph may be used to associate different types of
tokens that exist in a document. Thus, an edge between a document d and a to-
ken t represents the fact that the token t appears in document d. Moreover, there
are many applications of bipartite graphs in systems biology and medicine [7].
Fig. 1. An example of an undirected bipartite graph, with two bipartitions B =
{u, v, w} and W = {a, b, c, d}.
Figure 1 depicts a simple bipartite graph containing seven nodes and five
edges. Among the black nodes, u has the maximum number of neighbors (i.e.,
three). One of the nodes is isolated, i.e., it does not have any neighbors.
Motivation and Contributions. Conventional bipartite graphs are character-
ized by the fact that the sets of vertices B and W as well as the set of edges
E are known in advance. Nodes and edges are organized in a way to enable
efficient execution of fundamental graph-oriented computational tasks, such as
finding nodes with large degree, computing shortest paths, clustering and com-
munity detection. Usually, the adjacency list representation is being used, which
is a good compromise between space requirements and computational efficiency.
However, a concept that has started to gain significant interest recently is that
of hidden graphs. In contrast to a conventional graph, a hidden bipartite graph
is defined as G(B, W, f ()), where B and W are the subsets of nodes and f ()
is a function B × W → {0, 1} which takes as an input two vertex identifiers
and returns true or false if the edge exists or not respectively. Therefore, in a
hidden graph the edge set E is not given explicitly and it is inferred by using
the function f ().
Hidden graphs are very powerful because they are able to represent any type
of relationship among a set of entities. Formally, for n nodes, there is an exponen-
tial number of different graphs that may be generated (the exact number is 2(n
2)).
To materialize all these different graphs demands significant space requirements.
Distributed Computation of Top-k Degrees in Hidden Bipartite Graphs
3
Moreover, it is unlikely that all these graphs will be used eventually. In contrast,
the use of a hidden graph enables the representation of any possible graph by
the specification of the appropriate function f (). It is noted that the function
f () may require the execution of a complex algorithm in order to decide if two
nodes are connected by an edge. Therefore, interesting what-if scenarios may be
tested with respect to the satisfaction of meaningful properties. It is evident,
that the complete graph structure may be revealed if all possible nb × nw edge
probing queries are executed, where nb = B and nw = W . However, this solu-
tion involves the execution of a quadratic number of probes, which is expected
to be highly inefficient, taking into account that the function f () is computa-
tionally intensive and that real-world graphs are usually very large. Therefore,
the target is to provide a solution to a graph-oriented problem by using as few
edge probing queries as possible. The problem we are targeting is the discovery
of the k nodes with the highest degrees. The degree of a node v is defined as the
number of neighbors of v. This problem has been addressed previously by [9] and
[11]. In this work, we are interested in solving the problem by using distributed
algorithms and over Big Data architectures. This enables the analysis of mas-
sive hidden graphs and will provide some baseline for executing more complex
graph mining tasks, thus overcoming the limitations provided by centralized ap-
proaches. In particular, we study distributed algorithms for the discovery of the
top-k degree nodes in Apache Spark [] over YARN and HDFS [10] and we offer
experimental results based on a cluster of 32 physical machines. Performance
evaluation results demonstrate that the proposed techniques are scalable and
can be used for the analysis of massive hidden networks. We note that this is
the first work addressing the problem of hidden graph analysis in a distributed
setting.
Roadmap. The rest of the paper is organized as follows. The next section con-
tains the most representative related work in the area. Section 4 studies our main
contribution in detail. Performance evaluation results are offered in Section 5,
whereas Section 6 concludes our work and presents briefly interesting directions
for future work in the area.
2 Related Research
A hidden graph is able to represent arbitrary relationship types among graph
nodes. A research direction that is strongly related to hidden graphs is graph
property testing [5]. In this case, one is interested in detecting if a graph satisfies
a property or not by using fast approximate algorithms.
Evidently, detecting graph properties efficiently is extremely important. How-
ever, an ever more useful and more challenging task is to detect specific sub-
graphs or nodes that satisfy specific properties, by using as few edge probing
queries as possible.
Another research direction related to hidden graphs focuses on learning a
graph or a subgraph by using edge probing queries using pairs or sets of nodes
4
P. Kostoglou et al.
(group testing) [2]. A similar topic is the reconstruction of subgraphs that satisfy
certain structural properties [3].
An important difference between graph property testing and analyzing hid-
den graphs is that in the first case the graph is known whereas in the second case
the set of edges is unknown and must be revealed gradually. Moreover, property
testing focuses on checking if a specific property holds or not, whereas in hid-
den graph analysis we are interested in answering specific queries exactly. The
problem we attack is the discovery of the top-k nodes with the highest degrees.
This problem was solved by [9] and [11] assuming a centralized environment.
The basic algorithm used in [9] was extended in [8] for unipartite graphs,
towards detecting if a hidden graph contains a k-core or not. Again, the algorithm
proposed in [8] is centralized and its main objective is to minimize the number
of edge probing queries performed.
In this paper, we take one step forward towards the design and performance
evaluation of distributed algorithms for detecting the top-k nodes with the high-
est degrees in hidden bipartite graphs, aiming at the reduction of the overall
computational cost which depends on both the number of edge probing queries
and the level of parallelism used. We note that this is the first work in the
literature to attack the specific problem in a distributed setting.
3 Fundamental Concepts and Problem Definition
In this section, we present some fundamental concepts related to our research and
state the problem formally. Recall that, the detection of the top-k nodes with the
highest degrees in a bipartite graph has been attached in [9] taking a centralized
perspective. In that paper, the authors present the Switch-On-Empty (SOE)
algorithm which shows the best performance and provide an optimal solution
with respect to the number of edge probing queries that are required. Table 1
presents the most frequently used symbols.
Before diving into the details of our proposal, there is a need to describe
briefly the way the SOE algorithm works. SOE receives as input a hidden bipar-
tite graph, with bipartitions B and W . The output of SOE is composed of the
k vertices from B or W with the highest degrees. Without loss of generality, we
are focusing on vertices of B. Edge probing queries are executed as follows:
-- Initially, SOE starts from a vertex b1 ∈ B, selects a vertex w1 ∈ W and
executes f (b1, w1). If the edge (b1, w1) is solid, it continues to perform probes
between b1 and another vertex w2 ∈ W .
-- Upon a failure, i.e., when the probe f (b1, wj ) returns an empty result, the
algorithm applies the same process for another vertex b2 ∈ B. Vertices for
which all the probes have been applied, do not participate in future edge
probes.
-- A round is complete when all vertices of B have been considered. After each
round, some vertices can be safely included in the result set R and they are
removed from B. When a vertex bi must be considered again, we continue
the execution of probes remembering the location of the last failure.
Distributed Computation of Top-k Degrees in Hidden Bipartite Graphs
5
Table 1. Frequently used symbols.
Symbol
Interpretation
G(B, W, f ) a hidden graph
B
W
set of black vertices of G
set of black vertices of G
f (b, w)
true if the edge (b, w) exists, false otherwise
nb, nw
number of black and white vertices
k
number of highest degree vertices requested
N (u)
d(u)
E
m
s(u)
e(u)
probes
set of neighbors of vertex u
degree of vertex u
(unknown) set of edges
(unknown) number of edges (m = E)
number of known existing neighbors of u
number of known non-existing neighbors of u
total number of edge probing queries issued
-- SOE keeps on performing rounds until the upper bound of vertex degrees in
B is less than the current k-th highest degree determined so far. In that case,
R contains the required answer and the algorithm terminates. Note that all
equal-degree vertices are included in R.
In this work, we proceed one step further in order to detect high-degree nodes
in larger graphs using multiple resources. In this respect, our algorithms are
implemented in the Apache Spark engine [12,13] using the Scala programming
language [6]. Spark offers a powerful environment that enables the execution of
distributed applications in massive amounts of data. Apache Spark is a unified
distributed engine with a rich and powerful API for Scala, Python, Java and
R [13]. One of its main characteristics is that (in contrast to Hadoop MapReduce)
it exploits main memory as much as possible, being able to persist data across
rounds to avoid unnecessary I/O operations. Spark jobs are executed based on
a master-slave model in cooperation with a cluster manager such as YARN 3 or
MESOS 4.
4 Proposed Approach
In the following sections, we will focus on the algorithms developed to solve
the distributed detection of top-k nodes in a hidden bipartite graph. Two al-
gorithms are presented that are both inspired by the SOE (Switch-On-Empty)
3 http://hadoop.apache.org/
4 http://mesos.apache.org/
6
P. Kostoglou et al.
algorithm [9]. The first algorithm, Distributed Switch-On-Empty (DSOE), is a
distributed version of the SOE algorithm. The second algorithm, , DSOE∗, is an
improved and more flexible version of DSOE.
4.1 The DSOE Algorithm
Our first solution is very simple but at the same time very effective. The main
mechanism has the following rationale. For a vertex b ∈ B we are executing
edge-probing queries until we get a certain amount of negative results f . The
value of f is relevant to the size of the graph and is being reduced exponentially.
More precisely, the first batch will have f = W /2 the second f = W /4 and so
on. The idea behind this is that, because the majority of the degree distribution
in real life graphs follows a Power law distribution, we do not expect to find
many vertices with a high degree. The closer we get to the point of exhausting
all w ∈ W the smaller we set f , because we want to avoid as many unnecessary
queries as possible. The pseudocode of the routine is given below.
Function routine(v: vertex, f: Int) : void is
while (F alseprobes) ≤ f do
Execute the next query
if edge-probing query==False then
F alseprobes + +
end
end
The routine can be implemented easily to work in a distributed setting of
the form ∀b ∈ B. After each batch of routines, we check for the vertices that
belong to the answer set R. Vertices that belong to R can be recognized easily,
since vertices that have completed all possible probes ∀w ∈ W should be in the
answer. If R ≥ k, then we need one last batch of routines to finalize R.
Algorithm 1: DSOE
Result: Return a set R of vertices that have the highest degree
1 f = 2;
2 while R ≤ k do
3
4
5
map(routine(∀b ∈ B,f )) ;
∀b ∈ B we check if b has probe all the vertices ∀w ∈ W ,each vertices
that did it is being removed from B and is being added to R;
f = f ∗ 2
6 end
7 map(routine(∀b ∈ B,f ));
8 ∀b ∈ B we check if b has probed all the vertices ∀w ∈ W ,each vertices
that did it, is being removed from B and is being added to R;
9 return R;
Distributed Computation of Top-k Degrees in Hidden Bipartite Graphs
7
In this part we will prove that our conditions for the loop and for the vertices
that belong in R are correct. For a vertex b1 ∈ B, if b1 completes all possible
probes from the first routine, then there are only two options for it's degree:
either d(b1) = W or d(b1) = W − 1, because there is a possibility that the last
query could be negative and still b1 could have exhausted all possible probes.
Assume that while we execute the loop we are in the t1 repeat. Also we assume
that after t1 we get a vertex b2 ∈ B that has exhausted all possible edge-probing
queries. For d(b2) again we have two possibilities, either d(b2) = W − t1 or
d(b2) = W − t1 − 1 for the same reason as previously.
From the previous observations we can safely conclude that for a vertex
b3 ∈ B, that has completed all possible queries in t2 with t2 > t1 the best-
case scenario for the degree is d(b3) = W − t2 and the worst case scenario is
d(b2) = W − t2 − 1.
It is evident that d(b2) ≥ d(b3) and the equality is possible only if t2 = t1 + 1.
From this conclusion we are sure that if R ≤ k then if a vertex b ∈ B exhausts
all the queries, it can be inserted into R. Taking into concern the equality we have
to run the batch of routines one last time for the possibility that we may find a
vertex with degree equal to the minimum degree in R. Algorithm 1 contains the
outline of DSOE.
4.2 The DSOE∗ Algorithm
DSOE is the natural extension to the centralized SOE algorithm. However, we
advance one step further in order to improve runtime as much as possible, even
if the number of probes increases. For very large graphs we already expect a
very large number of probes that is inevitable. For that reason trying to improve
the execution time by adding a very small amount of probes in the already
big number of inevitable probes may worth for the overall performance of our
algorithm. The updated algorithm is named DSOE∗.
DSOE treate all vertices equally, so for algorithms we want to make an initial
prediction about the degree of the vertices and after that, to emphasize during
the routines the vertices that we predict to have a large degree by having a
more loose condition in contrast to those that we predict that will have small
degree. The result of this process is to calculate all possible edge-probing queries
for the vertices we predict to have a large degree. With the information of the
exact number of the degree for those vertices we are able to have a better ending
condition for the rest of the vertices. Therefore, we will be able to stop processing
of the vertices with low degrees faster and this way we will have better execution
times. Moreover, for real life graphs, the degrees of the vertices usually follow
a Power law distribution,so we expect that most vertices of the graph will have
way smaller degree in comparison with the degree of the top-k vertices.
More specifically, DSOE∗ initially performs some random edge-probing queries
∀b ∈ B. The number for these queries is set to log(log(W )). After this step,
the course of DSOE∗ is quite similar to that of DSOE. We execute repeatedly
a batch of routines ∀b ∈ B, with the difference that, this time a single routine
for a vertex b ∈ B is complete when N negative edge-probing queries, where N
8
P. Kostoglou et al.
is an outcome of the prediction performed by the sampling process to quickly
detect nodes that potentially have large degree.
When a vertex exhausts all possible queries, then it is added gets added to
a temporary set M . The vertices in the set M may not be completely correct,
so we have to continue with the probing queries. However, the contents of M
provide a threshold T which is set to the minimum degree among the vertices
in M . Probing queries are executed ∀b ∈ B, until d(b) < T . The vertices that
have completed all possible probes are added to M . Finally, the k best vertices
from M with respect to the degree are returned as the final answer. Algorithm
2 contains the pseudocode of DSOE∗.
Function prediction(v: vertex,probes: int) : int is
while counter < probes do
if edge-probing query==True then
prediction++
end
return prediction
end
Function routine(v: vertex) : void is
while negatives < v.prediction do
if edge-probing query==False then
negatives++
end
end
Function exhaust(v: vertex,T: int) : void is
while T ≤ v.degree do
execute the next edge-probing query
end
end
Algorithm 2: DSOE∗
Result: Return a set R of vertices that have the highest degree
10 map(prediction(∀b ∈ B,log(log( W ))));
11 while M ≤ k do
12
13
map(routine(∀b ∈ B));
∀b ∈ B we check if b has probe all the vertices ∀w ∈ W ,each vertices
that did it is being removed from B and is being added to M ;
14 end
15 threshold=min(M);
16 map(exhaust(∀b ∈ B,threshold));
17 ∀b ∈ B we check if b has probe all the vertices ∀w ∈ W ,each vertices that
did it is being removed from B and is being added to M ;
18 R=top-k from M ;
19 return R;
Distributed Computation of Top-k Degrees in Hidden Bipartite Graphs
9
5 Performance Evaluation
In this section, we present performance evaluation results depicting the efficiency
of the proposed distributed algorithms. All experiments have been conducted in
a cluster of 32 physical nodes (machines) running Hadoop 2.7 and Spark 2.1.0.
One node is used as the master whereas the rest 31 nodes are used as workers.
The data resides in HDFS and YARN is being used as the resource manager.
5.1 Datasets
All datasets used in performance evaluation correspond to real-world networks.
The networks used have different number of black and white nodes as well as
different number of edges. More specifically, we have used three networks: DBLP,
YOUTUBE, and WIKI. All networks are publicly available at the Koblenz Net-
work Collection, which is a project to collect large network datasets of dif-
ferent types, in order to assist research in network science and related fields.
The collection is maintained by the Institute of Web Science and Technologies
at the University of KoblenzLandau and it accessible by the following URL:
http://konect.uni-koblenz.de/.
-- DBLP. The DBLP network is the authorship network from the DBLP com-
puter science bibliography. The network is bipartite and a node is either an
author or a publication. Each edge connects an author to one of the publi-
cations. The characteristics of this network are as follows: B = 4, 000, 150,
W = 1, 425, 813, the highest degree for set B is 114, the highest degree for
set W is 951 and the average degree for B is 6.0660 and for W is 2.1622.
-- YOUTUBE1. This is the bipartite network of YouTube users and their
group memberships. Nodes correspond to users and groups, and an edge
between a user and a group denotes a group membership. The properties
of this network are as follows: B = 94, 238 and W = 30, 087, the highest
degree of set B is 1, 035, the highest degree of set W is 7, 591, the average
degree for B is 3.1130 and the average degree of W is 9.7504.
-- YOUTUBE2. This network represents friendship relationships between
YouTube users. Nodes are users and an undirected edge between two nodes
indicates a friendship. Although this graph is unipartite we modified it in
order to become bipartite. We duplicate it's vertices and the set B is one
clone of the nodes whereas W is the other. Two nodes between B and W are
connected if their corresponding nodes are connected in the initial graph.
Evidently, for this graph the statistics for the two sets B and W are exactly
the same: B = W = 1, 134, 890, the maximum degree is 28, 754 for both
sets and the average degree for both sets is 5.2650
-- WIKIPEDIA. This is the bipartite network of English Wikipedia articles
and the corresponding categories they are contained in. The first set of nodes
corresponds to articles and the second corresponds to categories. For this
graph we have B = 182, 947, W = 1, 853, 493, the highest degree for B is
11, 593 and for W is 54, the average degree for B is 2.048 while for set W is
20.748.
10
P. Kostoglou et al.
5.2 Experimental Results
In the sequel, we present some representative experimental results demonstrating
the performance of the proposed techniques. First, we perform a comparison of
DSOE and DSOE∗ with respect to runtime (i.e., time duration to complete
the computation in the cluster) by modifying the number of Spark executors
running. For this experiment, we start with 8 Spark executors and gradually we
keep on increasing their number keeping k = 10. The DBLP graph has been used
in this case. Figure 2(a) shows the runtime of both algorithms by increasing the
number of executors. It is evident that both algorithms are scalable, since there
is a significant speedup as we double the number of executors. Moreover, DSOE∗
shows better performance than DSOE.
DSOE
DSOE*
)
c
e
s
(
e
m
i
t
n
u
r
14000
12000
10000
8000
6000
4000
2000
0
0
20
40
60
80
100
120
140
s
e
b
o
r
p
f
o
r
e
b
m
u
n
9
2.88x10
9
2.86x10
9
2.84x10
9
2.82x10
2.8x10
9
9
2.78x10
9
2.76x10
9
2.74x10
9
2.72x10
DSOE
DSOE*
1
10
100
1000
number of executors
k
(a) runtime vs number of executors
(b) number of probes vs k
Fig. 2. Comparison of DSOE and DSOE∗ with respect to runtime and number of
probes.
Another important measure that we want to examine is the number of probes
that both algorithms execute. For this experiment, the number of executors
and the execution time are irrelevant, so we focus only on different values of
k. Moreover we are running our algorithms in a significantly smaller dataset
(YOUTUBE1) for different values of k (i.e., 1, 10, 100 and 1000). The corre-
sponding results are given in Figure 2(b). The first observation is that both
algorithms perform a significant amount of probes. However, this was expected
taking into account that if the average node degree is very small or very large,
then many probes are required before the algorithms can provide the answer,
as it has been shown in [9]. Also, in general DSOE∗ requires less probes in
comparison to DSOE for small values of k.
One more very interesting aspect that we examine is the performance of our
approaches with respect to the size of the graph. Our motivation is to compare
the impact of sets B and W to the execution time. For this reason we will
use DSOE∗ on the DBLP graph twice: for the first execution we have B =
4, 000, 150 and W = 1, 425, 813 and the for the second time we reverse the
Distributed Computation of Top-k Degrees in Hidden Bipartite Graphs
11
direction of the queries from W to B. This way the graphs that we compare
have the exact same number of edges and vertices but the differ significantly in
the cardinality of B and W . Figure 3(a) presents the corresponding results. It
is observed that in the reverse case the runtime is significantly higher, since for
every node in W there are more options to perform probes on B. In general, the
cost of the algorithm drops if the cardinality if B is larger than that of W .
)
c
e
s
(
e
m
i
t
n
u
r
6500
6000
5500
5000
4500
4000
3500
3000
2500
2000
1500
focusing on B
focusing on W
7000
6000
5000
4000
3000
2000
1000
)
c
e
s
(
e
m
i
t
n
u
r
Reverse
Original
graph size
(a) runtime vs source set
(b) runtime vs cardinality of B and W
0
182947
1134890
4000150
Fig. 3. Performance of DSOE∗ with respect to the source nodes and the size of the
node sets B and W .
The goal of the last experiment is to test the scalability of the algorithms
by increasing the size of the data. First we focus on B and then on W . For
this experiment DBLP, YOUTUBE2 and WIKIPEDIA datasets have been used.
These graphs have almost the same cardinality in one set and they differ on the
cardinality of the other. For all tests we have used 64 Spark executors and the
implementation of the DSOE∗ algorithm with k = 10. The corresponding results
are given in Figure 3(b). It is evident that although the cardinalities of both B
and W have an impact on peformance, execution time is more sensitive on the
cardinality of W when used as the source set.
6 Conclusions
In this work, we study for the first time the distributed detection of the top-
k nodes with the highest degrees in a hidden bipartite graph. Since the set of
edges is not available a-priori, edge probing queries must be applied in order
to be able to explore the graph. We have designed two algorithms to attack
the problem (DSOE and DSOE∗) and evaluate their performance based on real-
world networks. In general the algorithms are scalable, showing good speedup
factors by increasing the number of Spark executors.
There are many interesting directions for future work. By studying the ex-
perimental results, one important observation is that the number of probes is
12
P. Kostoglou et al.
in general large. Therefore, more research is required to be able to significantly
reduce the number of probes preserving the good quality of the answer. Also,
it is interesting to evaluate the performance of the algorithms in even larger
networks containing significantly larger number of nodes and edges.
Acknowledgments
The authors would like to thank the DaSciM group of the LiX laboratory of
Ecole Polytechnique, and specifically Prof. Michalis Vazirgiannis and Dr. Chris-
tos Giatsidis for sharing the cluster to conduct the experimental evaluation.
References
1. Aggarwal, C.C., Wang, H.: Managing and Mining Graph Data. Springer (2010)
2. Alon, N., Asodi, V.: Learning a hidden subgraph. SIAM Journal on Discrete Math-
ematics 18(4), 697 -- 712 (2005)
3. Bouvel, M., Grebinski, V., Kucherov, G.: Combinatorial search on graphs moti-
vated by bioinformatics applications: A brief survey. In: Revised Selected Papers,
31st International Workshop on Graph-Theoretic Concepts in Computer Science
(WG). pp. 16 -- 27. Metz, France (2005)
4. Cook, D.J., Holder, L.B.: Mining Graph Data. John Wiley & Sons, Inc., USA
(2006)
5. Goldreich, O., Goldwasser, S., Ron, D.: Property testing and its connection to
learning and approximation. Journal of the ACM 45(4), 653 -- 750 (1998)
6. Odersky, M., Spoon, L., Venners, B.: Programming in Scala: Updated for Scala
2.12. Artima Incorporation, USA, 3rd edn. (2016)
7. Pavlopoulos, G., Kontou, P., Pavlopoulou, A., Bouyioukos, C., Markou, E., Bagos,
P.: Bipartite graphs in systems biology and medicine: a survey of methods and
applications. GigaScience 7 (02 2018). https://doi.org/10.1093/gigascience/giy014
8. Strouthopoulos, P., Papadopoulos, A.N.: Core discovery in hidden graphs. CoRR
(to appear in Data and Knowledge Engineering) abs/1712.02827 (2017)
9. Tao, Y., Sheng, C., Li, J.: Finding maximum degrees in hidden bipartite graphs. In:
Proceedings ACM International Conference on Management of Data (SIGMOD).
pp. 891 -- 902. Indianapolis, IN (2010)
10. White, T.: Hadoop: The Definitive Guide. O'Reilly Media, Inc., 4th edn. (2015)
11. Yiu, M.L., Lo, E., Wang, J.: Identifying the most connected vertices in hidden
bipartite graphs using group testing. IEEE Transactions on Knowledge & Data
Engineering 25(10), 2245 -- 2256 (2013)
12. Zaharia, M., Chowdhury, M., Das, T., Dave, A., Ma, J., McCauley, M.,
Franklin, M.J., Shenker, S., Stoica, I.: Resilient distributed datasets: A fault-
tolerant abstraction for in-memory cluster computing. In: Proceedings of the
9th USENIX Conference on Networked Systems Design and Implementa-
tion. pp. 2 -- 2. NSDI'12, USENIX Association, Berkeley, CA, USA (2012),
http://dl.acm.org/citation.cfm?id=2228298.2228301
13. Zaharia, M., Xin, R.S., Wendell, P., Das, T., Armbrust, M., Dave, A., Meng, X.,
Rosen, J., Venkataraman, S., Franklin, M.J., Ghodsi, A., Gonzalez, J., Shenker,
S., Stoica, I.: Apache spark: A unified engine for big data processing. Communi-
cations of the ACM 59(11), 56 -- 65 (Oct 2016). https://doi.org/10.1145/2934664,
http://doi.acm.org/10.1145/2934664
|
1804.02981 | 1 | 1804 | 2018-04-09T13:49:38 | Lumping the Approximate Master Equation for Multistate Processes on Complex Networks | [
"cs.SI",
"physics.soc-ph"
] | Complex networks play an important role in human society and in nature. Stochastic multistate processes provide a powerful framework to model a variety of emerging phenomena such as the dynamics of an epidemic or the spreading of information on complex networks. In recent years, mean-field type approximations gained widespread attention as a tool to analyze and understand complex network dynamics. They reduce the model's complexity by assuming that all nodes with a similar local structure behave identically. Among these methods the approximate master equation (AME) provides the most accurate description of complex networks' dynamics by considering the whole neighborhood of a node. The size of a typical network though renders the numerical solution of multistate AME infeasible. Here, we propose an efficient approach for the numerical solution of the AME that exploits similarities between the differential equations of structurally similar groups of nodes. We cluster a large number of similar equations together and solve only a single lumped equation per cluster. Our method allows the application of the AME to real-world networks, while preserving its accuracy in computing estimates of global network properties, such as the fraction of nodes in a state at a given time. | cs.SI | cs |
Lumping the Approximate Master Equation for
Multistate Processes on Complex Networks
Gerrit Grossmann1, Charalampos Kyriakopoulos1, Luca Bortolussi2, and
Verena Wolf1
1 Computer Science Department, Saarland University
2 Department of Mathematics and Geosciences, University of Trieste
Abstract. Complex networks play an important role in human society
and in nature. Stochastic multistate processes provide a powerful frame-
work to model a variety of emerging phenomena such as the dynamics of
an epidemic or the spreading of information on complex networks. In re-
cent years, mean-field type approximations gained widespread attention
as a tool to analyze and understand complex network dynamics. They
reduce the model's complexity by assuming that all nodes with a similar
local structure behave identically. Among these methods the approxi-
mate master equation (AME) provides the most accurate description of
complex networks' dynamics by considering the whole neighborhood of a
node. The size of a typical network though renders the numerical solution
of multistate AME infeasible. Here, we propose an efficient approach for
the numerical solution of the AME that exploits similarities between the
differential equations of structurally similar groups of nodes. We clus-
ter a large number of similar equations together and solve only a single
lumped equation per cluster. Our method allows the application of the
AME to real-world networks, while preserving its accuracy in computing
estimates of global network properties, such as the fraction of nodes in
a state at a given time.
Keywords: Complex Networks, Multistate Processes, AME, Model Re-
duction, Lumping
1
Introduction
Various emerging phenomena of social, biological, technical, or economic nature
can be modeled as stochastic multistate processes on complex networks [1, 3,
24, 26]. Such networks typically consist of millions or even billions of nodes [1,
3], each one being in one of a finite number of states. The state of a node can
potentially change over time as a result of interaction with one of its neighbor-
ing nodes. The interactions among neighbors are specified by rules and occur
independently at random time points, governed by the exponential distribution.
Hence, the underlying process is a discrete-state space Markovian process in
continuous time (CTMC). Its state space consists of all labeled graphs repre-
senting all possible configurations of the complex network. For instance, in the
susceptible-infective (SI) model, which describes the spread of a simple epidemic
process, each node can either be susceptible or infected; infected nodes propagate
the infection to their susceptible neighbors [19, 5].
Monte-Carlo simulations can be carried out only for small networks [11, 19],
as they become very expensive for large networks, due to the large number
of simulation runs which are necessary to draw reliable conclusions about the
network's dynamics.
An alternative and viable approach is based on mean-field approximations, in
which nodes sharing a similar local structure are assumed to behave identically
and can be described by a single equation, capturing their mean behavior [18,
3, 4, 10, 12]. The heterogeneous (also called degree-based) mean-field (DBMF)
approach proposes a system of ordinary differential equations (ODEs) with one
equation approximating the nodes of degree k which are in a certain state [25,
9, 18]. The approximate master equation (AME) provides a far more accurate
approximation of the network's dynamics, considering explicitly the complete
neighborhood of a node in a certain state [16, 17, 14]. However, the corresponding
number of differential equations that have to be solved is of the order O(cid:0)kSmax(cid:1),
where kmax is the network's largest degree and S the number of possible states.
A coarser approximation called pair approximation (PA) can be derived from
AME by imposing the multinomial assumption for the number of neighbors in
a state [16, 17]. Nevertheless, solving PA instead of AME is faster but for many
networks not accurate enough [17].
Lumping is a popular model reduction technique for Markov-chains and sys-
tems of ODEs [21, 6, 28, 7, 8]. It has also been applied to the underlying model
of epidemic contact processes [27, 19] and has recently been shown to be ex-
tremely effective for the DBMF equation as well as for the PA approach [20].
In this work, we generalize the approach of [20] providing a lumping scheme for
the AME, leveraging the observation that nodes with a large degree having a
similar neighborhood structure have also typically very similar behaviors. We
show that it is possible to massively reduce the number of equations of the AME
while preserving the accuracy of global statistical properties of the network. Our
contributions, in particular, are the following: (i) we provide a fully automated
aggregation scheme for the multistate AME; (ii) we introduce a heuristic to find
a reasonable trade-off between number of equations and accuracy; (iii) we evalu-
ate our method on different models from literature and compare our results with
the original AME and Monte-Carlo simulation; (iv) we provide an open-source
tool3 written in Python, which takes as input a model specification, generates
and solves the lumped (or original) AME.
The remainder of this paper is organized as follows: In Section 2 we describe
multistate Markovian processes in networks and formally introduce the AME. In
Section 3 we derive lumped equations for a given clustering scheme and in Section
4 we propose and evaluate a clustering algorithm for grouping similar equations
together. Case studies are presented in Section 5. We draw final conclusions and
identify open research problems in Section 6.
3 https://github.com/gerritgr/LumPyQest
2 The Multistate Approximate Master Equation
In this section, we first define contact processes and introduce our notation and
terminology for the multistate AME.
2.1 Multistate Markovian Processes
state s.
We describe a contact process in a network (G,S, R, L) by a finite undirected
graph G = (V, E), a finite set of states S, a set of rules R, and an initial state
for each agent (node) of the graph L : V → S. We use s, s0, s00 and s1, s2, . . . to
denote elements of S. At each time point t ≥ 0, each node v ∈ V is in a state
s ∈ S. The rules R define how neighboring nodes influence the probability of
state transitions. A rule consists of a consumed state, a produced state, and a
transition rate, which depends on the neighborhood of the node. We use integer
vectors to model a node's neighborhood. For a given set of states S and maximal
degree kmax, the set of all potential neighborhood vectors is M = {m ∈ ZS
≥0
Ps∈S
m[s] ≤ kmax}, where we write m[s] to refer to the number of neighbors in
A rule r ∈ R is a triplet r = (s, f, s0) with s, s0 ∈ S, s 6= s0 and rate function
f : M → R≥0 corresponding to the exponential distribution. A rule r (also
s0) can be applied at every node in state s, and, when applied,
denoted as s
it transforms this node into state s0. Note that this general formulation of a rule
containing the rate function can express all types of rules that are described in
[16, 17, 14] such as spontaneous changes of a node's state (independent rules) or
changes due to the state of a neighbor (contact rules). The delay until a certain
rule is applied is exponentially distributed with rate f (m), with rules competing
in a race condition where the one with the shortest delay is executed. This results
in an underlying stochastic model described by a CTMC.
f−→
In the following, we indicate with Rs+ = {(s0, f, s) ∈ R, s0 ∈ S} all the rules
that change the state of a node into s, and with Rs− = {(s, f, s0) ∈ R, s0 ∈ S}
all rules that change an s-node into a different state.
Example In the SIS model, a susceptible node can become infected by one
of its neighbors. An infected node becomes susceptible again, independently of
λ1·m[I]
−
−−−−→ I and the recovery rule is
λ2−→ S, where m[I] denotes the number of infected neighbors and λ1, λ2 ∈ R≥0
its neighbors. Hence, the infection rule is S
I
are rule-specific rate constants.
2.2 Multistate AME
Here, we briefly present the multistate AME, similarly to [14, 20]. The AME
assumes that all nodes in a certain state and with the same neighborhood struc-
m[s] = k} to be
the subset of neighborhood vectors referring to nodes of degree k. In addition,
ture are indistinguishable. We define Mk = {m ∈ M Ps∈S
1 ,s−
for s1, s2 ∈ S and m ∈ M, we use m{s+
2} to denote a neighborhood vector
where all entries are equal to those of m, apart from the s1-th entry, which is
equal to m[s1] + 1, and the s2-th entry, which is equal to m[s2] − 1.
Let xs,m(t) be the fraction of network nodes that are in state s and have
a neighborhood m at time t, and assume the initial state xs,m(0) is known.
Formally, the AME approximates the time evolution of xs,m with the following
set of deterministic ODEs4:
∂xs,m
∂t
= X(s0,f,s)∈Rs+
+ X(s1,s2)∈S 2
− X(s1,s2)∈S 2
s16=s2
s16=s2
f (m)xs0,m − X(s,f,s0)∈Rs−
f (m)xs,m
βss1→ss2x
s,m{s+
1 ,s−
2 } m{s+
1 ,s−
2}[s1]
(1)
βss1→ss2xs,mm[s1] ,
where, the term βss1→ss2 is the the average rate at which an (s, s1)-edge changes
into an (s, s2)-edge, if s, s1, s2 ∈ S with s1 6= s2.
The first term in the right hand side models the inflow into (s, m) nodes
from (s0, m) nodes, while the second term models the outflow from (s, m) due
to the application of a rule. The other two terms describe indirect effects on a
(s, m) node due to changes in its neighboring nodes, again considering inflow
and outflow (cf. Fig. 1). In particular, a node in the neighborhood m of (s, m),
say in state s1, changes to state s2 by the firing of a rule.
To compute βss1→ss2 we need to define the subset of rules which consume a
s1-node and produce an s2-node: Rs1→s2 = {(s1, f, s2) ∈ R f : M → R≥0}.
Then
βss1→ss2 = Pm∈M
(s1,f,s2)∈Rs1→s2
xs1,mm[s]
P
Pm∈M
f (m)xs1,mm[s]
,
(2)
where in the denominator we normalize dividing by the fraction of (s, s1) edges.
The total number of equations of AME is determined by the number of states
S and the maximal degree kmax, and equals:
(cid:18)kmax + S
S − 1 (cid:19)(kmax + 1) .
(3)
The binomial arises from the number of ways in which, for a fixed degree k, one
can distribute k neighbors into S different states, see [20] for the proof.
As xs,m are fractions of network nodes, the following identity holds for all t:
Xs,m∈S×M
xs,m(t) = 1
(4)
4 we omit t for the ease of notation
node changes
neighborhood changes
2βss→ss'xs,(2,2)
f2(2, 2)xs,(2,2)
s'
s'
s'
xs',(2,2)
s
s'
xs,(2,2)
s
s
s
f1(2, 2)xs',(2,2)
2βss'→ssxs,(2,2)
s'
s'
xs,(1,3)
s'
s
3βss'→ssxs,(1,3)
3βss→ss'xI,(3,1)
s
s'
xs,(3,1)
s
s
Fig. 1: Illustration of how the AME governs the fraction of xs,(2,2) in a two-state
model with rules (s0, f1, s), (s, f2, s0). The inflow and outflow between xs,(2,2)
and xs0,(2,2) is induced by the direct change of a node's state from s to s0 or vice
versa. The inflow and outflow between xs,(2,2) and xs,(3,1), xs,(1,3) is attributed
to the change of state of a node's neighbor.
Moreover, we use xs to denote the global fraction of nodes in a fixed state s,
which we get by summing over all possible neighborhood vectors
xs(t) = Xm∈M
xs,m(t) ,
(5)
again with Ps∈S
xs(t) = 1. Intuitively, xs is the probability that a randomly
chosen node from the network is in state s. This is the value of primary interest
in many applications, e.g. [3, 24, 26]. Finally, the degree distribution P (k) gives
the probability that a randomly chosen node is of degree k (0 ≤ k ≤ kmax). If
we sum up all xs,m which belong to a specific k (i.e. m ∈ Mk), as the network
structure is assumed to be static, we will necessarily obtain the corresponding
degree probability. Hence, for each t ≥ 0, we have
Xs,m∈S×Mk
xs,m(t) = P (k) .
(6)
3 Lumping
The key idea of this paper is to group together equations of the AME which have
a similar structure and to solve only a single lumped equation per group. This
lumped equation will capture the evolution of the sum of the AME variables in
each group.
Therefore, we divide the set {xs,m s ∈ S, m ∈ M} into groups or clusters,
constructing our clustering such that two equations xs,m, xs0,m0 can only end
up in the same group if s = s0 and m is 'sufficiently' similar to m0. This ensures
that the fractions within a cluster as well as their time derivatives are similar,
provided the change in the rate as a function of m is relatively small when m is
large.
C ⊂ 2M andSC∈C
In the sequel, we consider a clustering C defined as a partition over M, i.e.,
C = M and all clusters C are disjoint and non-empty. Before
we discuss in detail the construction of C in Section 4, we derive the lumped
equations for a given clustering C.
First, recall that we want to approximate the global fractions for each state
(cf. Eq. (5)), which can be split into sums over the clusters
xs(t) =XC∈C Xm∈C
xs,m(t) .
(7)
Our goal is now to construct a smaller equation system, where the variables
zs,C approximate the sum over all xs,m with m ∈ C
xs,m(t) .
(8)
(9)
Henceforth, we can approximate the global fractions as
zs,C(t) ≈ Xm∈C
xs(t) ≈XC∈C
zs,C(t) .
The number of equations is then given by S·C. As one might expect, there is
a trade-off between the accuracy of zs,C(t) and the computational cost, propor-
tional to the number of clusters.
3.1 Lumping the Initial State and the Time Derivative
As the initial values of xs,m are given, we define the initial lumped values
zs,C(0) = Xm∈C
xs,m(0) .
(10)
To achieve the criterion in Eq. (8) for the fractions computed at t > 0, we
seek for time derivatives which fulfill
∂zs,C
∂t ≈ Xm∈C
∂xs,m
∂t
.
(11)
Note that an exact lumping is in general not possible as ∂zs,C
is a function of the
∂t
individual xs,m(t). In order to close the equations for zs,C, we need to express
xs,m as an approximate function of zs,C. The naive idea is to assume that the
true fractions xs,m are similar for all m that belong to the same cluster, i.e., if
m, m0 ∈ C then xs,m ≈ xs,m0, leading to an approximation of xs,m as zs,C/C.
This is however problematic, as it neglects the fact that neighbors of nodes
of different degree have different size. In fact, even if for two degrees k1 < k2
in the same cluster we have P (k1) = P (k2) (while typically P (k1) > P (k2)),
the number of possible different neighbors m2 of a k2-node is larger than the
number of different neighbors m1 of a k1-node, Mk1 < Mk2, hence typically
xs,m2 < xs,m1, as the mass of P (k2) has to be split among more variables. In
order to correct for this asymmetry between degrees in each cluster, we introduce
the following assumption:
Assumption: All fractions xs,m inside a cluster C that refer to the same degree
contribute equally to the sum zs,C. Equations of different degree contribute pro-
portionally to their degree probability P (k) and inversely proportionally to the
neighborhood size for that degree.
Based on the above assumption, we define a degree dependent scaling-factor
wC,k ∈ R≥0, which only depends on the corresponding cluster C and degree k.
According to the above assumption wC,k ∝ P (k)
. To ensure that the weights of
Mk
one cluster sum up to one, we define
wC,k =
P (k)
Mk · Xm∈C
P (km)
Mkm!−1
,
(12)
m[s] is the degree of a neighborhood m. We compute approx-
where km =Ps∈S
imations of xs,m based on zs,C as
xs,m ≈ zs,C · wC,km .
(13)
3.2 Building the Lumped Equations
To define a differential equation for the lumped fraction zs,C, we consider again
Eq. (11) and replace ∂xs,m
by the l.h.s. of Eq. (1). Then we substitute every
occurrence of xs,m by its corresponding lumped variable multiplied with the
scaling factor, i.e., zs,C · wC,km, where m ∈ C. Since m ∈ C does generally
not imply that m{s+
2} ∈ C, the substitution of x
2 } is somewhat more
complicated. Let C(m) denote the cluster m belongs to. If m lies "at the border"
1 ,s−2 }) might be different than C(m). The lumped AME
of a cluster then C(m{s+
s,m{s+
1 ,s−
∂t
1 ,s−
takes then the following form:
wC,kmf (m)(cid:17)
∂zs,C
∂t
zs0,C(cid:16) Xm∈C
= X(s0,f,s)∈Rs+
zs,C(cid:16) Xm∈C
wC,kmf (m)(cid:17)
(cid:16) Xm∈C
zs,C(cid:16) Xm∈C
− X(s,f,s0)∈Rs−
+ X(s1,s2)∈S 2
− X(s1,s2)∈S 2
βss1→ss2
L
βss1→ss2
L
C(m{s+
1 ,s−
s16=s2
w
s16=s2
wC,kmm[s1](cid:17) ,
2 }),km
z
s,C(m{s+
1 ,s−
2 })
m{s+
1 ,s−
2}[s1](cid:17)
(14)
where
zs1,C
= PC∈C
βss1→ss2
L
f (m)wC,kmm[s]
(s1,f,s2)∈Rs1→s2 Pm∈C
PC∈C
P
zs1,C Pm∈C
wC,km m[s]
.
(15)
To gain a significant speedup compared to the original equation system, it is
necessary that the lumped equations can be efficiently evaluated. In particular,
we want the number of terms in the lumped equation system to be proportional
to the number of fractions zs,C and not to the number of xs,m. This is possi-
ble for Eq. (14), because each time we have a sum over m ∈ C, for instance
equations and do not have to evaluate it at every step of the ODE solver. The
sum
Pm∈C wC,km f (m), we can precompute this value during the generation of the
X
m∈C
z
s,C(m{s+
1 ,s−
2 })
m{s+
1 ,s−
2}[s1]
can be evaluated efficiently since we only have to consider lumped variables
that correspond to clusters C(m{s+
2}) that are close to C(m), i.e., that can
be reached from a state in C(m) by the application of a rule. The number of
such neighboring clusters is typically small, due to our definition of clusters, see
Section 4.
1 ,s−
Remark 1. For large kmax, the number of neighbor vectors in M, i.e. the size of
the AME, becomes prohibitively large. For instance, for a maximum degree of
the order of 10 thousands, quite common in real networks, the size of M becomes
of the order of 1012. Even summing a number of elements of this order while
generating equations becomes very costly. To overcome this limit, the solution is
to approximate terms involving summations in Eq. (14). Consider for instance
w.r.t. wC,km, we can only evaluate f at the mean neighborhood vector hmiC,
Pm∈C wC,kmf (m). Instead of evaluating f at every m ∈ C and averaging it
where each coordinate is defined as hmiC[s] =Pm∈C wC,kmm[s]. We can then
approximatePm∈C wC,kmf (m) ≈ f(cid:0)hmiC(cid:1). See Appendix A for details.
4 Partitioning of the Neighborhood Set
In this section we describe an algorithm to partition M, and construct the clus-
tering C. Our algorithm builds partitions with a varying granularity to control
the trade-off between accuracy and execution speed. We consider three main
criteria: the similarity of different equations, their impact on the global error,
and how fast is the evaluation of the lumped equations. Furthermore, as the size
of M can be extremely large, we cannot rely on typical hierarchical clustering
algorithms having a cubic runtime in the number of elements to be clustered.
Our solution is to decouple each m into two components: its degree km (encod-
ing its length) and its projection to the unit simplex (encoding its direction).
We cluster these two components independently.
4.1 Hierarchical Clustering for Degrees
Since our clustering is degree-dependent, we first partition the set of degrees
{0, . . . , kmax}. Let K ⊂ 2{0,...,kmax} be a degree partitioning, i.e., the disjoint
union of all K ∈ K is the set of degrees. The goal of the degree clustering is to
merge together consecutive degrees with small probability while putting degrees
with high probability mainly in separate clusters. This is particularly relevant for
the power-law distribution, which is predominantly found in real world networks
[2, 1] as it allows us to cluster a large number of high degrees with low total
probability all together without losing much information.
We use an iterative procedure inspired by bottom-up hierarchical clustering
to determine K. We start by assigning to each degree an individual cluster and
iteratively join the two consecutive clusters that increase the cost function L
by the least amount. The cost function L punishes disparity in the spread of
probability mass over clusters, leading to clusters that have approximately the
same total probability mass. It is defined as
L(K) = XK∈K(cid:16)Xk∈K
P (k)(cid:17)2
.
(16)
Note that L(K) is minimal when allPk∈K P (k) have equal values. The algorithm
needs O(k2
max) comparisons to determine the degree cluster of each element. At
the end of this procedure, each m ∈ M has a corresponding degree-cluster K
with km ∈ K.
4.2 Proportionality Clustering
Independently of K, we partition M along the different components of vectors
m ∈ M. First, observe that if we normalize m by dividing each dimension by
km, we can embed each Mk into the unit simplex in RS. The idea is then
to partition the unit simplex, and apply the same partition to all Mk. More
specifically, we construct such partition coordinate-wise. As each element of the
normalized m takes values in [0, 1], we split the unit interval in p+1 subintervals
(a)
(b)
Fig. 2: Left: Clustering of M for a 2–state model with kmax = 20 and K =
P = 7. Right: Proportionality cluster of a 3–state model with kmax = 50 and
P = 5. Only the plane M50 is shown.
p , 2
p ), [ 1
p ), . . . , [ p−1
P = {[0, 1
p , 1]}. Then, two normalized neighbor vectors are in
the same proportionality cluster if and only if their coordinates all belong to the
subinterval P ∈ P, possibly different for each coordinate.
4.3 Joint Clusters
Finally, we construct C such that two points m, m0 are in the same cluster if
and only if they are in the same degree-cluster (i.e., ∃K ∈ K : km, km0 ∈ K) and
in the same proportionality cluster, (i.e., for each dimension s ∈ S, there exists
a P ∈ P, such that m[s]
The effect of combining degree and proportionality clusters, for a model with
two different states, is shown in Fig. 2a, where the proportionality clustering gives
equally sized triangles that are cut at different degrees by the degree clustering. If
we fix a degree k, each cluster has only two neighbors (one in each direction). In
the 3d-case, the proportionality clustering creates tetrahedra, which correspond
to triangles if we fix a degree k (cf. Fig. 2b).
km0 ∈ P ).
, m0[s]
km
The above clustering admits some advantageous properties: (1) If we fix a
degree, all clusters have approximately the same size and spatial shape; (2) The
number of 'direct spatial neighboring clusters' of each cluster is always small,
which simplifies the identification of clusters in the 'border' cases and eases
the generation and evaluation of the lumped AME. Hence, the clusters can be
efficiently computed even if M is very large. Next, we discuss how to choose the
size of the clusterings K and P.
4.4 Stopping Heuristic
To find an adequate number of clusters, we solve the lumped AME of the model
multiple times while increasing the number of clusters. We stop when the differ-
ence between different lumped solutions converges. The underlying assumption
is that the approximations become more accurate with an increasing number
of clusters and that the respective difference between consecutive lumped solu-
tions becomes evidently smaller when the error starts to level off. Our goal is to
stop when the increase in the number of clusters does not bring an appreciable
increase in accuracy.
Let z0(t), z00(t) be two solution vectors, i.e., containing the fractions of nodes
in each state at time t, of the lumped AME that correspond to two different
clusterings C0 and C00. We define the difference between two such solutions z0,
z00 as their maximal Euclidean distance over time.
(z0, z00) = max
0≤t≤HsXs∈S(cid:16)z0s(t) − z00s (t)(cid:17)2
.
(17)
For the initial clustering we choose K = P = c0. In each step, we increase the
number of clusters by multiplying the previous ci with a fixed constant, thus
ci+1 = brcic (r > 1). We find this to be a more robust approach than increasing
ci by only a fixed amount in each step. We stop when the difference between
two consecutive solutions are smaller than stop > 0. We consistently observe in
all our case studies that (z0, z00) is a very good indicator on the behavior of the
real error (cf. Fig. 6b). For our experiments we set empirically c0 = 10, r = 1.3,
and stop = 0.01.
5 Case Studies
We demonstrate our approach on three different processes, namely the well-
known SIR model, a rumor spreading model, and a SIS model with competing
pathogens [22, 13]. We test how the number of clusters, the accuracy, and the
runtime of our lumping method relate. In addition, we compare the dynamics
of the original and lumped AME with the outcome of Monte-Carlo simulations
on a synthetic network of 105 nodes [15, 23]. We performed our experiments
on an Ubuntu machine with 8 GB of RAM and quad-core AMD Athlon II X4
620 processor. The code is written in Python 3.5 using SciPy's vode 5 ODE
solver. The lumping error we provide is the difference between lumped solutions
(corresponding to different granularities) and the outcome of the original AME.
That is, for the original solution x and a lumped solution z, we define the
lumping errors of z as (x, z). To generate the error curves, we start with P =
K = 5 and increase both quantities by one in each step. Note that we test our
approach on models with comparably small kmax. In general, this undermines
the effectiveness of our lumping approach; however using a larger kmax would
have hindered the generation of the complete error curve.
(a)
(b)
Fig. 3: SIR model. (a): Lumping error and runtime of the ODE solver w.r.t. the
number of clusters. (b): Fractions of S,I,R nodes over time, as predicted by the
original AME (solid line), by the lumped AME (dashed line), and based on
Monte-Carlo simulations (diamonds).
5.1 SIR
First, we examine the well-known SIR model, where infected nodes (I) go through
a recovery state (R) before they become susceptible (S) again:
S
λ1·m[I]
−
−−−−→ I
I
λ2−−→ R
R
λ3−−→ S .
We choose (λ1, λ2, λ3) = (3.0, 2.0, 1.0) and assume a network structure with
kmax = 60 and a truncated power-law degree distribution with γ = 2.5. The
initial distribution is (xI(0), xR(0), xS(0)) = (0.25, 0.25, 0.5).
In this model the lumping is extremely accurate. In particular, we see that the
lumping error of our method becomes quickly very small (Fig. 3a) and that we
only need a few hundred ODEs to get a reasonable approximation of the original
AME. The lumped solution z we get from the stopping heuristic, consisting of less
than 5% of the original equations, is almost indistinguishable from the original
AME solution x and the Monte-Carlo simulation (Fig. 3b). The lumping error is
(x, z) = 0.0015. The lumped solution used here 1791 clusters with a runtime of
235 seconds while solving the original AME we needed 39711 clusters and 7848
seconds.
5.2 Rumor Spreading
In the rumor spreading model [13], agents are either ignorants (I) who do not
know about the rumor, spreaders (S) who spread the rumor, or stiflers (R)
who know about the rumor, but are not interested in spreading it. Ignorants
learn about the rumor from spreaders and spreaders lose interest in the rumor
when they meet stiflers or other spreaders. Thus, the rules of the model are the
following:
I
λ1·m[S]
−
−−−−→ S
S
λ2·m[R]
−−−−−→ R
S
λ3·m[S]
−
−−−−→ R .
https://docs.scipy.org/doc/scipy-0.14.0/reference/generated/scipy.integrate.ode.html
5
Runtime (s)
6000
4000
000
02
39711
20000
Number of Clusters
0.075
0.050
0.025
Lumping Error
0.000
0
IRS
1.0
0.5
Fractions
0.0
0
1
3
2
Time
4
5
(a)
(b)
Fig. 4: Rumor spreading model. (a): Lumping error and runtime of the ODE
solver w.r.t. the number of clusters. (b): Fractions of nodes in each state over
time given by the original AME (solid line), by the lumped AME (dashed line),
and based on Monte–Carlo simulations (diamonds).
(a)
(b)
Fig. 5: Competing pathogens dynamics. (a): Fractions of nodes in I, J, S: origi-
nal AME (solid line); lumped AME (dashed line); Monte-Carlo simulations (di-
amonds). (b): Comparison of pair approximation with Monte-Carlo simulation
(diamonds).
We assume (λ1, λ2, λ3) = (6.0, 0.5, 0.5) with kmax = 60 and γ = 3.0. The initial
distribution is set to (xI(0), xR(0), xS(0)) = ( 3
5 ). Again, we find that Monte–
Carlo simulations, original AME, and lumped AME are in excellent agreement
(Fig. 4b). The error curve, however, converges slower to zero than in the SIR
model but it gets fast enough close to it (Fig. 4a). The lumped solution cor-
responds to 1032 clusters with a lumping error of 0.0059 and a runtime of 35
seconds compared to 39711 clusters of the original AME solution the runtime of
which was 1606 seconds.
5 , 1
5 , 1
5.3 Competing Pathogens
We, finally, examine an epidemic model with two competing pathogens [22]. The
pathogens are denoted by I and J and the susceptible state by S:
S
λ1·m[I]
−
−−−−→ I
S
λ2·m[J]
−
−−−−→ J
I
λ3−−→ S
J
λ4−−→ S .
1500
1000
Runtime (s)
00
05
39711
20000
Number of Clusters
0.03
0.02
0.01
Lumping Error
0.00
0
IRS
0.5
Time
1.0
1.0
0.5
Fractions
0.0
0.0
IJS
1.0
0.5
Fractions
0.0
0
1
2
3
5
6
7
8
4
Time
IJS
1.0
0.5
Fractions
0.0
0
1
2
3
5
6
7
8
4
Time
We assume that both pathogens have the same infection rate and differ only in
their respective recovery rates. Specifically, we set
(λ1, λ2, λ3, λ4) = (5.0, 5.0, 1.5, 1.0) and assume network parameters of kmax = 55
and γ = 2.5. The initial distribution is (xI(0), xJ(0), xS(0)) = (0.2, 0.1, 0.7).
This model is the most challenging case study for our approach. AME solution
and naturally lumped AME are not in perfect alignment with Monte Carlo
simulations (Fig. 5a) and our lumping approach needs a, comparably to the
previous cases, larger number of clusters to get a reasonably good approximation
of the AME (Fig. 6a). The computational gain is, however, large as well. The
lumped solution that comes with an approximation error of 0.02 corresponds to
2135 clusters and a runtime of 961 seconds compared to 30856 clusters and 17974
seconds of the original AME solution. Pair approximation approach (Fig. 5b)
even tough faster (40 seconds) than the lumped AME would have here resulted
to a much larger approximation error than our method (cf. Fig. 5b).
At last, the slow convergence of the error curve makes the competing pathogen
model a good test case the for our stopping heuristic. The heuristic evaluates
the model for three different clusterings (509, 986, 2135 clusters). It stops as
the difference between the two last clusterings is smaller than stop, showing
its effectiveness also for challenging models. In Fig. 6b we show the alignment
between the true lumping error and the surrogate error used by the heuristic.
(a)
(b)
Fig. 6: Competing pathogens lumping. (a): Lumping error and runtime of the
ODE solver w.r.t. the number of clusters. (b): Lumping error compared to the
error used by the heuristic.
6 Conclusions and Future Work
In this paper, we present a novel model-reduction technique to overcome the
large computational burden of the multistate AME and make it tractable for
real world problems. We show that it is possible to describe complex global
behavior of dynamical processes using only an extremely small fraction of the
Runtime (s)
10000
20000
15000
Number of Clusters
0
30856
0.2
0.1
Lumping Error
0.0
0
Heuristic Error
0.04
0.02
15000
Number of Clusters
0.00
30856
0.2
0.1
Lumping Error
0.0
0
original equations. Our approach exploits the high similarity among the original
equations as well as the comparably small impact of equations belonging to the
tail of the power-law degree distribution. In addition, we propose an approach
for finding a reasonable trade-off between accuracy and runtime of our method.
Our approach is particularly useful in situations where several evaluations of
the AME are necessary such as for the estimation of parameters or for model
selection.
For future work, we plan to develop a method for on-the-fly clustering, which
joins equations and breaks them apart during integration. This would allow the
clustering to take into account the concrete (local) dynamics and to analyze
adaptive networks with a variable degree distribution.
7 Acknowledgments
This research was been partially funded by the German Research Council (DFG)
as part of the Collaborative Research Center "Methods and Tools for Under-
standing and Controlling Privacy". We thank James P. Gleeson for his comments
regarding the performance of AME on specific models and Michael Backenkohler
for his comments on the manuscript.
References
1. Albert-L´aszl´o Barab´asi. Network science. Cambridge university press, 2016.
2. Albert-L´aszl´o Barab´asi and R´eka Albert. Emergence of scaling in random networks.
science, 286(5439):509–512, 1999.
3. Alain Barrat, Marc Barthelemy, and Alessandro Vespignani. Dynamical processes
on complex networks. Cambridge university press, 2008.
4. Luca Bortolussi, Jane Hillston, Diego Latella, and Mieke Massink. Continuous
approximation of collective system behaviour: A tutorial. Performance Evaluation,
70(5):317–349, 2013.
5. Fred Brauer. Mathematical epidemiology: Past, present, and future. Infectious
Disease Modelling, 2(2):113–127, 2017.
6. Peter Buchholz. Exact and ordinary lumpability in finite markov chains. Journal
of applied probability, 31(1):59–75, 1994.
7. Luca Cardelli, Mirco Tribastone, Max Tschaikowski, and Andrea Vandin. Erode:
a tool for the evaluation and reduction of ordinary differential equations. In Inter-
national Conference on Tools and Algorithms for the Construction and Analysis of
Systems, pages 310–328. Springer, 2017.
8. Luca Cardelli, Mirco Tribastone, Max Tschaikowski, and Andrea Vandin. Syntactic
In Models, Algorithms,
markovian bisimulation for chemical reaction networks.
Logics and Tools, 2017.
9. Claudio Castellano and Romualdo Pastor-Satorras. Thresholds for epidemic
spreading in networks. Physical review letters, 105(21):218701, 2010.
10. Eric Cator and Piet Van Mieghem. Second-order mean-field susceptible-infected-
susceptible epidemic threshold. Physical review E, 85(5):056111, 2012.
11. Wesley Cota and Silvio C Ferreira. Optimized gillespie algorithms for the sim-
ulation of markovian epidemic processes on large and heterogeneous networks.
Computer Physics Communications, 219:303–312, 2017.
12. G Demirel, F Vazquez, GA Bohme, and T Gross. Moment-closure approximations
for discrete adaptive networks. Physica D: Nonlinear Phenomena, 267:68–80, 2014.
13. Nick Fedewa, Emily Krause, and Alexandra Sisson. Spread of a rumor. Society for
Industrial and Applied Mathematics. Central Michigan University, 25, 2013.
14. P. G. Fennell. Stochastic processes on complex networks: techniques and explo-
rations. PhD thesis, University of Limerick, 2015.
15. Bailey K Fosdick, Daniel B Larremore, Joel Nishimura, and Johan Ugander.
Configuring random graph models with fixed degree sequences. arXiv preprint
arXiv:1608.00607, 2016.
16. James P Gleeson. High-accuracy approximation of binary-state dynamics on net-
works. Physical Review Letters, 107(6):068701, 2011.
17. James P Gleeson. Binary-state dynamics on complex networks: Pair approximation
and beyond. Physical Review X, 3(2):021004, 2013.
18. James P Gleeson, Sergey Melnik, Jonathan A Ward, Mason A Porter, and Pe-
ter J Mucha. Accuracy of mean-field theory for dynamics on real-world networks.
Physical Review E, 85(2):026106, 2012.
19. Istvan Z Kiss, Joel C Miller, and P´eter L Simon. Mathematics of epidemics on
networks: from exact to approximate models. Forthcoming in Springer TAM series,
2016.
20. Charalampos Kyriakopoulos, Gerrit Grossmann, Verena Wolf, and Luca Borto-
lussi. Lumping of degree-based mean-field and pair-approximation equations for
multistate contact processes. Physical Review E, 97(1):012301, 2018.
21. Genyuan Li and Herschel Rabitz. A general analysis of approximate lumping in
chemical kinetics. Chemical engineering science, 45(4):977–1002, 1990.
22. Naoki Masuda and Norio Konno. Multi-state epidemic processes on complex net-
works. Journal of Theoretical Biology, 243(1):64–75, 2006.
23. Mark EJ Newman. The structure and function of complex networks. SIAM review,
45(2):167–256, 2003.
24. Romualdo Pastor-Satorras, Claudio Castellano, Piet Van Mieghem, and Alessandro
Vespignani. Epidemic processes in complex networks. Reviews of modern physics,
87(3):925, 2015.
25. Romualdo Pastor-Satorras and Alessandro Vespignani. Epidemic spreading in
scale-free networks. Physical review letters, 86(14):3200, 2001.
26. Mason Porter and James Gleeson. Dynamical systems on networks: A tutorial,
volume 4. Springer, 2016.
27. P´eter L Simon, Michael Taylor, and Istvan Z Kiss. Exact epidemic models on
graphs using graph-automorphism driven lumping. Journal of mathematical biol-
ogy, 62(4):479–508, 2011.
28. James Wei and James CW Kuo. Lumping analysis in monomolecular reaction sys-
tems. analysis of the exactly lumpable system. Industrial & Engineering chemistry
fundamentals, 8(1):114–123, 1969.
A Simplification of Equation Generation
compute a scalar of the formPm∈C wC,kmf (m) . In this section we introduce an
We constructed the lumped equations such that they can be evaluated efficiently
in each step of the ODE solver. However, for very large kmax, the size of M
becomes enormous. This makes the generation of the equations costly because
we iterate multiple times over M. This iteration is necessary, each time we
approximative scheme to generate lumped equations without the computational
burden of looking at each individual m ∈ M.
Our main idea is to only consider the center of each cluster w.r.t. wC,km, and
not at each cluster element. We use hmiC to denote the center of cluster C, each
entry being defined as:
hmiC[s] = Xm∈C
wC,kmm[s] .
(18)
We can efficiently compute hmiC by only considering the direction of a cluster
(which only depends on the associated proportionality cluster) and the mean
degree of a cluster (which can be computed by only considering the degree dis-
tribution).
Next, we approximate the average cluster rate by only evaluating the rate
function of each rule at the cluster mean:
X
m∈C
wC,kmf (m) ≈ f(cid:0)hmiC(cid:1) .
(19)
(20)
(21)
This, of course, only makes sense if the rate function is reasonably smooth (which
is the case in our models).
Likewise, inside the βss1→ss2, we approximate:
X
m∈C
f (m)wC,km m[s] ≈ f(cid:0)hmiC(cid:1) · wC,km · hmiC[s] .
Finally, we approximate the in- and outflow related to the βs. Note that, by
design, our clustering has the property that for given s1, s2 ∈ S and C ∈ C there
is only exactly one neighboring cluster in which probability mass can flow by
adding (resp. subtracting) state s1 (resp. s2) from the neighborhood vector. We
now assume a fixed s1, s2 and use C0 ∈ C to denote this cluster. We define
CN B = {m m{s+
CB = {m m{s+
1 ,s−
1 ,s−
2} ∈ C}
2} /∈ C} = {m m{s+
1 ,s−
2} ∈ C0} .
We see that all m ∈ CN B occur in the third term (inflow) and in the fourth
term (outflow) in the lumped AME. Hence, they cancel out and we can ignore
them. To determine the flow of probability mass between two clusters only CB
is of interest. Since the flow is symmetrical (i.e., the inflow of C0 is the outflow
of C) it is sufficient to approximate one direction. We use
βss1→ss2
L
· zs,C0 · hmiCB [s1] · C B
C
(22)
hmiC0[s1] .
(23)
1 2
to approximate the flow from C to C0. Hence, we add (resp. substract) this
value in the equation corresponding to C0 (resp. C). Note that hmiCB denotes
an approximation of the mean value of C B. As these points lie at the border to
C0, we use:
1 2
hmiCB [s1] =
hmiC[s1] +
CB
is a scaling factor which corresponds to the size of the border between
C
the clusters (the larger the border area, the more probability flows between the
clusters). Note that also the cardinality of C and the cardinality of CB can
be efficiently approximated by combinatoric reasoning without looking at the
individual elements.
First, consider CB. If we fix a k, each cluster has approximately the same
number of elements (cf. Fig. 2b). We get this number by dividing Mk (the
number of neighbor vectors for that degree) by the number of proportionality
clusters. To determine C, we simply aggregate this value over all degrees which
occur inside C. Next, consider CB. It denotes the number of points inside C
but next to one particular neighboring cluster. Luckily, our clustering has a nice
geometrical structure (namely a triangular one), which we exploit here. The size
of a face (surface area in one direction) of each cluster C ∈ C in n dimensions
for a fixed degree k is exactly the number of elements in a cluster for n − 1
dimensions for that k. For example, the face of a tetrahedron is a triangle, and
the size of the triangle can be determined by clustering three dimensions instead
of four.
We present two examples of approximative equation generation in Fig. 7.
First, we compare these with equations which are generated using the old ap-
proach (Fig. 7a). We find that their respective dynamics does not differ signifi-
cantly.
In addition, we test the approximative equation on a model for which the
traditional generation would introduce a significant overhead and where testing
the original AME is practically impossible (Fig. 7b). We choose a SIR model
(where nodes are trapped in state R) with kmax = 500, γ = 2.5, an infection rate
of 3.0 · m[I], and a recovery rate of 0.3. Again, we see that the lumped AME is
in excellent agreement with the numerical simulations.
(a)
(b)
Fig. 7: Dynamics of approximative equations. (a): The same SIR model as in
Fig. 3: Lumping of the AME (solid line) and approximation of the lumped equa-
tion (dashed line) corresponding to 10 proportionality clusters and 20 degree
clusters. (b): New SIR model with 50 degree clusters and 15 proportionality
clusters. Approximative equations (solid line) are compared with Monte-Carlo
simulations (diamonds). The lumped AME has 8583 clusters. In contrast to more
than 21 million clusters of the original model.
IRS
1.0
0.5
Fractions
0.0
0
1
2
3
Time
4
5
IRS
1.0
0.5
Fractions
0.0
0
1
2
3
Time
4
5
|
1705.02505 | 2 | 1705 | 2017-05-24T22:10:35 | HoloScope: Topology-and-Spike Aware Fraud Detection | [
"cs.SI"
] | As online fraudsters invest more resources, including purchasing large pools of fake user accounts and dedicated IPs, fraudulent attacks become less obvious and their detection becomes increasingly challenging. Existing approaches such as average degree maximization suffer from the bias of including more nodes than necessary, resulting in lower accuracy and increased need for manual verification. Hence, we propose HoloScope, which uses information from graph topology and temporal spikes to more accurately detect groups of fraudulent users. In terms of graph topology, we introduce "contrast suspiciousness," a dynamic weighting approach, which allows us to more accurately detect fraudulent blocks, particularly low-density blocks. In terms of temporal spikes, HoloScope takes into account the sudden bursts and drops of fraudsters' attacking patterns. In addition, we provide theoretical bounds for how much this increases the time cost needed for fraudsters to conduct adversarial attacks. Additionally, from the perspective of ratings, HoloScope incorporates the deviation of rating scores in order to catch fraudsters more accurately. Moreover, HoloScope has a concise framework and sub-quadratic time complexity, making the algorithm reproducible and scalable. Extensive experiments showed that HoloScope achieved significant accuracy improvements on synthetic and real data, compared with state-of-the-art fraud detection methods. | cs.SI | cs | HoloScope: Topology-and-Spike Aware Fraud Detection
Shenghua Liu,1,2,∗ Bryan Hooi,2 Christos Faloutsos2∗
1CAS Key Laboratory of Network Data Science & Technology,
Institute of Computing Technology, Chinese Academy of Sciences
2Carnegie Mellon University
[email protected],{bhooi,christos}@cs.cmu.edu
7
1
0
2
y
a
M
4
2
]
I
S
.
s
c
[
2
v
5
0
5
2
0
.
5
0
7
1
:
v
i
X
r
a
ABSTRACT
As online fraudsters invest more resources, including purchasing
large pools of fake user accounts and dedicated IPs, fraudulent at-
tacks become less obvious and their detection becomes increasingly
challenging. Existing approaches such as average degree maximiza-
tion su(cid:130)er from the bias of including more nodes than necessary,
resulting in lower accuracy and increased need for manual veri-
(cid:128)cation. Hence, we propose HoloScope, which uses information
from graph topology and temporal spikes to more accurately de-
tect groups of fraudulent users. In terms of graph topology, we
introduce "contrast suspiciousness," a dynamic weighting approach,
which allows us to more accurately detect fraudulent blocks, partic-
ularly low-density blocks. In terms of temporal spikes, HoloScope
takes into account the sudden bursts and drops of fraudsters' at-
tacking pa(cid:138)erns. In addition, we provide theoretical bounds for
how much this increases the time cost needed for fraudsters to
conduct adversarial a(cid:138)acks. Additionally, from the perspective of
ratings, HoloScope incorporates the deviation of rating scores in
order to catch fraudsters more accurately. Moreover, HoloScope has
a concise framework and sub-quadratic time complexity, making
the algorithm reproducible and scalable. Extensive experiments
showed that HoloScope achieved signi(cid:128)cant accuracy improve-
ments on synthetic and real data, compared with state-of-the-art
fraud detection methods.
KEYWORDS
Graph Mining, Fraud Detection, Burst and Drop
ACM Reference format:
Shenghua Liu,1,2,∗ Bryan Hooi,2 Christos Faloutsos2. 2016. HoloScope:
Topology-and-Spike Aware Fraud Detection. In Proceedings of ACM Confer-
ence, Washington, DC, USA, July 2017 (Conference'17), 9 pages.
DOI: 10.1145/nnnnnnn.nnnnnnn
1 INTRODUCTION
Online fraud has become an increasingly serious problem due to
the high pro(cid:128)t it o(cid:130)ers to fraudsters, which can be as much as
$5 million from 300 million fake "views" per day, according to a
report of Methbot [20] on Dec 2016. Meanwhile, to avoid detection,
fraudsters can manipulate their geolocation, internet providers, and
IP address, via large IP pools (852,992 dedicated IPs). Suppose a
fraudster has a accounts or IPs, and wants to rate or click b objects
(e.g., products) at least 200 times, as required by their customers.
∗(cid:140)e work was done when Shenghua Liu was a visiting researcher at Carnegie Mellon
University
Conference'17, Washington, DC, USA
2016. 978-x-xxxx-xxxx-x/YY/MM...$15.00
DOI: 10.1145/nnnnnnn.nnnnnnn
(cid:140)e edge density of the fraudulent block is then 200·b/(a·b) = 200/a.
We thus see that with enough user accounts or IPs, the fraudsters
can serve as many customers as they need while keeping density
low. (cid:140)is presents a di(cid:129)cult challenge for most existing fraud
detection methods.
Current dense block detection methods [4, 26, 27] maximize
the arithmetic or geometric average degree. We use "fraudulent
density" to indicate the edge density that fraudsters create for the
target objects. However, those methods have a bias of including
more nodes than necessary, especially as the fraudulent density
decreases, which we veri(cid:128)ed empirically. (cid:140)is bias results in low
precision, which then requires intensive manual work to verify each
user. Fraudar [11] proposed an edge weighting scheme based on
inverse logarithm of objects' degrees to reduce this bias, which was
inspired by IDF [23, 28]. However, their weighting scheme is (cid:128)xed
globally and a(cid:130)ects both suspicious and normal edges, lowering the
precision of Fraudar, which can be seen from results on semi-real
(with injected labels) and real data (see Fig. 1).
Accurately detecting fraudulent blocks of lower density requires
aggregating more sources of information. Consider the a(cid:138)ribute
of the creation time of edges: fraudulent a(cid:138)acks tend to be con-
centrated in time, e.g., fraudsters may surge to retweet a message,
creating one or more sudden bursts of activity, followed by sudden
drops a(cid:137)er the a(cid:138)ack is complete. Sudden bursts and drops have
not been directly considered together in previous work.
Tensor based methods [12, 26, 27] incorporate edge a(cid:138)ributes
into a multi-way tensor formulation, e.g., IPs, rating scores and time.
However, those methods rely on time-binning to incorporate tempo-
ral information, and then treat time bins independently, which loses
information about bursts and drops, which our approach captures.
(cid:140)erefore, we propose HoloScope, which combines suspicious
signals from graph topology, temporal bursts and drops, and rating
deviation. Our graph topology-based weighting scheme dynami-
cally reweights objects according to our beliefs about which users
are suspicious. Temporally, HoloScope detects suspicious spikes of
bursts and drops, which increases the time cost needed for fraud-
sters to conduct an a(cid:138)ack. In terms of rating deviation, our approach
takes into account how much di(cid:130)erence there is between an object's
ratings given by suspicious users and non-suspicious users.
In summary, our contributions are:
• Uni(cid:128)cation of signals: we make holistic use of several
signals, namely connectivity (i.e., topology), temporal bursts
and drops, and rating deviation in a systematic way.
• (cid:135)eoretical analysis of fraudsters' obstruction: we
show that if the fraudsters use less than an upper bound
of time for an a(cid:138)ack, they will cause a suspicious drop or
burst. In other words, HoloScope obstructs fraudsters by
increasing the time they need to perform an a(cid:138)ack.
Conference'17, July 2017, Washington, DC, USA
Shenghua Liu,1,2,∗ Bryan Hooi,2 Christos Faloutsos2
(a) HS-α using topology information outper-
forms competitors
(b) HS using holistic attributes provides clear
improvement, and performs the best.
(c) HS achieves the best F-measure, on real
data from Sina Weibo
Figure 1: (a) and (b) show experimental results on BeerAdvocate dataset. HS-α and HS are both our methods, where the former
only uses topology information. We increase the # of injected fraudsters from 200 to 2000 for HS-α, and to 20000 for HS. (cid:135)e
corresponding density is shown on the horizontal axis. (c) shows accuracy results on Sina Weibo, with ground truth labels.
Table 1: Comparison between HoloScope and other fraud
detection algorithms.
(a) BeerAdvocate dataset
(b) Amazon Electronics dataset
Figure 2: HoloScope (HS) runs in near-linear time.
• E(cid:130)ectiveness: we achieved higher accuracy than the com-
petitors on semi-real and real datasets. In fact, HoloScope
using only topology information (HS-α) outperformed the
graph-based competitors (see Fig. 1a), while HoloScope
(HS) using all a(cid:138)ributes achieved further improvement,
and outperformed the tensor-based competitors (see Fig. 1b
and 1c).
• Scalability: HoloScope runs in subquadratic time in the
number of nodes, under reasonable assumptions. Fig. 2
shows that its running time increases near-linearly with
the number of edges.
In addition, in Microblog, Sina Weibo1 data, HoloScope achieved
higher F-measure than the competitors in detecting the ground
truth labels, with high precision and recall. (cid:140)e code of HoloScope
is open-sourced for reproducibility 2.
2 RELATED WORKS
Most existing works study anomaly detection based on the density
of blocks within adjacency matrices [13, 22], or multi-way ten-
sors [26, 27]. [8] and CoreScope [25] proposed to use Shingling and
K-core algorithms respectively to detect anomalous dense block in
1 (cid:140)e largest Microblog service in China, h(cid:138)p://www.weibo.com
2h(cid:138)ps://github.com/shenghua-liu/HoloScope
]
1
2
,
1
[
s
d
o
h
t
e
m
d
e
s
a
b
-
P
B
]
7
2
,
6
2
[
/
e
b
u
C
-
D
m
o
o
Z
-
M
e
p
o
c
S
o
l
o
H
]
1
1
[
r
a
d
u
a
r
F
]
2
2
[
n
E
k
o
p
S
]
3
[
h
c
t
a
C
y
p
o
C
]
2
1
[
t
o
p
S
s
s
o
r
C
scalability
camou(cid:131)age
hy-community
spike-aware
(cid:88) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88)
(cid:88) (cid:88)
(cid:88)
(cid:88)
(cid:88)
? (cid:88)
?
?
?
huge graphs. Taking into account the suspiciousness of each edge or
node in a real life graph potentially allows for more accurate detec-
tion. Fraudar [11] proposed to weight edges' suspiciousness by the
inverse logarithm of objects' indegrees, to discount popular objects.
[2] found that the degrees in a large community follow a power
law distribution, forming hyperbolic structures. (cid:140)is suggests pe-
nalizing high degree objects to avoid unnecessarily detecting the
dense core of hyperbolic community.
In addition to topological density, EdgeCentric [24] studied the
distribution of rating scores to (cid:128)nd the anomaly. In terms of tem-
poral a(cid:138)ribute, the identi(cid:128)cation of burst period has been studied
in [15]. A recent work, Sleep Beauty (SB) [14] more intuitively
de(cid:128)ned the awakening time for a paper's citation burst for burst
period. [31] clustered the temporal pa(cid:138)erns of text phrases and
hash tags in Twi(cid:138)er. Meanwhile, [9, 10] modeled the time stamped
rating scores with Bayesian model and autoregression model respec-
tively for anomalous behavior detection. Even though [6, 16, 30]
have used bursty pa(cid:138)erns to detect review spam, a sudden drop in
temporal spikes has not been considered yet.
However, aggregating suspiciousness signals from di(cid:130)erent at-
tributes is challenging. [5] proposed RRF (Reciprocal Rank Fusion)
scores for combining di(cid:130)erent rank lists in information retrieval.
However, RRF applies to ranks, not suspiciousness scores.
0.20.40.60.81density00.10.20.30.40.50.60.70.80.91F measureHS-α F of AFraudar F of AFraudar F of BSpokEn F of ASpokEn F of B00.050.10.20.30.40.50.6density00.20.40.60.81F measureHS F of AM-Zoom F of AM-Zoom F of BD-Cube F of AD-Cube F of BCrossSpot F of ACrossSpot F of B27.4%61.4%large result set withlow precision051015# of edges×10505001000Algorithm running Time (s)02468# of edges×1060200040006000800010000Algorithm running Time (s)HoloScope: Topology-and-Spike Aware Fraud Detection
Conference'17, July 2017, Washington, DC, USA
CrossSpot [12], a tensor-based algorithm, estimated the suspi-
ciousness of a block using a Poisson model. However, it did not take
into account the di(cid:130)erence between popular and unpopular objects.
Moreover, although CrossSpot, M-Zoom [26] and D-Cube [27] can
consider edge a(cid:138)ributes like rating time and scores via a multi-way
tensor approach, they require a time-binning approach. When time
is split into bins, a(cid:138)acks which create bursts and drops may not
stand out clearly a(cid:137)er time-binning. (cid:140)e problem of choosing bin
widths for histograms was studied by Sturges [29] assuming an ap-
proximately normal distribution, and Freedman-Diaconis [7] based
on statistical dispersion. However, the binning approaches were
proposed for the time series of a single object, which is not clear
for di(cid:130)erent kinds of objects in a real life graph, namely, popular
products and unpopular products should use di(cid:130)erent bin sizes.
Belief propagation [21] is another common approach for fraud
detection which can incorporate some speci(cid:128)c edge a(cid:138)ributes, like
sentiment [1]. However, its robustness against adversaries which
try to hide themselves is not well understood.
CopyCatch [3] detected lockstep behavior by maximizing the
number of edges in blocks constrained within time windows. How-
ever, this approach ignores the distribution of edge creation times
within the window, and does not capture bursts and drops directly.
Finally, we summarize our competitors compared to our Holo-
Scope in Table 1. We use "hy-community" to indicate whether
the method can avoid detecting the naturally-formed hyperbolic
topology which is unnecessary for fraud detection. HoloScope is
the only one which considers temporal spikes (sudden bursts and
drops and multiple bursts) and hyperbolic topology, in a uni(cid:128)ed
suspiciousness framework.
3 PROPOSED APPROACH
(cid:140)e de(cid:128)nition of our problem is as follows.
Problem 1 (informal definition). Given quadruplets (user,
object, timstamp, #stars), where timestamp is the time that a user
rates an object, and #stars is the categorical rating scores.
- Find a group of suspicious users, and suspicious objects or
its rank list with suspiciousness scores,
- to optimize the metric under the common knowledge of
suspiciousness from topology, rating time and scores.
To make the problem more general, timestamps and #stars are
optional. For example, in Twi(cid:138)er, we have (user , object, timestamp)
triples, where user retweets a message object at timestamp. In a
static following network, we have pairs (user , object), with user
following object.
As discussed in previous sections, our metric should capture the
following basic traits:
Trait 1 (Engagement). Fraudsters engage as much (cid:128)repower as
possible to boost customers' objects, i.e., suspicious objects.
Trait 2 (Less Involvement). Suspicious objects seldom a(cid:136)ract
non-fraudulent users to connect with them.
Trait 3 (Spikes: Bursts and Drops). Fraudulent a(cid:136)acks are
concentrated in time, sometimes over multiple waves of a(cid:136)acks, cre-
ating bursts of activity. Conversely, the end of an a(cid:136)ack corresponds
to sudden drops in activity.
Trait 4 (Rating Deviation). High-rating objects seldom a(cid:136)ract
extremely low ratings from normal users. Conversely, low-rating
objects seldom a(cid:136)ract extremely high ratings from normal users.
(cid:140)us we will show in the following sections, that our proposed
metric can make holistic use of several signals, namely topology,
temporal spikes, and rating deviation, to locate suspicious users
and objects satisfying the above traits. (cid:140)at is the reason we name
our method as HoloScope (HS).
3.1 HoloScope metric
To give a formal de(cid:128)nition of our metric, we describe the quadru-
plets (user, object, timstamp, #stars) as a bipartite and directed
graph G = {U , V , E}, which U is the source node set, V is the
sink node set, and connections E is the directed edges from U to
V . Generally, graph G is a multigraph, i.e., multiple edges can be
present between two nodes. Multiple edges mean that a user can
repeatedly comment or rate on the same product at a di(cid:130)erent time,
as common in practice. Users can also retweet message multiple
times in the Microblog Sina W eibo. Each edge can be associated
with rating scores (#stars), and timestamps, for which the data
structure is introduced in Subsection 3.1.2.
Our HoloScope metric detects fraud from three perspectives:
topology connection, timestamps, and rating score. To easily un-
derstand the framework, we (cid:128)rst introduce the HoloScope in a
perspective of topology connection. A(cid:137)erwards, we show how we
aggregate the other two perspectives into the HoloScope. We (cid:128)rst
view G as a weighted adjacency matrix M, with the number of
multiple edges (i.e., edge frequency) as matrix elements.
Our goal is to (cid:128)nd lockstep behavior of a group of suspicious
source nodes A ⊂ U who act on a group of sink nodes B ⊂ V . Based
on Trait 1, the total engagement of source nodes A to sink nodes B
can be basically measured via density measures. (cid:140)ere are many
density measures, such as arithmetic and geometric average degree.
Our HoloScope metric allows for any such measure. However, as
the average degree metrics have a bias toward including too many
nodes, we use a measure denoted by D(A, B) as the basis of the
HoloScope, de(cid:128)ned as:
D(A, B) =
vi ∈B fA(vi)
A + B
(1)
where fA(vi) is the total edge frequency from source nodes A to a
sink node vi. fA(vi) can also be viewed as an engagement from A
to vi, or A's lockstep on vi, which is de(cid:128)ned as
σji · eji
fA(vi) =
(2)
(uj,vi)∈E∧uj ∈A
where constant σ ji are the global suspiciousness on an edge, and
eji is the element of adjacency matrix M, i.e., the edge frequency
between a node pair (uj , vi). (cid:140)e edge frequency eji becomes a
binary in a simple graph. (cid:140)e global suspiciousness as a prior can
come from the degree, and the extra knowledge on fraudsters, such
as duplicated review sentences and unusual behaving time.
To maximize D(A, B), the suspicious source nodes A and the
suspicious sink nodes B are mutually dependent. (cid:140)erefore, we
introduce contrast suspiciousness in an informal de(cid:128)nition:
Conference'17, July 2017, Washington, DC, USA
Shenghua Liu,1,2,∗ Bryan Hooi,2 Christos Faloutsos2
Figure 3: An intuitive view of our de(cid:128)nitions in the Holo-
Scope.
De(cid:128)nition 3.1 (contrast suspiciousness). (cid:140)e contrast suspicious-
ness denoted as P(vi ∈ BA) is de(cid:128)ned as the conditional likelihood
of a sink node vi that belongs to B (the suspicious object set), given
the suspicious source nodes A.
A visualization of the contrast suspiciousness is given in Fig. 3.
(cid:140)e intuitive idea behind contrast suspiciousness is that in the most
case, we need to judge the suspiciousness of objects by currently
chosen suspicious users A, e.g., an object is more suspicious if very
few users not in A are connected to it (see Trait 2); the sudden burst
of an object is mainly caused by A (see Trait 3); or the rating scores
from A to an object are quite di(cid:130)erent from other users (see Trait 4).
(cid:140)erefore, such suspiciousness makes use of the contrasts between
users in A and users not in A or the whole set.
Finally, instead of maximizing D(A, B), we maximize the follow-
ing expectation of suspiciousness D(A, B) over the probabilities
P(vi ∈ BA):
max
A
HS(A) := E[D(A, B)]
1
fA(vi)P(viA)
(3)
A +
k ∈V
=
i∈V
P(vk A)
where for simplicity we write P(viA) to mean P(vi ∈ BA). 1 −
P(viA) is the probability of vi being a normal sink node. We
dynamically calculate the contrast suspiciousness for all the objects,
a(cid:137)er every choice of source nodes A.
Using this overall framework for our proposed metric HS(A), we
next show how to satisfy the remaining Traits. To do this, we de(cid:128)ne
contrast suspiciousness P(viA) in a way that takes into account
various edge a(cid:138)ributes. (cid:140)is will allow greater accuracy particularly
for detecting low-density blocks.
3.1.1 HS-α: Less involvement from others. Based on Trait 2, a
sink node should be more suspicious if it only a(cid:138)racts connections
from the suspicious source nodes A, and less from other nodes.
Mathematically, we capture this by de(cid:128)ning
P(viA) ∝ q(αi), where αi =
(4)
where fU (vi) is the weighted indegree of sink node vi. Similar
to fA(vi), the edges are weighted by global suspiciousness. αi
measures the involvement ratio of A in the activity of sink node vi.
(cid:140)e scaling function q(·) is our belief about how this ratio relates to
suspiciousness, and we choose the exponential form q(x) = bx−1,
where base b > 1.
fA(vi)
fU (vi)
(a) HS-α (cid:128)nds the exact dense
block in the synthetic data
(b) Hyperbolic community in
BeerAdvocate data
Figure 4: (a) (cid:135)e synthetic data consists of hyperbolic and
rectangular blocks, with volume density around 0.84 and
0.60 respectively. (cid:135)e camou(cid:131)age is randomly biased to
columns of high degree. (b) A real data of naturally-formed
hyperbolic community, and injected dense block. (cid:135)e injec-
tion is 2000 × 200 with biased camou(cid:131)age.
As previous work showed, large communities form hyperbolic
structures, which is generated in our synthetic data (see the lower-
right block in Fig. 4a), and also exists in real BeerAdvocate data
(see Fig. 4b). For clarity, our HoloScope method are denoted as
HS-α when it is only applied on a connection graph. (cid:140)e results
of the synthetic data show that HS-α detected the exact dense
rectangular block (b = 128), while the other competitors included
a lot of non-suspicious nodes from the core part of hyperbolic
community resulting in low accuracy. In the beer review data from
the BeerAdvocate website, testing on di(cid:130)erent fraudulent density
(see Fig. 1a), our HS-α remained at high accuracy, while the other
methods' accuracy drops quickly when the density drops below
70%.
(cid:140)e main idea is that HS-α can do be(cid:138)er because it dynamically
adjusts the weights for sink nodes, penalizing those sink nodes
that also have many connections from other source nodes not in
A.
In contrast, although Fraudar proposed to penalize popular
sink nodes based their indegrees, these penalties also scaled down
the weights of suspicious edges. (cid:140)e Fraudar (green box) only
improved the unweighted "average degree" method (red box) by a
very limited amount. Moreover, with a heavier penalty, the "sqrt
weight" method (blue box) achieved be(cid:138)er accuracy on source
nodes but worse accuracy on sink nodes, since those methods used
globally (cid:128)xed weights, and the weights of suspicious were penalized
as well. Hence the hyperbolic structure pushes those methods to
include more nodes from its core part.
In summary, our HS-α using dynamic contrast suspiciousness
can improve the accuracy of fraud detection in 'noisy' graphs (con-
taining hyperbolic communities), even with low fraudulent density.
3.1.2 Temporal bursts and drops. Timestamps for edge creation
are commonly available in most real se(cid:138)ings. If two subgroups of
Microblog users have the same number of retweets to a message,
can we say they have the same suspiciousness? As an example
shown in Fig. 5a, the red line is the time series (histogram of time
bins) of the total retweets of a message in Microblog, Sina Weibo.
UVvi()Aifv()iPvAA050010001500200025003000050010001500200025003000avgdegree1172x1331Fraudar1120x1472sqrtweight1028x2057HS-α500x500injected fraud & camouflage hyperbolic block(naturally formed )HoloScope: Topology-and-Spike Aware Fraud Detection
Conference'17, July 2017, Washington, DC, USA
(a) Group A1 is more suspicious than A2, due to
the sudden burst and drop
(b) Detection of temporal bursts and drops
(c) Proof the time cost obstruction
Figure 5: (a) and (b) are the time series (histogram) of a real message being retweeted in Microblog, Sina Weibo. (cid:135)e horizontal
axis is the seconds a(cid:133)er 2013 − 11 − 1. (c) illustrates our proof of time cost obstruction.
(cid:140)e blue do(cid:138)ed line and green dashed line are the retweeting time
series respectively from user groups A1 and A2. (cid:140)e two series have
the same area under the time series curves, i.e., the same number
of retweets. However, considering that fraudsters tend to surge to
retweet a message to reduce the time cost, the surge should create
one or more sudden bursts, along with sudden drops. (cid:140)erefore,
the suspiciousness of user groups A1 and A2 become quite di(cid:130)erent
even though they have the same number of retweets, which cannot
be detected solely based on connections in the graph. (cid:140)us we
include the temporal a(cid:138)ribute into our HoloScope framework for
de(cid:128)ning contrast suspiciousness.
Denote the list of timestamps of edges connected to a sink node
v as Tv. To simplify notation, we use T without subscript when
talking about a single given sink node v. Let T ={(t0, c0), (t1, c1), · · · ,
(te, ce)} as the time series of T , i.e., the histogram of T . (cid:140)e count ci
is the number of timestamps in the time bin [ti − ∆t/2, ti + ∆t/2),
with bin size ∆t. (cid:140)e bin size of histogram is calculated according to
the maximum of Sturges criteria and the robust Freedman-Diaconis'
criteria as mentioned in related works. It is worth noticing that the
HoloScope can tune di(cid:130)erent bin sizes for di(cid:130)erent sink nodes, e.g.,
popular objects need (cid:128)ne-grained bins to explore detailed pa(cid:138)erns.
Hence, the HoloScope is more (cid:131)exible than tensor based methods,
which use a globally (cid:128)xed bin size. Moreover, the HoloScope can
update the time series at a low cost when T is increasing.
To consider the burst and drop pa(cid:138)erns described in Trait 3,
we need to decide the start point of a burst and the end point of
a drop in time series T . Let the burst point be (tm, cm), having
the maximum value cm. According to the de(cid:128)nition in previous
work "Sleeping Beauty", we use an auxiliary straight line from the
beginning to the burst point to decide the start point, named the
awakening point of the burst. Fig. 5b shows the time series T (red
polygonal line) of a message from Sina Weibo, the auxiliary straight
line l (black do(cid:138)ed line) from the lower le(cid:137) point (t0, c0) to upper
right point (tm, cm), and the awakening point for the maximum
point (tm, cm), which is de(cid:128)ned as the point along the time series T
which maximizes the distance to l. As the do(cid:138)ed line perpendicular
to l suggests in this (cid:128)gure, the awakening point (ta, ca) satis(cid:128)es
(5)
(cm − c0)t − (tm − t0)c + tmc0 − cmt0
(cid:113)(cm − c0)2 + (tm − t0)2
ta = arg max
(c,t)∈T,t <tm
Finding the awakening point for one burst is not enough, as
multiple bursts may be present. (cid:140)us, sub-burst points and the as-
sociated awakening points should be considered. We then propose
a recursive algorithm MultiBurst in Alg. 1 for such a purpose.
Algorithm 1 MultiBurst algorithm.
Input Time series T of sink node v, beginning index i, end index j
Output A list of awakening-burst point pairs,
sam: slope of the line passing through each point pair,
∆c: altitude di(cid:130)erence of each point pair.
If j − i < 2 then return
(tm, cm) = point of maximum altitude between indices i and j.
(ta, ca) = the awakening point as Eq (5) between indices i and j.
∆cam = cm − ca, and sam = ∆cam/(tm−ta)
Append {(ta, ca), (tm, cm)}, sam, and ∆cam into the output.
MultiBurst(T, i, a − 1)
k = Find the (cid:128)rst local min position from indices m + 1 to j
MultiBurst(T, k, j)
∆cam ·sam
Φ(TU ), and Φ(T) =
A(cid:137)er (cid:128)nding awakening and burst points, the contrast suspi-
ciousness of burst awareness satis(cid:128)es P(viA) ∝ q(φi), where φi is
the involvement ratio of source nodes in A in multiple bursts. Let
the collection of timestamps from A to sink node vi be TA. (cid:140)en,
φi = Φ(TA)
1(t ∈ [ta, tm]) (6)
where sam is the slope from the output of MultiBurst algorithm.
Here sam is used as a weight based on how steep the current burst is.
(cid:140)is de(cid:128)nition of suspiciousness satis(cid:128)es Trait 3. It is worth noticing
that the MultiBurst algorithm only needs to be executed once.
With the preprocessed awakening and burst points, the contrast
suspiciousness of edges connected to v has O(dv) complexity, where
dv is the degree of sink node v. Hence the complexity for overall
sink nodes are O(E).
(ta,tm)
t ∈T
6789101112time (s)×105050100150200250300350400# of retweetsGroup 𝐴"Group 𝐴#involve more in sudden burstsudden dropawakening pointsburst pointsdying point𝑙(𝑡$,𝑐$)(𝑡(,𝑐()(𝑡),𝑐))(𝑡*,𝑐*)exceed 𝑆"exceed 𝑆#𝑆"𝑆#𝑐%𝑛"∆𝑡𝑛#∆𝑡Conference'17, July 2017, Washington, DC, USA
Shenghua Liu,1,2,∗ Bryan Hooi,2 Christos Faloutsos2
In fact, sudden drops are also a prominent pa(cid:138)ern of fraudulent
behavior as described in Trait 3, since a(cid:137)er creating the a(cid:138)ack is
complete, fraudsters usually stop their activity sharply. To make
use of the suspicious pa(cid:138)ern of a sudden drop, we de(cid:128)ne the dyin❕
point as the end of a drop. As Fig. 5b suggests, another auxiliary
straight line is drawn from the highest point (tm, cm) to the last
point (te, ce). (cid:140)e dying point (td, cd) can be found by maximizing
the distance to this straight line. (cid:140)us we can discover the "sudden
drop" by the absolute slope value sbd=(cm − cd)/(td − tm) between the
burst point and the dying point. Since there may be several drops in
a (cid:131)uctuated time series T , we choose the drop with the maximum
fall. To (cid:128)nd the maximum fall, we also need a recursive algorithm,
similar to Alg. 1:
1) Find a maximum point (tm, cm), and the corresponding dying
point (td , cd ) by de(cid:128)nition; 2) Calculate the current drop slope sbd ,
and the drop fall ∆cbd = cm − cd ; 3) Recursively (cid:128)nd drop slope and
drop fall for the le(cid:135) and right parts of T , i.e., t < tm and t ≥ td
respectively.
As a result, the algorithm returns the maximum drop fall ∆cbd,
and its drop slope sbd, which it has found recursively. Finally, we
use the weighted drop slope ∆cbd · sbd as a global suspiciousness
in equation (2), to measure the drop suspiciousness. Each edge con-
nected to the sink node v is assigned the same drop suspiciousness.
We use a logarithm scale for smoothing those edge weights.
With this approach to detect bursts and drops, we now show
that this provides a provable time obstruction for fraudsters.
(cid:113) 2N ∆t(S1+S1)
to create for an object.
Theorem 3.2. Let N be the number of edges that fraudsters want
If the fraudsters use time less than τ ≥
, then they will be tracked by a suspicious burst or
drop, where ∆t is the size of time bins, and S1 and S2 are the slopes of
normal rise and decline respectively.
S1·S1
Proof. (cid:140)e most e(cid:129)cient way to create N edges is to have one
burst and one drop, otherwise more time is needed. As shown
in Fig. 5c, in order to minimize the slope, every point in the time
series should in line with the two auxiliary straight lines to the
highest point cm, separately from the awakening and dying points.
Otherwise, the slopes will exceed the normal values S1 and S2.
Hence we only consider the triangle with the auxiliary lines as its
two edges. It is worth noticing that a trapezoid whose legs have
the same slopes as the triangle's edges cannot have a shorter time
cost. (cid:140)en
cm
n1∆t
(n1 + n2) · cm = 2N
Here n1 and n2 are the number of time bins before and a(cid:137)er the
burst. N (cid:48) is the total number of rating edges, and N (cid:48) ≥ N consider
some edges from normal users. (cid:140)us, solving the above equations,
we have
cm
n2∆t
= S2,
= S1,
(cid:48)
.
(cid:115)2N (cid:48)∆t(S1 + S2)
(cid:115)2N ∆t(S1 + S2)
≥
τ = (n1 + n2)∆t =
S1 · S2
S1 · S2
We also have the height of burst, cm ≥(cid:113) 2N ∆tS1S2
(cid:3)
. (cid:140)us, the
maximum height of time series T cannot be larger by far than that
of a normal sink node. (cid:140)at is the reason that we use the weighted
φi in equation (6) and weighted drop slope in equation (2).
S1+S2
3.1.3 Rating deviation and aggregation. We now consider edges
with categorical a(cid:138)ributes such as rating scores, text contents, etc.
For each sink node vi, we use the KL-divergence κi between the
distributions separately from the suspicious source nodes A and the
other nodes, i.e., U \ A. We use U \ A for KL-divergence instead of
the whole source nodes U , in order to avoid the trivial case where
most of the rating scores are from A. (cid:140)e rating deviation κi is
scaled into [0, 1] by the maximum value before being passed into
function q(·) to compute contrast suspiciousness. (cid:140)e neutral scores
can be ignored in the KL-divergence for the purpose of detecting
fraudulent boosting or defamation. Moreover, rating deviation is
meaningful when both A and U \A have the comparable numbers of
ratings. (cid:140)us, we weighted κi by a balance factor, min{ fA(vi)/fU \A(vi),
fU \A(vi)/fA(vi) }.
To make holistic use of di(cid:130)erent signals, i.e., topology, temporal
spikes, and rating deviation, we need a way to aggregate those
signals together. We have tried to use RRF (Reciprocal Rank Fusion)
scores from Information Retrieval, and wrapped the scores with
and without scaling function q(x). Compared to RRF score, we
found that a natural way of joint probability by multiplying those
signals together:
,
P(viA) = bαi +φi +κi−3
(7)
was the most e(cid:130)ective way to aggregate. In a joint probability,
we can consider the absolute suspicious value of each signal, as
opposite to the only use of ranking order. Moreover, being wrapped
with q(x), the signal values cannot be canceled out by multiplying
a very small value from other signals. A concrete example is that
a suspicious spike can still keep a high suspiciousness score by
multiplying a very small score from low fraudulent density.
Moreover, HoloScope dynamically updates the contrast suspi-
ciousness P(viA). (cid:140)us the sink nodes being added with camou-
(cid:131)age will have a very low contrast suspiciousness, with respect to
the suspicious source nodes A. (cid:140)is o(cid:130)ers HoloScope the resistance
to camou(cid:131)age.
3.2 Algorithm
Before designing the full algorithm for large scale datasets, we
(cid:128)rstly introduce the most important sub-procedure GreedyShavin❕
in Alg. 2.
At the beginning, this greedy shaving procedure starts with an
initial set A0 ⊂ U as input. It then greedily deletes source nodes
from A, according to users' scores S:
S(uj ∈ A) =
σ ji · eji · P(viA),
vi :(uj,vi)∈E
which can be interpreted as how many suspicious nodes that user
uj is involved in. So the user is less suspicious if he has a smaller
score, with respect to the current contrast suspiciousness P, where
we use P to denote a vector of contrast suspiciousness of all sink
nodes. We build a priority tree to help us e(cid:129)ciently (cid:128)nd the user
with minimum score. (cid:140)e priority tree updates the users' scores
and maintains the new minimum as the priorities change. With
removing source nodes A, the contrast suspiciousness P change,
in which we then update users' scores S. (cid:140)e algorithm keeps
reducing A until it is empty. (cid:140)e best A∗ maximizing objective HS
and P(vA∗) are returned at the end.
HoloScope: Topology-and-Spike Aware Fraud Detection
Conference'17, July 2017, Washington, DC, USA
Algorithm 2 GreedyShavin❕ Procedure.
Given bipartite multigraph G(U , V , E),
Initialize:
initial source nodes A0 ⊂ U .
A = A0
P= calculate contrast suspiciousness given A0
S = calculate suspiciousness scores of source nodes A.
MT = build priority tree of A with scores S.
while A is not empty do
u = pop the source node of the minimum score from MT .
A = A \ u, delete u from A.
Update P with respect to new source nodes A.
Update MT with respect to new P.
H S = estimate objective as Equation (3).
end while
return A∗ that maximizes objective H S(A∗) and P(v A∗), v ∈ V .
Since awakening and burst points have been already calculated
for each sink node as an initial step before the GreedyShavin❕
procedure, the calculation of the contrast suspicious P(vA) for a
sink node v only needs O(A) time. With source node j as the j-th
one removed from A0 by the GreedyShavin❕ procedure, A0 = m0,
and the out degree as di, the complexity is
O(dj · (j − 1) · log m0) = O(m0E0 log m0)
(8)
j =2,··· ,m0
where E0 is the set of edges connected to source nodes A0.
With the GreedyShavin❕ procedure, our scalable algorithm can
be designed so as to generate candidate suspicious source node sets.
In our implementation, we use singular vector decomposition (SVD)
for our algorithm. Each top singular vector gives a spectral view of
high connectivity communities. However, those singular vectors
are not associated with suspiciousness scores. (cid:140)us combined with
the top singular vectors, our fast greedy algorithm is given in Alg. 3.
Theorem 3.3 (Algorithm complexity). In the graph G(U , V , E),
given V = O(U ) and E = O(U 0), the complexity of FastGreedy
algorithm is subquadratic, i.e., o(U 2) in li(cid:136)le-o notation, if the size
of truncated user set U (k) ≤ U 1/ , where > max{1.5,
3−0 }.
2
Proof. (cid:140)e FastGreedy algorithm executes GreedyShavin❕ in a
constant iterations. A0 is assigned to U (k) in every GreedyShavin❕
procedure. (cid:140)en m0 = A0 = U (k). In the adjacency matrix M of
the graph, we consider the submatrix M0 with A0 as rows and V as
columns. If the fraudulent dense block is in submatrix M0, then we
assume that the block has at most O(m0) columns. Excluding the
dense block, the remaining part of M0 is assumed to have the same
density with the whole matrix M. (cid:140)erefore, the total number of
edges in M0 is
O(E0) = O(m
2
0 + m0 · E
U
) = O(U 2/ + U 1/−1E)
(cid:140)en based on equation (8), the algorithm complexity is
O(m0E0 log m0) = O((U 3/ + U 2/−1+0) log U )
(cid:140)erefore, if > max{1.5,
quadratic o(U 2).
3−0 }, then the complexity is sub-
2
(cid:3)
In real life graph, 0 ≤ 1.6, so if > 1.5 the complexity of
FastGreedy algorithm is subquadratic. (cid:140)erefore, without loss
of performance and e(cid:129)ciency, we can limit U (k) ≤ U 1/1.6 for
truncating an ordered U in the FastGreedy algorithm for a large
dataset.
In FastGreedy algorithm for HS-α, SVD on adjacency matrix M
is used to generate initial blocks for the GreedyShavin❕ procedure.
Although we can still use SVD on M for HS with holistic a(cid:138)ributes,
yet considering a(cid:138)ributes of timestamps and rating scores may
bring more bene(cid:128)ts. Observing that not every combination of # of
stars, timestamps and product ids has a value in a multi-way tenor
representation, we can only choose every existing triplets (object,
timestamp, #stars) as one column, and user as rows, to form a new
matrix. (cid:140)e above transformation is called the matricization of a
tensor, which outputs a new matrix. With proper time bins, e.g.,
one hour or day, and re-clustering of #stars, the (cid:131)a(cid:138)ening matrix
becomes more dense and contains more a(cid:138)ribute information. (cid:140)us
we use such a (cid:131)a(cid:138)ening matrix with each column weighted by the
sudden-drop suspiciousness for our FastGreedy algorithm.
Algorithm 3 FastGreedy Algorithm for Fraud detection.
Given bipartite multigraph G(U , V , E).
L = get (cid:128)rst several le(cid:137) singular vectors
for all L(k) ∈ L do
Rank source nodes U decreasingly on L(k)
(k)
u ≤ 1√U
U (k) = truncate u ∈ U when L
Gr eedyShavin❕ with initial U (k).
end for
return the best A∗ with maximized objective H S(A∗),
and the rank of v ∈ V by fA∗(v) · P(v A∗).
4 EXPERIMENTS
Table 2: Data Statistics
Data Name
BeerAdvocate [18]
Yelp
Amazon Phone & Acc [17]
Amazon Electronics [17]
Amazon Grocery [17]
Amazon mix category [19]
#nodes
26.5K x 50.8K
686K x 85.3K
2.26M x 329K
4.20M x 476K
763K x 165K
1.08M x 726K
time span
#edges
1.07M Jan 08 - Nov 11
2.68M Oct 04 - Jul 16
3.45M Jan 07 - Jul 14
7.82M Dec 98 - Jul 14
1.29M Jan 07 - Jul 14
2.72M Jan 04 - Jun 06
In the experiments, we only consider the signi(cid:128)cant multiple
bursts for (cid:131)uctuated time series of sink nodes. We keep those
awakening-burst point pairs with the altitude di(cid:130)erence ∆c at least
50% of the largest altitude di(cid:130)erence in the time series. Table 2
gives the statistics of our six datasets which are publicly available
for academic research 3. Our extensive experiments showed that
the performance was insensitive to scaling base b, and became
very stable when larger than 32. Hence we choose b = 32 in the
following experiments.
3Yelp dataset is from h(cid:138)ps://www.yelp.com/dataset challenge
Conference'17, July 2017, Washington, DC, USA
Shenghua Liu,1,2,∗ Bryan Hooi,2 Christos Faloutsos2
Table 3: Experimental results on real data with injected labels
Data Name
BeerAdvocate
metrics*
auc
F≥90%
auc
F≥90%
auc
F≥90%
auc
F≥90%
auc
F≥90%
auc
F≥90%
M-Zoom D-Cube
0.7280
0.7353
0.5000
0.5000
0.9137
0.9019
0.2000
0.2500
0.8042
0.9246
0.1667
0.5000
0.9117
0.9141
0.1250
0.2000
0.8428
0.8998
0.5000
0.1667
0.9001
0.8490
0.5000
0.2500
Yelp
Amazon
Phone & Acc
Amazon
Electronics
Amazon
Grocery
Amazon
mix category
* we use the two metrics: the area under the curve (abbrev as low-case "auc") of the accuracy curve as drawn in Fig. 1b, and the lowest
detection density that the method can detect in high accuracy(≥ 90%).
† one of the above fraudulent density was not detected in high accuracy.
0.5747
0.2000†
0.0009
0.0058
0.0515
0.0301
0.0200
–
–
–
0.0157
HS
0.9758
0.0333
0.9925
0.0143
0.9691
0.0200†
0.9250
0.1000
0.9250
0.1000
0.9922
0.0167
M-Zoom D-Cube
0.6221
0.6454
0.5000
0.5000
0.8863
0.9709
1.0000
0.0250
0.8810
0.9279
0.1429
0.1000
0.7868
0.9142
0.5000
0.1000
0.8241
0.8756
0.2500
0.1250
0.9937
0.9346
0.2000
0.0100
source nodes
CrossSpot
0.2259
–
0.9916
0.0200
0.0169
sink nodes
CrossSpot
0.1295
0.0415
HS
0.9945
0.0333
0.9950
0.0100
0.9823
0.0200†
0.9385
0.1250
0.9621
0.1000
0.9950
0.0100
–
–
–
–
–
–
4.1 Evaluation on di(cid:130)erent injection density
In the experiments, we mimic the fraudsters' behaviors and ran-
domly choose 200 objects that has no more than 100 indegree as
the fraudsters' customers, since less popular objects are more likely
to buy fake ratings. On the other hand, the fraudulent accounts
can come from the hijacked user accounts. (cid:140)us we can uniformly
sample out a number of users from the whole user set as fraud-
sters. To test on di(cid:130)erent fraudulent density, the number of sampled
fraudsters ranges from 200 to 20000. (cid:140)ose fraudsters as a whole
randomly rate each of the 200 products for 200 times, and also
create some biased camou(cid:131)age on other products. As a results, the
fraudulent density ranges from 1.0 to 0.01 for testing. (cid:140)e rating
time was generated for each fraudulent edge: (cid:128)rst randomly choos-
ing a start time between the earliest and the latest creation time
of the existing edges; and then plus a randomly and biased time
interval from the intervals of exiting creation time, to mimic the
surge of fraudsters' a(cid:138)acks. Besides, a high rating score, e.g. 4 or
4.5, is randomly chosen for each fraudulent edge4.
Fig. 1b shows the results of HoloScope HS on the BeerAdvocate
data. When the fraudulent density decreases from the right to the
le(cid:137) along the horizontal axis, HS can keep as high F-measure on
accuracy as more than 80% before reaching 0.025 in density, be(cid:138)er
by far than the competitors. Since HS returns suspiciousness scores
for sink nodes, we measure their accuracy using AUC (the area
under the ROC curve), where ROC stands for receiver operating
characteristic. For the detection of suspicious objects, HS achieved
more than 0.95 in AUC for all the testing injection density, with a
majority of tests reaching to 1.0.
In order to give a comparison on all six data sets with di(cid:130)erent
injection density, we propose to use the two metrics: a low-case
"auc" and the lowest detection density, described in the notes of
Table 3. (cid:140)e table reports the fraud detection results of our Holo-
Scope (HS) and competitors on the six datasets. Since the accuracy
curve stops at 0.01 (the minimum testing density); and we add zero
accuracy at zero density, the ideal value of auc is 0.995. (cid:140)e auc
on source and sink nodes are reported separately. As the table
4 the injection code is also open-sourced for reproducibility
suggests, our HS achieved the best auc among the competitors,
and even reached the ideal auc in two cases. Since the HS outputs
the suspiciousness scores for sink nodes, we used the area under
the upper-case AUC (similar to F-measure) accuracy curve along
all testing density. Although it is sometimes unfair to compare
F-measure with AUC, since the smallest value of AUC is around
0.5, yet the high auc values can indicate the high F-measure values
on our top suspicious list.
Furthermore, we compare the lowest detection density in Table 3.
(cid:140)e be(cid:138)er a method is, the lower density it should be able to detect
well. As we can see, HS has the smallest detection density in most
cases, which can be as small as 200/14000= 0.0143 on source nodes,
and reached the minimum testing density of 0.01 on sink nodes.
(cid:140)at means we can detect fraudsters in high accuracy even if they
use 14 thousand accounts to create 200 × 200 fake edges for 200
objects. (cid:140)e fraudulent objects can also be detected accurately, even
if 20 thousand fraudsters are hired to create 200 fake edges for each
object.
4.2 Evaluation on Sina Weibo with real labels
We also did experiments on a large real dataset from Sina Weibo,
which has 2.75 million users, 8.08 million messages, and 50.1 million
edges in Dec 2013. (cid:140)e user names and ids, and message ids are
from the online system. (cid:140)us we can check their existence status
in the system to evaluate the experiments. If the messages or the
users were deleted from the system, we treat them as the basis for
identifying suspicious users and messages. Since it is impossible to
check all of the users and messages, we (cid:128)rstly collected a candidate
set, which is the union of the output sets from the HS and the
baseline methods. (cid:140)e real labels are from the candidate set by
checking the status whether they still exists in Sina Weibo (checked
in Feb. 2017). We used a program on the API service of Sina Weibo
to check the candidate user and message id lists, (cid:128)nally resulting
in 3957 labeled users and 1615 labeled messages.
(cid:140)e experimental results in Fig. 1c show that HS achieved high
F-measure on accuracy, which detected 3781 labeled users higher
than M-Zoom's 1963 labeled users. (cid:140)e F-measure of HS improved
HoloScope: Topology-and-Spike Aware Fraud Detection
Conference'17, July 2017, Washington, DC, USA
about 30% and 60%, compared with M-Zoom and D-Cube respec-
tively. CrossSpot biased to include a large amount of users in their
detection results, which detected more than 100 labeled users but
with extremely low precision, i.e., less than 1%. (cid:140)at is the reason
CrossSpot got the lowest F-measure, which is less than 1.5%. For
labeled messages, the HS achieved around 0.8 in AUC, while M-
Zoom and D-Cube got lower recall, and CrossSpot still su(cid:130)ered
very low F-measure with higher recall. (cid:140)erefore, our HoloScope
outperformed the competitors in real-labeled data as well.
4.3 Scalability
To verify the complexity, we choose two representative datasets:
BeerAdvocate data which has the highest volume density, and Ama-
zon Electronics which has the most edges. We truncated the two
datasets according to di(cid:130)erent time ranges, i.e., from the past 3
months, 6 months, or several years to the last day, so that the gen-
erated data size increases. Our algorithm is implemented in Python.
As shown in Fig. 2, the running time of our algorithm increases
almost linearly with the number of the edges.
5 CONCLUSION
We proposed a fraud detection method, HoloScope, on a bipartite
graph which can have timestamps and rating scores. HoloScope
has the following advantages: 1) Uni(cid:128)cation of signals: we make
holistic use of several signals, namely topology, temporal spikes,
and rating deviation in our suspiciousness framework in a system-
atic way. 2) (cid:135)eoretical analysis of fraudsters' obstruction: we
showed that if the fraudsters use less than an upper bound of time
to rate an object, they will cause a suspicious drop or burst. In other
words, our HoloScope can obstruct fraudsters and increases their
time cost. 3) E(cid:130)ectiveness: we achieved higher accuracy on both
semi-real and real datasets than the competitors, achieving good
accuracy even when the fraudulent density is low. 4) Scalability:
while HoloScope needs to dynamically update the suspiciousness
of objects, the algorithm is sub-quadratic in the number of nodes,
under reasonable assumptions.
REFERENCES
[1] Leman Akoglu, Rishi Chandy, and Christos Faloutsos. 2013. Opinion Fraud
Detection in Online Reviews by Network E(cid:130)ects. ICWSM 13 (2013), 2–11.
[2] Miguel Araujo, Stephan Gunnemann, Gonzalo Mateos, and Christos Faloutsos.
2014. Beyond blocks: Hyperbolic community detection. In Joint European Con-
ference on Machine Learning and Knowledge Discovery in Databases. Springer,
50–65.
[3] Alex Beutel, Wanhong Xu, Venkatesan Guruswami, Christopher Palow, and
Christos Faloutsos. 2013. Copycatch: stopping group a(cid:138)acks by spo(cid:138)ing lockstep
behavior in social networks. In Proceedings of the 22nd international conference
on World Wide Web. ACM, 119–130.
[4] Moses Charikar. 2000. Greedy approximation algorithms for (cid:128)nding dense
components in a graph. In International Workshop on Approximation Algorithms
for Combinatorial Optimization. Springer, 84–95.
[5] Gordon V Cormack, Charles LA Clarke, and Stefan Bue(cid:138)cher. 2009. Reciprocal
rank fusion outperforms condorcet and individual rank learning methods. In
Proceedings of the 32nd international ACM SIGIR conference on Research and
development in information retrieval. ACM, 758–759.
[6] Geli Fei, Arjun Mukherjee, Bing Liu, Meichun Hsu, Malu Castellanos, and Rid-
dhiman Ghosh. 2013. Exploiting Burstiness in Reviews for Review Spammer
Detection. ICWSM 13 (2013), 175–184.
tor: L 2 theory. Probability theory and related (cid:128)elds 57, 4 (1981), 453–476.
[7] David Freedman and Persi Diaconis. 1981. On the histogram as a density estima-
[8] David Gibson, Ravi Kumar, and Andrew Tomkins. 2005. Discovering large dense
subgraphs in massive graphs. In Proceedings of the 31st international conference
on Very large data bases. VLDB Endowment, 721–732.
[9] Nikou Gunnemann, Stephan Gunnemann, and Christos Faloutsos. 2014. Robust
multivariate autoregression for anomaly detection in dynamic product ratings.
In Proceedings of the 23rd international conference on World wide web. ACM,
361–372.
[10] Stephan Gunnemann, Nikou Gunnemann, and Christos Faloutsos. 2014. Detect-
ing anomalies in dynamic rating data: A robust probabilistic model for rating
evolution. In Proceedings of the 20th ACM SIGKDD international conference on
Knowledge discovery and data mining. ACM, 841–850.
[11] Bryan Hooi, Hyun Ah Song, Alex Beutel, Neil Shah, Kijung Shin, and Christos
Faloutsos. 2016. Fraudar: bounding graph fraud in the face of camou(cid:131)age. In
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining. ACM, 895–904.
[12] Meng Jiang, Alex Beutel, Peng Cui, Bryan Hooi, Shiqiang Yang, and Christos
Faloutsos. 2015. A general suspiciousness metric for dense blocks in multimodal
data. In Data Mining (ICDM), 2015 IEEE International Conference on. IEEE, 781–
786.
[13] Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang.
2014. Inferring strange behavior from connectivity pa(cid:138)ern in social networks.
In Paci(cid:128)c-Asia Conference on Knowledge Discovery and Data Mining. Springer,
126–138.
[14] Qing Ke, Emilio Ferrara, Filippo Radicchi, and Alessandro Flammini. 2015. De(cid:128)n-
ing and identifying Sleeping Beauties in science. Proceedings of the National
Academy of Sciences 112, 24 (2015), 7426–7431.
[15] Ravi Kumar, Jasmine Novak, Prabhakar Raghavan, and Andrew Tomkins. 2005.
On the bursty evolution of blogspace. World Wide Web 8, 2 (2005), 159–178.
[16] Huayi Li, Geli Fei, Shuai Wang, Bing Liu, Weixiang Shao, Arjun Mukherjee,
and Jidong Shao. 2016. Modeling Review Spam Using Temporal Pa(cid:138)erns and
Co-bursting Behaviors. arXiv preprint arXiv:1611.06625 (2016).
Julian McAuley and Jure Leskovec. 2013. Hidden factors and hidden topics:
understanding rating dimensions with review text. In Proceedings of the 7th ACM
conference on Recommender systems. ACM, 165–172.
Julian John McAuley and Jure Leskovec. 2013. From amateurs to connoisseurs:
modeling the evolution of user expertise through online reviews. In Proceedings
of the 22nd international conference on World Wide Web. ACM, 897–908.
[19] Arjun Mukherjee, Bing Liu, and Natalie Glance. 2012. Spo(cid:138)ing fake reviewer
groups in consumer reviews. In Proceedings of the 21st international conference
on World Wide Web. ACM, 191–200.
h(cid:138)p://go.whiteops.com/rs/
179-SQE-823/images/WO Methbot Operation WP.pdf. (2016). [Online; accessed
Jan-7-2017].
[20] White Ops. 2016. (cid:140)e Methbot Operation.
[17]
[18]
[21] Shashank Pandit, Duen Horng Chau, Samuel Wang, and Christos Faloutsos.
2007. Netprobe: a fast and scalable system for fraud detection in online auction
networks. In Proceedings of the 16th international conference on World Wide Web.
ACM, 201–210.
[22] B Aditya Prakash, Ashwin Sridharan, Mukund Seshadri, Sridhar Machiraju,
and Christos Faloutsos. 2010. Eigenspokes: Surprising pa(cid:138)erns and scalable
community chipping in large graphs. In Paci(cid:128)c-Asia Conference on Knowledge
Discovery and Data Mining. Springer, 435–448.
[23] Stephen Robertson. 2004. Understanding inverse document frequency: on theo-
retical arguments for IDF. Journal of documentation 60, 5 (2004), 503–520.
[24] Neil Shah, Alex Beutel, Bryan Hooi, Leman Akoglu, Stephan Gunnemann, Disha
Makhija, Mohit Kumar, and Christos Faloutsos. 2015. EdgeCentric: Anomaly
Detection in Edge-A(cid:138)ributed Networks. arXiv preprint arXiv:1510.05544 (2015).
[25] Kijung Shin, Tina Eliassi-Rad, and Christos Faloutsos. 2016. CoreScope: Graph
Mining Using k-Core Analysis-Pa(cid:138)erns, Anomalies and Algorithms. ICDM.
[26] Kijung Shin, Bryan Hooi, and Christos Faloutsos. 2016. M-Zoom: Fast Dense-
Block Detection in Tensors with (cid:139)ality Guarantees. In Joint European Conference
on Machine Learning and Knowledge Discovery in Databases. 264–280.
[27] Kijung Shin, Bryan Hooi, Jisu Kim, and Christos Faloutsos. 2017. D-Cube:
Dense-Block Detection in Terabyte-Scale Tensors. In Proceedings of the 10th ACM
International Conference on Web Search and Data Mining (WSDM '17). ACM.
[28] Karen Sparck Jones. 1972. A statistical interpretation of term speci(cid:128)city and its
application in retrieval. Journal of documentation 28, 1 (1972), 11–21.
153 (1926), 65–66.
[29] Herbert A Sturges. 1926. (cid:140)e choice of a class interval. J. Amer. Statist. Assoc. 21,
[30] Sihong Xie, Guan Wang, Shuyang Lin, and Philip S Yu. 2012. Review spam
detection via temporal pa(cid:138)ern discovery. In Proceedings of the 18th ACM SIGKDD
international conference on Knowledge discovery and data mining. ACM, 823–831.
Jaewon Yang and Jure Leskovec. 2011. Pa(cid:138)erns of temporal variation in online
media. In Proceedings of the fourth ACM international conference on Web search
and data mining. ACM, 177–186.
[31]
|
1812.02712 | 1 | 1812 | 2018-12-06T18:46:32 | Analyzing the hate and counter speech accounts on Twitter | [
"cs.SI"
] | The online hate speech is proliferating with several organization and countries implementing laws to ban such harmful speech. While these restrictions might reduce the amount of such hateful content, it does so by restricting freedom of speech. Thus, an promising alternative supported by several organizations is to counter such hate speech with more speech. In this paper, We analyze hate speech and the corresponding counters (aka counterspeech) on Twitter. We perform several lexical, linguistic and psycholinguistic analysis on these user accounts and obverse that counter speakers employ several strategies depending on the target community. The hateful accounts express more negative sentiments and are more profane. We also find that the hate tweets by verified accounts have much more virality as compared to a tweet by a non-verified account. While the hate users seem to use words more about envy, hate, negative emotion, swearing terms, ugliness, the counter users use more words related to government, law, leader. We also build a supervised model for classifying the hateful and counterspeech accounts on Twitter and obtain an F-score of 0.77. We also make our dataset public to help advance the research on hate speech. | cs.SI | cs | Analyzing the hate and counter speech accounts on Twitter
Binny Mathew1 Navish Kumar1 Ravina2
Pawan Goyal1 Animesh Mukherjee1
1 Indian Institute of Technology, Kharagpur
2 National Institute of Technology, Patna
[email protected], [email protected], [email protected]
[email protected] , [email protected]
Abstract
The online hate speech is proliferating with several organi-
zation and countries implementing laws to ban such harm-
ful speech. While these restrictions might reduce the amount
of such hateful content, it does so by restricting freedom
of speech. Thus, an promising alternative supported by sev-
eral organizations is to counter such hate speech with more
speech. In this paper, We analyze hate speech and the cor-
responding counters (aka counterspeech) on Twitter. We per-
form several lexical, linguistic and psycholinguistic analysis
on these user accounts and obverse that counter speakers em-
ploy several strategies depending on the target community.
The hateful accounts express more negative sentiments and
are more profane. We also find that the hate tweets by verified
accounts have much more virality as compared to a tweet by a
non-verified account. While the hate users seem to use words
more about envy, hate, negative emotion, swearing terms, ug-
liness, the counter users use more words related to govern-
ment, law, leader. We also build a supervised model for clas-
sifying the hateful and counterspeech accounts on Twitter and
obtain an F-score of 0.77. We also make our dataset public to
help advance the research on hate speech.
1
Introduction
The online proliferation of hatespeech1 has caused several
countries and companies to implement laws against hate-
speech to enforce the citizens to restrain from such behavior.
Countries like Germany, United States of America, France
have laws banning hatespeech. Social media sites such as
Twitter, Facebook usually respond to hatespeech with the
suspension or deletion of the message or the user account
itself.
While these laws may reduce the amount of hatespeech in
online media, it does so at the cost of causing harm to the
freedom of speech. Another potential alternative to tackle
hatespeech is "counterspeech". The main idea behind coun-
terspeech is to add more speech to the conversation and try
to change the mindset of the hate speaker.
This requirement led countries and organizations to con-
sider counterspeech as an alternative to blocking (Gagliar-
done et al. 2015). The idea that 'more speech' is a remedy
for harmful speech has been familiar in liberal democratic
thought at least since the U.S. Supreme Court Justice Louis
1https://goo.gl/4rWGiF
Brandeis declared it in 1927. There are several initiatives
with the aim of using counterspeech to tackle hatespeech.
For example, the Council of Europe supports an initiative
called 'No Hate Speech Movement'2 with the aim to re-
duce the levels of acceptance of hatespeech and develop on-
line youth participation and citizenship, including in Internet
governance processes. UNESCO released a study (Gagliar-
done et al. 2015) titled 'Countering Online Hate Speech',
to help countries deal with this problem. Social platforms
like Facebook have started counterspeech programs to tackle
hatespeech3. Facebook has even publicly stated that it be-
lieves counterspeech is not only potentially more effective,
but also more likely to succeed in the long run (Bartlett and
Krasodomski-Jones 2015). Combating hatespeech in this
way has some advantages: it is faster, more flexible and re-
sponsive, capable of dealing with extremism from anywhere
and in any language and it does not form a barrier against
the principle of free and open public space for debate.
1.1 The present work
In this paper, we perform the first comparative study of
the interaction dynamics of the hatespeech and the corre-
sponding counterspeech replies. We choose Twitter as our
source of data and curate a dataset with 1290 hate tweet and
counterspeech reply pairs. After the annotation process, the
dataset consists of 558 unique hate tweets from 548 user and
1290 counterspeech replies from 1239 users. We found that
75.39% of these replies are counterspeech that oppose the
hatespeech spread by the user.
1.2 Contributions
The main contributions of our paper are as follows:
• We perform the first comparative study that looks into the
characteristics of the hateful and counter accounts.
• We provide a dataset of 1290 tweet-reply pair in which
the tweets are the hatespeech and their replies are coun-
terspeech. We plan to release the dataset upon acceptance.
2No Hate Speech Movement Campaign: http://www.
nohatespeechmovement.org/
3 Counterspeech Campaign
//counterspeech.fb.com/en/
by
Facebook: https:
• We develop a model which predicts if a given Twitter user
is a hateful or counterspeech account with an accuracy of
78%.
1.3 Observations
Our study results in several important observations.
• First, we find significant difference in the activity pat-
tern between these users. Hateful accounts tend to express
more negative sentiment and profanity in general. If the
hateful tweet is from a verified account, it seems to be
much more viral as compared to other hateful tweets.
• Another intriguing finding is that hateful users also act
as counterspeech users in some situations. In our dataset,
such users use hostile language as a counterspeech mea-
sure 55% of the times.
• In terms of personality traits, the counterspeakers seem to
have a higher quotient of 'agreeableness'. They are more
altruistic, modest and sympathetic. The hateful users, on
the other hand, seem to have a higher quotient of 'ex-
traversion' indicating that they are more energetic and
talkative in nature. They are more cheerful, excitement-
seeking, outgoing, and sociable in nature.
• Using the linguistic structure of the general tweets and
the account characteristics of the hateful and the counter
speakers, it is possible to distinguish them early with an
accuracy of 78%.
• We analyze the topical inclination of the users and ob-
serve that counterspeakers prefer topics related to 'poli-
tics', 'news', and 'journalism' while hate users prefer top-
ics like 'niggas'.
2 Preliminaries
• Hatespeech: We define hatespeech according to the Twit-
ter guidelines. Any tweet that 'promotes violence against
other people on the basis of race, ethnicity, national ori-
gin, sexual orientation, gender, gender identity, religious
affiliation, age, disability, or serious disease' is consid-
ered as a hatespeech4. A hate account (HA) is a Twitter
account which posts one or more such hateful tweets.
• Counterspeech: We follow the definition of counter-
speech used in (Mathew et al. 2018). We call a tweet as
a 'counterspeech' if the tweet is a direct reply to a hate-
ful tweet. A counter account (CA) is a Twitter account
which posts one or more such counterspeech in response
to a hateful post.
3 Dataset Collection
We use Twitter as the platform for this study. As we are in-
terested in the replies received by a particular hate tweet, we
could not use the Twitter API directly as it does not pro-
vide any service that helps in directly collecting the replies
of a particular tweet. To collect these replies we utilize the
4https://help.twitter.com/en/rules-and-policies/hateful-
conduct-policy
Figure 1: A flowchart showing the process by which we ob-
tained the dataset.
PHEME script5 which allows us to collect the set of tweets
replying to a specific tweet, forming a conversation. Other
works (Zubiaga et al. 2016) have used this technique as well.
Our overall methodology is a multi-step approach for creat-
ing the dataset which can be divided into the following three
steps:
• Hateful tweet collection.
• Filtration and annotation of the hateful tweets.
• Extraction and annotation of the reply tweets.
We explain these three steps in detail below.
3.1 Hatespeech collection
We rely on the hatespeech templates defined in (Silva et al.
2016) to collect the hateful tweets. These templates are of
the form:
I <intensity><userintent><hatetarget>
The subject "I" implies that the user is expressing her
own personal emotions. The verb, embodied by <userin-
tent> component is used to specify the user's intent which
in this case is the word 'hate' or its synonyms. The com-
ponent <intensity> is optional and acts as a qualifier which
some users use to amplify their emotions. Words such as 're-
ally','f**cking' are used to express the <intensity>. In our
work, we have used the words that are listed in (Mondal,
Silva, and Benevenuto 2017) for each of the component. The
component <hatetarget> is used to find the target commu-
nity on the receiving end of the hatred. Table 2 lists the key-
words that we have used to extract hateful tweets for each of
these communities. Some examples of the these templates
include: "I hate muslims", "I really despise white people"
etc.
Next, we utilize the Jefferson-Henrique's web scraping
script6 to collect the hateful posts using the templates de-
fined above. We run the script for all the communities de-
fined in Table 2 to collect around 578K tweets in total. We
removed all non-English tweets from the dataset.
3.2 Filtration and annotation of hateful tweets
As an initial filtering step to ensure that we get sufficient
replies to a hateful tweet, we filter out all the tweets col-
lected in the previous step that did not have at least two
replies. This reduced the number of hatespeech tweets to
5https://github.com/azubiaga/pheme-twitter-conversation-
collection
6https://github.com/Jefferson-Henrique/GetOldTweets-python
Counterspeech Type
Presentation of facts
Pointing our hypocrisy
Hatespeech
A tragedy that is a DIRECT result of allowing too many
f**king Muslims in their country. There should not be
any surprises here. #BANMUSLIMS
I hate Fat ppl bruhhhh ughhh
Warning of consequences
I hate lesbians so much omfg
Affiliation
Denouncing speech
Images
Humor
Positive tone
Hostile language
Miscellaneous
I'm christian so i hate muslims, muslim turkish people
and MUSLIM TURKISH BELIEBERS cause YOU ARE
THE TERRORIST!Turkish BELIEBERS Need Bieber
I hate gays
- - -
I hate gays
@user the problem with the world is you f**king mus-
lims! go choke to death on some bacon you child raper
pig! f**k you a**hole!
@user f**k the muslims!!!
F**k I hate women! All bit**es to a good guy
Total
Counterspeech
The guy was born in UK in 1995
"@user: I hate Fat ppl bruhhhh ughhh" you use to be fat
you hypocrite!
I report you to the LGBT community, this blatant dis-
crimination will not be tolerated
@user IM MUSLIM BUT DO NOT HATE CRISTIANS
"@user: I hate gays." Stop being homophobic
- - -
@user so uhhh I guess you hate yourself huh? HAHAH-
HAHAHAHAHA man I'm funny
@user, I'm sorry you feel that way. Islam is a beautiful
religion, so misunderstood. Not all Muslims are the same.
@user you are truly one stupid backwards thinking
mother**cker to believe negativity about Islam
@user Hey hey now.. ALL women are NOT the same.
Total
136
177
69
58
132
83
134
175
357
220
1481
Table 1: Example hatespeech and the corresponding counterspeech received for each type. Please note that the total is more
than the reported 1290 counterspeech replies because the users sometimes employ multiple strategies in a single tweet.
Gender
Men
Women
Female
Physical Trait
Fat
Ethnicity
Nigger
Nigga
White people
Black people
Sexual Orientation Nationality
Lesbian
Gay
LGBT
Transgender
American
Indian
Mexican
Arab
Asian
Religion
Jew
Islam
Muslim
Table 2: Keywords used during search to select hatespeech
for different communities.
13,321. Next, we manually tagged the tweets as containing
hatespeech or not. We follow the guidelines defined by Twit-
ter 4 to identify if a tweet contains hatespeech or not. Each
tweet was annotated by two users and in case of a disagree-
ment, we ask one more annotator to resolve it. The anno-
tators were instructed to take the context into consideration
when annotating a tweet as hateful. The annotations were
performed by a group of two undergraduate students with
Major in Computer Science and a PhD student in Social
Computing. The final dataset consisted of 558 tweets that
were tagged as hateful. Figure 1 illustrates the whole pro-
cess in a flowchart.
3.3 Extraction and annotation of the reply tweets
Once we selected the hatespeech tweets with at least two
replies, the next step involved using the PHEME script5 to
scrape the replies received to these hateful tweets. We ob-
serve that the 558 hate tweets received a total of 1711 replies
with a mean of 3.067 and a median of 2 replies per tweet.
We employ two annotators for the counterspeech tagging.
We follow the procedure used in (Mathew et al. 2018) to
annotate the counterspeech data. For each reply text to a
hatespeech tweet, the annotators were asked to perform two
tasks: (i) decide if the reply is a counterspeech or not, and
(ii) if the reply is indeed a counterspeech, then decide the
category of the counterspeech. We describe these categories
in the subsequent section.
Two independent annotators tagged each reply tweet as
counterspeech or not and got an accuracy of 81.35% and κ
score of 0.46, which is moderately good. For the second task
of deciding on the category of counterspeech, we use the
Exact Match Ratio and Accuracy defined in (Sorower 2010).
The two annotators obtain an Exact Match Ratio of 71.4%
and an Accuracy of 77.58%. We employ a third annotator to
resolve the conflicting cases and report the final distribution
in Table 1.
4 Taxonomy of Counterspeech
A successful counter to a hatespeech will require various
types of strategies. In (Benesch et al. 2016b), the authors de-
fine eight such strategies that are used by counterspeakers.
Similar to (Mathew et al. 2018), we divide the Tone cate-
gory into two parts: positive and negative Tone. We aggre-
gate all the counterspeech that would not fit in the above
categories into a 'Miscellaneous' category. Note that some-
times the users employ multiple counterspeech strategies in
a single tweet. We refer the readers to (Benesch et al. 2016b;
Mathew et al. 2018) for a detailed discussion on the taxon-
omy of counterspeech. Table 1 shows an example for each
type of counterspeech.
Hate Target
Presentation of facts
Pointing out hypocrisy
Warning of consequences
Affiliation
Denouncing speech
Images
Humor
Positive tone
Hostile language
Miscellaneous
Total counter
Total hate
Gender
1 (00.36%)
38 (13.77%)
3 (01.09%)
14 (05.07%)
15 (05.43%)
17 (06.16%)
32 (11.59%)
47 (17.03%)
50 (18.12%)
59 (21.38%)
276
120
Sexuality Nationality
5 (04.24%)
5 (02.54%)
19 (9.64%)
16 (13.56%)
4 (3.39%)
9 (4.57%)
9 (4.57%)
9 (7.63%)
12 (10.17%)
20 (10.15%)
10 (5.08%)
10 (8.47%)
30 (15.23%)
6 (5.08%)
13 (11.02%)
34 (17.26%)
32 (27.12%)
39 (19.80%)
11 (9.32%)
22 (11.17%)
118
197
110
43
Religion Physical Trait
0 (00.00%)
7 (4.86%)
2 (1.39%)
2 (1.39%)
3 (2.08%)
1 (0.69%)
12 (8.33%)
15 (10.42%)
65 (45.14%)
37 (25.69%)
144
91
125 (17.86%)
104 (14.86%)
35 (5.00%)
24 (3.43%)
53 (7.57%)
41 (5.86%)
51 (7.29%)
64 (9.14%)
124 (17.71%)
79 (11.29%)
700
143
Ethinicity
2 (00.96%)
7 (3.35%)
25 (11.96%)
4 (1.91%)
34 (16.27%)
10 (4.78%)
8 (3.83%)
13 (6.22%)
81 (38.76%)
25 (11.96%)
209
99
Total
138 (08.39%)
191 (11.62%)
78 (4.74%)
62 (3.77%)
137 (8.33%)
89 (5.41%)
139 (8.45%)
186 (11.31%)
391 (23.78%)
233 (14.17%)
1644
606
Table 3: Counterspeech strategies used by various target communities. The percentage given in the bracket are normalized by
the total number of counterspeech in each category. Please note that the total reported is more than the 1290 counterspeech
replies because of the presence of multiple target communities in a single tweet.
5 Target community analysis
Our final dataset consisted of 558 hatespeech tweets from
548 Hate Accounts (HAs) and 1290 direct replies that were
counterspeech from 1239 Counterspeech Accounts (CAs).
Of the total 1711 tweets that were replies to the 558 hate
tweets, 75.39% (1290) were counterspeech tweets. This is
almost double of what is reported in (Mathew et al. 2018).
We argue that the main reason behind this could be the pub-
lic nature of Twitter as opposed to the semi-anonymous na-
ture of Youtube. We also found that 82.09% of the coun-
terspeech employed only one kind of strategy. The p-values
reported are calculated using Mann-Whitney U test.
5.1 Strategies used by CAs
The CAs used different strategies to tackle the hatespeech.
We can observe from Table 3 that different target commu-
nities adopt different measures to respond to the hateful
tweets. The largest fraction (23.60%) of the hateful tweets
seems to be religious in nature. They also receive the high-
est number of counterspeech with an average of 4.9 counter-
speech for every religious hateful tweet as compared to only
2.7 counterspeech per hateful tweet for the entire dataset.
The religious CAs seems to be using two strategies more as
compared to other target communities: presentation of facts
and pointing out hypocrisy.
In case of the nationality target communities, CAs seem
to be relying more on affiliation and using images in their
counter speech. The CAs for the ethnicity use warning of the
consequences and denounce the hatespeech more as com-
pared to other target communities.
The CAs for the target communities associated with sex-
uality rely on humor and positive tone to counter the hateful
messages. In case of the hatespeech which target the phys-
ical traits, the CAs heavily use hostile language to counter
them.
Irrespective of the community, the counterspeakers seem
to be using hostile language a lot with the lowest being
for the religion (17.71%) and highest for the physical traits
(45.14%). We can also observe that 27.67% of the counter-
speech tweets used hostile language as a strategy. This is less
than the 35% reported in (Mathew et al. 2018) on YouTube.
One of the main reasons for this could be the more public
nature of Twitter.
5.2 Use of images/videos
We observe that only 12 (2.15%) of hate tweets contained
images/videos whereas 145 (11.24%) of the counter tweets
had images/videos. We also look into the replies of these
12 hate tweets which use images/videos to get a better un-
derstanding. Interestingly, we found that 69 (47.59%) out
of the 145 counter tweets which use images/videos were
in response to hateful tweets which themselves used im-
ages/videos. Another interesting observation was that the
counterspeech involving images/videos are liked more by
the Twitter community as compared to other strategies. The
counter images received the highest likes among all the
counterspeech strategies with a median of 2.5 likes (average
= 10).
6 User level analysis
In this section, we characterize the HAs and CAs based on
their activity and tweet history. We first collect for each user
their last 3200 tweets using the Twitter API7. This would
also give us other information about the users such as the
number of tweets, number of followers, friends etc.
6.1 User activity
We normalize the user-characteristics by dividing them by
the age of the account. Thus each of the user properties are
divided by the number of days since the start of the account.
In Figure 2, we can observe several striking differences in
the nature of the accounts. We observe that the hate users
are more "popular" in that they tweet more, have more fol-
lowers, and are part of more public lists as compared to the
counter users (p-value<0.001).
The counter users have more friends per day as compared
to hate users (p-value<0.005).
7Twitter API: https://developer.twitter.com/
en/docs/tweets/timelines/api-reference/
get-statuses-user_timeline.html
Figure 2: Average values for several user profile properties for Hateful and Counter user normalized by the account age. Error
bars represent 95% confidence interval.
6.2 Creation dates
We analyze the account creation dates of hate and counter
users as shown in Figure 3. Previous works on hate users
(Ribeiro et al. 2017; ElSherief et al. 2018b) have reported
that the Twitter accounts of hateful users have relatively less
age as compared to the normal users. Our results, in con-
trast, do not seem to support this observation. We find that
the hate accounts are older than the counter accounts (p-
value<0.01). We argue that the main reason for this is due
to the way we collected our dataset. Around 80% of the hate-
ful tweets are older than Dec 2017. Around this time Twit-
ter first started enforcing stricter rules on abusive content,
which means that they managed to bypass the platform's
strict guidelines. Thus, many of the hate accounts are much
older.
Figure 4: Boxplots for the distribution of Subjectivity, Neg-
ative Sentiment, Profanity, and Hatespeech for the Hateful
and Counter users
Figure 3: KDEs of the account creation dates of Hateful and
Counter users.
account or that the account was permanently deleted after
thirty days of deactivation. We found that 4.56% and 4.28%
of the hate and counter users, respectively, were deleted.
6.3 Suspended and deleted accounts
The Twitter API returns an error message when the user ac-
count is suspended or the user is not found. According to
Twitter8, the common reasons for account suspension in-
clude spam, risk to Twitter's security, or abusive tweet or
behavior. Twitter accounts are not found when the user does
not exist. This may be because the user deactivated her
8https://help.twitter.com/en/managing-your-
account/suspended-twitter-accounts
6.4 Verified accounts
Next, we look for the presence of verified accounts in our
dataset. We found that 3.28% of the hate users are verified; in
contrast, 0.56% of the counter users have verified accounts.
We found that the hateful tweets by the HAs generated much
more audience as compared to the CAs. On average (me-
dian) the verified HAs received 356.42 (57.5), 80.42 (13),
24.08 (16) likes, retweets, and replies, respectively. This is
much higher than the verified CAs who received 1.8 (2.0),
0.4 (0.0), 0.4 (0.0) likes, retweets, and replies, respectively.
(a) Hate users
(b) Counter users
Figure 5: Word cloud of the user hashtags. There are several hashtags such as 'maga', 'fakenews', 'worldcup' that are common
in both types of users. Notice the inclusion of hashtags such as 'WhiteGenocide' in the word cloud for the hate users. The
counter users seem to use the hashtags such as 'loveislove' to show their support for different communities.
6.5 Tweet analysis
To understand how the different set of users express their
emotions, we make use of the users' tweet history. We
apply VADER (Hutto and Gilbert 2014) to find the av-
erage negative sentiment expressed by the users. In Fig-
ure 4, we observe that the tweets from hateful users ex-
press more negative sentiments compared to counter users.
We use TextBlob9 to measure the subjectivity expressed in
the tweets. As observed from Figure 4, hate accounts use
more subjective tweets as compared to counters accounts
(p<0.001). In order to find the profanity expressed in the
tweets, we use Shutterstock's "List of Dirty, Naughty, Ob-
scene, and Otherwise Bad Words"10. We observe that hate
accounts use more profane words as compared to counter
accounts (p-value<0.05). We use the model provided by
(Davidson et al. 2017) to check for hatespeech and abusive
language in the tweet history of user. We found that the hate
users seem to use more hatespeech and abusive language as
compared to counter speakers.
6.6 Hashtags
Using the Twitter history of the users, we plot word clouds
for each type of users as shown in Figure 5. As we can ob-
serve, there are several hashtags such as '#maga', '#fake-
news', '#worldcup', '#newprofilepic' that are common for
both the types of users. The hate accounts used hashtags
such as '#whitegenocide' which is commonly used by white
nationalist/supremacists.
6.7 Lexical analysis
Empath (Fast, Chen, and Bernstein 2016) is a tool that can
be used to analyze text over 200 pre-built lexical categories.
We characterize the users over these categories and ob-
serve several interesting results as shown in Figure 6. The
9https://github.com/sloria/textblob
10https://github.com/LDNOOBW/List-of-Dirty-Naughty-
Obscene-and-Otherwise-Bad-Words
hate users seem to be using more words related to cate-
gories such as envy, hate, negative emotion, positive emo-
tion, ridicule, swearing terms, ugliness. These results are in
alignment with the sentiment values obtained for these users.
The counter users seem to be using words in the categories
such as government, law, leader, pride, religion, terrorism
indicating that the counter users are more civil in nature. All
the values reported have p-value<0.01.
6.8 Personality analysis
In order to get a better understanding of the user char-
acteristics, we perform personality analysis on the user
set. We make use of the IBM Watson Personality Insights
API (Gou, Zhou, and Yang 2014) 11 to understand the per-
sonality of the users. Previous research (Hu et al. 2016;
Liu et al. 2017) has used this tool to understand the person-
ality of the users. We provide all the tweets of a particular
user as input to the API and the service analyzes the linguis-
tic features to infer the Big-5 personality traits (Goldberg
1992). We observe distinctive difference between the hate
and counter users as shown in Figure 7.
CAs score higher in the personality traits such as agree-
ableness. They are more altruistic, modest, sympathetic.
This is intuitive since the counter speakers in many cases
have a simple motive to help the hate speakers. They also
seem to be more self-disciplined. The counter speakers score
higher than the hate speakers in all the sub-traits of the con-
scientiousness. The counter speakers are more driven, delib-
erate, dutiful, persistent, and self-assured.
The HAs seem to score higher in extraversion indicating
that they are more energetic and talkative in nature. They are
more cheerful, excitement-seeking, outgoing, and sociable in
nature.
11IBM Personality Insights API: https://www.ibm.com/
watson/services/personality-insights/
Figure 6: Lexical analysis using Empath for the hateful and counter users. We report the median values for the relative oc-
currence in several categories of Empath. Error bars represent 95% confidence intervals. That HAs score significantly higher
in topics like envy, hate, negative emotion, positive emotion, ridicule, swearing terms, ugliness while CAs score significantly
higher in topics like government, law, leader, pride, religion, terrorism
Openess
Conscientiousness
Extraversion
Agreeableness
Figure 7: Personality traits of the CAs and HAs. The CAs are more self-disciplined, driven, deliberate, dutiful, persistent, and
self-assured while the HAs are more energetic, talkative, cheerful, excitement-seeking, outgoing, and social in nature.
6.9 Topical inclination of users
We infer the topical interests of the users using the method
explained in (Bhattacharya et al. 2014) and utilize the 'Who
likes what?' web service12 for this task. In this method, for a
given Twitter user u (whose interests are to be inferred), the
method first checks which other users u is following, i.e.,
users from whom u is interested in receiving information. It
then identifies the topics of expertise of those users (whom u
is following) to infer u's interests, i.e., the topics on which u
is interested in receiving information. Expertise is defined by
the users bio or tweets via the lists feature in Twitter (Ghosh
et al. 2012).
12Topical
Interest: https://twitter-app.mpi-sws.
org/who-likes-what
In order to understand which topics are preferred by the
HAs and CAs, we analyze the topical interests of the users
as shown by the word cloud in Figure 8. We can observe
that hate and counter users have several topics of common
interest. Topics such as 'Fame', 'Music', 'Artist' seem to be
of interest to a large proportion of hate and counter users.
On a closer analysis, we found that topics such as 'politics',
'news', and 'journalism' are preferred more by the CAs as
compared to HAs (p-value<0.01). This is possibly indica-
tive of a constructive nature of the CAs. Also the HAs tend
to subscribe to topics like 'niggas' significantly more.
7 Classification
In this section, we leverage the unique characteristics of
the hate and counter user accounts to develop a predictive
(a) Hate users.
(b) Counter users.
Figure 8: Word cloud of the user topical interests. Several of the topics such as 'fame', 'music', 'artist' seems to be of interest
to both hate and counter users. However while CAs subscribe to topics like 'politics', 'journalism' and 'news' more, HAs
subscribe to topics like 'niggas' more.
model. We pose this as a binary classification problem - dis-
tinguishing hate users from counter users. This early auto-
matic distinction can help the platform to develop appropri-
ate incentive mechanisms to demote the hate user accounts
and promote the counter user accounts and also urge these
users to help in overall purging of the media. (Munger 2017)
showed that counterspeech using automated bots can reduce
instances of racist speech if the instigators are sanctioned by
a high-follower white male.
7.1 Features
We use the following feature set for our classifier.
• TF-IDF values: For each account, we calculate its tf-idf
• User profile properties: We use several user account
properties such as #favorites per day, #tweets per day,
#followers per day, #friends per day, #listed per day, and
whether the account is verified.
• Lexical properties: We use the vector of 200 pre-built
• Affect properties: For each user account we calculate the
average sentiment, profanity, and subjectivity expressed
in the tweet history.
topics as the feature set for each user.
vector using the users tweet history.
7.4 Results
Table 4 shows the results of the classification task. We can
observe that CatBoost (CB) performs the best with an accu-
racy of 78% followed by XGBoost (XGB) with an accuracy
of 74%. Both the classifiers perform much better than the
baseline classifier (LR + TF-IDF).
Model
LR + TFIDF
SVM
LR
ET
RF
XGB
CB
Precision Recall F-score Accuracy
0.68
0.64
0.66
0.72
0.72
0.74
0.83
0.68
0.63
0.66
0.70
0.72
0.74
0.78
0.68
0.63
0.66
0.70
0.72
0.74
0.78
0.68
0.62
0.66
0.69
0.72
0.74
0.77
Table 4: Evaluation results for various classifiers - Support
Vector Machines (SVM), Logistic Regression (LR), Ran-
dom Forest (RF), Extra-Tree (ET), XGBoost (XGB), and
CatBoost (CB) on the task of classification of an account
as hateful or counter. The evaluation metrics reported are
calculated by taking macro average.
7.2 Dataset
We first divide the dataset into training and test set in the
ratio 90:10 while keeping the test set balanced. In order to
find the hyperparameter of our models, we use 10% of the
training data as the validation set. We run randomized grid
search to find the optimal hyperparameter values.
7.3 Choice of classifier
We choose classifiers such as Support Vector Machines
(SVM), Logistic Regression (LR), Random Forest (RF),
Extra-Tree (ET), XGBoost (XGB), and CatBoost (CB) for
this task. We use TF-IDF features along with LR as the base-
line.
7.5 Feature ablation
We perform feature ablation to understand the importance of
the different feature types. Table 5 reports the feature abla-
tion study carried out by CatBoost (CB) classifier. From the
table, we can observe that TF-IDF feature is the most useful
followed by lexical features.
8 Related Work
In this section, we review some of the related literature. First,
we review the works done on analysis and detection of hate-
speech and harmful language. Next we summarize the litera-
ture available for countering these hateful or harmful speech.
Feature excluded Precision Recall F-score Accuracy
TF-IDF
User profile
Lexical
Affect
0.53
0.79
0.56
0.77
0.53
0.79
0.56
0.77
0.59
0.84
0.65
0.83
0.43
0.78
0.49
0.76
Table 5: Feature ablation study for the CatBoost (CB) classi-
fier. The evaluation metrics reported are calculated by taking
macro average.
8.1 Hateful or harmful speech
Hatespeech lies in a complex nexus with freedom of expres-
sion, group rights, as well as concepts of dignity, liberty, and
equality (Gagliardone et al. 2015). Owing to this, there can
be several issues in defining what constitutes as hatespeech
(Benesch 2014). The authors usually adopt a definition that
fits a general description of hatespeech. There is substantial
literature on the analysis of hatespeech. (Silva et al. 2016)
studies the targets of hatespeech on Twitter and Whisper
and observes that 'Blacks' are among the most frequent tar-
gets of hatespeech. (Mondal, Silva, and Benevenuto 2017)
studies the effects of anonymity on hatespeech. There are
works where the authors study the perceptions and ex-
perience of people regarding the hatespeech (Leets 2002;
Gelber and McNamara 2016). In (Van Spanje and De Vreese
2015), the authors study the impact of hatespeech prosecu-
tion of a politician on electoral support for his party and find
an immediate increase in the support for the party.
Another line of research corresponds to detection of
hatespeech in various social media platforms like Twit-
ter (Waseem and Hovy 2016; Chatzakou et al. 2017; David-
son et al. 2017; Badjatiya et al. 2017), Facebook (Del Vi-
gna et al. 2017), Yahoo! Finance and News (Warner and
Hirschberg 2012; Djuric et al. 2015; Nobata et al. 2016),
and Whisper (Mondal, Silva, and Benevenuto 2017). In an-
other online effort, a Canadian NGO, the Sentinel Project13,
launched a site in 2013 called HateBase14, which invites In-
ternet users to add to a list of slurs and insulting words in
many languages.
There are some works which have tried to characterize the
hateful users. In (Ribeiro et al. 2018; Ribeiro et al. 2017),
the authors study the user characteristics of hateful accounts
on twitter and found that the hateful user accounts differ sig-
nificantly from normal user accounts on the basis of activity,
network centrality, and the type of content they produce. In
(ElSherief et al. 2018b), the authors perform a comparative
study of the hate speech instigators and target users on twit-
ter. They found that the hate instigators target more popular
and high profile twitter users, which leads to greater online
visibility. In (ElSherief et al. 2018a), the authors focus on
studying the target of the hatespeech - directed and general-
ized. They look into linguistic and psycholinguistic proper-
ties of these two types of hatespeech and found that while
directed hate speech is more personal and directed, informal
and express anger, the generalized hate is more of religious
13https://thesentinelproject.org/
14https://www.hatebase.org/
type and uses lethal words such as 'murder', 'exterminate',
and 'kill'.
8.2 Countering hatespeech
The current solution adopted by several organization and
companies to tackle online hate speech involves block-
ing/suspending the account or the particular hateful post.
While these options are very powerful, they tend to violate
the free speech doctrine. Countespeech is considered to be a
promising solution in this direction as it can help in con-
trolling the hate speech problem and at the same time, it
supports free speech. Institutions can help in educating the
public about hatespeech and its implications, consequences
and how to respond. Programmes such as 'No Hate Speech'
movement 2 and Facebook's counterspeech program 3 help
in raising awareness, providing support and seeking creative
solutions (Citron and Norton 2011).
Silence in response to digital hate carries significant ex-
pressive costs as well. When powerful intermediaries rebut
demeaning stereotypes (like the Michelle Obama image) and
invidious falsehoods (such as holocaust denial), they send
a powerful message to readers. Because intermediaries of-
ten enjoy respect and a sense of legitimacy, using counter-
speech, they can demonstrate what it means to treat others
with respect and dignity (Citron and Norton 2011).
Online social media sites such as Twitter, YouTube, and
Facebook have been used to study counterspeech. (Wright
et al. 2017) study the conversations on Twitter, and find that
some arguments between strangers lead to favorable change
in discourse and even in attitudes. (Ernst et al. 2017) study
the comments in YouTube counterspeech videos related to
Islam and find that they are dominated by messages that deal
with devaluating prejudices and stereotypes corresponding
to Muslims and/or Islam. In (Schieb and Preuss 2016),
the authors study counterspeech on Facebook and through
simulation, find that the defining factors for the success of
counter speech are the proportion of the hatespeech and the
type of influence the counter speakers can exert on the un-
decided.
(Stroud and Cox 2018) perform case studies on
feminist counterspeech. They explore the range of feminist
counterspeech by engaging two representative case studies
from the current online environment. (Benesch et al. 2016a)
describes strategies that have favorable impact or are coun-
terproductive on users who tweet hateful or inflammatory
content. In (Mathew et al. 2018), the authors curate a coun-
terspeech dataset from YouTube and build a general classi-
fier which achieves an F1-score of 0.73 .
This work is the first to study the interaction dynamics
of the hate and counter speakers in a coupled fashion. We
would also release the dataset used in our experiment as
well as the model for classifying an account as hateful or
counter 15.
9 Discussion
Here we discuss some of the key insights that we obtain from
this study. We believe that many of these could be very help-
15Dataset and Model available here: https://goo.gl/
vqMPc7
ful for Twitter and, in general, other social media platforms
to meaningfully combat hate content.
9.1 Success of counterspeech
We found cases in which the counterspeech provided was
successful in changing the mindset of the user who had
posted the hateful tweet. In one case, the user who had
posted the hateful message on Twitter, later apologized to
everyone saying that she was really sorry for what she did.
Although, we rarely receive such direct evidence of a coun-
terspeech being successful, these cases prove that counter-
speech can actually help in changing the attitude of the
hate users without resorting to aggressive measures such as
blocking/suspension of the account.
9.2 New venues for hatespeech
The harsh nature of Twitter on hatespeech has led to several
user account suspension and deletion. This is true for other
social media sites as well. Due to this, several new social
media sites have sprung up in the recent years like Gab16,
Wrongthink17 which support free speech on their site and
allow users to posts contents that would not be allowed on
other sites. This has resulted in gab becoming an echo cham-
ber for right-leaning dissemination (de Lima et al. 2018).
9.3 Common users
We found some users which were common in HAs and CAs.
On examining these accounts we observe that these accounts
take the role of hate or counter user depending on the situa-
tion. For example, we observe that a user who had performed
a hate speech targeting the 'LGBTQ' community also per-
formed a counterspeech in response to a hatespeech target-
ing 'Fat people'. We found in cases where the HAs act as
counter speaker, 55% of the times they use the hostile lan-
guage strategy.
9.4 Hate supporters
While annotating the dataset, we also found several tweets
that were in support of the hate tweet. Specifically, we an-
notated 223 direct replies to the hate tweets that were in
support. We found several interesting properties of these
hate support accounts (HSAs). To begin with, we found that
HSAs had several similarities with the HAs. They use more
profane and subjective words, their accounts are relatively
newer as compared to HAs and CAs, and hashtags such as
'whitegenocide' were also used by them. As per lexical anal-
ysis, the HSAs use more words in the categories such as
anger, independence, suffering. The HSAs seem to be more
open in nature as compared to CAs and HAs. They are more
imaginative, philosophical and authority-challenging.
10 Conclusion
In this paper, we perform the first characteristic study com-
paring the hateful and counterspeech accounts in Twitter. We
provide a dataset of 1290 tweet-reply pairs of hatespeech
16https://gab.ai/home
17https://wrongthink.net/
and the corresponding counterspeech tweets. We observe
that the counter speakers of different communities adopt dif-
ferent techniques to counter the hateful tweets. We perform
several interesting analysis on these accounts and find that
hateful accounts express more negative sentiments and are
more profane. The hateful users in our dataset seem to be
more popular as they tweet more and have more followers.
We also find that the hate tweets by verified accounts have
much more virality as compared to a tweet by a non-verified
account. While the hate users seem to use words more about
envy, hate, negative emotion, swearing terms, ugliness, the
counter users use more words related to government, law,
leader. We also build a supervised model for classifying the
hateful and counterspeech accounts on Twitter and obtain an
F-score of 0.77. Our work should be useful in appropriately
designing incentive mechanisms to make Twitter-like plat-
forms free of hate content.
References
2015.
J.,
for
2016a.
successful counterspeech.
[Badjatiya et al. 2017] Badjatiya, P.; Gupta, S.; Gupta, M.; and
Varma, V. 2017. Deep learning for hate speech detection in tweets.
WWW, 759 -- 760.
and
[Bartlett and Krasodomski-Jones 2015] Bartlett,
Krasodomski-Jones, A.
Counter-speech examining
content that challenges extremism online. Demos. Available at:
http://www.demos.co.uk/wp-content/uploads/2015/10/Counter-
speech.pdf.
[Benesch et al. 2016a] Benesch, S.; Ruths, D.; Dillon, K. P.;
Saleem, H. M.; and Wright, L.
Consider-
Dangerous Speech
ations
Project. Available at: https://dangerousspeech.org/considerations-
for-successful-counterspeech/.
[Benesch et al. 2016b] Benesch, S.; Ruths, D.; Dillon, K. P.;
Saleem, H. M.; and Wright, L.
2016b. Counterspeech on
twitter: A field study. Dangerous Speech Project. Available
at: https://dangerousspeech.org/counterspeech-on-twitter-a-field-
study/.
[Benesch 2014] Benesch, S. 2014. Defining and diminishing hate
speech. Freedom from hate: State of the worlds minorities and
indigenous peoples 2014 18 -- 25.
[Bhattacharya et al. 2014] Bhattacharya, P.; Zafar, M. B.; Ganguly,
N.; Ghosh, S.; and Gummadi, K. P. 2014.
Inferring user inter-
ests in the twitter social network. In Proceedings of the 8th ACM
Conference on Recommender systems, 357 -- 360. ACM.
[Chatzakou et al. 2017] Chatzakou, D.; Kourtellis, N.; Blackburn,
J.; De Cristofaro, E.; Stringhini, G.; and Vakali, A. 2017. Measur-
ing #gamergate: A tale of hate, sexism, and bullying. In WWW '17
Companion, 1285 -- 1290.
[Citron and Norton 2011] Citron, D. K., and Norton, H. 2011. In-
termediaries and hate speech: Fostering digital citizenship for our
information age. BUL Rev. 91:1435.
[Davidson et al. 2017] Davidson, T.; Warmsley, D.; Macy, M.; and
Weber, I. 2017. Automated hate speech detection and the problem
of offensive language.
[de Lima et al. 2018] de Lima, L. R. P.; Reis, J. C. S.; Melo, P. F.;
Murai, F.; Silva, L. A.; Vikatos, P.; and Benevenuto, F. 2018. Inside
the right-leaning echo chambers: Characterizing gab, an unmoder-
ated social system.
[Del Vigna et al. 2017] Del Vigna, F.; Cimino, A.; DellOrletta, F.;
[Nobata et al. 2016] Nobata, C.; Tetreault, J.; Thomas, A.; Mehdad,
Y.; and Chang, Y. 2016. Abusive language detection in online user
content. In WWW '16, 145 -- 153.
[Ribeiro et al. 2017] Ribeiro, M. H.; Calais, P. H.; Santos, Y. A.;
Almeida, V. A.; and Meira Jr, W. 2017.
" like sheep among
wolves": Characterizing hateful users on twitter. In WSDM work-
shop on Misinformation and Misbehavior Mining on the Web
(MIS2).
[Ribeiro et al. 2018] Ribeiro, M.; Calais, P.; Santos, Y.; Almeida,
V.; and Jr., W. M. 2018. Characterizing and detecting hateful users
on twitter.
[Schieb and Preuss 2016] Schieb, C., and Preuss, M. 2016. Gov-
erning hate speech by means of counterspeech on facebook.
In
66th ICA Annual Conference, At Fukuoka, Japan, 1 -- 23.
[Silva et al. 2016] Silva, L. A.; Mondal, M.; Correa, D.; Ben-
evenuto, F.; and Weber, I. 2016. Analyzing the targets of hate
in online social media. In ICWSM, 687 -- 690.
[Sorower 2010] Sorower, M. S. 2010. A literature survey on algo-
rithms for multi-label learning. Oregon State University, Corvallis
18.
[Stroud and Cox 2018] Stroud, S. R., and Cox, W. 2018. The va-
rieties of feminist counterspeech in the misogynistic online world.
In Mediating Misogyny. Springer. 293 -- 310.
[Van Spanje and De Vreese 2015] Van Spanje, J., and De Vreese,
C. 2015. The good, the bad and the voter: The impact of hate
speech prosecution of a politician on electoral support for his party.
Party Politics 21(1):115 -- 130.
[Warner and Hirschberg 2012] Warner, W., and Hirschberg,
J.
2012. Detecting hate speech on the world wide web. In Proceed-
ings of the Second Workshop on Language in Social Media, LSM
'12, 19 -- 26.
[Waseem and Hovy 2016] Waseem, Z., and Hovy, D. 2016. Hate-
ful symbols or hateful people? predictive features for hate speech
detection on twitter. In Proceedings of the NAACL student research
workshop, 88 -- 93.
[Wright et al. 2017] Wright, L.; Ruths, D.; Dillon, K. P.; Saleem,
H. M.; and Benesch, S. 2017. Vectors for counterspeech on twitter.
In Proceedings of the First Workshop on Abusive Language Online,
57 -- 62.
[Zubiaga et al. 2016] Zubiaga, A.; Liakata, M.; Procter, R.; Wong
Sak Hoi, G.; and Tolmie, P. 2016. Analysing how people orient
to and spread rumours in social media by looking at conversational
threads. PLOS ONE 11:1 -- 29.
Petrocchi, M.; and Tesconi, M. 2017. Hate me, hate me not: Hate
speech detection on facebook.
[Djuric et al. 2015] Djuric, N.; Zhou, J.; Morris, R.; Grbovic, M.;
Radosavljevic, V.; and Bhamidipati, N. 2015. Hate speech detec-
tion with comment embeddings. In WWW '15 Companion, 29 -- 30.
[ElSherief et al. 2018a] ElSherief, M.; Kulkarni, V.; Nguyen, D.;
Wang, W. Y.; and Belding, E. 2018a. Hate lingo: A target-based
linguistic analysis of hate speech in social media. ICWSM '18.
[ElSherief et al. 2018b] ElSherief, M.; Nilizadeh, S.; Nguyen, D.;
Vigna, G.; and Belding, E. 2018b. Peer to peer hate: Hate speech
instigators and their targets.
[Ernst et al. 2017] Ernst, J.; Schmitt, J. B.; Rieger, D.; Beier, A. K.;
Vorderer, P.; Bente, G.; and Roth, H.-J. 2017. Hate beneath the
counter speech? a qualitative content analysis of user comments on
youtube related to counter speech videos. Journal for Deradical-
ization 1 -- 49.
[Fast, Chen, and Bernstein 2016] Fast, E.; Chen, B.; and Bernstein,
M. S. 2016. Empath: Understanding topic signals in large-scale
text. In Proceedings of the 2016 CHI Conference on Human Fac-
tors in Computing Systems, 4647 -- 4657. ACM.
[Gagliardone et al. 2015] Gagliardone, I.; Gal, D.; Alves, T.; and
Martinez, G. 2015. Countering online hate speech. UNESCO
Publishing.
[Gelber and McNamara 2016] Gelber, K., and McNamara, L. 2016.
Evidencing the harms of hate speech. Social Identities 22(3):324 --
341.
[Ghosh et al. 2012] Ghosh, S.; Sharma, N.; Benevenuto, F.; Gan-
guly, N.; and Gummadi, K. 2012. Cognos: crowdsourcing search
for topic experts in microblogs. In Proceedings of the 35th inter-
national ACM SIGIR conference on Research and development in
information retrieval, 575 -- 590. ACM.
[Goldberg 1992] Goldberg, L. R. 1992. The development of mark-
ers for the big-five factor structure. Psychological assessment
4(1):26.
[Gou, Zhou, and Yang 2014] Gou, L.; Zhou, M. X.; and Yang, H.
2014. Knowme and shareme: Understanding automatically dis-
covered personality traits from social media and user sharing pref-
erences. CHI '14, 955 -- 964. ACM.
[Hu et al. 2016] Hu, T.; Xiao, H.; Luo, J.; and Nguyen, T.-v. T.
2016. What the language you tweet says about your occupation.
In Tenth International AAAI Conference on Web and Social Media.
[Hutto and Gilbert 2014] Hutto, C. J., and Gilbert, E. 2014. Vader:
A parsimonious rule-based model for sentiment analysis of social
media text. In ICWSM.
[Leets 2002] Leets, L. 2002. Experiencing hate speech: Percep-
tions and responses to anti-semitism and antigay speech. Journal
of social issues 58(2):341 -- 361.
[Liu et al. 2017] Liu, Z.; Xu, A.; Wang, Y.; Schoudt, J.; Mahmud,
J.; and Akkiraju, R. 2017. Does personality matter?: A study of
personality and situational effects on consumer behavior. HT '17,
185 -- 193. ACM.
[Mathew et al. 2018] Mathew, B.; Tharad, H.; Rajgaria, S.; Singha-
nia, P.; Maity, S. K.; Goyal, P.; and Mukherje, A. 2018. Thou
arXiv preprint
shalt not hate: Countering online hate speech.
arXiv:1808.04409.
[Mondal, Silva, and Benevenuto 2017] Mondal, M.; Silva, L. A.;
and Benevenuto, F. 2017. A measurement study of hate speech
in social media. In HT.
Tweetment effects on the
[Munger 2017] Munger, K.
tweeted: Experimentally reducing racist harassment. Political Be-
havior 39(3):629 -- 649.
2017.
|
1710.10642 | 1 | 1710 | 2017-10-29T16:26:32 | Homophily of Music Listening in Online Social Networks | [
"cs.SI",
"physics.soc-ph"
] | Homophily, ranging from demographics to sentiments, breeds connections in social networks, either offline or online. However, with the prosperous growth of music streaming service, whether homophily exists in online music listening remains unclear. In this study, two online social networks of a same group of active users are established respectively in Netease Music and Weibo. Through presented multiple similarity measures, it is evidently demonstrated that homophily does exist in music listening of both online social networks. The unexpected music similarity in Weibo also implies that knowledge from generic social networks can be confidently transfered to domain-oriented networks for context enrichment and algorithm enhancement. Comprehensive factors that might function in formation of homophily are further probed and many interesting patterns are profoundly revealed. It is found that female friends are more homogeneous in music listening and positive and energetic songs significantly pull users close. Our methodology and findings would shed lights on realistic applications in online music services. | cs.SI | cs |
Homophily of Music Listening in Online Social Networks
Zhenkun Zhou, Ke Xu
State Key Lab of Software Development Environment, Beihang University, Beijing, China
Jichang Zhao∗
School of Economics and Management, Beihang University, Beijing, China
∗Corresponding author: [email protected]
Abstract
Homophily, ranging from demographics to sentiments, breeds connections in
social networks, either offline or online. However, with the prosperous growth
of music streaming service, whether homophily exists in online music listening
remains unclear. In this study, two online social networks of a same group of
active users are established respectively in Netease Music and Weibo. Through
presented multiple similarity measures, it is evidently demonstrated that ho-
mophily does exist in music listening of both online social networks. The un-
expected music similarity in Weibo also implies that knowledge from generic
social networks can be confidently transfered to domain-oriented networks for
context enrichment and algorithm enhancement. Comprehensive factors that
might function in formation of homophily are further probed and many inter-
esting patterns are profoundly revealed. It is found that female friends are more
homogeneous in music listening and positive and energetic songs significantly
pull users close. Our methodology and findings would shed lights on realistic
applications in online music services.
Keywords: Online Social Networks, Homophily, Music Listening, Music
Genres
Preprint submitted to Elsevier
October 31, 2017
1. Introduction
One of the best established findings in social networks is that people who
are friends exhibit plenty of similarities in human behaviors [1, 2]. Friendship
relations, either offline or online, in which individuals socially interact, involve a
need for shared mutual understandings. Tremendous efforts have been devoted
on homophily of social networks from many aspects, ranging from demograph-
ics [3] to mental states [4, 5]. Even it is revealed from the recent study that
personality similarity exists among close relationships [6]. Particularly, with
the booming of online social media, previous studies have extensively inves-
tigated the homophily of behaviors in online social networks [7, 8, 9] and the
friend similarity that exists in face-to-face offline networks is identically revealed.
However, as a prominent element of daily life that possesses the cultural uni-
versality [10, 11, 12], music listening is rarely explored in the context of social
networks and little knowledge is established about the behavior referring to
homophily, especially in the circumstance of online social networks.
In fact, individuals that embedded in social networks come across music of
varying categories, including vast kinds of genres, languages and moods, and
continually judge whether or not like the music [13]. In addition, music is al-
ways shared with families, friends and other folks socially around us. Before
times of the Internet, CDs and cassettes were the main media to record the
music and the music communication was thus limited and awkward [14]. Yet
in last twenty years, with the prosperous development of the Internet, portable
music players have exploded in popularity, promoting the music communication
essentially [15, 16]. Friends are willing to exchange the iPods from each other.
And now, the music streaming platforms offer low-latency access to the large-
scale database, such as Spotify [17], Last.fm [18], QQ Music [19] and Netease
Music [20]. Since then, people exchange the music with each other online and
share the amazing music they respectively like, and music even creates inter-
personal bonds between different individuals in turn [21]. Though evidence of
music similarity in offline friendships has been demonstrated [22], the relation-
2
ship between listening similarity and online social networks has not been com-
prehensively explored and understood yet. Specifically, questions like whether
we enjoy the music at which the online friends are enchanted, in other words,
whether the homophily of music listening exists in online social networks, still
deserve a systemic investigation.
Until recently, empirical research willing to answer the questions about mu-
sic listening had to depend on interviews and surveys in controlled environ-
ments [23, 24] with inevitable limitations in both data scale and granularity.
While in fact, the technological and societal evolutions that sustain the emer-
gence of online music listening indeed provide unparalleled opportunities for
human behavior understanding. Detailed footprints, including where, when
and how massive individuals listen music can be regarded as a big-data window
and through which the homophily in music listening can be collectively or in-
dividually probed and studied thoroughly. For instance, Netease Music, one of
the most popular online music providers in China, contributes the high-quality
music streaming service to millions of users and accordingly accumulate the
detailed behavior records of these users continuously. According to the official
report of Netease Music, its active users is over 200 million. With music playlists
creation being the core listening pattern, each day users establish around 420
thousand playlists and user-generated playlists total 800 million.
In the half
of 2016, users play songs 1.82 billion times and the duration amounts to 7.2
billion minutes, implying the impressive vitality of users in online music listen-
ing. Even more inspiring, Netease Music develops one extraordinary trait of
socializing its users. Specifically, it firstly provides a domain-specialized social
network through which users engage in sharing interests of music. Like generic
online social networks, users can be networked through following others, not
only ordinary users but also artists. Indeed, the social network sourced in mu-
sic listening profoundly facilitates the acquiring and sharing of music interests,
implying an ideal entanglement between social ties and music listening for the
present study. Thus anonymous digital traces of massive users are collected to
quantitatively support the investigation of homophily in music listening.
3
However, domain-oriented social networks like the one established by Netease
Music can not be a typical representation of online social networks that are gen-
erally resulted by comprehensive factors and music might be just one of them.
Specifically, Netease music social network relies predominately on the musical
interest and its digital traces are insufficient to describe other individual traits.
In the meantime, evidence of musical preferences being linked to individual
traits like personalities [24], cognitive styles [25] and even socioeconomic sta-
tuses [26] has been extensively demonstrated, implying the consideration more
generic online social networks. We argue that aiming at a systemic understand-
ing, it is necessary to study listening practices based on other more typical social
networks in which users are jointed sophisticatedly but realistically by psycho-
logical traits, extensive interests or other individual characteristics. Considering
the booming of social media in recent decades, prosperous networks like Twitter
or its variant Weibo of China that aggressively replicate offline social networks
to online counterparts, can be ideal targets. These online social networks are
natural, long-term and diverse and thus the objective footprints of massive in-
dividuals can be promising proxies for the present study. Nonetheless, it is
still extremely difficult to correctly match each individual of the music social
network to the identical one in networks like Weibo, which is the essence of em-
bedding music listening into a generic online social network. Very fortunately,
users can log into Netease Music through their Weibo accounts and along this
line we can obtain the digital traces of Weibo for these users. Therefore, it is
possible to further study the similarity of music listening for friends that linked
in Weibo. In addition, demographics and tweets in Weibo are excellent supple-
ments for enriching individual characteristics. We can even explore which key
factors influence the similarity of music listening.
Starting from the above motivations and assumptions, in this study, dig-
ital footprints of over seventy thousand individuals from both Netease Music
and Weibo are thoroughly collected through a novel crawler. Then 25, 953 ac-
tive users with plenty of times for listening and tweeting are sampled as the
subjectives for further explorations. Two online social networks, the Netease
4
network and Weibo network are respectively constructed through user follow-
ings in Netease Music and Weibo. To examine whether the music listening is
homogeneous for users jointed by online social networks, similarities from six
perspectives are defined and measured. In order to investigate the crucial fac-
tors influencing the music listening homophily, subjectives are clustered into
different categories from multiple perspectives like social attributes, musical
preferences or etc. Our results demonstrate that friends linked by online social
networks indeed appreciate the identical songs and possess the similar music
preferences. As for gender, patterns for music listening between female friends
are closer than male friends, implying that women are more sensitive for emo-
tional expression through music [27, 28]. Listening practices of the friends with
common music preferences in the current culture are similar especially for music
languages (Chinese) and genres (pop and folk). With regard to musical mood,
the users who enjoy exciting, wild and happy music share more similarities in
music listening.
It is also difficult for users owning high musical diversity to
find friends with similar musical tastes. The present study confirms evidently
the existing of homophily in music listening of online social networks and elab-
orately clarify the roles of human demographics and music traits in influencing
the homophily. Our findings would shed insightful lights on music recommen-
dation and friend suggestion in online applications. We merge different social
circles of an individual and surprisingly reveal that generic social networks like
Weibo still demonstrate significantly the homophily that intuitively only exists
in domain-oriented networks. It indeed implies that rich information in general
social media can be confidently introduced into the study of specialized social
networks [29].
2. Methods
2.1. Netease Music Dataset
Digital service providers began to amass large user bases, offering the pri-
mary sources of digital music streaming via the Internet increasingly. New
5
innovations, including digitalization and the Internet, transform the existing
landscape over the past decade and attracted new artists and listeners into the
fields, and digital music streaming services has also profoundly reshaped the
user behaviors. China follows this global trend and has become a leading dig-
ital country in terms of music services. The Netease Music is one of the most
trending music streaming providers in China, whose special trait is the music so-
cial network. Users are allowed to follow others in the platform, such as friends
and artists. Therefore, this music platform has become a new and booming
social network of domain-oriented.
The web site of Netease Music provides abundant online information about
users, playlists and music. We develop an excellent crawler aiming at Netease
Music platform first to perform the data collection. Our crawler adapts massive
agent servers and each agent will simulate a real user to visit pages and click
links from the browser. By traversing the following links, from August in 2016
to May in 2017, we obtain a dataset of over 200 thousand users, 1.5 million
playlists and 3.2 million songs.
The collected data referring to users include the following lists, historical
listening and like records. For each user, the following list contains the complete
ID numbers of users (UID) that she/he followed. The top 100 songs listened
by one user are recorded in her/his historical listening. The platform provides
the 'like' button to label their favorite playlists or songs which are restored in
like records. According to the historical listening and like records, we obtain
the corresponding detailed playlists and attributes of songs. In each playlist,
ID numbers of songs (SID) it contains and style tags labeled by its creator are
both collected. The attributes of a song include the album, artists and several
acoustic features.
2.2. Weibo Dataset
Tremendous social relationships are forged in popular online services like
Facebook, Twitter and Weibo with the explosive development of online social
networks. Twitter, as the most popular social networking and micro-blog ser-
6
vice, enables registered users to read and post short messages, so-called tweets.
At the beginning of 2016, Twitter had reached 310 monthly active users (MAU).
As of the third quarter of 2017, it averaged at 330 million MAU. However, more
people are using Weibo, the Chinese variant of Twitter now. According to the
Chinese company's first quarter reports, it has 340 million MAU, 30% up on
the previous year, implying that social relationships and online behaviors of
massive individuals from Weibo can be sensed and profiled with unparalleled
richness and granularity. Moreover, replicating offline social ties to online and
replacing face-to-face communication with interactions of cyberspace have es-
sentially digitized the daily life and reshaped the social networks, suggesting
that the online social network is of fundamental significance for explorations in
both social theories and applications.
In the fore part mentioning Netease Music Dataset, 74,056 users connect
their Weibo accounts to Netease Music, offering us an opportunity to establish
a perfect match between these two different platforms. Employing the crawler
agents, their corresponding ID numbers in Weibo are obtained. With the help
of Weibo's open APIs, for each ID, the public profile, following relationships
and historical tweets can be accordingly collected. And in order to speed up the
the collection, cloud servers are also extensively utilized. The profiles of Weibo
users include demographics (e.g. gender), social attributes (e.g. the number of
followers) and other individual information. For each Weibo user, the following
relations contains the Weibo ID numbers (WID) of users it follows. Unfortu-
nately, due to the official limit on viewing following list, we only obtain the
latest 1,000 following relations. Nevertheless, according to theory of Dunbar's
number, the maximum size of ego-network averages 150 [30, 31, 32], implying
that the latest one thousand followings could sufficiently reflect recently active
social connections the user possesses. Similarly, due the limit on tweets viewing,
for each Weibo user only its latest 1000 (or less if not enough) tweets can be
obtained.
7
2.3. Two Social Networks
We further refine the subjects of the present study by selecting active users
from both datasets. Specifically, active users are defined as those have listened
complete songs at least 1000 times and posted over 100 tweets. The complemen-
tary cumulative distribution function (CCDF) of the number of users in music
listening and tweeting is depicted in Fig 1. As can be seen in Fig 1a, for the
majority of users, the number of music listening is lower than 104. The percent
of users that listen music over 1000 times is lower than 55%. As shown in Fig 1b,
about 70% of users tweet 100 times at least. Note that owing to the limit of
Weibo, the maximum of number of tweets is 1000. After the refinement, totally
25,953 active users are filtered out to be subjectives of further explorations.
Regarding to the same group of active users, two social networks are then
respectively established from the following relationships in Netease Music and
Weibo. The first one, named Netease network, contains 89,988 links. The sec-
ond one, named Weibo network, contains 112,753 links. And these two networks
share the 25,953 identical nodes, implying that we construct an ideal scenario to
reveal the homophily of music listening in both domain-oriented social network
and generic social network. It is worthy noting that here we regard social net-
works as undirected graphs. The degree distributions of Netease network and
Weibo network are demonstrated in Fig 2 and the power-law trending implies
the consistence to existing understanding of typical social networks [33]. As for
Netease network (γ = 2.12), the distribution evidently shows a long tail, indi-
cating there are few users with large amount of relationships in social network
of music-oriented. As for Weibo network (γ = 2.07), a power-law like distribu-
tion is observed as degree lower than 500, however, a exponential cutoff then
emerges and the maximum degree is 100, both due to the API limit of Weibo.
2.4. Similarities of music listening
Based on the personal historical listening and like records, we define six
types of similarities with respect to music listening for any pair of users A and
8
(a)
(b)
Figure 1: CCDF of the number of music listening and tweeting.
9
100101102103104Number of music listening0.00.20.40.60.81.0P(X>x)100101102103Number of tweets0.20.40.60.81.0P(X>x)(a)
(b)
Figure 2: Probability distribution of the degree of Weibo network and Netease Music network.
The degree exponent γ of networks are respectively 2.12 and 2.07 (2 < γ < 3).
10
101102103104Degree of Netease Music user104103102101Probability=2.12101102103Degree of Weibo user104103102101Probability=2.07B in both social networks. And higher similarities suggest more significant
homophily in social networks.
The historical listening records for A and B are denoted as HA and HB,
respectively and in which top 100 songs of high-frequency are included. The
historical similarity simsong, indicating the number of co-occurrence songs in
top records can be thus defined as
simsong = HA ∩ HB
.
(1)
For presenting measures of similarity from aspects of music traits, we first
develop ways to label songs and users in terms of traits vectors. Given the
missing of tags of songs in Netease dataset, the tags of playlists can be fused
to infer traits vectors of songs. Specifically, Netease officially provides 6 tags of
languages, 24 tags of genres, 13 tags of moods and 12 tags of scenes and among
these 55 tags at most three are selected to label a playlist by its creator. Assum-
ing that a song can be labeled confidently by tags of the playlists it belongs to,
a 55-dimension traits vector (initialized to be zero) can be accordingly derived
for each song by examining 1.5 million playlists, i.e., a tag occurrence will result
in addition of 1 to the corresponding dimension. However, considering the fact
that values of the traits vector of a song can be significantly influenced by the
number of playlists it appears, we split the long vector into four sub-vectors
including Slanguage, Sgenre, Smood and Sscene (S refers to songs) and then do
normalization on each sub-vector to avoid bias. To be specific, we calculate
the proportion of each tag respectively in four vectors and the sum of values in
each sub-vector should be 1. In fact, Slanguage, Sgenre, Smood and Sscene can be
features to appropriately represent the category distribution of songs. Following
the same idea, supposing that music preferences of a user can be well reflected
by the top songs listened, the traits vectors of users can be inferred through
100(cid:88)
Uc =
Sc,i,
(2)
in which c stands for traits and can be language, genre, mood or scene. Finally,
based on the feature vectors of 3.2 million songs, traits vectors for 25,953 active
i=1
11
users are derived and normalized to z-cores. Then the similarity of user pair A
and B can be intuitively measured through cosine distance between their traits
vectors, which is defined as
simc =
Uc,A · Uc,B
Uc,A Uc,B .
(3)
Note that −1 (cid:54) simc (cid:54) 1 and values closer to 1 indicate more similar music
preferences. And as c varies over different music traits, we accordingly obtain
four music preference similarities from perspectives of languages, genres, moods
and scenes.
In addition, the similarity of favorite songs can also reflect the strength of
homophily in music preference. Different from historical listening records, the
number of songs in like record is not limited. Therefore we define the Jaccard
distance as the similarity for like records between users A and B as
simlike =
LA ∩ LB
LA ∪ LB
(4)
in which L stands for the set of one's favorite songs.
To sum up, from the above we obtain six similarities referring to music
listening and higher similarities indicate more significant homophily in music
listening of online social networks. These measures pave the way for quantitative
investigations of homophily in this study.
2.5. User classifications
Many factors in social networks might influence the homophily between
friends. In order to reveal the crucial factors, demographics, social attributes
and listening behaviors of active users are further probed for detailed under-
standing of their roles in homophily of music listening. We argue that regarding
these factors as features, active users can be thus clustered into groups from
multiple perspectives and discriminations of inter-groups offer windows of ho-
mophily investigation and factor weighing.
Gender is one of the most significant demographics in understanding human
behaviors. We extract gender from Weibo profiles and split active users into
12
10,388 female ones and 15,565 male ones. Whether a user is officially verified
by Weibo can be an indicator of influence and through the 'verified' labels
active users are split into 24,368 non-verified ones and 1,585 verified ones. In
addition, social attributes that reflect users' ranks in the social network can be
well modeled through the number of the followers (N ER) as well as RF F that
defined as the rate of f ollowing numbers to f ollowed numbers (log( N ER+1
N EE+1 ),
in which N EE refers to the number of the users' followees). Given the fact
that both N ER and RF F are continuous variables, the discretization based on
K-means clustering is employed to categorize active users into groups of low
rank and high rank respectively based on these two attributes.
Patterns of online music consumption could be sufficiently reflected in terms
of users' music preferences that result in behavioral differences directly. Hence
active users can also be clustered into groups from the perspective of music
preference. The traits vector Uc can be features representing users in clustering
and the preference feature matrix of c is accordingly constructed for all users.
The matrix is de-correlated by principal component analysis (PCA) with full
covariance and then the approach of K-means is employed to cluster active users
into groups. Clusterings based on all traits are denoted separately as Cmood,
Clanguage and Cgenre, indicating that for each trait active users are grouped into
three clusters with divergent patterns of music preferences. In order to better
interpret the clusterings, for groups of each clustering, the group feature defined
as the mean user feature within the group is calculated. Then the semantic of
each group is explained by the top 3 attributes of the group feature. Table 1
reports the clusterings and group interpretations. As can be seen, groups of
each clustering could be well explained by the top attributes, suggesting that
our methods indeed capture the music preferences and behavioral patterns in
music listening can be effectively detected.
In the meantime, as exploited in previous efforts [34, 26], diversity of mu-
sical preferences is also an indicator of great significance in reflecting listening
behaviors. We draw on the concept of entropy [35] to define users' diversity in
13
Table 1: User classifications from perspectives about music preferences.
Traits
Groups
Interpretations
language
genre
mood
0
1
2
0
1
2
0
1
2
Chinese (including Cantonese)
Japanese, Korean
English, minority
rap, dance, alternative
pop, folk
light, New age, classic,
exciting, wild, happy
sad, missing, lonely
fresh, sanative, easy
music preferences as
3(cid:88)
n(cid:88)
c=1
i=1
div = − 1
3
p(uc,i)log(p(uc,i)),
(5)
in which p(uc,i) refers to the proportion of i-th attribute in user vector of trait c.
Higher diversity implies the user's more appreciations for variety of experience
in music listening. We then employ K-means to cluster active users into high-
diversity and low-diversity groups respectively.
The above user classifications can be finally utilized to define the homophily
of relationships in online social networks. According to eight groups of all the
clusterings, these are totally 19 factors1. As the dummy variable, the value of
factor is 1 when the two linked users are classified to the same group, otherwise
the value is 0. For example, Factors f emale is 1 and male is 0 when user
A (female) is linked with user B (female).
If f emale and male are both 0,
1The factors range from demographics to music traits and include f emale, male, V 0, V 1,
N ER0, N ER1, RF F 0, RF F 1, lang0, lang1, lang2, genre0, genre1, genre2, mood0, mood1,
mood2, div0 and div1.
14
Figure 3: Distribution of similarities of listening historical records. Through the two-sample
Kolmogorov-Smirnov test, except for the two random networks (p = 0.99), the distributions
of other pairs have significant differences (p < 0.001,∗∗∗).
indicating that A and B possess different genders.
3. Results
3.1. Existence of homophily
Being direct indicators of homophily, similarities from different perspectives
are first investigated in the two social networks constructed from Netease and
Weibo. Meanwhile, in order to testify the significance of the similarity distribu-
tion, for each realistic network, in terms of shuffling nodes a random counterpart
is also built for base lines.
The CCDF of simsong, as can be seen in Fig. 3, demonstrates that similarities
of actual networks are evidently higher than that of random networks, especially
when simsong > 5, indicating that friends in online social network inclines
to listen same songs and the homophily in music listening significantly exists.
Particularly, as compared to Weibo network, friendships in Netease network
15
0.02.55.07.510.012.515.017.520.0simsong104103102101100CCDFWeiboNetworkNeteaseNetworkRandomWeiboNetworkRandomNeteaseNetwork(a)
(b)
(c)
(d)
Figure 4: Distribution of similarities of musical preferences. Through the two-sample
Kolmogorov-Smirnov test, except for the two random networks (p > 0.05), the distributions
of other pairs have significant differences (p < 0.001,∗∗∗).
are slightly closer, implying that from the perspective of listening same songs,
homophily is enhanced in the music-oriented social network.
CCDFs of similarities in perspectives of music preferences are further in-
vestigated, as can be seen in Fig 4. Similar to observations of simsong, it is
consistently demonstrated that the friend similarity in music preferences is sig-
nificant, suggesting the existing of homophily in music listening of online social
network. Even more interesting, homophily in Netease network is more evident
than that of Weibo network, implying again that friends are more homogeneous
in domain-oriented social networks than the generic counterparts. However, as
for the measure of simlike that shown in Fig 5, there is no evidence for the ex-
isting of homophily because the similarity of friends in 'like' behavior of online
networks are close to or even lower than that in random networks.
16
1.000.750.500.250.000.250.500.751.00simlanguage0.00.20.40.60.81.0CCDFWeiboNetworkNeteaseNetworkRandomWeiboNetworkRandomNeteaseNetwork1.000.750.500.250.000.250.500.751.00simgenre0.00.20.40.60.81.0CCDFWeiboNetworkNeteaseNetworkRandomWeiboNetworkRandomNeteaseNetwork1.000.750.500.250.000.250.500.751.00simmood0.00.20.40.60.81.0CCDFWeiboNetworkNeteaseNetworkRandomWeiboNetworkRandomNeteaseNetwork1.000.750.500.250.000.250.500.751.00simscene0.00.20.40.60.81.0CCDFWeiboNetworkNeteaseNetworkRandomWeiboNetworkRandomNeteaseNetworkFigure 5: Distribution of similarities of favorite songs between users. Through the two-sample
Kolmogorov-Smirnov test, except for the two random networks (p = 0.163), the distributions
of other pairs have significant differences (p < 0.001,∗∗∗).
To sum up, in terms of similarity metrics except the one regarding to 'like'
behavior, homophily of music listening in online social networks, especially the
one of music-oriented, is significantly demonstrated and confirmed. Friends con-
nected in online social networks indeed enjoy identical music and share similar
music preferences. The absence of homophily in 'like' behavior suggests that
even in homogeneous online social networks, individual differences still exist
across friends. Although the homophily in specialized network is slightly more
significant, we indeed find the same behavior pattern in generic networks like
Weibo where the relationships are bonded with more common interests. It fur-
ther implies that social media like Weibo can be generic but typical instances
of online social networks. We further explore the important factors which affect
the listening similarity in the Weibo network.
3.2. Critical factors for homophily
Given the rich backgrounds of active users carried by Weibo, we further
investigate how characteristics of social ties, i.e., factors influence the homophily
17
0.000.010.020.030.040.05simlike102101100CCDFWeiboNetworkNeteaseNetworkRandomWeiboNetworkRandomNeteaseNetworkTable 2: Results of multiple regression to predict simsong based on user classifications. The
column of "Coef." (coefficient) shows the influence of factors on homophily. Note: ∗∗p <
.01,∗∗∗ p < .001.
Traits
Factors
Coef.
Std. Error
t-Value P r(> t )
gender
verified
NER
RFF
female
male
V0
V1
NER0
NER1
RFF0
RFF1
lang0
language
lang1
lang2
genre0
genre1
genre2
mood0
mood1
mood2
div0
div1
genre
mood
diversity
0.369
0.254
0.119
0.014
0.444
-0.149
0.517
0.036
1.047
0.569
0.228
-0.023
1.043
0.061
0.668
0.359
0.126
0.770
0.208
0.021
0.015
0.017
0.035
0.042
0.018
0.031
0.026
0.026
0.036
0.020
0.022
0.020
0.041
0.024
0.027
0.023
0.015
0.023
17.25
16.91
6.91
0.41
10.58
-8.49
16.72
1.35
40.43
15.79
11.28
-1.05
50.90
1.51
27.71
13.32
5.35
50.59
8.89
Intercept
0.396
0.019
20.50
Observations
112,753
R2
0.1701
Adjusted R2
0.1699
F-Statistic
1100
18
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
∗∗∗
disclosed in music listening. Except for simsong, other similarities referring to
music preference are measured with Uc (traits vectors of users), however, the
vectors are also used to cluster the individuals. It could take a mistake when
the dependent variable and some independent variables are calculated from the
same source. Therefore, we only consider simsong as the dependent variable to
predict in regression analysis. As can be seen, Table 2 presents the multiple
regression results of nineteen factors function on the homophily.
As for gender, the coefficients of male are higher than that of female, indi-
cating that relationships in online social network between female users are more
homogeneous in music listening. Yet the correlations between listening similar-
ities and the verification statuses are not significant due to trivial coefficients.
For social attributes N ER0 and RF F 0 that reflecting individual extraversion
and openness [36, 37], coefficients are significantly higher than that of N ER1
and RF F 1, implying that users of low extroversion and openness demonstrate
more homophily in music listening.
For factors from perspective of music preferences, the positive coefficients
shown in Table 2 indicate that users within the same group of clusterings re-
ferring to preferences of language and mood are similar. As for the language
preference, users in the group of Chinese are more similar than those in other
groups. Pop music and folk music are known as the mainstream genres in China.
As for genres, it can be found that the users following pop and folk genre are
significantly more similar. According to the results for languages and genres,
we suggest that the friends in online social networks, whose music preferences
accord with the mass taste, are always listening to the similar music. From the
perspective of moods, the coefficients of the factor 'exciting, wild and happy'
is the highest for simsong. It demonstrates that people who like the positive
and energetic songs are more homogeneous in music listening. In addition, we
investigate whether the diversity (div0 and div1) of music consumption is an
influential factor for listening similarity. The results show that users with low
musical diversity are more similar. However, users that enjoys multiple types of
music, always own the uncommon and unique preferences and it is difficult for
19
them to find friends sharing alike musical preferences.
4. Discussion
The booming of social media greatly facilitates exploitations of social net-
works by offering an unprecedented big-data window.
In the present study,
aiming at understanding homophily of music listening in online social networks,
two networks with a same group of active users from Netease Music and Weibo
are separately built for probing six measures of homophily. It is confirmed sig-
nificantly that homophily exists in music listening of online social networks,
even for the generic one from Weibo. Factors of social ties ranging from demo-
graphics to music preferences are further investigated in influencing homophily
and many interesting patterns are revealed. To our best knowledge, for the first
time a systematic and comprehensive study of music homophily is performed in
a manner of data-driven solution.
In the meantime, we are also the first to construct a big music data through
matching active users in both music stream platform and Weibo. The unex-
pected existing of homophily in Weibo suggests that the knowledge from generic
social networks can be confidently introduced and transfered to the study [38]
and application [29] of domain-oriented social networks, which will essentially
enrich the context of subjectives. Previous investigation shows that human av-
eragely spend 17% of life in music listening [39]. Nevertheless, massive behavior
data is still missing in existing studies. By combing behavioral and demograph-
ical data from different online social networks, our study demonstrates that
explorations of music listening can be profoundly boosted.
In fact, music steaming platforms have been experiencing a fast growing
stage with increasing influence through establishment of musical environments
tailored to individual preferences. Plenty of music service providers use the
relationships between online friends to estimate users' musical tastes and then
recommend music [40]. In our study, we provide a solid evidence for the ho-
mophily of music listening both in specialized online social network and the
20
generic network, suggesting that no matter specialized or generic social net-
works can serve as high quality sources of music recommendation [41, 42]. We
argue that the homophily should be exploited in building and enhancing music
services. Specifically, the influential factors that function on listening similarities
can be directly introduced into the design of music recommendation algorithms
and coefficients we obtained can be principal weights of those factors. Tak-
ing gender as an example, music platforms could put more emphasis on female
friends when recommend music to female users.
Acknowledgments
This work was supported by NSFC (Grant No. 71501005) and the fund of the
State Key Lab of Software Development Environment (Grant Nos. SKLSDE-
2015ZX-05 and SKLSDE-2015ZX-28).
References
References
[1] M. Mcpherson, L. Smithlovin, J. M. Cook, Birds of a feather: Homophily
in social networks, Annual Review of Sociology 27 (1) (2001) 415–444.
[2] M. De Klepper, E. Sleebos, G. Van de Bunt, F. Agneessens, Similarity in
friendship networks: Selection or influence? the effect of constraining con-
texts and non-visible individual attributes, Social Networks 32 (1) (2010)
82–90.
[3] A. Chmiel, P. Sobkowicz, J. Sienkiewicz, G. Paltoglou, K. Buckley, M. Thel-
wall, J. A. Ho(cid:32)lyst, Negative emotions boost user activity at bbc forum,
Physica A: statistical mechanics and its applications 390 (16) (2011) 2936–
2944.
[4] J. Bollen, B. Gon¸calves, G. Ruan, H. Mao, Happiness is assortative in
online social networks, Artificial life 17 (3) (2011) 237–251.
21
[5] R. Fan, J. Zhao, Y. Chen, K. Xu, Anger is more influential than joy:
Sentiment correlation in weibo, PloS one 9 (10) (2014) e110184.
[6] W. Youyou, D. Stillwell, H. A. Schwartz, M. Kosinski, Birds of a feather do
flock together: Behavior-based personality-assessment method reveals per-
sonality similarity among couples and friends, Psychological science 28 (3)
(2017) 276–284.
[7] J. Brown, A. J. Broderick, N. Lee, Word of mouth communication within
online communities: Conceptualizing the online social network, Journal of
interactive marketing 21 (3) (2007) 2–20.
[8] A. Mislove, B. Viswanath, K. P. Gummadi, P. Druschel, You are who you
know: inferring user profiles in online social networks, in: Proceedings of
the third ACM international conference on Web search and data mining,
ACM, 2010, pp. 251–260.
[9] D. Centola, The spread of behavior in an online social network experiment,
science 329 (5996) (2010) 1194–1197.
[10] J. Blacking, Music, culture, and experience: Selected papers of John Black-
ing, University of Chicago Press, 1995.
[11] A. C. North, Uses of music in everyday life, Music Perception An Interdis-
ciplinary Journal 22 (1) (2004) 41–77.
[12] C. Wright, Listening to music, Nelson Education, 2013.
[13] S. Frith, Music and everyday life, Critical Quarterly 44 (1) (2002) 35–48.
[14] T. Bostrom, S. Eliasson, P. Lindtorp, F. Moioli, M. Nystrom, Mobile audio
distribution, Personal Technologies 3 (4) (1999) 166–172.
[15] L. E. Holmquist, Ubiquitous music, Interactions 12 (4) (2005) 71.
[16] D. B. Rondeau, For mobile applications, branding is experience, Commu-
nications of the Acm 48 (7) (2005) 61–66.
22
[17] G. Kreitz, F. Niemela, Spotify–large scale,
low latency, p2p music-on-
demand streaming, in: Peer-to-Peer Computing (P2P), 2010 IEEE Tenth
International Conference on, IEEE, 2010, pp. 1–10.
[18] V. Henning, J. Reichelt, Mendeley-a last. fm for research?, in: eScience,
2008. eScience'08. IEEE Fourth International Conference on, IEEE, 2008,
pp. 327–328.
[19] E. Priest, The future of music and film piracy in china, Berkeley Technology
Law Journal (2006) 795–871.
[20] A. Y. Fung, The emerging (national) popular music culture in china, Inter-
Asia Cultural Studies 8 (3) (2007) 425–437.
[21] D. Boer, R. Fischer, M. Strack, M. H. Bond, E. Lo, J. Lam, How shared
preferences in music create bonds between people: Values as the missing
link, Personality and Social Psychology Bulletin 37 (9) (2011) 1159–1171.
[22] M. H. Selfhout, S. J. Branje, T. F. ter Bogt, W. H. Meeus, The role of
music preferences in early adolescents' friendship formation and stability.,
Journal of Adolescence 32 (1) (2009) 95–107.
[23] J. A. Sloboda, Everyday uses of music listening: A preliminary study,
Music, mind and science (1999) 354–369.
[24] D. M. Greenberg, M. Kosinski, D. J. Stillwell, B. L. Monteiro, D. J. Levitin,
P. J. Rentfrow, The song is you: Preferences for musical attribute dimen-
sions reflect personality, Social Psychological and Personality Science 7 (6)
(2016) 597–605.
[25] D. M. Greenberg, S. Baron-Cohen, D. J. Stillwell, M. Kosinski, P. J. Rent-
frow, Musical preferences are linked to cognitive styles, PloS one 10 (7)
(2015) e0131151.
[26] M. Park, I. Weber, M. Naaman, S. Vieweg, Understanding musical diversity
via online social media., in: ICWSM, 2015, pp. 308–317.
23
[27] A. Wells, E. A. Hakanen, The emotional use of popular music by adoles-
cents, Journalism Quarterly 68 (3) (1991) 445–454.
[28] C. Robazza, C. Macaluso, V. D'Urso, Emotional reactions to music by
gender, age, and expertise, Perceptual and Motor skills 79 (2) (1994) 939–
944.
[29] F. Carmagnola, F. Cena, User identification for cross-system personalisa-
tion, Information Sciences 179 (1) (2009) 16–32.
[30] R. Dunbar, Neocortex size as a constraint on group size in primates, Journal
of Human Evolution 22 (6) (1992) 469 – 493.
[31] R. A. Hill, R. I. Dunbar, Social network size in humans, Human nature
14 (1) (2003) 53–72.
[32] J. Zhao, J. Wu, G. Liu, D. Tao, K. Xu, C. Liu, Being rational or aggressive?
a revisit to dunbars number in online social networks, Neurocomputing
142 (Supplement C) (2014) 343 – 353.
[33] M. Newman, Networks: an introduction, Oxford university press, 2010.
[34] K. Van Eijck, Social differentiation in musical taste patterns, Social forces
79 (3) (2001) 1163–1185.
[35] P. J. Alexander, Entropy and popular culture: product diversity in the
popular music recording industry, American Sociological Review 61 (1)
(1996) 171–174.
[36] Y. Amichai-Hamburger, G. Vinitzky, Social network use and personality,
Computers in Human Behavior 26 (6) (2010) 1289–1295.
[37] Y. Bachrach, M. Kosinski, T. Graepel, P. Kohli, D. Stillwell, Personality
and patterns of facebook usage, in: Acm Web Science Conference, 2012,
pp. 24–32.
24
[38] A. Malhotra, L. Totti, W. Meira Jr, P. Kumaraguru, V. Almeida, Study-
ing user footprints in different online social networks, in: Advances in So-
cial Networks Analysis and Mining (ASONAM), 2012 IEEE/ACM Inter-
national Conference on, IEEE, 2012, pp. 1065–1070.
[39] P. J. Rentfrow, The role of music in everyday life: Current directions in
the social psychology of music, Social and personality psychology compass
6 (5) (2012) 402–416.
[40] C. Zhong, N. Sastry, Systems applications of social networks, ACM Com-
put. Surv. 50 (5) (2017) 63:1–63:42. doi:10.1145/3092742.
[41] O. Simek, D. Jensen, Navigating networks by using homophily and degree,
Proceedings of the National Academy of Sciences of the United States of
America 105 (35) (2008) 12758.
[42] J. Bu, S. Tan, C. Chen, C. Wang, H. Wu, L. Zhang, X. He, Music recom-
mendation by unified hypergraph:combining social media information and
music content, in: ACM International Conference on Multimedia, 2010,
pp. 391–400.
25
|
1905.08067 | 1 | 1905 | 2019-05-15T17:14:34 | Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter | [
"cs.SI",
"cs.CL",
"cs.CY",
"cs.LG",
"stat.ML"
] | The Internet and, in particular, Online Social Networks have changed the way that terrorist and extremist groups can influence and radicalise individuals. Recent reports show that the mode of operation of these groups starts by exposing a wide audience to extremist material online, before migrating them to less open online platforms for further radicalization. Thus, identifying radical content online is crucial to limit the reach and spread of the extremist narrative. In this paper, our aim is to identify measures to automatically detect radical content in social media. We identify several signals, including textual, psychological and behavioural, that together allow for the classification of radical messages. Our contribution is three-fold: (1) we analyze propaganda material published by extremist groups and create a contextual text-based model of radical content, (2) we build a model of psychological properties inferred from these material, and (3) we evaluate these models on Twitter to determine the extent to which it is possible to automatically identify online radical tweets. Our results show that radical users do exhibit distinguishable textual, psychological, and behavioural properties. We find that the psychological properties are among the most distinguishing features. Additionally, our results show that textual models using vector embedding features significantly improves the detection over TF-IDF features. We validate our approach on two experiments achieving high accuracy. Our findings can be utilized as signals for detecting online radicalization activities. | cs.SI | cs | Understanding the Radical Mind: Identifying
Signals to Detect Extremist Content on Twitter
Mariam Nouh∗, Jason R.C. Nurse†, and Michael Goldsmith∗
∗Department of Computer Science, University of Oxford, UK
Email: {mariam.nouh, michael.goldsmith}@cs.ox.ac.uk
†School of Computing, University of Kent, UK
Email: [email protected]
9
1
0
2
y
a
M
5
1
]
I
S
.
s
c
[
1
v
7
6
0
8
0
.
5
0
9
1
:
v
i
X
r
a
Abstract -- The Internet and, in particular, Online Social Net-
works have changed the way that terrorist and extremist groups
can influence and radicalise individuals. Recent reports show
that the mode of operation of these groups starts by exposing
a wide audience to extremist material online, before migrating
them to less open online platforms for further radicalization.
Thus, identifying radical content online is crucial to limit the
reach and spread of the extremist narrative. In this paper,
our aim is to identify measures to automatically detect radical
content in social media. We identify several signals, including
textual, psychological and behavioural, that together allow for
the classification of radical messages. Our contribution is three-
fold: (1) we analyze propaganda material published by extremist
groups and create a contextual text-based model of radical
content, (2) we build a model of psychological properties inferred
from these material, and (3) we evaluate these models on Twitter
to determine the extent to which it is possible to automatically
identify online radical tweets. Our results show that radical users
do exhibit distinguishable textual, psychological, and behavioural
properties. We find that the psychological properties are among
the most distinguishing features. Additionally, our results show
that textual models using vector embedding features significantly
improves the detection over TF-IDF features. We validate our
approach on two experiments achieving high accuracy. Our find-
ings can be utilized as signals for detecting online radicalization
activities.
Index Terms -- radicalization, extremism, data mining, social
media, machine learning, Twitter
I. INTRODUCTION
The rise of Online Social Networks (OSN) has facilitated
a wide application of its data as sensors for information to
solve different problems. For example, Twitter data has been
used for predicting election results, detecting the spread of
flu epidemics, and a source for finding eye-witnesses during
criminal incidents and crises [1], [2]. This phenomenon is
possible due to the great overlap between our online and
offline worlds. Such seamless shift between both worlds has
also affected the modus operandi of cyber-criminals and ex-
tremist groups [3]. They have benefited tremendously from
the Internet and OSN platforms as it provides them with
opportunities to spread their propaganda, widen their reach
for victims, and facilitate potential recruitment opportunities.
For instance, recent studies show that the Internet and social
media played an important role in the increased amount of
©2019 IEEE. Personal use of this material is permitted. Permission from
IEEE must be obtained for all other uses, in any current or future media,
including reprinting/republishing this material for advertising or promotional
purposes,creating new collective works, for resale or redistribution to servers
or lists, or reuse of any copyrighted component of this work in other works.
violent, right-wing extremism [4]. Similarly, radical groups
such as Al-Qaeda and ISIS have used social media to spread
their propaganda and promoted their digital magazine, which
inspired the Boston Marathon bombers in 2010 [5].
To limit the reach of cyber-terrorists, several private and
governmental organizations are policing online content and
utilising big data technologies to minimize the damage and
counter the spread of such information. For example, the UK
launched a Counter Terrorism Internet Referral Unit in 2010
aiming to remove unlawful Internet content and it supports
the police in investigating terrorist and radicalizing activities
online. The Unit reports that among the most frequently
referred links were those coming from several OSNs, such
as Facebook and Twitter [3]. Similarly, several OSNs are
constantly working on detecting and removing users promoting
extremist content. In 2018, Twitter announced that over 1.2
million accounts were suspended for terrorist content [6].
Realizing the danger of violent extremism and radicaliza-
tion and how it is becoming a major challenge to societies
worldwide, many researchers have attempted to study the
behaviour of pro-extremist users online. Looking at existing
literature, we find that a number of existing studies incorporate
methods to identify distinguishing properties that can aid in
automatic detection of these users [7], [8]. However, many of
them depend on performing a keyword-based textual analysis
which, if used alone, may have several shortcomings, such as
producing a large number of false positives and having a high
dependency on the data being studied. In addition, it can be
evaded using automated tools to adjust the writing style.
Another angle for analyzing written text is by looking at the
psychological properties that can be inferred regarding their
authors. This is typically called psycholinguistics, where one
examines how the use of the language can be indicative of
different psychological states. Examples of such psychological
properties include introversion, extroversion, sensitivity, and
emotions. One of the tools that automates the process of
extracting psychological meaning from text is the Linguistic
Inquiry and Word Count (LIWC) [9] tool. This approach
has been used in the literature to study the behaviour of
different groups and to predict
their psychological states,
such as predicting depression [10]. More recently, it has also
been applied to uncover different psychological properties of
extremist groups and understand their intentions behind the
recruitment campaigns [11].
Building on the findings of previous research efforts, this
paper aims to study the effects of using new textual and
psycholinguistic signals to detect extremist content online.
These signals are developed based on insights gathered from
analyzing propaganda material published by known extremist
groups. In this study, we focus mainly on the ISIS group
as they are one of the leading terrorist groups that utilise
social media to share their propaganda and recruit individuals.
We analyze the propaganda material they publish in their
online English magazine called Dabiq, and use data-mining
techniques to computationally uncover contextual
text and
psychological properties associated with these groups. From
our analysis of these texts, we are able to extract a set of
signals that provide some insight into the mindset of the radical
group. This allows us to create a general radical profile that we
apply as a signal to detect pro-ISIS supporters on Twitter. Our
results show that these identified signals are indeed critical to
help improve existing efforts to detect online radicalization.
II. RELATED WORK
In recent years, there has been an increase in online accounts
advocating and supporting terrorist groups such as ISIS [6].
This phenomenon has attracted researchers to study their
online existence, and research ways to automatically detect
these accounts and limit
their spread. Ashcroft et al. [7]
make an attempt to automatically detect Jihadist messages
on Twitter. They adopt a machine-learning method to classify
tweets as ISIS supporters or not. In the article, the authors
focus on English tweets that contain a reference to a set of
predefined English hashtags related to ISIS. Three different
classes of features are used, including stylometric features,
temporal features and sentiment features. However, one of the
main limitations of their approach is that it is highly dependent
on the data. Rowe and Saif [8] focused on studying Europe-
based Twitter accounts in order to understand what happens
before, during, and after they exhibit pro-ISIS behaviour.
They define such behaviour as sharing of pro-ISIS content
and/or using pro-ISIS terms. To achieve this, they use a term-
based approach such that a user is considered to exhibit a
radicalization behaviour if he/she uses more pro-ISIS terms
than anti-ISIS terms. While such an approach seems effective
in distinguishing radicalised users, it is unable to properly
deal with lexical ambiguity (i.e., polysemy). Furthermore,
in [12] the authors focused on detecting Twitter users who
are involved with "Media Mujahideen", a Jihadist group who
distribute propaganda content online. They used a machine
learning approach using a combination of data-dependent and
data-independent features. Similar to [8] they used textual
features as well as temporal features to classify tweets and
accounts. The experiment was based on a limited set of Twitter
accounts, which makes it difficult to generalize the results for
a more complex and realistic scenario.
Radicalization literature also looked at psychological factors
involved with adopting such behaviour. Torok [13] used a
grounded theory approach to develop an explanatory model
for the radicalization process utilizing concepts of psychiatric
power. Their findings show that the process typically starts
with the social isolation of individuals. This isolation seems
to be self-imposed as individuals tend to spend a long time
engaging with radical content. This leads to the concept
of homophily, the tendency to interact and associate with
similar others. Through constant interaction with like-minded
people, an individual gradually strengthens their mindset and
progresses to more extreme levels. Similarly, they start to feel
as being part of a group with a strong group identity which
leads to group polarization. In psychology, group polarization
occurs when discussion leads the group to adopt actions that
are more extreme than the initial actions of the individual
group members [14]. Moreover, the National Police Service
Agency of the Netherlands developed a model to describe the
phases a Jihadist may pass through before committing an act of
terrorism [15]. These sequential phases of radicalism include
strong links between the person's psychological and emotional
state (e.g., social alienation, depression, lack of confidence in
authority) and their susceptibility to radicalization.
III. METHODOLOGY
tasks. In the first
As illustrated in Fig. 1, our approach consists of two
main phases: Phase 1:Radical Properties Extraction, where
articles from Dabiq extremist magazines are input into this
step to perform two parallel
task, we
build a language model using (i) Term-Frequency Inverse-
Document-Frequency (TF-IDF) scores of uni-, bi-, and tri-
grams, and (ii) Word embeddings generated from a word2vec
model [16]. The output of this task is a radical corpus of
top k-grams, and a word embedding model giving a vector
representation for each word in the corpus. The second task
seeks to create a psychological profile based on the language
used in the extremist propaganda articles, consisting of a set
of emotional and topical categories using LIWC dictionary-
based tool. Phase 2: Tweet classification involves the use of
the models generated from Phase 1 to engineer features related
to radical activities. We identify three groups of features and
then train a binary classifier to detect radical tweets.
A. Feature Engineering
Feature engineering is the process of exploring large spaces
of heterogeneous features with the aim of discovering mean-
ingful features that may aid in modeling the problem at hand.
We explore three categories of information to identify relevant
features to detect radical content. Some features are user-based
while others are message-based. The three categories are: 1)
Radical language (Textual features FT ); 2) Psychological sig-
nals (Psychological features FP ); and 3) Behavioural features
(FB). In the following, we detail each of these categories.
1) Radical Language: In order to understand how radical
messages are constructed and used, as mentioned earlier, we
analyze content of ISIS propaganda material published in
Dabiq magazine. Dabiq is an online magazine published by
ISIS terrorist groups with the purpose of recruiting people
and promoting their propaganda and ideology. Using this data
Fig. 1: Approach overview
topics,
source, we investigate what
textual properties, and
linguistic cues exist in these magazines. Our intuition is that
utilising these linguistic cues from the extremist propaganda
would allow us to detect supporters of ISIS group who are
influenced by their propaganda.
We use two methods to extract the radical language from
the propaganda corpus. First we calculate tf-idf scores for
each gram in the propaganda corpus. We use uni-grams,
bi-grams, and tri-grams to capture phrases and context in
which words are being used. We then select the top scoring
grams to be used as features for the language model. N-
grams and words frequency have been used in the literature to
classify similar problems, such as hate-speech and extremist
text and have proven successful [17]. The second method
we use is word embeddings to capture semantic meanings.
Research in NLP has compared the effectiveness of word
embedding methods for encoding semantic meaning and found
that semantic relationships between words are best captured by
word vectors within word embedding models [18]. Therefore,
we train word2vec model on our propaganda corpus to build
the lexical semantic aspects of the text using vector space
models. We learn word embeddings using skip-gram word2vec
model implemented in the gensim package1 with vector size
of 100 and window size of 5. This word embedding model
is used to obtain the vector representation for each word.
We aggregate the vectors for each word in the tweet, and
concatenate the maximum and average for each word vector
dimension, such that any given tweet is represented in 200
dimension sized vector. This approach of aggregating vectors
was used successfully in previous research [19]. Moreover,
since ISIS supporters typically advocate for violent behaviour
and tend to use offensive curse words, we use dictionaries of
violent words2 and curse words3 to record the ratio of such
words in the tweet. We also count the frequency of words
with all capital letters as they are traditionally used to convey
yelling behaviour.
2) Psychological Signals: Research in fields such as lin-
guistics, social science, and psychology suggest that the use
of language and the word choices we make in our daily
1https://radimrehurek.com/gensim/models/word2vec.html
2https://myvocabulary.com/word-list/terrorism-vocabulary
3https://www.cs.cmu.edu/∼biglou/resources/bad-words.txt
communication, can act as a powerful signal to detect our
emotional and psychological states [9]. Several psychological
properties are unintentionally transmitted when we commu-
nicate. Additionally, literature from the fields of terrorism
and psychology suggests that terrorists may differ from non-
terrorists in their psychological profiles [20]. A number of
studies looked at the motivating factors surrounding terrorism,
radicalization, and recruitment tactics, and found that terrorist
groups tend to target vulnerable individuals who have feelings
of desperation and displaced aggression. In particular research
into the recruiting tactics of ISIS groups, it was found that
they focus on harnessing the individual's need for signifi-
cance. They seek out vulnerable people and provide them
with constant attention [21]. Similarly, these groups create a
dichotomy and promote the mentality of dividing the world
into "us" versus "them" [22]. Inspired by previous research,
we extract psychological properties from the radical corpus in
order to understand the personality, emotions, and the different
psychological properties conveyed in these articles.
We utilise LIWC dictionaries to assign a score to a set of
psychological, personality, and emotional categories. Mainly,
we look at the following properties: (1) Summary variables:
Analytically thinking which reflects formal, logical, and hi-
erarchical thinking (high value), versus informal, personal,
and narrative thinking (low value). Clout which reflects high
expertise and confidence levels (high value), versus tentative,
humble, and anxious levels (low value). Tone which reflects
positive emotions (high value) versus more negative emotions
such as anxiety, sadness, or anger (low value). Authentic
which reflects whether the text
is conveying honesty and
disclosing (high value) versus more guarded, and distanced
(low value). (2) Big five: Measures the five psychological
properties (OCEAN), namely Openness, Conscientiousness,
Extraversion, Agreeableness, and Neuroticism. (3) Emotional
Analysis: Measures the positive emotions conveyed in the text,
and the negative emotions (including anger, sadness, anxiety).
(4) Personal Drives: Focuses on five personal drives, namely
power, reward, risk, achievement, and affiliation. (5) Personal
Pronouns: Counts the number of 1st, 2nd, and 3rd personal
pronouns used. For each Twitter user, we calculate their
psychological profiles across these categories. Additionally,
using Minkowski distance measure, we calculate the distance
between each of these profiles and the average values of the
psychological properties created from the ISIS magazines.
3) Behaviour Signals: This category consists of measuring
behavioural features to capture different properties related to
the user and their behaviour. This includes how active the user
is (frequency of tweets posted) and the followers/following
ratio. Additionally, we use features to capture users' interac-
tions with others through using hashtags, and engagement in
discussions using mention action. To capture this, we construct
the mention interaction graph (GM ) from our dataset, such
that GM = (U, E), where U represents the user nodes and E
represents the set of edges. The graph GM is a directed graph,
where an edge e exists between two user nodes A and B, if
user A mentions user B. After constructing the graph, we mea-
sure the degree of influence each user has over their network
using different centrality measures, such as degree centrality,
betweenness centrality, and HITS-Hub. Such properties have
been adopted in the research literature to study properties of
cyber-criminal networks and their behaviour [23], [24].
IV. EXPERIMENTS
A. Dataset
We acquired a publicly available dataset of tweets posted
by known pro-ISIS Twitter accounts that was published during
the 2015 Paris attacks by Kaggle data science community4.
The dataset consists of around 17, 000 tweets posted by more
than 100 users. These tweets were labelled as being pro-ISIS
by looking at specific indicators, such as a set of keywords
used (in the user's name, description, tweet text), their network
of follower/following of other known radical accounts, and
sharing of images of the ISIS flag or some radical leaders. To
validate that these accounts are indeed malicious, we checked
the current status of the users' accounts in the dataset and
found that most of them had been suspended by Twitter. This
suggests that they did, in fact, possess a malicious behaviour
that opposes the Twitter platform terms of use which caused
them to be suspended. We filter out any tweets posted by
existing active users and label this dataset as known-bad.
To model the normal behaviour, we collected a random
sample of tweets from ten-trending topics in Twitter using
the Twitter streaming API. These topics were related to news
events and on-going social events (e.g., sports, music). We
filter out any topics and keywords that may be connected to
extremist views. This second dataset consists of around 8, 000
tweets published by around 1, 000 users. A random sample of
200 tweets was manually verified to ascertain it did not contain
radical views. We label this dataset as our random-good data.
A third dataset is used which was acquired from Kaggle
community5. This dataset is created to be a counterpoise to
the pro-ISIS dataset (our known-bad) as it consists of tweets
talking about topics concerning ISIS without being radical. It
contains 122, 000 tweets from around 95, 000 users collected
on two separate days. We verify that this dataset is indeed non
4https://www.kaggle.com/fifthtribe/how-isis-uses-twitter/data
5https://www.kaggle.com/activegalaxy/isis-related-tweets/home
radical by checking the status of users in Twitter and found
that a subset (24, 000 users) was suspended. We remove those
from the dataset and only keep users that are still active on
Twitter. This dataset is labelled as counterpoise data.
We performed a series of preprocessing steps to clean the
complete dataset and prepare it for feature extraction. These
steps are: (1) We remove any duplicates and re-tweets from
the dataset in order to reduce noise. (2) We remove tweets
that have been authored by verified users accounts, as they
are typically accounts associated with known public figures.
(3) All stop words (e.g., and, or, the) and punctuation marks
are removed from the text of the tweet. (4) If the tweet text
contains a URL, we record the existence of the URL in a new
attribute, hasURL, and then remove it from the tweet text. (5)
If the tweet text contains emojis (e.g., :-), :), :P), we record
the existence of the emoji in a new attribute, hasEmj, and then
remove it from the tweet text. (6) If the tweet text contains
any words with all capital characters, we record its existence
in a new attribute, allCaps, and then normalize the text to
lower-case and filter out any non-alphabetic characters. (7) We
tokenize the cleansed tweet text into words, then we perform
lemmatization, the process of reducing inflected words to their
roots (lemma), and store the result in a vector.
B. Experimental Set-up
We conducted two experiments using the datasets described
in Section IV-A. Our hypothesis is that supporters of groups
such as ISIS may exhibit similar textual and psychological
properties when communicating in social media to the proper-
ties seen in the propaganda magazines. A tweet is considered
radical if it promotes violence, racism, or supports violent
behaviour. In Exp 1 we use the first two datasets, i.e., the
known-bad and the random-good datasets to classify tweets
to radical and normal classes. For Exp 2 we examine if
our classifier can also distinguish between tweets that are
discussing similar topics (ISIS related) by using the known-
bad and the counterpoise datasets.
The classification task is binomial (binary) classification
where the output of the model predicts whether the input
tweet
is considered radical or normal. In order to handle
the imbalanced class problem in the dataset, there are mul-
tiple techniques suggested in the literature Oversampling or
undersampling of the minority/majority classes are common
techniques. Another technique that
is more related to the
classification algorithm is cost sensitive learning, which pe-
nalizes the classification model for making a mistake on the
minority class. This is achieved by applying a weighted cost
on misclassifying of the minority class [25]. We will use the
last approach to avoid downsampling of our dataset.
Previous research investigating similar problems reported
better performances for Random Forest (RF) classifiers [26].
RF usually performs very well as it is scalable and is robust
to outliers. RF typically outperforms decision trees as it has
a hierarchical structure and is based on multiple trees. This
allows RF to be able to model non-linear decision boundaries.
Moreover, Neural Networks (NN) also produced good results
TABLE I: Exp 1: Evaluation metrics across all feature groups
Features
FT (tf − idf )
FT (w2v)
FT
FB
FP
FALL
AC
0.52
0.81
0.84
0.94
1.0
1.0
Precision
0.76
0.82
0.84
0.95
1.0
1.0
Recall
0.52
0.81
0.84
0.94
1.0
1.0
F-measure
0.37
0.81
0.84
0.94
1.0
1.0
TABLE II: Exp 2: Evaluation metrics across all feature groups
Features
FT (tf − idf )
FT (w2v)
FT
FB
FP
FALL
AC
0.56
0.73
0.80
0.91
1.0
1.0
Precision
0.69
0.73
0.80
0.92
1.0
1.0
Recall
0.56
0.73
0.80
0.91
1.0
1.0
F-measure
0.48
0.73
0.80
0.91
1.0
1.0
when applied to problems related to image recognition, text
and natural language processing [27]. However, they usually
tend to require very large amounts of data to train. For
the purpose of this study, we experimented with multiple
classification algorithms, including RF, NN, SVM, and KNN
and found that RF and NN produced the best performance.
Due to space limitation, we only report results obtained using
RF model. We configured the model to use 100 estimators trees
with a maximum depth of 50, and we selected gini impurity
for the split criteria. We used the out-of-bag samples (oob)
score to estimate the generalization accuracy of the model.
Additionally, since RF tends to be biased towards the majority
class, we apply the cost sensitive learning method described
earlier to make RF more suitable for imbalanced data [25].
We divided the dataset to training set (80%) and testing set
(20%), where the testing set is held out for validation. We
reported validation results using different combinations of the
features categories (i.e., FT , FB, FP ) and different evaluation
metrics: accuracy, recall, precision, f-measure, and area under
the ROC curve. Recall measures how many radical tweets we
are able to detect, while precision measures how many radical
tweets we can detect without falsely accusing anyone. For
instance, if we identify every single tweet as radical, we will
expose all radical tweets and thus obtain high recall, but at the
same time, we will call everyone in the population a radical
and thus obtain low precision. F-measure is the average of
both precision and recall.
Fig. 2: ROC curve for Exp1 (top), Exp2 (bottom).
Exp2: In this experiment, we tested the performance of
our classifier in distinguishing between radical and normal
tweets that discusses ISIS-related topics. Although this task
is more challenging given the similarity of the topic discussed
in the two classes, we find that the model still achieves high
performance. Table II shows the different metrics obtained
from each feature category. The FT feature group obtains
80% accuracy, and 91%, 100% for FB and FP feature groups,
respectively. The results are consistent with the ones obtained
from the first experiment with the features from FP group
contributing to the high accuracy of the model. The area under
the Receiver Operator Characteristic (ROC) curve, which
measures accuracy based on TP, and FP rates, is shown in
Fig. 2 for each classification model.
C. Results
D. Features Significance
Exp 1: The classification results using the known-bad and
random-good datasets are reported in Table I. The table shows
the average accuracy, precision, recall and f-measure scores
obtained from each feature category (FT , FP , FB) and their
combination (FAll). We also compared the two textual models,
and find that results obtained from using word embedding out-
performs the use of n-grams tf-idf scores. This confirms that
contextual information is important in detecting radicalization
activities. Furthermore, our model performed best using the
FP features across all metrics. This means that the model is
able to distinguish between both radical and non-radical with
high confidence using only FP .
We investigated which features contribute most to the clas-
sification task to distinguish between radical and non-radical
tweets. We used the mean decrease impurity method of random
forests [28] to identify the most important features in each
feature category. The ten most important features are shown
in Table III. We found that the most important feature for dis-
tinguishing radical tweets is the psychological feature distance
measure. This measures how similar the Twitter user is to the
average psychological profile calculated from the propaganda
magazine articles. Following this is the Us-them dichotomy
which looks at the total number of pronouns used (I,they,
we, you). This finding is in line with the tactics reported in
TABLE III: Features Importance
Top 10
1
2
3
4
5
6
7
8
9
10
Features
Radical psych-profile distance
Us-Them dichotomy
# of mentions a user make
User rank (hub and authority)
Sad emotion
Risk driver
All-caps count
URL count
Violent-word ratio
Hash count
Category
FP
FP
FB
FB
FP
FP
FT
FT
FT
FT
the radicalization literature with regards to emphasizing the
separation between the radical group and the world.
Moreover, among the top contributing features are be-
havioural features related to the number of mentions a single
user makes, and their HITS hub and authority rank among
their interaction network. This relates to how active the user
is in interacting with other users and how much attention
they receive from their community. This links to the ob-
jectives of those radical users in spreading their ideologies
and reaching out to potential like-minded people. As for the
FT category, we find that the use of word2vec embedding
improves the performance in comparison with using the tf-idf
features. Additionally, all bi-grams and tri-grams features did
not contribute much to the classification; only uni-grams did.
This can be related to the differences in the writing styles when
constructing sentences and phrases in articles and in the social
media context (especially given the limitation of the number
of words allowed by the Twitter platform). Additionally, the
violent word ratio, longWords, and allCaps features are among
the top contributing features from this category. This finding
agrees to a large extent with observations from the literature
regarding dealing with similar problems, where the use of
dictionaries of violent words aids with the prediction of violent
extremist narrative.
V. CONCLUSION AND FUTURE WORK
In this paper, we identified different signals that can be
utilized to detect evidence of online radicalization. We de-
rived linguistic and psychological properties from propaganda
published by ISIS for recruitment purposes. We utilize these
properties to detect pro-ISIS tweets that are influenced by their
ideology. Unlike previous efforts, these properties do not only
focus on lexical keyword analysis of the messages, but also
add a contextual and psychological dimension. We validated
our approach in different experiments and the results show
that this method is robust across multiple datasets. This system
can aid law enforcement and OSN companies to better address
such threats and help solve a challenging real-world problem.
In future work, we aim to investigate if the model is resilient
to different evasion techniques that users may adopt. We will
also expand the analysis to other languages.
REFERENCES
[1] F. Morstatter, N. Lubold, H. Pon-Barry, J. Pfeffer, and H. Liu, "Finding
eyewitness tweets during crises," arXiv preprint arXiv:1403.1773, 2014.
[2] A. Tumasjan, T. Sprenger, P. Sandner, and I. Welpe, "Predicting elections
with twitter: What 140 characters reveal about political sentiment," in
Int. Conference on Web and Social Media, 2010.
[3] C. Edwards and L. Gribbon, "Pathways to violent extremism in the
digital era," The RUSI Journal, vol. 158, no. 5, pp. 40 -- 47, 2013.
[4] The Editorial Board. The New York Times, "The New Radicalization of
the Internet," www.nytimes.com/2018/11/24/opinion/sunday/facebook-
twitter-terrorism-extremism.html, 2018, [Online; accessed 09-04-2019].
[5] A. Ward, "ISIS's Use of Social Media Still Poses a Threat to Stability
in the Middle East and Africa," Georgetown Security Studies Review,
Tech. Rep., 2018.
[6] Twitter Public Policy, "Expanding and building #TwitterTransparency,"
https://blog.twitter.com/en us/topics/company/2018/twitter-
transparency-report-12.html, 2018, [Online; accessed 10-April-2019].
[7] M. Ashcroft, A. Fisher, L. Kaati, E. Omer, and N. Prucha, "Detecting
Jihadist Messages on Twitter," in Proceedings of the Intelligence and
Security Informatics Conference, Sept 2015, pp. 161 -- 164.
[8] M. Rowe and H. Saif, "Mining pro-isis radicalisation signals from social
media users." in ICWSM, 2016, pp. 329 -- 338.
[9] J. Pennebaker, R. Boyd, K. Jordan, and K. Blackburn, "The development
and psychometric properties of LIWC2015," University of Texas at
Austin, Tech. Rep., 2015.
[10] M. De Choudhury, M. Gamon, S. Counts, and E. Horvitz, "Predicting
depression via social media." ICWSM, vol. 13, pp. 1 -- 10, 2013.
[11] M. Vergani and A.-M. Bliuc, "The language of new terrorism: dif-
ferences in psychological dimensions of communication in Dabiq and
inspire," Journal of Language and Social Psychology, vol. 37, no. 5, pp.
523 -- 540, 2018.
[12] L. Kaati, E. Omer, N. Prucha, and A. Shrestha, "Detecting Multipliers
of Jihadism on Twitter," in IEEE ICDMW, 2015, pp. 954 -- 960.
[13] R. Torok, "Developing an explanatory model for the process of online
radicalisation and terrorism," Sec. Informatics, vol. 2, no. 1, p. 6, 2013.
[14] D. G. Myers and H. Lamm, "The group polarization phenomenon."
Psychological Bulletin, vol. 83, no. 4, p. 602, 1976.
[15] P. Elzinga, J. Poelmans, S. Viaene, G. Dedene, and S. Morsing, "Terrorist
threat assessment with formal concept analysis," in IEEE ISI, 2010, pp.
77 -- 82.
[16] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean,
"Distributed representations of words and phrases and their composi-
tionality," in Advances in neural information processing systems, 2013,
pp. 3111 -- 3119.
[17] D. Devyatkin, I. Smirnov, M. Ananyeva, M. Kobozeva, A. Chepovskiy,
and F. Solovyev, "Exploring linguistic features for extremist
texts
detection (on the material of russian-speaking illegal texts)," in IEEE
ISI, 2017, pp. 188 -- 190.
[18] W. L. Hamilton, J. Leskovec, and D. Jurafsky, "Diachronic word embed-
dings reveal statistical laws of semantic change," in Proceedings of the
54th Annual Meeting of the Association for Computational Linguistics
(Volume 1: Long Papers). Association for Computational Linguistics,
2016, pp. 1489 -- 1501.
[19] P. Liu, J. Guberman, L. Hemphill, and A. Culotta, "Forecasting the
presence and intensity of hostility on Instagram using linguistic and
social features," in ICWSM, 2018.
[20] A. W. Kruglanski and S. Fishman, "The psychology of terrorism: "Syn-
drome" versus "Tool" perspectives," Terrorism and Political Violence,
vol. 18, no. 2, pp. 193 -- 215, 2006.
[21] V. Pierson, "Western radicalization: rethinking the psychology of terror-
ism," Naval Postgraduate School Monterey, US, Tech. Rep., 2017.
[22] M. Lopez, E. Grace, R. Matteson, S. Henry, M. Link, and D. Axler,
"A Forensic Psychological Assessment of Terrorists: An Anti-Terrorism
Approach for Radicalized Westerners," Journal of Aggression, Maltreat-
ment & Trauma, vol. 9, no. 1-2, pp. 33 -- 43, 2015.
[23] M. Nouh and J. R. C. Nurse, "Identifying key-players in online activist
groups on the Facebook social network," in IEEE International Confer-
ence on Data Mining Workshop (ICDMW), 2015, pp. 969 -- 978.
[24] P. J. Carrington, "Crime and social network analysis," The SAGE
handbook of social network analysis, pp. 236 -- 255, 2011.
[25] C. Chen, A. Liaw, and L. Breiman, "Using random forest to learn
imbalanced data," Dept. Statistics, University of California, Berkeley,
Tech. Rep., 2004.
[26] M. Alfifi and J. Caverlee, Badly Evolved? Exploring Long-Surviving
Suspicious Users on Twitter. Cham: Springer International Publishing,
2017, pp. 218 -- 233.
[27] R. Collobert and J. Weston, "A unified architecture for natural language
processing: Deep neural networks with multitask learning," in Proceed-
ings of ICML. ACM, 2008, pp. 160 -- 167.
[28] G. Louppe, L. Wehenkel, A. Sutera, and P. Geurts, "Understanding
variable importances in forests of randomized trees," in Advances in
neural information processing systems, 2013, pp. 431 -- 439.
|
1804.05705 | 2 | 1804 | 2018-04-23T09:07:36 | And Now for Something Completely Different: Visual Novelty in an Online Network of Designers | [
"cs.SI"
] | Novelty is a key ingredient of innovation but quantifying it is difficult. This is especially true for visual work like graphic design. Using designs shared on an online social network of professional digital designers, we measure visual novelty using statistical learning methods to compare an images features with those of images that have been created before. We then relate social network position to the novelty of the designers images. We find that on this professional platform, users with dense local networks tend to produce more novel but generally less successful images, with important exceptions. Namely, users making novel images while embedded in cohesive local networks are more successful. | cs.SI | cs | And Now for Something Completely Different:
Visual Novelty in an Online Network of Designers
Johannes Wachs
Anikó Hannák
Bálint Daróczy
Institute for Computer Science and
Control, Hungarian Academy of
Sciences (MTA SZTAKI)
Budapest, Hungary
[email protected]
Central European University
Budapest, Hungary
[email protected]
Central European University
Budapest, Hungary
[email protected]
8
1
0
2
r
p
A
3
2
]
I
S
.
s
c
[
2
v
5
0
7
5
0
.
4
0
8
1
:
v
i
X
r
a
Katinka Páll
Institute for Computer Science and
Control, Hungarian Academy of
Sciences (MTA SZTAKI)
Budapest, Hungary
[email protected]
Christoph Riedl
Northeastern University
Boston, MA
Harvard University
Cambridge, MA
[email protected]
ABSTRACT
Novelty is a key ingredient of innovation but quantifying it is dif-
ficult. This is especially true for visual work like graphic design.
Using designs shared on an online social network of professional
digital designers, we measure visual novelty using statistical learn-
ing methods to compare an image's features with those of images
that have been created before. We then relate social network po-
sition to the novelty of the designer's images. We find that on
this professional platform, users with dense local networks tend
to produce more novel but generally less successful images, with
important exceptions. Namely, users making novel images while
embedded in cohesive local networks are more successful.
KEYWORDS
Novelty; image analysis; neural networks; Fisher information; social
networks
ACM Reference Format:
Johannes Wachs, Bálint Daróczy, Anikó Hannák, Katinka Páll, and Christoph
Riedl. 2018. And Now for Something Completely Different: Visual Novelty
in an Online Network of Designers. In WebSci '18: 10th ACM Conference on
Web Science, May 27–30, 2018, Amsterdam, Netherlands. ACM, New York,
NY, USA, 11 pages. https://doi.org/10.1145/3201064.3201088
1 INTRODUCTION
High-quality creative design work can create tremendous value for
organizations. It helps technical products gain acceptance [26] and
it often serves as the basis for competition in cultural markets [59].
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
WebSci '18, May 27–30, 2018, Amsterdam, Netherlands
© 2018 Association for Computing Machinery.
ACM ISBN 978-1-4503-5563-6/18/05...$15.00
https://doi.org/10.1145/3201064.3201088
Consequently, there has been mounting interest in the use of design-
ers by organizations as a source of value creation [43, 46, 47]. One
important ingredient to successful designs is novelty: the degree
to which a design is new, original, or unusual relative to what has
come before. One reason for this is that derivative work is frowned
up in creative fields [6]. Indeed novelty is the prime ingredient
of innovation and the production of new things [19]. Economists
have long known that innovation is the driving influence behind
economic growth and development [50], and recent studies suggest
that successful companies make 80% of their revenue with products
younger than five years [34].
Despite its importance novelty is difficult to measure, especially
in the context of creative design. In this paper we investigate three
research questions related to novelty in design: (1) how can we
measure novelty in digital design? (2) who produces novel work?
and (3) what is the relationship between novelty and success? We
develop and compare different mathematically-grounded measures
of novelty or distinctiveness of digital images to better understand
its antecedents and subsequent effect on success in a community
of professional designers.
To investigate these questions we collect roughly 40,000 images
posted by over four thousand professional designers on an online
community over a period of about four years. We propose and eval-
uate a measure of novelty for digital design at the image level using
two feature sets: one capturing content and structure defined using
an Inception neural network, the other capturing visual aesthetics
using classical compositional features. We visualize the distribu-
tions of images in low dimensional projections of these feature
spaces to better understand what these features capture and how
they may capture novelty of an image.
We calculate novelty by comparing an image with prior images
in terms of these derived features using information theoretic meth-
ods. This focus on temporal order distinguishes novelty from more
"timeless" notions like beauty or appeal [18]. Calculating novelty
using the compositional features yields a measure of aesthetic or
style novelty based on colors, spatial arrangement, and symmetry,
while using Inception features results in a measure of content nov-
elty. We validate our measures by showing that the earliest images
annotated with emerging labels or "tags" for new kinds of designs
are indeed more content-novel.
With these measures of novelty for digital design in hand, we
ask two questions: who produces novel images? How does novelty
relate to success? The social networks literature makes two sugges-
tions. Individuals with open, diverse social networks have access to
diverse sources of information, which they may synthesize in novel
ways [10, 24]. But individuals in cohesive, closed networks have
greater access to trust and social support, allowing them to more
easily take the risk inherent in the creation of novelties [12, 35].
The literature suggests that when the domain is quickly changing
and when the space of possible novelties is large, it is rather cohe-
sive networks that facilitate novelty [3]. We argue that our topic of
study is such a domain: design evolves quickly and new trends can
be drastically different, and so we hypothesize that cohesive local
networks do more to facilitate novelty in this domain than diverse
ones.
Using a regression framework to analyze our panel data, we find
a positive relationship between the local cohesion of a user's net-
work on the site and the novelty of her images. Users in the global
center of the network make less novel images. We suggest one
possible explanation: that standing out is a form of risk-taking and
that local network density facilitates this behavior. Furthermore,
we find that novel images are on average less successful, but can
be successful when originating from the right network position.
Finally, we demonstrate that our novelty measures add explanatory
power to a machine learning model predicting success, above and
beyond a user's network position. This suggests that network po-
sition does not entirely mediate the relationship between novelty
and success.
Our paper makes three contributions to the literature. First, we
qualitatively compare the data encoded in different feature sets that
can be derived from images. Second, we define a statistically-sound
measure of the novelty of images, applicable to either set of features.
Third, we provide empirical evidence for relationships between
novelty, network position, and success, showing that novelty and
network position together can predict success.
2 RELATED WORK
In this section we first survey research on the quantification of
novelty. Next, we overview literature on the relationship between
novelty, social network position, and success, and finally, introduce
studies that have looked at design in an online setting.
2.1 Quantifying Novelty
As novelty is a complex construct with various dimensions, many
different measures of it have been proposed [9, 21, 44]. One key
notion underlying the measurement of novelty is the concept of
recombination: that novelty is the result of reconfiguration of old
ideas [58]. Novelty is distinguished from aesthetic quality or beauty
because it carries an intrinsic temporal property. For example, it is
difficult to judge in retrospect how novel a product was at the time
of its release. Previous studies on the beauty of images utilize the
fact that crowdsourced judgments of beauty are relatively stable
over time [49].
Recent models of novelty frame it in terms of the "actual" and
the "possible". Models consider what it means for something to
be new in terms of a path of discovery in an evolving complex
space [37]. When something new is done for the first time, the
space of the "adjacent possible" grows, making new things possible.
In this framework, novelties are discrete, binary events.
Previous work from the data mining community on novelty of
images has mostly been concerned with the detection of outliers or
anomalies within images, rather than across images [8, 52]. Most ap-
plications concern the detection of verifiable facts about an image:
the presence of specific objects in satellite images, detecting biolog-
ical abnormalities like cancer, etc. One commonality across these
efforts, and indeed our own, is that features need to be extracted
from an image to make computational analysis tractable.
Several recent data-driven studies quantify novelty in creative
fields. In a study of popular music, Askin and Mauskapf compare
songs with their predecessors using cosine similarity of a set of
derived features like danceability and tempo [4]. Past work has
quantified the creativity of visual art as a combination of both nov-
elty and influence using visual features [18]. Redi et al. quantify the
novelty of short video clips using a similar approach to ours [44],
while Khosla et al. use image features to predict engagement on so-
cial media [32]. Natural language processing has also been applied
to measure the novelty of textual content including scientific article
abstracts [9, 20] and equity crowdfunding campaigns [29]. We do
not define novelty of a thing in terms of success [51] or surprise [5].
Novelty of a thing as we consider it says nothing intrinsically about
its impact, influence, or outcomes. At the same time, we acknowl-
edge that any attempt to measure novelty or distinctiveness can
only capture a small facet of the phenomenon.
2.2 Network Position, Novelty, Success
Psychological research emphasizes that creativity is a demanding
enterprise, requiring focus and concentration [13]. Given the appar-
ent difficulty of creative endeavors, it is perhaps no surprise that
social network structure plays a significant role in both facilitating
novelty and shaping its reception. In fact, recent studies of creativity
emphasize that novel products, even nominally created by a single
author, can sometimes be understood as "products of a momentary
collective process" [27]. How the networks that synthesize creative
products fit together have strong predictive power of their eventual
success [16].
So what kind of network position facilitates novelty? Creators
embedded in a cohesive social network can hope to benefit from
high amounts of social capital and support [12]. Strong ties rep-
resent avenues of trust, which greatly facilitates the kind of risk-
taking inherent in making a novel product in a professional, cre-
ative environment [35]. One study indicates that central actors in a
network of research scientists produce more creative outputs, indi-
cating that established actors can feel the freedom to experiment
more broadly [42].
It is also true that diversity of social connections has been shown
to foster creativity. Weak ties in social networks tend to bridge
groups and provide an actor with access to novel information [24].
Indeed the same study of research scientists cited above shows
that creativity increases with the number of weak ties [42]. This
line of thought is built on the idea that bridging actors occupying
"structural holes" can create their own social capital by leveraging
their unique access to diverse information [10]. Whether open or
closed networks better support novelty creation in our context is
therefore an empirical question.
Besides the relationship of network position and novelty, the
perception of novelty is also of interest to the research community.
What ratio of traditional and novel maximizes success? Work across
many disciplines find an inverse-U shaped relationship between
novelty and success [4, 9]. One prolific strand of the literature
models novelty as the recombination of known ideas in new ways,
and that the key to successful novelty is the combination of many
conventional ingredients with relatively few new ones [56].
2.3 Online Design Communities
Closest to our work empirically are studies on online design commu-
nities, like Dribbble, Behance, or Threadless. These studies generally
focus on the question of how users or products become successful,
and how different groups of users fare [17, 45]. For instance several
studies find significant differences in the behavior and success of
men and women on these sites [33, 57].
Dribbble has received attention from researchers because of its
importance to the professional design community and its exclusive,
invitation-only nature. In an interview-based study researchers
found that users leverage the site and its social network to gather
inspiration, learn skills by reverse engineering examples, anticipate
trends in the marketplace, and to gather feedback [40]. The study
also found that users invested significant effort in developing a
professional identity through the site. As in many other online
communities, users reported the status importance of having many
followers and collecting likes.
More recently, machine vision researchers have taken an interest
in learning from image data taken from online design communi-
ties, as they offer substantively different opportunities to develop
machine vision than, say, photographs [60]. Similarly, the dual func-
tions of online digital communities as places to post and places to
be inspired offer interesting opportunities for bespoke recommen-
dation systems [48].
3 DATA
In this section we describe the Dribbble platform, our data collection
method, and outline the extracted features at the image, user, and
network levels.
3.1 Dribbble
Dribbble, founded in 2009, is an online community where designers
share their work by posting images. It is a highly-visited site, with
an Alexa rank of 1104, the second most popular website for design
sharing after Behance. Unlike most content-sharing platforms, the
site operates on an invitation-only basis: though the site can be
viewed by anyone, only invited users can post images. Active users
are occasionally given invitations which they can use to invite other
designers. Moreover, the number of images a user can post in a
given time frame is capped. All together, this leads to high-quality
Figure 1: Shot (Image) and User Pages on Dribbble.
content and the feeling of belonging to an "elite" community among
users.
The stakes on Dribbble are high. Interviews with users on the
site reveal that individuals use the site to develop their professional
identities [40]. Indeed most users use their real names, post pho-
tographs of themselves for their account image, and link to their
accounts on other online platforms including Linkedin and Twit-
ter. Users build their portfolio of designs over many years. They
accumulate reputation by gathering views and likes (engagement)
on their images, called shots on the site, and followers on their
account. The social network aspect of the site facilitates continued
interactions as users see more and more of each others' work. Suc-
cess on Dribbble has impact outside the site itself, as it can bring
significant employment opportunities and influence. The platform
has recently added a job board and special recruiter accounts.
3.2 Data Collection
Our data sample consists of all Dribbble users who were members of
a team at the time of the data collection. Typically companies form
teams on Dribbble as paid umbrella accounts that users can join.
We select this sample in order to gather a comparable set of users
who are both active and committed members of the site. We then
crawled the profiles of 6,215 users identified as team members. Next,
we crawled all 60,406 images made by these users. In subsequent
analysis, we discard users making fewer than five images1. We
also discard images posted by the team account with identifiable
individual author. We share examples of an image and a user page
in Figure 1. Data collection took place between September and
November 2016 and observed listed rate-limits on the Dribbble API.
3.3 Extracted User features
At the shot level we first record the image itself, the date it was
made, and the identity of the author. We also note the tags the
author annotated the shot with. Tags are free-form key words that
say something about the image. Others can search for images listing
specific tags. Tags therefore serve a dual purpose: to describe what
the author is doing, and to help others find the image. Each shot
has a count of the likes that it received, which can be thought of as
the main success measure in the community.
At the user level we collect the name of the author, whether the
author has a "pro-badge", and the author's tenure on the platform
1Our results are robust to including these users.
(in days). A pro-badge is a sign that the user has paid for a premium
account, which facilitates job search features on the site and lifts the
cap on the number of shots a user can make in a given amount of
time. We consider pro-badges as a proxy for buy-in on the platform.
At the shot level we calculate how many shots a user has made
before to quantify their experience. Finally, we also estimate the
gender of each user. Since the profiles do not directly list gender,
we infer them from the users' first names using the US baby name
data set [1]. For any user with a name not in the database or an
ambiguous gender score (i.e. greater than 10% and less than 90%)
we manually check their self-portrait on Dribbble and on linked
social media accounts.
3.4 Network Features
Like many other online communities, Dribbble is built on top of a
social network. When a user follows another user, the second user's
future shots are included in the default newsfeed of the first user
and so following a user has bandwidth costs. We collect a list of
all following relationships amongst our users and when they were
created. These timestamped edges allow us to recreate the social
network of our users at the time when an image was submitted .
For each image we calculate several network measures quantifying
the position of the user at the time of creation.
• In-degree: How many followers the user has.
• Out-degree: How many other users the user follows.
• Closeness centrality: One over the average distance of the
user from all other nodes [7]. This measures how close the
user is to the center of network.
• Constraint: Burt's measure of the extent to which a user's
• Density: The ratio of observed ties to possible ties among the
outgoing connections are redundant [10].
users the user follows.
In- and out-degree quantify the simple connectivity of a user.
Closeness centrality is a global network measure which increases
as the user is closer to the center of the network. Constraint and
density of the user measure the cohesiveness of his local social
network.
4 EXTRACTING IMAGE FEATURES
In this section we describe two sets of images features upon which
we calculate an image's novelty. First we calculate compositional
features. Then we use a neural network framework to extract a
set of unsupervised features. We compare the two feature spaces
by projecting them to a low-dimensional space in which similar
images are placed closer to one another. We examine what kind of
images are similar according to the two feature sets, finding that
the compositional features capture color and style while the neural
network features capture content.
4.1 Compositional Features
Imitating precisely previous work on the qualitative features of
images [49], we define 47 compositional features for each image.
These features are derived from aesthetic considerations and have
proven to have significant predictive power of the beauty or at-
tractiveness of images. Previous work groups the features into the
following categories: colors, spatial arrangements, and texture.
Color features include contrast (defined in terms of luminance)
and the averages of hue, saturation, and brightness across both the
whole image and a subset in its center [15]. We also include three
"emotional" features which are linear combinations of saturation
and brightness: pleasure, arousal, and dominance [39]. Binning hue,
saturation, and brightness yield Itten Color Histograms and taking
their standard deviations yields Itten Color Contrasts after a careful
segmentation. Spatial features include symmetry and salience [30],
the distribution of which describes how attention-grabbing different
regions of the image are. Finally, Haralick's texture features quantify
image complexity: entropy, energy, homogeneity, and contrast [25].
4.2 Neural Network Features
Feedforward-based neural networks have made tremendous strides
in object-in-image classification tasks in recent years. Many such
networks have penultimate layers which reduce images input for
classification into a feature space for the classification layer. It is
possible to extract these features from pre-trained neural networks.
We harness one such network: the Inception v3 [54], originally
constructed to optimally classify a large dataset of images into 1000
categories. We acknowledge here that there are many alternative
specifications to generate similar sets of features. Passing our im-
ages through the network we generate 2048 features that encode
highly discriminating facets of the data.
4.3 Visualizing Image Features
Before proceeding, we pause to visualize and inspect our data in the
two visual feature spaces. We reduce the 47 and 2048 dimensional
spaces to two-dimensions using t-SNE, a popular dimensionality
reduction method that uses information theoretic methods to mini-
mize distances between data points in the projection as a function
of their similarity [38]. In Figure 2, we visualize the 2-D t-SNE
projections of a random sample of 200 images a year from 2012 to
2016 using the Inception and compositional features, respectively.
In both projections we observe the clustering of images into
groups. The qualitative attributes that define the clustering, how-
ever, are quite different. As highlighted in Figure 2, clustering on
compositional features is based on color and aesthetic style, as ex-
pected. In the projection based on Inception features, however, we
observe that images cluster based on their content. In other words,
images with highly similar Inception features are likely to represent
similar concepts, be they logos, mobile phone interfaces, icons, wire-
frames, etc. This is perhaps not surprising given Inception's origin
as an object-in-image classification tool. This characterization of
the two features sets as describing style and content is important
for understanding their novelty.
5 NOVELTY MEASURES
In this section we define a reference novelty based on user annota-
tions or tags of an image by defining the relative surprise of seeing
a set of tags on image, compared with the tags that came before.
We then define a measure of novelty for our visual feature spaces
using Gaussian mixtures and Fisher information.
Figure 2: Visualizing sample images using t-SNE dimensionality reduction of Inception and compositional features. We high-
light three example groups of images. Images from the gold group are close together in the compositional feature space but
spread out in the Inception feature space. The teal group is close in both feature spaces, with one exception in the composi-
tional space. Images from the purple group are close in Inception space but scattered in compositional space. The gold group
consists of a logo, a collection of icons, a web page design, and an email flier: they are likely clustered in compositional space
because of their color. The members of the purple group are all mobile phone screens. Members of the teal group are likely
clustered in both spaces because they share both structural and compositional qualities.
5.1 Tag Novelty
Before calculating novelty using visual features, we create a novelty
measure using the tags an author gives an image. Following [53],
we calculate the "surprise" of each tag of an image. That is, given
all the images and their tags posted before the image, we define the
probability of observing a tag t as P(t), the proportion of previous
images listing that tag. The log of P(t) is our measure of the surprise
of a tag. As we are especially interested in completely new tags,
we also include the focal image and its tag when we calculate P(t),
to avoid taking the log of 0. We then define tag novelty Ni of an
image i with tags t1, t2, . . . tn ∈ Ti as the aggregate the surprise of
an image's tags:
t ∈Ti
Ni = − 1
Ti
log P(t)
In order to make our measure robust to the order of the images,
we scale each image's tag novelty by the maximum possible novelty.
Namely, if I is the number of images made before image i, we
normalize the equation above by − log(I).
5.2 Visual Novelty via Fisher Information
To study the visual novelty of images, we define a parametric model
for images in terms of their position in a given feature space. Given
a new image, we consider the distribution of previous images in a
feature space and approximate them using Gaussian mixture mod-
els. We calculate the likelihood of the focal image relative to these
(GMM) with N Gaussians, the pdf is p(xθ) =N
distributions using its Fisher information, an information theoretic
measure which we prefer to alternatives such as the Akaike in-
formation criterion because of its reparametrization-invariance.
Specifically we define novelty as one minus the norm of the Fisher
vector of an image over the Gaussian mixture models. This approach
is similar in style to a recent method to calculate novelty using a
data point's distance to the centroids of a k-means clustering [44].
Formally, let be x ∈ Rd a finite d-dimensional real representation
of an image and a parametric model p(xθ) where θ is the parameter
of the density function. If the model is a Gaussian mixture model
i ωiдi(x) where
the дi(x) is the density function of the i-th Gaussian. The continu-
ously evolving model changes the parameters of the probabilistic
model with the emergence of new images in time. We consider two
different likelihood measures to apply to the probabilistic model:
• Akaike's information criterion (AIC) [2]: we measure the
AIC per image according the actual state of our generative
model.
• Fisher information: after calculating the Fisher score [31]
of for each image according to the shape of the model we
can measure the similarity of images x and y with the Fisher
kernel, as
Kθ(x, y) = ∇θ log p(xθ)T F
(1)
where Fθ is the Fisher information matrix. The gradient of
the likelihood indicates how the model may change to fit the
actual point, in our case an image. Our choice was driven by
−1
θ ∇θ log p(yθ)
the unique invariance properties (e.g. reparametrization in-
variance) of the Fisher information matrix and the Fisher ker-
nel [11, 36, 55]. Applying Cholesky decomposition, the ker-
nel can be defined as a simple scalar product, as Kθ(x, y) =
−1/2
Gθ(x)T Gθ(y) where Gθ(x) = ∇θ log p(xθ)F
is the nor-
θ
malized Fisher score or the Fisher vector of image x. We note
that the Fisher vector has dimension O(dθ).
On account of its reparametrization invariance we choose to
continue with the Fisher information as our measure of likelihood.
Although estimation of the Fisher information matrix is difficult,
there are known closed form approximations for both Gaussian mix-
ture models [41] and special classes of Markov random fields [14].
We suggest two potential definitions of novelty measures based on
the Fisher information:
• Norm of the Fisher Vector over Gaussian Mixture (FVGMM):
as the Fisher score highlights how the model parameters
should change to best fit the focal image, our first novelty
measures the norm of the Fisher vector for each image as
−1/2
θ
.
NFV (x) = Gθ(x) = ∇θ log p(xθ)F
In case of Gaussian Mixtures the pdf is p(xθ) =N
(2)
i ωiдi(x)
where θ consists of the mixture weights, mean, and covari-
ance parameters of the Gaussian mixture. In practice we
observe that the Fisher score for both compositional and
Inception features is very sparse because of the "peakness"
property of the membership probability, defined as the prob-
ability that a point is generated from one of the Gaussians.
In comparison with [4] this method puts the most weight on
the most similar images that came before the focal image.
• Similarity graph over the Gaussian Mixture (FVMRF): one
approach to overcoming the "peakness" property while still
capturing the temporal distribution is to define a Markov
random field following [14] with the mean of the Gaussian
mixture as the sample set. The main idea is to define an
undirected random field, which is a graph with N nodes
consisting of random variables and sample points, connected
to our image as a separate random variable in a star. The
probability density function of the new distribution can be
factorized over the maximal cliques in the resulting graph.
In our case the edges and therefore the pdf are:
e−
∫
x ∈X e−
i αi x−µi
i αi x−µi dx
p(xα, θ) =
(3)
where µi is the mean vector of the i-th Gaussian, α is the
relative importance of the cliques. The Fisher vector can be
approximated in this context with a simple formula [14]:
NFV MRF(x) = { di(x) − E[di(x)]
− 1
2 (di(x))
where di(x) = x − µi and i ∈ 1, ..., N .
V ar
}
Given the relatively high complexity of the random field ap-
proach, we define novelty using the norm of the Fisher vector2. As
2In applications where the aforementioned peakness issue is more pronounced, we
recommend using the random field approach
Figure 3: Kernel density estimated distributions of tag, com-
positional, and Inception novelty.
the method returns a similarity score, we subtract one to define vi-
sual novelty. For the rest of the paper we refer to this novelty score
as Inception novelty when it is calculated using Inception features,
and compositional novelty when it is calculated using compositional
features.
5.3 Comparison of Novelty Scores and
Validation
We visualize the distribution of tag, Inception, and compositional
novelty scores in Figure 3. We correlate the two novelties with
tag novelty and several user-level features in Table 1. We find that
both visual novelties are weakly correlated with tag novelty. The
correlation is roughly twice as strong for Inception novelty than
compositional novelty. This suggests that tags are used to describe
images in a conceptional rather than stylistic manner. The two
visual novelties are significantly correlated, and, together with tag
novelty, are negatively correlated with engagement. We note that
the platform's design may explain the trade-off between engage-
ment and tag novelty: users can search for images by tags.
5.3.1 Validation of Visual Novelty. As discussed, novelty is an
ephemeral quality of a cultural product and its measurement im-
plicitly requires comparison, more so than, for example, its beauty.
We cannot, for instance, ask someone to evaluate the novelty of a
four-year-old mobile phone application layout. In this case success
and perceptions of novelty are likely anti-correlated: success breeds
familiarity.
One approach to validate our measures of visual novelty, be-
sides the correlations with tag novelty noted above, is to identify a
population of images which are likely to be covering a new kind
of product that emerges in the middle of our dataset. We identify
emerging product types by finding tags which are used only after
2013, yet still are among the 200 most used tags. We find two such
(1)
(2)
(3)
(4)
Tag Novelty (1)
Inception Novelty (2) 0.123
Compositional Novelty (3) 0.067
0.274
Likes (Log) (4) -0.138 -0.082 -0.014
Views (Log) (5) -0.138 -0.114 -0.058 0.927
Table 1: Correlation matrix of novelty and success features.
6 NOVELTY, NETWORKS, AND SUCCESS
In this section we investigate which users are more likely to create
novel images and whether novel images are more or less likely to be
successful. We consider both Inception and compositional novelty.
First we use hierarchical linear regression [23] on data at the
image level with user random-effectsand controls to predict nov-
elty. Our aim is understand who makes novel images. Then we
predict success using novelty and network position. In both cases
we control for gender, the (log) number of shots made previously,
the (log) number of days the user has been active on the site at the
time of the shot, and whether the user has a paid account. In other
words we control for gender, productivity/experience, tenure, and
investment into the site.
6.1 Who makes novel shots?
We find several significant predictors of Inception novelty, both
among our control variables and network variables. Interestingly,
the network features we consider do not impact compositional
novelty. We summarize these findings in Table 2.
For both compositional and Inception-based measures we find
that pro-users are less likely to make novel images. One inter-
pretation is that users who take the site more seriously are more
risk-averse and less likely to experiment. Users making more shots
in the past make slightly more novel shots. There is mixed evidence
that users active for a longer period of time make less novel shots.
We detect no gender disparity.
The two novelty measures diverge when we consider the impact
of network features. The Inception-based measure of novelty is
significantly lower for users closer to the core of the network, and
higher for users with cohesive local networks defined by density
and constraint. This supports our hypothesis that cohesion facili-
tates novelty. We find no significant relationship between network
position and compositional novelty.
6.2 When are novel shots successful?
We now turn to the question of predicting engagement, measured
by likes, using novelty. We find that novel shots are generally less
successful. We summarize our findings in Table 3. Pro users are
more successful, as are those who have many followers. We find
that constrained users are less successful. Finally, novel images are
in general less successful.
We find an interesting interaction between constraint and In-
ception novelty. Namely, users embedded in highly constrained
networks making novel images do better than those in uncon-
strained networks making novel images. To better interpret this
finding we visualize this relationship in Figure 5. In other words,
the least constrained users have a penalty for novelty while the
most constrained users have a bonus for novelty. We also find a
significant interaction between inception novelty and closeness
centrality: novelty has an increasingly negative relationship with
success as a user is more central in the network, but no relationship
between local density and either novelty measure.
Finally, using a machine learning framework, we check how
well our features can predict success binned into three separate
class labels: less than ten likes, between ten and one hundred likes,
and more than one hundred likes. As an initialization we used the
Figure 4: Comparison of visual novelty scores of images with
the tags "material" and "principle". We consider those im-
ages in the first 10% and most recent 10% of all images cre-
ated using the tags. We find that Inception novelty is signif-
icantly higher for images listing these "emerging" tags.
tags3 which we can verify as representing truly emerging novelties:
"material" and "principle".
Material design4 is a design language or vocabulary created by
Google, announced to the public in June 2014. Like other design
languages, it has guidelines and principles that shape the design pro-
cess, resulting in a consistent look with certain qualities. Material
design was created especially for use in digital and technological
areas. It emphasizes the use of print design best practices together
with motion. Material or "material design" appears as a tag in 748
images in our dataset.
Principle5 is a new software design tool for creating interactive
and dynamic user interfaces. Released in August 2015, it is a popular
tool for designers to prototype UIs. 243 images in our dataset include
a "principle" tag.
For both tags we compare the distributions of novelty for the first
10% of images using the tag, with the most recent 10% of images
using the tag. In figure 4 we plot the resulting distributions. We
find that Inception novelty is significantly higher for the earliest
images tagged with "material" (Mann-Whitney U = 1897, p<.01)
and "princple" (Mann-Whitney U = 190, p<.01) compared with the
most recent ones. Though the average compositional novelty is
higher for the earliest images in both cases, the differences are not
statistically significant (resp. U = 2465, p .26; U = 288, p .32).
3Other examples of tag fitting our quantitative criteria are tags used by groups of
designers to indicate group membership. Though these tags certainly merit further
study, they do not capture the emergence of a new design approach or method
4https://material.io/
5http://principleformac.com/
Inception Novelty
Composition Novelty
Dependent variable:
(1)
−0.015∗∗∗ (0.002)
0.020∗∗∗ (0.007)
−0.002
(0.013)
−0.036∗∗∗ (0.010)
0.004
(0.004)
−0.042∗∗∗ (0.008)
0.002
(0.025)
37,799
−25,740.880
51,576.620
Days Active (log)
nShots Previous
Male
Pro
In-Degree (log)
Closeness
Constraint
Density
Constant
Observations
Log Likelihood
Bayesian Inf. Crit.
User random effects
(2)
−0.016∗∗∗ (0.002)
0.022∗∗∗ (0.007)
0.001
(0.013)
−0.034∗∗∗ (0.010)
0.002
(0.004)
0.060∗∗ (0.025)
−0.009
(0.026)
37,799
−25,749.400
51,593.660
(3)
−0.017∗∗∗ (0.002)
0.022∗∗∗ (0.007)
0.001
(0.013)
−0.034∗∗∗ (0.011)
(0.004)
0.001
0.046∗∗ (0.023)
−0.002
(0.026)
37,799
−25,750.350
51,595.570
(4)
−0.000
(0.002)
0.013∗
(0.007)
−0.000
(0.013)
−0.034∗∗∗ (0.011)
(0.004)
0.004
0.001
(0.008)
−0.048∗
(0.026)
37,799
−25,731.900
51,558.660
Table 2: Predicting novelty with network position.
(5)
0.000
(0.002)
0.013∗
(0.007)
−0.000
(0.013)
−0.034∗∗∗ (0.011)
(0.004)
0.004
0.018
(0.026)
−0.053∗∗ (0.026)
37,799
−25,730.540
51,555.950
(6)
−0.000
(0.002)
0.013∗
(0.007)
−0.000
(0.013)
−0.034∗∗∗ (0.011)
(0.004)
0.004
−0.005
−0.047∗
(0.024)
(0.026)
37,799
−25,730.860
51,556.580
∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01
Dependent variable:
Log Likes
(1)
−0.006∗∗ (0.003)
0.086∗∗∗ (0.023)
−0.046
(0.044)
0.196∗∗∗ (0.037)
0.371∗∗∗ (0.009)
−0.046∗∗∗ (0.013)
−0.234∗∗∗ (0.059)
−0.108∗∗∗ (0.009)
0.084∗∗ (0.039)
2.930∗∗∗ (0.088)
37,799
−36,353.290
72,833.060
(2)
−0.004∗
(0.003)
0.090∗∗∗ (0.023)
−0.047
(0.045)
0.196∗∗∗ (0.037)
0.373∗∗∗ (0.009)
−0.046∗∗∗ (0.013)
−0.233∗∗∗ (0.059)
−0.025∗∗∗ (0.010)
0.017
(0.040)
2.908∗∗∗ (0.089)
37,799
−36,450.650
73,027.780
Days Active (log)
nShots Previous
Male
Pro
In-Degree (log)
Out-Degree (log)
Constraint
Incep. Nov.
Incep. Nov. × Constraint
Comp. Nov.
Comp. Nov. × Constraint
Constant
Observations
Log Likelihood
Bayesian Inf. Crit.
∗p<0.1; ∗∗p<0.05; ∗∗∗p<0.01
User random effects
Table 3: Predicting success with novelty and network posi-
tion.
first year as the first training period and for every consecutive
quarter thereafter we consider the previous year. We found that
the random field approach to calculating the Fisher vector (FVMRF)
was most effective in predicting engagement. Using the area under
the receiver operating characteristic curve (AUC), we find that a
gradient boosted trees model [22] on network and content features
has significant predictive power. As we can see in Figure 6, even
Figure 5: Relationship between success and novelty as con-
straint varies. Low constraint users have less success when
making novel shots. High constraint users have more suc-
cess with novel shots.
though the network features are the best indicators of success, the
content and novelty of the images, encoded using the Inception-
based Fisher vectors offer additional predictive power. This suggests
that it is possible to use image features to predict success on the
site. It is likely possible to do better if features are extracted with
the aim of predicting success.
7 CONCLUSIONS
In this paper we developed, evaluated, and compared measures of
novelty of images using data from an online community of digital
designers. We first compared different feature sets of images, noting
that compositional features like entropy, contrast, and brightness
participation, the presence of significant players and companies
in the field, and the potential for economic opportunities, it seems
reasonable that established designers may have reason to make
more conventional images. That Dribbble is an online community
only compounds the potential costs of creating unsuccessful nov-
elty: though a designer's support system and network of strong ties
cannot vastly grow, her audience can scale drastically. The underes-
timated permanence of online identities makes this asymmetry all
the more important when we consider what it means for a designer
to take a risk with a distinctive image.
Indeed professional online communities present a dilemma for
users in general. Though the feelings of anonymity and distance
may facilitate bold experimentation, members of online communi-
ties who wish to leverage their investment of time and effort into
professional advancement must credibly link their online identi-
ties to their real ones. Even users who want to stay anonymous
often have a hard time doing so [28]. Once this identification has
occurred, the individual must consider that anything they share
online is widely broadcast and more consistently recorded and pre-
served than what they may say or share offline. We claim that as the
labor market becomes increasingly digital, online social networks
merit closer study.
Turning to the relationship between novelty and success, we find
that novelty is related to worse outcomes. We also find that users in
highly constrained positions are less successful. On the other hand,
the interaction between constraint and novelty is positive: users
with cohesive local networks of strong ties making novel images
find more success. We argue that these relationships merit further
study. Are these embedded designers better positioned to take
risks? Can we interpret images with high novelty score, according
to our definition, as being risky? The negative relationship between
novelty and network centrality raises even more questions.
Our study has several limitations. Given the transient nature of
novelty, we have only limited tests of validity for our measures.
Given the ubiquity of digital technology, a highly novel digital de-
sign from five years ago likely looks highly outdated now. Moreover,
the networking behavior of designers on this platform is highly
tailored to the situation. For example, users adopting a strategy of
aggressive following anticipating reciprocity, may end up in highly
dense networks. All at once, Dribbble serves as a social network,
professional portfolio, information network, and status hierarchy
for the field. Any attempt to infer causal relations between social
network structure and the creation of new ideas on this platform
must disentangle the complicated layers driving interactions. We
also concede that novelty is multi-faceted: no single measure can
totally capture such a broad concept. In future work we aim to
better understand influence and spreading of novelty.
8 ACKNOWLEDGEMENTS
The authors wish to thank Zsófia Czémán, Anna May, and anony-
mous referees for their helpful suggestions. This research has been
funded in part by NSF grant IIS-1514283. D.B was supported by the
Momentum Grant of the Hungarian Academy of Sciences (LP2012-
19/2012).
Figure 6: Average AUC of quarter to quarter success pre-
diction. We predict success of the images using gradient
boosted trees on the visual image features, novelty scores,
and network position of the users. We find that novelty
scores extracted image features increase the predictive
power of the model including the network features, This
suggests that network position does not entirely mediate the
relationship between novelty and success.
capture qualitatively different facets of an image and features de-
rived from an Inception neural network learning framework capture
qualitatively different facets of an image. Specifically, compositional
features seem to capture stylistic aspects and while Inception fea-
tures capture content, in line with their origins.
Next, we created a mathematical framework to compare images
with all images that came before in terms of either set of image
features. To calculate the novelty of an image, we estimate the
distribution of previous shots in the given feature space using a
Gaussian mixture model. We then calculate the likelihood of the
the image - in other words we quantify how statistically similar the
image is to those that came before. We define novelty of an image
as one minus this similarity score.
We find that both novelties calculated from the Inception fea-
tures and compositional features are significantly correlated with a
measure of novelty based on author text annotations or "tags" of
their images. We also found that Inception novelty was significantly
higher for images created in the early stages of an emerging tag
compared with images using the same tag later.
Attempting to understand the profile of a user who makes more
novel shots, we turned to the site's social network. Using temporal
following data, we related social network position at the time of
the creation of an image to its novelty. We found that users with
cohesive local networks (quantified by density or Burt's constraint
measure) tend to post images with higher Inception novelty.
We also find that users close to the center of the network, in a
global sense, make less novel shots. Users with a "pro-badge" (paid
account) likewise make less novel images. Given the professional
atmosphere of the site, including for example its invitation-only
Baby Names from Social Security Card Applications-National
https://catalog.data.gov/dataset/
Level Data.
baby-names-from-social-security-card-applications-national-level-data.
data.gov.
(2016).
[2] Hirotugu Akaike. 1981. Likelihood of a model and information criteria. Journal
of econometrics 16, 1 (1981), 3–14.
[3] Sinan Aral and Marshall Van Alstyne. 2011. The diversity-bandwidth trade-off.
Amer. J. Sociology 117, 1 (2011), 90–171.
[4] Noah Askin and Michael Mauskapf. 2017. What Makes Popular Culture Popular?
Product Features and Optimal Differentiation in Music. American Sociological
Review 82, 5 (2017), 910–944.
[5] Andrew Barto, Marco Mirolli, and Gianluca Baldassarre. 2013. Novelty or sur-
prise? Frontiers in psychology 4 (2013).
[6] Julia Bauer, Nikolaus Franke, and Philipp Tuertscher. 2016. Intellectual property
norms in online communities: How user-organized intellectual property regula-
tion supports innovation. Information Systems Research 27, 4 (2016), 724–750.
[7] Alex Bavelas. 1950. Communication patterns in task-oriented groups. The Journal
of the Acoustical Society of America 22, 6 (1950), 725–730.
[8] Giacomo Boracchi, Diego Carrera, and Brendt Wohlberg. 2014. Novelty detection
in images by sparse representations. In Intelligent Embedded Systems (IES), 2014
IEEE Symposium on. IEEE, 47–54.
[9] Kevin J Boudreau, Eva C Guinan, Karim R Lakhani, and Christoph Riedl. 2016.
Looking across and looking beyond the knowledge frontier: Intellectual distance,
novelty, and resource allocation in science. Management Science 62, 10 (2016),
2765–2783.
[10] Ronald S Burt. 2004. Structural holes and good ideas. American journal of sociology
110, 2 (2004), 349–399.
[11] LL Campbell. 1986. An extended Čencov characterization of the information
metric. Proc. Amer. Math. Soc. 98, 1 (1986), 135–141.
[12] James S Coleman. 1988. Social capital in the creation of human capital. American
journal of sociology 94 (1988), S95–S120.
[13] Mihaly Csikszentmihalyi. 1996. Flow and the psychology of discovery and invention.
New York: Harper Collins.
[14] Balint Daroczy, David Siklois, Robert Palovics, and Andras A Benczur. 2015. Text
Classification Kernels for Quality Prediction over the C3 Data Set. In Proceedings
of the 24th International Conference on World Wide Web. ACM, 1441–1446.
[15] Ritendra Datta, Dhiraj Joshi, Jia Li, and James Z Wang. 2006. Studying aesthetics
in photographic images using a computational approach. In European Conference
on Computer Vision. Springer, 288–301.
[16] Mathijs De Vaan, David Stark, and Balazs Vedres. 2015. Game changer: The
topology of creativity. Amer. J. Sociology 120, 4 (2015), 1144–1194.
[17] Biplab Deka, Haizi Yu, Devin Ho, Zifeng Huang, Jerry O Talton, and Ranjitha
Kumar. 2015. Ranking designs and users in online social networks. In Proceedings
of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in
Computing Systems. ACM, 1887–1892.
[18] Ahmed Elgammal and Babak Saleh. 2015. Quantifying Creativity in Art Networks.
In Proceedings of the Sixth International Conference on Computational Creativity
June. 39.
[19] Maria-Isabel Encinar and Felix-Fernando Munoz. 2006. On novelty and economics:
Schumpeter's paradox. Journal of Evolutionary Economics 16, 3 (2006), 255–277.
[20] James A Evans and Jacob G Foster. 2011. Metaknowledge. Science 331, 6018
(2011), 721–725.
Science 47, 1 (2001), 117–132.
[21] L. Fleming. 2001. Recombinant uncertainty in technological search. Management
[22] Jerome H Friedman. 2001. Greedy function approximation: a gradient boosting
machine. Annals of statistics (2001), 1189–1232.
[23] Andrew Gelman and Jennifer Hill. 2006. Data analysis using regression and
multilevel/hierarchical models. Cambridge university press.
[24] Mark S Granovetter. 1973. The strength of weak ties. American journal of sociology
REFERENCES
[1] 2016.
78, 6 (1973), 1360–1380.
IEEE 67, 5 (1979), 786–804.
[25] Robert M Haralick. 1979. Statistical and structural approaches to texture. Proc.
[26] A. Hargadon and R.I. Sutton. 1997. Technology brokering and innovation in a
product development firm. Administration Science Quarterly 42, 4 (1997), 716–749.
[27] Andrew B Hargadon and Beth A Bechky. 2006. When collections of creatives be-
come creative collectives: A field study of problem solving at work. Organization
Science 17, 4 (2006), 484–500.
[28] Emöke-Ágnes Horvát, Michael Hanselmann, Fred A Hamprecht, and Katharina A
Zweig. 2012. One plus one makes three (for social networks). PloS one 7, 4 (2012),
e34740.
[29] Emöke-Ágnes Horvát, Johannes Wachs, Aniko Hannak, and Rong Wang. 2018.
The Role of Novelty in Securing Investors for Equity Crowdfunding Campaigns.
In The 6th AAAI Conference on Human Computation and Crowdsourcing (HCOMP).
AAAI.
[30] Xiaodi Hou and Liqing Zhang. 2007. Saliency detection: A spectral residual
approach. In Computer Vision and Pattern Recognition, 2007. CVPR'07. IEEE Con-
ference on. IEEE, 1–8.
[31] Tommi S Jaakkola, David Haussler, et al. 1999. Exploiting generative models
in discriminative classifiers. Advances in neural information processing systems
(1999), 487–493.
[32] Aditya Khosla, Atish Das Sarma, and Raffay Hamid. 2014. What makes an image
popular?. In Proceedings of the 23rd international conference on World wide web.
ACM, 867–876.
[33] Nam Wook Kim. 2017. Creative Community Demystified: A Statistical Overview
of Behance. arXiv preprint arXiv:1703.00800 (2017).
[34] W Chan Kim and Renée Mauborgne. 1997. Value innovation: The strategic logic
of high growth. Harvard Business School Pub.
[35] David Krackhardt. 2003. The strength of strong ties. Networks in the knowledge
economy (2003), 82.
[36] Guy Lebanon. 2004. An extended Čencov-Campbell characterization of condi-
tional information geometry. In Proceedings of the 20th conference on Uncertainty
in artificial intelligence. AUAI Press, 341–348.
[37] Vittorio Loreto, Vito DP Servedio, Steven H Strogatz, and Francesca Tria. 2016.
Dynamics on expanding spaces: modeling the emergence of novelties. In Cre-
ativity and Universality in Language. Springer, 59–83.
[38] Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE.
Journal of Machine Learning Research 9, Nov (2008), 2579–2605.
[39] Jana Machajdik and Allan Hanbury. 2010. Affective image classification using
features inspired by psychology and art theory. In Proceedings of the 18th ACM
international conference on Multimedia. ACM, 83–92.
[40] Jennifer Marlow and Laura Dabbish. 2014. From rookie to all-star: professional
development in a graphic design social networking site. In Proceedings of the
17th ACM conference on Computer supported cooperative work & social computing.
ACM, 922–933.
[41] Florent Perronnin and Christopher Dance. 2007. Fisher kernels on visual vocabu-
laries for image categorization. In Computer Vision and Pattern Recognition, 2007.
CVPR'07. IEEE Conference on. IEEE, 1–8.
[42] Jill E Perry-Smith. 2006. Social yet creative: The role of social relationships in
facilitating individual creativity. Academy of Management journal 49, 1 (2006),
85–101.
[43] D. Ravasi and G. Lojacono. 2005. Managing design and designers for strategic
renewal. Long Range Planning 38 (2005), 51–77.
[44] Miriam Redi, Neil OHare, Rossano Schifanella, Michele Trevisiol, and Alejandro
Jaimes. 2014. 6 seconds of sound and vision: Creativity in micro-videos. In
Computer Vision and Pattern Recognition (CVPR), 2014 IEEE Conference on. IEEE,
4272–4279.
[45] Christoph Riedl and V Seidel. 2018. Learning from Mixed Signals: Evidence from
a Contest-based Online Innovation Community. Organization Science (2018).
[46] V. Rindova, E. Dalpiaz, and D. Ravasi. 2011. A cultural quest: A study of organiza-
tional use of new cultural resources in strategy formation. Organization Science
22, 2 (2011), 413–431.
[47] V.P. Rindova and A.P. Petkova. 2007. When is a new thing a good thing? Tech-
nological change, product form design, and perceptions of value for product
innovations. Organization Science 18, 2 (2007), 217–232.
[48] Maja R Rudolph, Matthew Hoffman, and Aaron Hertzmann. 2016. A joint model
for who-to-follow and what-to-view recommendations on behance. In Proceedings
of the 25th International Conference Companion on World Wide Web. International
World Wide Web Conferences Steering Committee, 581–584.
[49] Rossano Schifanella, Miriam Redi, and Luca Maria Aiello. 2015. An Image Is
Worth More than a Thousand Favorites: Surfacing the Hidden Beauty of Flickr
Pictures. In Ninth International AAAI Conference on Web and Social Media.
[50] Joseph Schumpeter and Ursula Backhaus. 2003. The theory of economic develop-
ment. Joseph Alois Schumpeter (2003), 61–116.
[51] Roberta Sinatra, Dashun Wang, Pierre Deville, Chaoming Song, and Albert-László
Barabási. 2016. Quantifying the evolution of individual scientific impact. Science
354, 6312 (2016), aaf5239.
[52] Alex Smola, Le Song, and Choon Hui Teo. 2009. Relative novelty detection. In
Artificial Intelligence and Statistics. 536–543.
[53] Sameet Sreenivasan. 2013. Quantitative analysis of the evolution of novelty in
cinema through crowdsourced keywords. Scientific reports 3 (2013).
[54] Christian Szegedy, Wei Liu, Yangqing Jia, Pierre Sermanet, Scott Reed, Dragomir
Anguelov, Dumitru Erhan, Vincent Vanhoucke, and Andrew Rabinovich. 2015.
Going deeper with convolutions. In Proceedings of the IEEE conference on computer
vision and pattern recognition. 1–9.
[55] N. N. Cencov. 1982. Statistical decision rules and optimal inference. American
Mathematical Society 53 (1982).
[56] Brian Uzzi, Satyam Mukherjee, Michael Stringer, and Ben Jones. 2013. Atypical
combinations and scientific impact. Science 342, 6157 (2013), 468–472.
[57] Johannes Wachs, Anikó Hannák, András Vörös, and Bálint Daróczy. 2017. Why
Do Men Get More Attention? Exploring Factors Behind Success in an Online
Design Community. In Eleventh International AAAI Conference on Web and Social
Media.
[58] M.L. Weitzman. 1998. Recombinant growth. Quarterly Journal of Economics 113,
2 (1998), 331–360.
[59] N.M. Wijnberg and G. Gemser. 2000. Adding Value to Innovation: Impressionism
and the Transformation of the Selection System in Visual Arts. Organization
Science 11, 3 (2000), 323–329.
[60] Michael J Wilber, Chen Fang, Hailin Jin, Aaron Hertzmann, John Collomosse, and
Serge Belongie. 2017. BAM! The Behance Artistic Media Dataset for Recognition
Beyond Photography. arXiv preprint arXiv:1704.08614 (2017).
|
1711.10251 | 1 | 1711 | 2017-11-28T12:29:40 | Joint Non-negative Matrix Factorization for Learning Ideological Leaning on Twitter | [
"cs.SI"
] | People are shifting from traditional news sources to online news at an incredibly fast rate. However, the technology behind online news consumption promotes content that confirms the users' existing point of view. This phenomenon has led to polarization of opinions and intolerance towards opposing views. Thus, a key problem is to model information filter bubbles on social media and design methods to eliminate them. In this paper, we use a machine-learning approach to learn a liberal-conservative ideology space on Twitter, and show how we can use the learned latent space to tackle the filter bubble problem.
We model the problem of learning the liberal-conservative ideology space of social media users and media sources as a constrained non-negative matrix-factorization problem. Our model incorporates the social-network structure and content-consumption information in a joint factorization problem with shared latent factors. We validate our model and solution on a real-world Twitter dataset consisting of controversial topics, and show that we are able to separate users by ideology with over 90% purity. When applied to media sources, our approach estimates ideology scores that are highly correlated (Pearson correlation 0.9) with ground-truth ideology scores. Finally, we demonstrate the utility of our model in real-world scenarios, by illustrating how the learned ideology latent space can be used to develop exploratory and interactive interfaces that can help users in diffusing their information filter bubble. | cs.SI | cs | Joint Non-negative Matrix Factorization for
Learning Ideological Leaning on Twi(cid:29)er
Preethi Lahoti∗
Max Planck Institute for Informatics
Saarbruecken, Germany
[email protected]
Kiran Garimella
Aalto University
Helsinki, Finland
kiran.garimella@aalto.(cid:27)
Aristides Gionis
Aalto University
Helsinki, Finland
aristides.gionis@aalto.(cid:27)
7
1
0
2
v
o
N
8
2
]
I
S
.
s
c
[
1
v
1
5
2
0
1
.
1
1
7
1
:
v
i
X
r
a
ABSTRACT
People are shifting from traditional news sources to online news at
an incredibly fast rate. However, the technology behind online news
consumption promotes content that con(cid:27)rms the users' existing
point of view. This phenomenon has led to polarization of opinions
and intolerance towards opposing views. Thus, a key problem is
to model information (cid:27)lter bubbles on social media and design
methods to eliminate them. In this paper, we use a machine-learning
approach to learn a liberal-conservative ideology space on Twitter,
and show how we can use the learned latent space to tackle the
(cid:27)lter bubble problem.
We model the problem of learning the liberal-conservative ideol-
ogy space of social media users and media sources as a constrained
non-negative matrix-factorization problem. Our model incorporates
the social-network structure and content-consumption informa-
tion in a joint factorization problem with shared latent factors. We
validate our model and solution on a real-world Twitter dataset
consisting of controversial topics, and show that we are able to
separate users by ideology with over 90 % purity. When applied
to media sources, our approach estimates ideology scores that are
highly correlated (Pearson correlation 0.9) with ground-truth ide-
ology scores. Finally, we demonstrate the utility of our model in
real-world scenarios, by illustrating how the learned ideology latent
space can be used to develop exploratory and interactive interfaces
that can help users in di(cid:29)using their information (cid:27)lter bubble.
1 INTRODUCTION
Social media and the web have provided a foundation where users
can easily access diverse information from around the world. How-
ever, over the years, various factors, such as user homophily (social
network structure), and algorithmic (cid:27)ltering (e.g., news feeds and
recommendations) have narrowed the content that a user consumes.
As an example, imagine two users of opposite ideological stances
(liberal and conservative). Though the two users may be looking
at the same topic (e.g., a presidential debate), they might be seeing
∗Author was at Aalto University at the time of this work.
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for pro(cid:27)t or commercial advantage and that copies bear this notice and the full citation
on the (cid:27)rst page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior speci(cid:27)c permission
and/or a fee. Request permissions from [email protected].
WSDM 2018, Marina Del Rey, CA, USA
© 2018 Copyright held by the owner/author(s). Publication rights licensed to ACM.
978-1-4503-5581-0/18/02...$15.00
DOI: 10.1145/3159652.3159669
completely di(cid:29)erent viewpoints due to the diverse network sur-
rounding and di(cid:29)erent content sources they get their information
from. Consequently, users on di(cid:29)erent ends of the ideological spec-
trum live in their own information bubbles [31], oblivious to the
views on the other side and creating their own world-view of truth.
This phenomenon has led to the polarization of viewpoints, intol-
erance towards opposing views, and ideological segregation [36].
Many studies suggest that increasingly users live in their echo
chambers [35] and polarization of the public has intensi(cid:27)ed [11].
In this paper, we propose a principled approach to infer the
ideological stances (also known as ideology or polarity or leaning)
of both the users in a social network, and the media sources that
provide news content in the network. Our approach is based on a
non-negative matrix-factorization model, which jointly decomposes
the social network of users and the content they consume in a
shared latent space. Learning the ideological stances of social media
users and content sources is an important step in building useful
tools that can make users aware of their informational bias and
consequently, help in reducing those biases, thus mitigating the
increasing polarization in the society.
Existing approaches to identifying the ideological leaning of
users either (i) require large amounts of manually annotated data [10,
32]; or (ii) consider only the structure of social ties [4] or user
interactions [16, 37]; or (iii) analyze only the content shared by
users [33]. Each of these families of approaches has its own limita-
tions. First, obtaining manual annotations is both expensive and
time consuming. Second, when using only the structure of social
ties or interactions, it is assumed that users with the same ideology
are more likely to interact with or follow each other. However,
social networks are extremely sparse and noisy, and users with
the same ideological leaning may never interact with or follow
each other, while users with di(cid:29)erent ideological leaning may still
interact due to di(cid:29)erent reasons. Last, inferring ideological leaning
by using only content is a challenging task and prone to errors due
to the inherent complexity of natural-language understanding.
To overcome these problems, we propose an unsupervised ap-
proach that uses simultaneously the network structure and the
information about content shared by users. We are motivated by
the observation that a user's ideological stance on a topic depends
on both the surrounding network structure as well as the content
sources that users consume their information from. Thus, we ex-
ploit the inherent connection between the two data types: Users are
not only more likely to interact with or follow like-minded users,
but also to share content of aligned ideological leaning. Taking
into account the full available information results in more accurate
estimation of ideological leaning both for users and content sources.
In addition, we formulate the task of learning ideological leaning
as a joint matrix factorization problem in which users and sources
are represented in a shared latent space. This formulation allows us
to identify the relationship between data points of the two types,
which is particularly useful for visualizing social-media users and
sources in a common space, and building applications for exploring
the ideological landscape in one's media neighborhood, or making
recommendations to escape the (cid:27)lter bubble. In fact, we demon-
strate concretely how to use the learned ideology latent space to
develop exploration and recommendation tools (Section 6).
Experiments comparing our approach to the state of the art show
the bene(cid:27)t of such a principled joint approach. Our method is able
to separate users into ideological clusters with over 90% purity.
When applied to media sources, our approach estimates ideology
scores that are highly correlated with ground-truth ideology scores.
All our analysis is done on Twitter, though the methods gener-
alize to any other social network. In the rest of the paper, for the
sake of clarity we use Twitter-speci(cid:27)c nomenclature (e.g., retweets,
follow, etc.).
In summary, our contributions are as follows:
• We present a principled approach to jointly compute the ide-
ology scores of both users and content sources by formulating
the problem as a joint constrained matrix-factorization task.
This formulation allows us to jointly cluster the two data types,
"user" and "source". We apply our learned ideological latent
space to the problems of "who" and "what" to recommend to
users so as to reduce polarization and di(cid:29)use their information
(cid:27)lter bubble.
• To the best of our knowledge, this is the (cid:27)rst work to compute
ideological stances for both users and content sources, in a
common latent space, based on both the network structure and
the users' interaction with sources.
• We provide an extensive experimental evaluation, presenting
both qualitative and quantitative results on real-world Twitter
data. Our method shows promise when compared to existing
state of the art approaches.
2 RELATED WORK
In this paper, we propose an approach that can identify the ideolog-
ical leaning of users on Twitter. We de(cid:27)ne ideology based on the
policy dimension that articulates a user's political preference. Our
de(cid:27)nition is inspired by work in political-science literature, such
as work by Bafumi et al. [2], where ideology is de(cid:27)ned as "a line
whose left end is understood to re(cid:30)ect an extremely liberal position
and whose right end corresponds to extreme conservatism."
Estimation of user ideology. Traditionally, the most common
sources for estimating ideology comprised of behavioral data gener-
ated from roll call votes [34], co-sponsorship records [1], or political
contributions [7]. These datasets were often only available for the
political elite, like members of congress, and hence getting such
estimates for a large population of ordinary citizens was di(cid:28)cult, if
not impossible.
With the proliferation of social media platforms, behavioral data
started being available at an individual level and researchers have
tried to use such data for identifying political ideology for social
media users at scale. Initial work started with supervised meth-
ods [10, 32] for predicting a (binary) political alignment of users
on Twitter. Though these works report accuracies over 90%, Cohen
at al. [9] warns about the limitations of such approaches and their
dependence on politically active users.
Unsupervised approaches have also been proposed, mainly based
on the structure of user interests [23], social connections [4], and
interactions [6, 16, 37]. The main idea behind these methods is
that users typically either surround themselves (follow/friend) with
other users who are similar in their ideology (homophily), or inter-
act with others (retweet/like) similar to them.
Perhaps the closest approach to this paper is the work by Lu et
al. [28] (biaswatch), who seek to identify the bias of a user on a
topic by combining their retweet and content networks, where a
content network is obtained based on the similarity of users tweets.
biaswatch, however, assumes the presence of a set of labeled
bias anchors (seed hashtags), making it not completely unsupervised.
Second, fusing the content and retweet networks is somewhat
arbitrary, since there is no common underlying principle that holds
the two networks together and hence a graph that results from
such a merger contains di(cid:29)erent types of edges (multigraph) simply
merged together. We compared our approach with biaswatch in
Section 5 and show that our method outperforms their bias scores.
Estimation of source ideology. Polarization and bias of media
outlets has existed long before the time of internet, however, data
availability makes it easier to study and quantify nowadays. Mitchell
et al. [29] study the media habits of American public using a large
scale survey and show how fractured the media production and con-
sumption have become in the recent years. Groseclosea et al. [21]
propose a method to estimate the ideology of various media sources
by comparing the number of citations to think tanks and policy
groups to those of Congress members. For a complete survey of
methods on measuring ideology of media and media bias, please
refer to Groeling et al. [20].
Reducing polarization. The problem of reducing polarization
and di(cid:29)using information bubbles on social media has been tack-
led before. Most papers approach the problem by recommending
content outside a user's (cid:27)lter bubble. Studies have looked at what
to recommend [19], how to recommend [25, 26] and to whom to
recommend such content [17].
Based on the papers discussed above, we make the following
observations:
a. Most existing approaches only consider one dimension (con-
tent or network) for computing user ideology. We propose a princi-
pled approach that can compute a user's ideology by taking into
account both content and network.
b. We compute the ideology of users and sources simultaneously.
No existing approach, to the best of our knowledge, proposes such
a method to do it simultaneously.
c. Most approaches for reducing polarization do not take a user's
choice into account. Our methods (in Section 6) can help users
di(cid:29)use their information bubbles based on their own choices.
3 PROBLEM FORMULATION
In this section we discuss the problem setting, introduce the nota-
tion, and formally de(cid:27)ne the problem we consider.
3.1 Data model
The social graph. We consider a social graph of Twitter users
G = (U , E, w), where U represents the set of users, E is the set
of edges representing social interactions between the users, and
w : E → R is a weighting function that assigns real-valued weights
to each edge in G.
We also represent the graph G by its adjacency matrix A ∈ Rn×n.
In particular, it is A(u, v) = wi for each edge ei = (u, v, wi) ∈ E,
and A(u, v) = 0 if there is no edge between u and v. Since the social
graph G may not represent a symmetric relation, the matrix A is
not necessarily symmetric.
To de(cid:27)ne the edges of the graph G one can consider social links
between users based on their retweet and follow networks. Two
commonly-used options are to consider an edge ei = (u, v, wi) if (i)
users u and v follow a common set of users, and wi is the number of
common users; or if (ii) user u retweets user v, and wi is the number
of retweets. In the (cid:27)rst case the social graph is symmetric, while in
the second case it is not.
Content sources. We model the presence of content in the network
by considering a set of content sources S. The set S represents a set
of items that are shared in the network. The number of sources is
denoted by S = m. We associate with each user u the subset of
sources in S that the user shares (i.e., posts) in the network. Thus
the overall user activity in the network is denoted by a matrix
C ∈ Rn×m, where C(u, s) denotes the number of times that user
u ∈ U shares source s ∈ S.
We derive the content features (i.e., items of the set S) based
on users' tweets. Speci(cid:27)cally, we experiment with two variants of
feature sets: (i) extracted urls from the tweets; and (ii) hostnames
of urls extracted from the tweets. In other words, in the latter case,
the content is aggregated by their source of authorship (i.e., various
news media channels).
For the presentation of our method, we also need the following
de(cid:27)nitions.
A(cid:28)nity matrix. Given a matrix X, we de(cid:27)ne the a(cid:28)nity matrix of
the rows of X to be XrnXT
rn, where Xrn is row normalized X. That is,
the a(cid:28)nity matrix of rows of X is formed by the cosine similarities
of all pairs of rows of X. Similarly, we de(cid:27)ne the a(cid:28)nity matrix of
the columns of X to be XT
cnXcn, where Xcn is column normalized X.
Laplacian matrix. Given a square and symmetric matrix X, we
consider its Laplacian to be the matrix L = D − X, where D is a
diagonal matrix whose (i, i) entry is the i-th row-sum of X.
3.2 Motivation of the approach
Our goal in this paper is to learn the ideological leaning of users
and content sources on Twitter. The underlying motivation is that
learning the ideological leaning of Twitter users and sources is an
important step in building useful tools that can help users perceive
their informational bias and consequently improve their news diet.
A simple approach to identify ideological leaning of users is to
consider only the social graph and apply one of the many community-
detection algorithms. The intuition here is that users with the same
ideological leaning are more likely to interact with each other, and
thus, to form graph communities. The drawback of this simple
approach is that community detection on real-world social graphs
is an extremely challenging task, due to sparsity and overlapping
communities. For instance, two users u and v can have the same
ideological leaning even though they do not have any social inter-
action, or they have di(cid:29)erent topical interests.
Similarly, one simple approach to attempt identifying the ideo-
logical leaning of sources is to cluster them using deep-NLP or
semantic-analysis techniques. However, this approach is again
prone to errors due to the inherent complexity of the text-analysis
task. Furthermore, it ignores the rich user information about how
content is shared in the social network.
In contrast to these simple techniques, which rely on one-sided
clustering of either users or content, with no association between
them, the proposed approach seeks to jointly learn the ideological
leaning of users and content sources.
Combining di(cid:29)erent data types in a uni(cid:27)ed learning framework
has several advantages. First, we exploit the inherent connection
between the two data types: users are not only more likely to
interact with, or follow, like-minded users, but also to share content
of aligned ideological leaning. Consequently, taking into account
the full information on social structure and content will result in
better clustering performance. Furthermore, considering both data
types simultaneously allows us to learn the ideological leanings of
users and content sources in a shared latent space. This means that
not only do we separate users and sources into ideological clusters,
but we also identify the relationship between the clusters of the
two data types. The applications we present in the Section 6 rely
heavily on the ability to represent users and content sources in a
shared latent space.
3.3 Problem formulation
To learn the latent space of the input data (users and sources) we use
non-negative matrix factorization (nmf) techniques. In particular,
we propose a joint matrix factorization formulation, which exploits
the duality between user and source clustering.
First, assume that the ideological leaning is represented by k
factors (dimensions). Our model is described by two components.
The (cid:27)rst component, represented by a n × k matrix U, captures user
information. In particular, the entry (u, i) of the matrix U represents
the degree to which user u aligns with ideology factor i.
The second component, represented by a m×k matrix V, captures
source information: the entry (s, i) of the matrix V represents the
degree to which source item s aligns with ideology factor i.
To determine the user and source ideology clusters, we decom-
pose the two input matrices A and C, using the components U
and V as latent factors. For decomposing A and C so as to capture
ideology clusters we require the following constraints.
Partitioning constraints:
1. Users in a user-cluster interact with each other more often than
with users outside the cluster.
2. Users in the same user-cluster post content from the same
3. Content in the same content-cluster is posted by users in the
content-cluster.
same user-cluster.
Co-partitioning constraints:
4. Users in a user-cluster share more articles from their corre-
sponding content-cluster than from other content-clusters.
5. Content in a content-cluster is shared by more users from their
corresponding user-cluster than from other user-clusters.
Non-negative matrix factorization for co-clustering: For a
given input data matrix X, the bi-orthogonal non-negative 3-factor
decomposition (onmtf) [13], formulated as X ≈ WHZT , provides
a good framework for simultaneously clustering the rows and the
columns of X. The left factor W provides a clustering of the rows
of X, while the right matrix Z provides a clustering of the columns
of X. The middle factor H provides association between the clusters
and additional degrees of freedom.
Problem 1. (onmtf [13]) Given an n×m matrix X, and integer k,
with k << n, m, (cid:27)nd non-negative matrices W, H, and Z, of respective
dimensions n × k, k × k, and k × m, so as to
minimize (cid:107)X − WHZT (cid:107)2
F ,
subject to W ≥ 0, H ≥ 0, Z ≥ 0,
and WT W = ZT Z = I.
subject to orthogonality constraints for U and V.
As shown by Ding et al. [13], the bi-orthogonality constraints
provide an interpretation of the onmtf problem as a simultaneous
clustering of the rows and columns of the input data matrix.
In our approach we use onmtf to decompose the input matrices
(social-graph matrix A and user–source matrix C) using the latent
factors U and V.
First, the user–source matrix is decomposed by C ≈ UHs VT ,
For the social-graph matrix A, as both the rows and columns
represent users, we equate the left and right factors and require
A ≈ UHu UT , subject to orthogonality constraints for U.
Note that as Hu is not necessarily symmetric, the decomposition
UHu UT can produce a non-symmetric matrix. Furthermore, the
formulation can capture link transitivity [39]: consider a path ui →
uk → uj. A non-symmetric factorization A ≈ XZT represents
the values of A as links from set of users to a set of objects, say,
O = {oi}. Hence, it would split the path (ui → uk → uj) into
two parts ui → ok and uk → oj, which is a misinterpretation
of the original path. Whereas, A ≈ UHu UT considers the links
to be amongst the same set of objects. Hence, the transitive link
ui → uk → uj is correctly captured by the latent factors in U.
Combining link and content information is achieved by using
a common latent factor U and formulating a joint factorization
problem asking to minimize
(cid:107)A − UHu UT (cid:107)2
F
+ (cid:107)C − UHs VT (cid:107)2
F ,
(1)
subject to non-negativity of U, Hu, V, Hs, and orthogonality of
U and V. This approach is inspired by the formulation of Zhu et
al. [39] for classifying web-pages by exploiting both content and
link information.
Graph regularization. From a geometric perspective, a dataset
can be viewed as a set of data points on a continuous manifold. The
task of clustering is to (cid:27)nd these intrinsic manifolds in the data.
However, the clustering formulation of onmtf fails to consider
this geometric structure in the data. To address this problem, Cai et
al. [8] introduced a graph-regularized nmf based on the manifold
assumption that if two data points xi, xj are close in the input data
matrix X, their projections ui and uj in the new basis U are also
close. This is formulated by seeking to minimize
(cid:107)ui − uj (cid:107)2Wij = tr(UT LU),
1
2
i, j
where W is the a(cid:28)nity matrix of rows of X (see Section 3.1), and L
is the laplacian of W.
Motivated by the duality between row and column manifolds,
Gu et al. [22] proposed a dual-manifold regularized co-clustering
method as a decomposition of an input matrix X, by asking to
minimize
(cid:107)X − WHZT (cid:107)2
F
+ α · tr(WT Lw W) + β · tr(ZT LzZ),
subject to non-negativity constraints of the factor matrices. Here
Lw and Lz are the Laplacians on the a(cid:28)nity matrices of rows and
columns of X, respectively. As before, the matrix H captures the
association between row and column clusters.
We extend our joint factorization model (Equation 1) by including
dual-graph regularization constraints on users and sources. We
refer to this problem by ifd, for ideology factor decomposition. The
formal problem de(cid:27)nition is the following.
Problem 2 (ifd). Given a user–user social matrix A of dimension
n × n, a user–source matrix C of dimension n × m, an integer k, with
k << n, m, and regularization parameters α and β, (cid:27)nd factors U,
Hu , V, Hs , of dimensions n × k, k × k, m × k, n × k, respectively, so
as to
minimize (cid:107)A − UHu UT (cid:107)2
F
+ (cid:107)C − UHs VT (cid:107)2
F
+ α · tr(UT Lu U) + β · tr(VT Ls V),
subject to U ≥ 0, Hu ≥ 0, V ≥ 0, Hs ≥ 0,
(2)
and UT U = VT V = I,
where Lu and Ls are the Laplacians of the a(cid:28)nity matrices of rows
(users) and columns (sources) of C, respectively.
In the ifd problem we factorize A and C jointly based on the dual
manifold assumption i.e., both users and content share the same
latent space and the cluster labels of users are smooth with respect
to the content manifold, while the cluster labels of content are
smooth with respect to the user manifold. To apply these manifold
constraints, we consider a(cid:28)nity matrices for users and content
sources. While there are many ways to construct such an a(cid:28)nity
matrices, in our experiments we consider the a(cid:28)nity matrices of
the rows (for users) and columns (for sources) of the C matrix.
Finally, it is instructive to review how ifd addresses the par-
titioning constraints 1–3 and co-partitioning constraints 4–5: the
bi-orthogonality constraints on the tri-factorization problem pro-
vide a clustering interpretation for the rows and columns of the
input matrices, while the manifold constraints provide a geometric
interpretation to the discovered latent space. The correspondance
between the user clusters and source clusters is achieved by using
a shared latent factor.
3.4 Solving the optimization problem
Following the standard theory of constrained optimization, we solve
Problem 2 by introducing Lagrangian multipliers Λ (a symmetric
matrix of size k × k) and minimizing the Lagrangian function
L = (cid:107)A − UHu UT (cid:107)2
F
+ (cid:107)C − UHs VT (cid:107)2
F
+α · tr(UT Lu U) + β · tr(VT Ls V)
tr(Λ(UT U − I)) + tr(Λ(VT V − I)).
(3)
We can compute the gradient of L with respect to U, V, Hu,
and Hs. A locally-optimal solution for Problem 2 can be found
using an iterative-update algorithm, similar to the one proposed by
Ding et al. [13]. The multiplicative update rules are as follows:
U ← U
V ← V
(cid:118)(cid:116)
(cid:115)
(cid:115)
(cid:115)
H1 ← H1
H3 ← H3
U T AU
U T U H1U T U
U T CV
U T U H3V T V
,
,
AU HT1 + CV HT3 + αSuU
U H1U T U HT1 + U H3V T V HT3 + αDuU + U λu
CT U H3 + βSdV
βDdV + V H3U T U H3 + V λv
,
,
(4)
(5)
(6)
(7)
where
λu = U T AU HT1 + U T CV HT3 − αU T LuU − H1U T U HT1 − H3V T V HT3
and λv = V T CT U H3 − βV T LdV − H3U T U H3.
4 ESTIMATING IDEOLOGICAL LEANING
In this section we discuss how to use the latent factors U and V com-
puted using ifd in order to estimate ideological leaning scores for
Twitter users and media channels (sources). Our approach utilizes
the probabilistic model of nmf factorizations, discussed in Yoo et
al. [38], to derive a probabilistic interpretation of latent factors. We
also discuss how to derive a hard cross-ideological separation (hard
clustering) from the latent factors.
As proposed in the literature [24, 38], the latent factors U and V
have the following probabilistic interpretation:
– the entry (i, (cid:96)) of matrix U indicates the degree to which user i
– the entry (j, (cid:96)) of matrix V indicates the degree to which media
belongs to the user-cluster (cid:96); and
source j belongs to the content-cluster (cid:96).
In the context of our problem setting, we are interested in identify-
ing two main ideologies, liberal and conservative, and thus, we set
the number of latent dimensions equal to 2 (k = 2). It follows that
each user and each media source are represented by a 2-dimensional
vector (x, y) in the latent space - a row of U for users, and a row of
V for media sources. Thus, user and source ideology hard clusters
are derived as arg max Uij and arg max Vij, respectively. To esti-
mate a single score for users and media sources, we compute the
angle of line de(cid:27)ned by the center of origin and the latent vector
(x, y), normalized to be between 0 and 1, i.e.,1
arctan(y/x)
i(x, y) = θ
π/2
1Recall that arctan(0) = 0 and limz→∞ arctan(z) = π/2.
π/2 =
.
(8)
(a) original latent space
(b) transformed coordinate space
(cid:113)
Figure 1: Projection of a subset data points in the learned ide-
ology latent space and the transformed ideology-popularity
coordinate space.
We also compute the magnitude of the latent vector (x, y)
2
,
x
ρ(x, y) =
2 + y
(9)
which, as can be shown easily, represents the popularity of the cor-
responding user or source - in particular, it is correlated with the
number of re-tweets and follows of a given user, and the number of
tweets containing a given source. Figure 1 visualizes a subset of real
data points projected in the original latent space and their transfor-
mation to the corresponding ideology/popularity co-ordinate space
according to the aforementioned computations.
In summary, given a user or media source represented by a latent
vector (x, y), we can estimate a single ideological leaning score by
Equation (8), as well as its popularity by Equation (9). When using
more than 2 dimensions for the latent ideology space (k > 2) it is
not possible to estimate ideology scores with a single number, but
we can still handle the user and source representations by standard
vector operations.
5 EXPERIMENTS
5.1 Dataset
Our dataset is collected using Twitter's streaming API from 2011 to
2016, by (cid:27)ltering for keywords related to three popular controver-
sial topics: gun control, abortion and obamacare. We use the list of
keywords proposed by Lu et al. [28] to (cid:27)lter the tweets related to
these topics. We only consider users who tweeted about all three
topics at least once, obtaining a set of n = 6 391 users, and collect
all their tweets, which gave us 19 million tweets.
As discussed in Section 3, we consider two variants of matrix
A (retweet and follow) and two variants of matrix C (urls and host-
names). We observe that the follow user-user matrix A along with
hostname user-content matrix C gives signi(cid:27)cantly superior results
compared to all other variants, thus, all subsequent results use that
variant. We omit results with the other variants due to lack of space.
5.2 Ground truth
Ideology scores for sources: We collect ground truth for news-
media channels from multiple studies in the literature: (i) 500 most
shared news domains on Facebook [3] (ii) 100 most visited domains
in Bing toolbar [15] and (iii) 27 domains from an o(cid:31)ine survey and
latentdimension1(x)latentdimension2(y)011hx,yiρθideologyscoreipopularityscoreρ011(i,ρ)webpage visit data [18]. Each of these scores roughly measures the
fraction of views/shares/clicks by a conservative user. We map all
scores in the [0, 1] range, 1 being conservative. For the domains
listed in multiple lists we compute the ideology by averaging the
scores. We also remove domains that are not necessarily news
sources (e.g., wikipedia.org, reddit.com, etc.). In total, we collect 559
news domains with ground-truth ideology scores. We refer to this
dataset as content ground truth.
Ideology scores for Twitter users: We use two di(cid:29)erent ground-
truth scores for users: (i) barbera: ideology score estimated by
Barberá et al. [5], which applies Bayesian ideal point estimate on
nearly 12 million Twitter users, and (ii) avg_content: average
ground-truth ideology scores of the sources tweeted by the user.
Popularity scores for sources: We use the aggregated number
of tweets about each news media channel in the collected data set
as a proxy for the popularity of the source.
Popularity scores for users: Since the collection of users is a
random set of people on user, we do not have any ground truth for
popularity of Twitter users.
5.3 Baseline algorithms
We compare our method with three types of methods for ideol-
ogy detection: network-only, content-only, and a combination of
network and content.
Network-only: We consider two types of network-only methods:
(i) nmf-based methods that can provide a continuous ideology
score for a user between 0 and 1; and (ii) other methods that only
produce binary labels for ideology (a user is either liberal or conser-
vative). We use symmetric nmf (nmf-symm) [13], a 3-factor nmf
shown to be equivalent to normalized-cut spectral clustering [12],
retweet a method based on partitioning the retweet graph [16]
and follow a graph partitioning approach on the follow network.
In order to construct a source-source relationship matrix, we use
CT C. It is noteworthy that network-only methods perform only
one-side clustering - one data type at a time. Hence, we need to ap-
ply the methods separately for users and content sources. As such,
network-only methods do not provide any information about the
correspondence between the two clusterings. Further, retweet
and follow return only binary labels, hence we do not use this
baseline for comparing ideology scores.
Content-only: We use orthogonalnmf tri-factorization (onmtf),
a co-clustering approach [13], and dual manifold co-clustering
(dmcc) [22]. In these methods the bipartite content matrix C is used
to co-cluster the rows (users) and columns (sources) of the matrix
simultaneously using bi-orthogonality and graph-regularization
constraints.
Network and content: We compute ideology scores of Twitter
users estimated by kulshrestha et al. [23] (kulshrestha) and
Lu et al. [28] (biaswatch).
Proposed methods: We use the proposed method ifd, and a vari-
ant of ifd without graph-regularization constraints (ifd-ngr).
We initialized U and V randomly from a uniform distribution in
[0,1] and Hu and Hs as identity matrices of size k. Parameters α
and β are chosen using grid search. Additional details on various
approaches tried for parameter initialization, parameter tuning,
Figure 2: Popular media outlets and their ideology leaning
scores computed by our method.
and stability of the algorithms with respect to the parameters are
omitted due to lack of space, and will be provided in the full version
of the paper.
5.4 Experimental setup
Evaluation measures. We perform two types of qualitative evalu-
ation tasks: (i) quality of ideological cluster separation (into liberal
or conservative clusters) and (ii) correlation between the computed
ideology scores and ground-truth scores. In order to evaluate clus-
ter separation, we measure purity, adjusted Rand index (ari),
adjusted mutual information (ami), and normalized mutual infor-
mation (nmi) between the clusters detected by the algorithm and
the set of ground-truth communities derived by separating users
at ideology score threshold at 0.5. In order to measure correlation
between the computed ideology scores and the ground-truth scores,
we use Pearson mutual correlation coe(cid:28)cient (corr).
5.5 Results
Ideology estimates for users and sources. At a (cid:27)rst look, the
user ideology scores seem intuitive with the top liberal users being
@barackobama (score: 0.0), @berniesanders (0.0), @thedemocrats
(0.0) and top conservative users @tedcruz (score: 0.99), @sean-
hannity (0.99), and @davidlimbaugh (0.9). Figure 2 shows popular
news-media outlets and their ideology leaning scores computed by
our method. We observe that the position of the news sources is as
expected: Liberal-leaning news outlets (e.g., nytimes, washington
post, the guardian) are on the left, and conservative news outlets
(e.g., fox news, breitbart, rushlimbaugh) on the right. This is also
consistent with the survey-based results found by [29]. While it
is easy to identify the extreme left and right, it is more di(cid:28)cult to
identify the neutral users and sources (like yahoo, mediaite, white-
house.gov, etc), which, in fact, is the most important subset of users
and sources to tackle the information (cid:27)lter-bubble issue.
Evaluation of clustering and ideology scores. We compare the
proposed methods with the baselines on (i) quality of ideological
cluster separation (purity, ari, ami and nmi) and (ii) correla-
tion (corr) between computed ideology score and ground-truth
00.51nytimeshuffingtonposttheguardiandailykosmsnbcwashingtonpostcnnpoliticobbcthehillusatodayreutersforbesbloombergchicagotribuneyahoomediaitewhitehouse.govwsjtelegraphnationalreviewdailymail.co.ukfreebeaconbreitbartfoxnewsdailycallerwashingtonexaminerthegatewaypundittheblazerushlimbaughliberalconservativescores. The results of both evaluation tasks are listed in Table 1.
Following are some noteworthy observations:
(i) ifd has the best performance among all the methods for
both user as well as source clustering. We observe that combining
network and content information gives consistently best results.
For example, purity of clustering for combined methods is 20%
higher than content-only methods for users and 27% higher for
source clustering.
(ii) When comparing ideology scores, ifd performs better than
state of the art baselines kulshrestha and biaswatch. Note
that biaswatch almost has no correlation with ground truth
and performs poorly. This could be due to reasons mentioned in
Section 2. Though kulshrestha works slightly better on the
clustering task, it doesn't do so well with the correlation. This indi-
cates that our method is able to identify the (cid:27)ne grained ideology
scores better, where as kulshrestha can do better at separating
users into binary clusters.
(iii) nmf-symm, a network-only method, performs quite well
for user clustering, whereas the results are not satisfactory for
source clustering. Perhaps this can be attributed to the noise in
the input matrix CT C, caused by, e.g., sparsity and topical diver-
sity of user interests, which is mitigated in ifd because of the
joint factorization. Similarly, our method performs much better
than retweet and follow, which do not use both content and
network information.
Audience of news sources. Figure 3 shows a kernel density es-
timate (kde) of ideology scores computed using the proposed
method (solid line) and ground truth of ideology scores (dashed
line) for all 6 391 users for a selection of 5 representative news
channels. The (cid:27)ndings from our experiments are strikingly similar
to the results computed using extensive user surveys [29]. We can
clearly observe that there is a non-trivial association between news
sources and polarization of users.
6 DIFFUSING THE INFORMATION BUBBLE
In the recent years, a few papers [17] have aimed to solve the
problem of echo chambers and (cid:27)lter bubbles on social media by
connecting users with others outside of their bubble. The problem
with most of these approaches is that they typically suggest tech-
nical solutions that do not take into account user biases, such as,
cognitive dissonance [14] and biased assimilation [27]. In addition,
in many cases, users themselves are not aware of being present in a
bubble, due to the non-transparent nature of algorithmic (cid:27)ltering.2
To handle both these issues, we propose that a better solution to
take users out of their bubble is to give them information and choice.
We do this in two steps: (i) make a user aware of their information
bubble, and (ii) provide content recommendations that can help
users di(cid:29)use their bubble. In this section, we demonstrate how to
use the latent space representations learned in this paper to perform
both of these steps.
2E.g., the (cid:27)lter bubble is claimed to be a reason why many people did not predict
correctly the results of Brexit or US elections
http://(cid:30)amingogroup.com/trump-brexit-and-why-we-didnt-see-them-coming
Table 1: Comparison of the proposed method with baseline
methods on (i) quality of ideological cluster separation (pu-
rity, ari, ami and nmi) and (ii) correlation (corr) between
computed ideology score and ground truth. corr for ideol-
ogy is represented as corri and for popularity as corrρ.
Since, we do not have ground truth for popularity of users
we do not compute corrρ for users. Best results for each
measure are marked in bold.
(a) Evaluation for users using barbera ground truth (upper value
in each row) and avg_content ground truth (lower value in
each row)
Type
Network Only
Content Only
Network + Content
Method
nmf-symm
retweet
follow
onmtf
dmcc
ifd
ifd-ngr
kulshrestha
biaswatch
purity ari
0.928
0.733
0.522
0.861
0.476
0.844
0.461
0.839
0.538
0.867
0.476
0.845
0.743
0.234
0.247
0.749
0.229
0.74
0.241
0.746
0.722
0.925
0.528
0.863
0.722
0.925
0.863
0.528
0.744
0.931
0.547
0.869
0.000
0.541
0.543
0.000
ami
0.628
0.418
0.385
0.395
0.454
0.382
0.233
0.223
0.23
0.218
0.62
0.441
0.62
0.441
0.637
0.448
0.000
0.000
nmi
0.629
0.418
0.385
0.399
0.456
0.382
0.266
0.246
0.263
0.242
0.621
0.442
0.621
0.442
0.638
0.449
0.000
0.000
corri
0.912
0.744
-
-
-
-
0.756
0.715
0.755
0.715
0.904
0.772
0.904
0.772
0.875
0.744
0.002
0.018
corrρ
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(b) Evaluation for sources using content ground truth
0.752
-
0.746
0.746
0.827
0.813
nmf-symm 0.597
follow
0.819
onmtf
0.606
dmcc
0.606
ifd
0.826
ifd-ngr
0.822
0.031
0.405
0.039
0.039
0.424
0.415
0.135
0.318
0.145
0.145
0.346
0.339
0.171
0.32
0.181
0.181
0.348
0.341
Network Only
Content Only
Network + Content
0.597
-
0.593
0.592
0.929
0.93
6.1 Visualizing the information bubble
Recent studies have shown that making users aware of their im-
balance in media consumption can encourage them to make small
yet signi(cid:27)cant improvements in increasing the diversity of their
reading [30]. Inspired by these studies, we suggest providing to the
users a visual way to explore their information (cid:27)lter bubble.
The way we approach this is by visualizing the user and content
in the same space to allow users to explore their content consump-
tion. To this end, we use the learned latent space to map the users
and content in the same space. Using their estimated ideological po-
sitions (from Section 4), we project users as well as sources in a two
dimensional ideology-popularity coordinate space with computed
ideology score on x-axis and popularity score on y-axis. Since we
do not have popularity score for users, we determine the position of
a user on y-axis using the average popularity score of the content
that the user engages with. Since all user scores are on the same
scale and relative to each other, we would observe that users and
sources with similar ideology lie close to each other. Finally, we
connect users to the sources that they consume by drawing a link
between them. The size of a source node is proportionate to the
Figure 3: Polarization of the audience of news sources. Values on the x-axis represent the ideology score of users and values
on the y-axis represent the kernel density estimate of the number of users at each point.
(a) Democratic Party
(b) Republican Party
Figure 4: Ideological position of @thedemocrats and @gop
(black dots) and their content engagement. Points in the grey
are the sources that the user never interacted with.
number of times a user has consumed content from the said source.
In order to increase the ease of visual interpretation, we color the
content according to the ideological learning (blue: liberal, green:
neutral and red: conservative). Content not consumed by the user
is colored gray.
Figure 4 presents a prototype for two popular Twitter accounts
from the two ends of the political spectrum: the Republican Party
(@gop) and the Democratic party (@thedemocrats).3 From this
(cid:27)gure, one can visually observe their own ideological positioning
as well as the ideology of the content that they engage with. For
instance, @thedemocrats is heavily liberal in their ideology (ide-
ology score 0.0). The content consumed by @thedemocrats is also
heavily biased on the liberal side. As expected, a large fraction of the
content they engage with is from the left (mainly liberal media like
nytimes.com and washingtonpost.com), and negligible amount from
the opposite point of view, whereas the opposite is true for @gop.
It is interesting to observe that the Republican party account has a
higher engagement with diverse view points than the Democrats.
6.2 Making ideologically diverse content
recommendations
Garimella et al. [17] proposed an approach to di(cid:29)use a user's (cid:27)lter
bubble by connecting him to a user outside his bubble from the
opposing viewpoint. Their approach is mainly based on identify-
ing users from opposing sides and optimizing a global function.
Here, we build on top of that idea and use our computed ideology
to di(cid:29)use a user's bubble by recommending him content from an
3An interactive web version of these plots can be accessed at
http://resources.mpi-inf.mpg.de/d5/(cid:27)lterbubble.
(a) original latent space
(b) transformed latent space
Figure 5: Logical diagram of user content recommendation
by sampling from the Gaussian over "ideology" and "popu-
larity" positioning.
opposing viewpoint, along with an option to choose how willing
the user is to explore the other side. Recommending ideologically
diverse content to a user can be controlled by the user using two
parameters: ideology tolerance threshold θ and popularity thresh-
old δ. Intuitively, a user is more likely to accept content within the
region +θ and −θ on either side of the user's ideological positioning,
and +δ and −δ on either side of his popularity position. Figure 5a
visualizes a hypothetical user in the original ideology latent space
and the transformed ideology-popularity coordinate space (detailed
in Section 4). Consider that we build two Gaussian distributions
around the user box (see Figure 5b) with their means centered at
user's ideology and popularity score respectively, and variance as
a function of the tolerance threshold given as input by the user.
We can now sample content from these Gaussian distributions and
use it for recommending content to the user. As desired, in such a
sampling, the content close to the user's own ideology and popu-
larity score has a higher probability of being selected. As we move
closer to the thresholds, the probability of an article being selected
gradually decreases. This "box" gives the space of exploration for a
user and depending on the user's willingness to explore (based on
parameters θ, δ), they can see content outside their bubble.
7 CONCLUSIONS
We considered the problem of identifying ideological leaning of
users and news sources (content) on Twitter. The paper tackles
two main challenges: (i) learning the ideological latent factors of
users and content in a joint model that explores simultaneously
user-to-user and user-to-content relations; and (ii) embedding the
discovered factors in a common latent space so as to support visu-
alization and exploration of the results. Our approach distinguishes
/044
/0389:00/
/044
047%208
/044
,$970094:73,
/044
408
/044
%0,0.425:90/8.47074:3/97:9
/0448.470
545:,798.470,7.3943,5489-442-07-:100/:1139435489549.43928,83943548939208;490/024.7,98
/0448.470
14308890549.4,839435489,839430,2307549.4-442-0739208;4904545 !latentdimension1(x)latentdimension2(y)011userθθδδideologyscoreipopularityscoreρ011userδδθπ/2θπ/2itself from most existing work in the area in three major ways. First,
our model aims to learn ideology on a continuous scale rather than
a binary liberal-conservative opinion, which is a much simpler and
well studied problem. Second, our model de(cid:27)nes polarization as a
multidimensional problem and allows for learning any number of
dimensions (ideology, popularity, etc) rather than just one (ideol-
ogy). Third, our model can identify the ideology of both the user
and content simultaneously, thus making use of the interdependent
structure between content and network. We also demonstrate how
to use the learned latent space in an application of providing tools
to visualize a users information bubble and for ideologically di-
verse content recommendation with the purpose of di(cid:29)using their
information (cid:27)lter bubble.
Future work. One of the main focuses of this work was to create
a strong technical foundation to understand the problem of online
polarization. We believe that the methods presented in this paper
provide several avenues for future work in multiple emerging in-
terdisciplinary research areas, for instance, humanly interpretable
and explanatory machine learning, transparent recommendations
and a new era of social media platforms that encourage discussion
and debates between users of diverse view points, thus helping to
reduce the ideological segregation of users instead of reinforcing it.
Acknowledgments. This work was supported by the Academy of
Finland projects "Nestor" (286211) and "Agra" (313927), and the EC
H2020 RIA project "SoBigData" (654024).
8 REFERENCES
[1] E. Alemán, E. Calvo, M. P. Jones, and N. Kaplan. Comparing
cosponsorship and roll-call ideal points. Legislative Studies Quarterly,
34(1):87–116, 2009.
[2] J. Bafumi, A. Gelman, D. K. Park, and N. Kaplan. Practical issues in
implementing and understanding bayesian ideal point estimation.
Political Analysis, 13(2):171–187, 2005.
[3] E. Bakshy, S. Messing, and L. A. Adamic. Exposure to ideologically
diverse news and opinion on facebook. Science, 348(6239):1130–1132,
2015.
[4] P. Barberá. Birds of the same feather tweet together: Bayesian ideal
point estimation using twitter data. Political Analysis, 23(1):76–91,
2015.
[5] P. Barberá, J. T. Jost, J. Nagler, J. A. Tucker, and R. Bonneau. Tweeting
from left to right: Is online political communication more than an
echo chamber? Psychological science, 26(10):1531–1542, 2015.
[6] R. Bond and S. Messing. Quantifying social media's political space:
Estimating ideology from publicly revealed preferences on facebook.
American Political Science Review, 109(1):62–78, 2015.
[7] A. Bonica. Ideology and interests in the political marketplace.
American Journal of Political Science, 57, 2013.
[8] D. Cai, X. He, X. Wu, and J. Han. Non-negative matrix factorization
on manifold. In ICDM, pages 63–72. IEEE, 2008.
[9] R. Cohen and D. Ruths. Classifying political orientation on twitter:
It's not easy! In ICWSM, 2013.
[10] M. D. Conover, B. Gonçalves, J. Ratkiewicz, A. Flammini, and
F. Menczer. Predicting the political alignment of twitter users. In
SocialCom, pages 192–199. IEEE, 2011.
[11] M. Dimock, C. Doherty, J. Kiley, and R. Oates. Political polarization in
the american public. Pew Research Center, 2014.
[12] C. Ding, X. He, and H. D. Simon. On the equivalence of nonnegative
matrix factorization and spectral clustering. In SDM, pages 606–610.
SIAM, 2005.
[13] C. Ding, T. Li, W. Peng, and H. Park. Orthogonal nonnegative matrix
tri-factorizations for clustering. In KDD, pages 126–135. ACM, 2006.
[14] L. Festinger. A theory of cognitive dissonance, volume 2. Stanford
university press, 1962.
[15] S. Flaxman, S. Goel, and J. M. Rao. Filter bubbles, echo chambers, and
online news consumption. Public Opinion Quarterly, 80(S1):298–320,
2016.
[16] K. Garimella, G. De Francisci Morales, A. Gionis, and
M. Mathioudakis. Quantifying controversy in social media. In WSDM,
pages 33–42. ACM, 2016.
[17] K. Garimella, G. De Francisci Morales, A. Gionis, and
M. Mathioudakis. Reducing controversy by connecting opposing
views. In WSDM, pages 81–90. ACM, 2017.
[18] M. Gentzkow and J. M. Shapiro. Ideological segregation online and
o(cid:31)ine. The Quarterly Journal of Economics, 126(4):1799–1839, 2011.
[19] E. Graells-Garrido, M. Lalmas, and D. Quercia. People of opposing
views can share common interests. In WWW Companion, pages
281–282. ACM, 2014.
[20] T. Groeling. Media bias by the numbers: Challenges and
opportunities in the empirical study of partisan news. Annual Review
of Political Science, 16, 2013.
[21] T. Groseclose and J. Milyo. A measure of media bias. The Quarterly
Journal of Economics, 120(4):1191–1237, 2005.
[22] Q. Gu and J. Zhou. Co-clustering on manifolds. In KDD, pages
359–368. ACM, 2009.
[23] J. Kulshrestha, M. Eslami, J. Messias, M. B. Zafar, S. Ghosh, K. P.
Gummadi, and K. Karahalios. Quantifying search bias: Investigating
sources of bias for political searches in social media. In CSCW, pages
417–432. ACM, 2017.
[24] T. Li and C. Ding. The relationships among various nonnegative
matrix factorization methods for clustering. In ICDM, pages 362–371.
IEEE, 2006.
[25] Q. V. Liao and W.-T. Fu. Can you hear me now?: mitigating the echo
chamber e(cid:29)ect by source position indicators. In CSCW, pages
184–196. ACM, 2014.
[26] Q. V. Liao and W.-T. Fu. Expert voices in echo chambers: e(cid:29)ects of
source expertise indicators on exposure to diverse opinions. In CHI,
pages 2745–2754. ACM, 2014.
[27] C. G. Lord, L. Ross, and M. R. Lepper. Biased assimilation and attitude
polarization: The e(cid:29)ects of prior theories on subsequently considered
evidence. Journal of personality and social psychology, 37(11):2098,
1979.
[28] H. Lu, J. Caverlee, and W. Niu. Biaswatch: A lightweight system for
discovering and tracking topic-sensitive opinion bias in social media.
In CIKM, pages 213–222. ACM, 2015.
[29] A. Mitchell, J. Gottfried, J. Kiley, and K. E. Matsa. Political
polarization & media habits. Pew Research Center, 2014.
[30] S. A. Munson, S. Y. Lee, and P. Resnick. Encouraging reading of
diverse political viewpoints with a browser widget. In ICWSM, 2013.
[31] E. Pariser. The (cid:27)lter bubble: What the Internet is hiding from you.
Penguin UK, 2011.
[32] M. Pennacchiotti and A.-M. Popescu. Democrats, republicans and
starbucks a(cid:28)cionados: user classi(cid:27)cation in twitter. In KDD, pages
430–438. ACM, 2011.
[33] F. Pla and L. F. Hurtado. Political tendency identi(cid:27)cation in twitter
using sentiment analysis techniques. In COLING, pages 183–192,
2014.
[34] K. T. Poole and H. L. Rosenthal. Ideology and congress, volume 1.
Transaction Publishers, 1997.
[35] M. Prior. Post-broadcast democracy: How media choice increases
inequality in political involvement and polarizes elections. Cambridge
University Press, 2007.
[36] C. R. Sunstein. Republic. com 2.0. Princeton University Press, 2009.
[37] F. M. F. Wong, C. W. Tan, S. Sen, and M. Chiang. Quantifying political
leaning from tweets, retweets, and retweeters. TKDE,
28(8):2158–2172, 2016.
[38] J. Yoo and S. Choi. Orthogonal nonnegative matrix tri-factorization
for co-clustering: Multiplicative updates on stiefel manifolds.
Information processing & management, 46(5):559–570, 2010.
[39] S. Zhu, K. Yu, Y. Chi, and Y. Gong. Combining content and link for
classi(cid:27)cation using matrix factorization. In SIGIR, pages 487–494.
ACM, 2007.
|
1704.06920 | 1 | 1704 | 2017-04-23T13:22:41 | Maximizing the overall profit of a word-of-mouth marketing campaign: A modeling study | [
"cs.SI"
] | As compared to the traditional advertising, the word-of-mouth (WOM) communications have striking advantages such as significantly lower cost and rapid delivery; this is especially the case with the popularity of online social networks. This paper addresses the issue of maximizing the overall profit of a WOM marketing campaign. A marketing process with both positive and negative WOM is modeled as a dynamical model knwn as the SIPNS model, and the profit maximization problem is modeled as a constrained optimization problem. The influence of different factors on the dynamics of the SIPNS model is revealed experimentally. Also, the impact of different factors on the expected overall profit of a WOM marketing campaign is uncovered experimentally. On this basis, some promotion strategies are suggested. To our knowledge, this is the first time a WOM marketing campaign is treated this way. | cs.SI | cs | Maximizing the overall profit of a word-of-mouth marketing campaign:
A modeling study
Pengdeng Lia, Xiaofan Yanga, Lu-Xing Yanga,b,∗, Qingyu Xionga, Yingbo Wua, Yuan Yan Tangc
bFaculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Delft, GA 2600, The Netherlands
cDepartment of Computer and Information Science, The University of Macau, Macau
aSchool of Software Engineering, Chongqing University, Chongqing, 400044, China
7
1
0
2
r
p
A
3
2
]
I
S
.
s
c
[
1
v
0
2
9
6
0
.
4
0
7
1
:
v
i
X
r
a
Abstract
As compared to the traditional advertising, the word-of-mouth (WOM) communications have striking advantages such
as significantly lower cost and rapid delivery; this is especially the case with the popularity of online social networks.
This paper addresses the issue of maximizing the overall profit of a WOM marketing campaign. A marketing process
with both positive and negative WOM is modeled as a dynamical model knwn as the SIPNS model, and the profit
maximization problem is modeled as a constrained optimization problem. The influence of different factors on the
dynamics of the SIPNS model is revealed experimentally. Also, the impact of different factors on the expected overall
profit of a WOM marketing campaign is uncovered experimentally. On this basis, some promotion strategies are
suggested. To our knowledge, this is the first time a WOM marketing campaign is treated this way.
Keywords: word-of-mouth, marketing campaign, overall profit, dynamical model, constrained optimization
1. Introduction
Promotion is a common form of product sales. The third-party advertising on mass media such as TV and news-
paper has long been taken as the major means of promoting products. However, this promotion strategy suffers from
high cost [1, 2]. Furthermore, it has been found that, beyond the early stage of product promotion, the efficacy of
advertising diminishes [3].
Word-of-mouth (WOM) communications are a pervasive and intriguing phenomenon. It has been found that both
satisfied and dissatisfied consumers tend to spread positive and negative WOM, respectively, regarding the products
they have purchased and used [4, 5]. As compared to positive WOM, negative WOM is more emotional and is more
likely to influence the receiver's opinion. By contrast, positive WOM is more cognitive and more considered [6 -- 9].
The significant role of WOM in product sales is supported by broad agreement among practitioners and academics.
Both positive and negative WOM will affect consumers' purchase decisions. Due to significantly lower cost and
fast propagation, WOM-based promotion campaign outperforms their advertising counterparts [10, 11]. With the
increasing popularity of online social networks such as Facebook, Myspace, and Twitter, WOM has come to be the
main form of product marketing [12].
Currently, the major concern on WOM-based viral marketing focuses on the influence maximization problem: find
a set of seeds such that the expected number of individuals activated from this seed set is maximized [13]. Toward
this direction, large number of seeding algorithms have been proposed [14 -- 23]. Additionally, a number of epidemic
models capturing the WOM spreading process have been suggested [24 -- 34]. However, all of these works build on the
premise that a single product or a few competing products are to be promoted.
Typically, a large-scale marketing campaign often involves a consistent collection of products, that is, a customer
may purchase more than one product out of the collection. The ultimate goal of such a marketing campaign is to
∗Corresponding author
Email addresses: [email protected] (Pengdeng Li), [email protected] (Xiaofan Yang), [email protected] (Lu-Xing
Yang), [email protected] (Qingyu Xiong), [email protected] (Yingbo Wu), [email protected] (Yuan Yan Tang)
Preprint submitted to Physica A
October 8, 2018
maximize the overall profit. To achieve the goal, it is crucial to determine those factors that have significant influence
on the profit. To our knowledge, so far there is no literature in this aspect.
This paper addresses the issue of maximizing the overall profit of a WOM marketing campaign with rich products.
A marketing process with both positive and negative WOM is modeled as a dynamical model known as the SIPNS
model, and the profit maximization is modeled as an optimization problem. The influence of different factors on
the dynamics of the SIPNS model is revealed experimentally. Also, the impact of different factors on the expected
overall profit of a WOM marketing campaign is uncovered experimentally. On this basis, some promotion strategies
are recommended. To our knowledge, this is the first time a WOM marketing campaign is treated this way.
The subsequent materials are organized as follows. Section 2 models a WOM marketing process as the SIPNS
model, and models the profit maximization as an optimization problem. Section 3 experimentally reveals the influence
of different factors on the dynamics of the SIPNS model. Section 4 experimentally uncovers the influence of different
factors on the expected overall profit of a WOM marketing campaign. Finally, Section 5 summarizes this work and
points out some future topics.
2. The problem and its modeling
Suppose a marketer will launch a WOM promotion campaign for promoting a batch of products, with the goal
of achieving the maximum possible profit. To achieve the goal, let us modeling the profit maximization problem as
follows.
Let [0, T] denote the time interval for the campaign, Mt the target market at time t for the campaign, M(t) = Mt
the number of individuals in Mt. Here, Mt is classified as four categories, which are listed below.
(a) Susceptible individuals, i.e., those who haven't recently bought any product but are inclined to buy one.
(b) Infected individuals, i.e., those who have recently bought a product but haven't made comment on it.
(c) Positive individuals, i.e., those who have recently bought a product and have made a positive comment on it.
(d) Negative individuals, i.e., those who have recently bought a product and have made a negative comment on it.
Let S (t), I(t), P(t), and N(t) denote the expected number at time t of susceptible, infected, positive, and negative
individuals in Mt, respectively. Then, S (t) + I(t) + P(t) + N(t) = M(t).
Now, let us impose a set of statistical assumptions as follows.
(H1) At any time, the individuals outside of the target market enter the market at constant rate µ > 0, where µ is
referred to as the entrance rate.
(H2) At any time, a positive individual spontaneously exits from the market at constant rate δP, where δP is referred
to as the P-exit rate.
(H3) At any time, an infected individual spontaneously exits from the market at constant rate δI, where δI is referred
to as the I-exit rate.
(H4) At any time, a negative individual spontaneously exits from the market at constant rate δN, where δN is referred
to as the N-exit rate.
(H5) Encouraged by positive comments, at time t a susceptible individual buys a product (and hence becomes in-
fected) at rate βPP(t), where the constant βP > 0 is referred to as the P-infection force.
(H6) Discouraged by negative comments, at time t a susceptible individual exits from the market at rate βNN(t),
where the constant βN > 0 is referred to as the N-infection force.
(H7) At any time, an infected individual makes a positive comment on the product he/she has recently bought (and
hence becomes positive) at constant rate αP > 0, where αP > 0 is referred to as the P-comment rate.
(H8) At any time, an infected individual makes a negative comment on the product he/she has recently bought (and
hence becomes negative) at constant rate αN > 0, where αN > 0 is referred to as the N-comment rate.
(H9) At any time, a positive individual is inclined to buy a new product (and hence becomes susceptible) at constant
rate γP > 0, where γP > 0 is referred to as the P-viscosity rate.
(H10) At any time, an infected individual is inclined to buy a new product (and hence becomes susceptible) at constant
rate γI > 0, where γI > 0 is referred to as the I-viscosity rate.
2
dS (t)
dt
dI(t)
dt
dP(t)
dt
dN(t)
dt
= µ − βPP(t)S (t) − βNN(t)S (t) + γPP(t) + γII(t),
= βPP(t)S (t) − αPI(t) − αNI(t) − γII(t) − δII(t),
= αPI(t) − γPP(t) − δPP(t),
= αNI(t) − δNN(t).
(1)
(cid:90) T
βP
0
Fig. 1 shows these assumptions schematically.
Figure 1. Diagram of assumptions (H1)-(H10).
This collection of assumptions can be formulated as the dynamical model
Here, 0 ≤ t ≤ T. We refer to the model as the Susceptible-Infected-Positive-Negative-Susceptible (SIPNS) model.
Suppose the profit per item is one unit. Then the expected profit during the infinitesimal time interval [t, t + dt) is
βPP(t)S (t)dt. As a result, the expected overall profit during the campaign is
P(t)S (t)dt.
(2)
The marketer's goal is to maximize the expected overall profit subject to the SIPNS model.
3. The dynamics of the SIPNS model
The SIPNS model plays a key role in the overall profit of a WOM marketing campaign. However, it is difficult
to theoretically study the dynamics of the four-dimensional SIPNS model. This section is intended to experimentally
reveal the influence of different factors on the dynamics of the SIPNS model.
3.1. The entrance rate
Comprehensive simulation experiments show that, typically, the influence of the entrance rate on the dynamics of
the SIPNS model is as shown in Fig. 2. In general, the following conclusions are drawn.
(a) For any entrance rate, the expected number of susceptible, infected, positive and negative individuals levels off,
respectively.
(b) The steady expected number of susceptible individuals is not dependent upon the entrance rate.
(c) With the rise of the entrance rate, the steady expected number of infected, positive, and negative individuals
goes up, respectively.
3
()St()It()Pt()Nt()PPtPNPIPNI()NNtFigure 2. The time plots of S (t), I(t), P(t), and N(t) for different entrance rates.
3.2. The I-exit rate
Comprehensive simulation experiments show that, typically, the influence of the I-exit rate on the dynamics of the
SIPNS model is as shown in Fig. 3. In general, the following conclusions are drawn.
(a) For any I-exit rate, the expected number of susceptible, infected, positive, and negative individuals levels off,
respectively.
(b) With the rise of the I-exit rate, the steady expected number of susceptible individuals goes up.
(c) With the rise of the I-exit rate, the steady expected number of infected, positive, and negative individuals goes
down, respectively.
3.3. The P-exit rate
Comprehensive simulation experiments show that, typically, the influence of the P-exit rate on the dynamics of
the SIPNS model is as shown in Fig. 4. In general, the following conclusions are drawn.
(a) For any P-exit rate, the expected number of susceptible, infected, positive, and negative individuals levels off,
respectively.
(b) With the rise of the P-exit rate, the steady expected number of susceptible individuals goes up.
(c) With the rise of the P-exit rate, the steady expected number of infected, positive, and negative individuals goes
down, respectively.
3.4. The N-exit rate
Comprehensive simulation experiments show that, typically, the influence of the N-exit rate on the dynamics of
the SIPNS model is as shown in Fig. 5. In general, the following conclusions are drawn.
(a) For any N-exit rate, the expected number of susceptible, infected, positive, and negative individuals levels off,
respectively.
4
543210Number of susceptible individuals200150100500 Time (a)543210Number of infected individuals4003002001000 Time (b)1.00.80.60.40.20.0Number of positive individuals4003002001000 Time (c)100x10-3806040200Number of negative individuals4003002001000 Time (d)Figure 3. The time plots of S (t), I(t), P(t), and N(t) for different I-exit rates.
(b) The steady expected number of susceptible individuals is not dependent upon the N-exit rate.
(c) With the rise of the N-exit rate, the steady expected number of infected and positive individuals goes up,
respectively.
(d) With the rise of the N-exit rate, the steady expected number of infected and positive individuals goes down.
3.5. The P-comment rate
Comprehensive simulation experiments show that, typically, the influence of the P-comment rate on the dynamics
of the SIPNS model is as shown in Fig. 6. In general, the following conclusions are drawn.
(a) For any P-comment rate, the expected number of susceptible, infected, positive, and negative individuals levels
off, respectively.
(b) With the rise of the P-comment rate, the steady expected number of susceptible individuals goes down.
(c) With the rise of the P-comment rate, the steady expected number of infected, positive, and negative individuals
goes up, respectively.
3.6. The N-comment rate
Comprehensive simulation experiments show that, typically, the influence of the N-comment rate on the dynamics
of the SIPNS model is as shown in Fig. 7. In general, the following conclusions are drawn.
(a) For any N-comment rate, the expected number of susceptible, infected, positive, and negative individuals levels
off, respectively.
(b) With the rise of the N-comment rate, the steady expected number of susceptible and negative individuals goes
up, respectively.
(c) With the rise of the N-comment rate, the steady expected number of infected and positive individuals goes
down, respectively.
5
14121086420Number of susceptible individuals200150100500 Time (a)543210Number of infected individuals200150100500 Time(b) 0.350.300.250.200.150.100.050.00Number of positive individuals200150100500 Time (c)0.300.250.200.150.100.050.00Number of negative individuals200150100500 Time(d) Figure 4. The time plots of S (t), I(t), P(t), and N(t) for different P-exit rates.
3.7. The P-infection force
Comprehensive simulation experiments show that, typically, the influence of the P-infection force on the dynamics
of the SIPNS model is as shown in Fig. 8. In general, the following conclusions are drawn.
(a) For any P-infection force, the expected number of susceptible, infected, positive, and negative individuals levels
(b) With the rise of the P-infection force, the steady expected number of susceptible individuals goes down.
(c) With the rise of the P-infection force, the steady expected number of infected, positive, and negative individuals
off, respectively.
goes up, respectively.
3.8. The N-infection force
Comprehensive simulation experiments show that, typically, the influence of the N-infection force on the dynamics
of the SIPNS model is as shown in Fig. 9. In general, the following conclusions are drawn.
(a) For any N-infection force, the expected number of susceptible, infected, positive, and negative individuals levels
(b) The steady expected number of susceptible individuals is not dependent upon the N-infection force.
(c) With the rise of the N-infection force, the steady expected number of infected, positive, and negative individuals
off, respectively.
goes down, respectively.
3.9. The I-viscosity rate
Comprehensive simulation experiments show that, typically, the influence of the I-viscosity rate on the dynamics
of the SIPNS model is as shown in Fig. 10. In general, the following conclusions are drawn.
(a) For any I-viscosity rate, the expected number of susceptible, infected, positive, and negative individuals levels
(b) With the rise of I-viscosity rate, the steady expected number of susceptible individuals goes up.
(c) With the rise of the I-viscosity rate, the steady expected number of infected, positive, and negative individuals
off, respectively.
goes down, respectively.
6
1612840Number of susceptible individuals200150100500 Time (a)543210Number of infected individuals200150100500 Time (b)0.300.250.200.150.100.050.00Number of positive individuals200150100500 Time (c)0.40.30.20.10.0Number of negative individuals200150100500 Time (d)Figure 5. The time plots of S (t), I(t), P(t), and N(t) for different N-exit rates.
3.10. The P-viscosity rate
Comprehensive simulation experiments show that, typically, the influence of the P-viscosity rate on the dynamics
of the SIPNS model is as shown in Fig. 11. In general, the following conclusions are drawn.
(a) For any P-viscosity rate, the expected number of susceptible, infected, positive, and negative individuals levels
off, respectively.
(b) With the rise of P-viscosity rate, the steady expected number of susceptible individuals goes up.
(c) With the rise of the P-viscosity rate, the steady expected number of infected, positive, and negative individuals
goes down, respectively.
4. The overall profit of a WOM marketing campaign
This section aims to experimentally uncover the influence of different factors on the expected overall profit of a
WOM marketing campaign.
4.1. The entrance rate and the exit rates
Comprehensive simulation experiments show that, typically, the influence of the entrance rate and the three exit
rates on the expected overall profit is as shown in Fig. 12. In general, the following conclusions are drawn.
(a) With the rise of the entrance rate, the expected overall profit goes up.
(b) With the rise of the I-exit rate entrance rate, the expected overall profit goes down.
(c) With the rise of the P-exit rate entrance rate, the expected overall profit goes down.
(d) With the rise of the N-exit rate entrance rate, the expected overall profit goes up.
7
3.53.02.52.01.51.00.50.0Number of susceptible individuals100806040200 Time (a)543210Number of infected individuals100806040200 Time (b)1.21.00.80.60.40.20.0Number of positive individuals100806040200 Time (c)1.21.00.80.60.40.20.0Number of negative individuals100806040200 Time (d)Figure 6. The time plots of S (t), I(t), P(t), and N(t) for different P-comment rates.
The entrance rate can be enhanced by launching a viral marketing (VM) campaign, that is, marketers develop a
marketing message and encourage customers to forward this message to their contacts. There are quite a number of
successful VM cases: Hotmail generated 12 million subscribers in just 18 months with a marketing budget of only
$50,000, and Unilevers Dove Evolution campaign generated over 2.3 million views in its first 10 days. These VM
campaigns were successful in part because the marketers effectively utilized VM's unique potential to reach large
numbers of potential customers in a short period of time at a lower cost.
The I-exit rate or the P-exit rate can be reduced by enhancing customers' experiences with the purchased products
and taking promotional measures such as discounting and distributing coupons.
Typically, the N-exit rate is uncontrollable.
4.2. The comment rates
Comprehensive simulation experiments show that, typically, the influence of the two comment rates on the ex-
pected overall profit is as shown in Fig. 13. In general, the following conclusions are drawn.
(a) With the rise of the P-comment rate, the overall profit goes up.
(b) With the rise of the N-comment rate rate, the overall profit goes down.
The P-comment rate can be enhanced by enhancing customers' experiences. Also, the N-comment rate can be
enhanced by enhancing customers' experiences.
4.3. The infection forces
Comprehensive simulation experiments show that, typically, the influence of the two infection forces on the ex-
pected overall profit is as shown in Fig. 14. In general, the following conclusions are drawn.
(a) With the rise of the P-infection force, the overall profit goes up.
(b) With the rise of the N-infection force, the overall profit goes down.
The P-infection force can be enhanced by enhancing customers' experiences and, hence, earning positive WOM.
Also, the N-infection force can be reduced by enhancing customers' experiences.
8
121086420Number of susceptible individuals200150100500 Time (a)543210Number of infected individuals200150100500 Time (b)1.41.21.00.80.60.40.20.0Number of positive individuals200150100500 Time (c)0.300.250.200.150.100.050.00Number of negative individuals200150100500 Time (d)Figure 7. The time plots of S (t), I(t), P(t) and N(t) for different N-comment rates.
4.4. The viscosity rates
Comprehensive simulation experiments show that, typically, the influence of the two viscosity rates on the ex-
pected overall profit is as shown in Fig. 15. In general, the following conclusions are drawn.
(a) With the rise of the I-viscosity rate, the overall profit goes up.
(b) There is a threshold θ such that (1) when the P-viscosity is lower than θ, the expected overall profit goes up with
the rise of the P-viscosity, and (2) when the P-viscosity exceeds θ, the expected overall profit goes down with
the rise of the P-viscosity.
The I-viscosity rate can be enhanced by enhancing customers' experiences or by taking promotional measures.
5. Conclusions and remarks
The issue of maximizing the overall profit of a WOM-based promotion campaign has been modeled as a con-
strained optimization problem. Through comprehensive computer simulations, the influence of different factors on
the profit has been revealed. On this basis, some promotion strategies have been suggested.
Toward this direction, great efforts have yet to be made. It is well known that the structure of the underlying WOM
network has significant influence on the performance of a viral marketing [35, 36]. The proposed SIPNS model is
a population-level model and hence does not allow the analysis of this influence. To reveal the impact of the WOM
network on the marketing profit, a network-level epidemic model [37 -- 40] or an individual-level epidemic model
[41 -- 45] is an appropriate choice. The profit model presented in this paper builds on the uniform-profit assumption.
However, in everyday life different products may have seperate profits. Hence, it is of practical importance to construct
a non-uniform profit model. Also, a customer may purchase more than one items a time, and the corresponding model
is yet to be developed. Typically, a viral marketing campaign is subject to a limited budget. The dynamic optimal
control strategy against malicious epidemics [46 -- 50] may be borrowed to the analysis of viral marketing so as to
achieve the maximum possible net profit.
9
6543210Number of susceptible individuals200150100500 Time (a)543210Number of infected individuals200150100500 Time (b)1.21.00.80.60.40.20.0Number of positive individuals200150100500 Time (c)1.21.00.80.60.40.20.0Number of negative individuals200150100500 Time (d)Figure 8. The time plots of S (t), I(t), P(t) and N(t) under different P-infection forces.
Acknowledgments
This work is supported by Natural Science Foundation of China (Grant Nos. 61572006, 71301177), National Sci-
Tech Support Program of China (Grant No. 2015BAF05B03), Basic and Advanced Research Program of Chongqing
(Grant No. cstc2013jcyjA1658), and Fundamental Research Funds for the Central Universities (Grant No. 106112014CD-
JZR008823).
References
[1] G. Armstrong, P. Kotler, Marketing: An introduction (11th Edition), Prentice Hall, 2012.
[2] D. Grewal, M. Levy, Marketing (5th Edition), McGraw-Hill Education, 2016.
[3] J. Goldenberg, B. Libai, E. Muller, Talk of the network: A complex systems look at the underlying process of word-of-mouth, Marketing
[4] V. Mahajan, E. Muller, R.A. Kerin, Introduction strategy for new products with positive and negative word-of-mouth, Management Science,
Letters, 2001, 12(3): 211-223.
1984, 30(12): 1389-1404.
[5] E. Anderson, Customer satisfaction and word-of-mouth, Journal of Service Research, 1998, 1(1): 5-17.
[6] P.M. Herr, F.R. Kardes, J. Kim, Effects of word-of-mouth and product attribute information on persuasion: An accessibility-diagnosticity
perspective, Journal of Consumer Research, 1991, 17, 454-462.
[7] D. Charlett, R. Garland, N. Marr, How damaging is negative word of mouth? Marketing Bulletin, 1995, 6: 42-50.
[8] J.C. Sweeney, G.N. Soutar, T. Mazzarol, The differences between positive and negative word-of-mouth: Emotion as a differentiator? S.
Gopalan, N. Taher (eds), Viral Marketing: Concepts and Cases, Icfai University Press, 2007, pp. 156-168.
[9] N. Ahmad, J. Vveinhardt, R.R. Ahmed, Impact of word of mouth on consumer buying decision, European Journal of Business and Manage-
ment, 2014, 6(31): 394-403.
[10] I.R. Misner, The World's Best Known Marketing Secret: Building Your Business with Word-of-Mouth Marketing, 2nd ed. Bard Press, 1999.
[11] J. Chevalier, M. Dina, The effect of word of mouth on sales: online book reviews, Journal of Marketing Research, 2006, 43: 345-354.
[12] M. Trusov, R.E. Bucklin, K. Pauwels, Effects of word-of-mouth versus traditional marketing: Findings from an Internet social networking
[13] R. Peres, E. Muller, V. Mahajan, Innovation diffusion and new product growth models: A critical review and research directions, International
sites, Journal of Marketing, 2009, 73(5): 90-102.
Journal of Research in Marketing, 2010, 27: 91-106.
[14] D. Kempe, J. Kleinberg, E, Tardos, Influential nodes in a diffusion model for social networks, Proceedings of the 32nd International Confer-
ence on Automata, Languages and Programming, 2005, 1127-1138.
[15] W. Chen, Y. Wang, S. Yang, Efficient influence maximization in social networks, Proceedings of the 15th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, 2009, pp. 199-208.
10
2520151050Number of susceptible individuals4003002001000 Time (a)543210Number of infected individuals4003002001000 Time (b)1.41.21.00.80.60.40.20.0Number of positive individuals4003002001000 Time (c)0.250.200.150.100.050.00Number of negative individuals4003002001000 Time (d)Figure 9. The time plots of S (t), I(t), P(t) and N(t) under different N-infection forces.
[16] O. Hinz, B. Skiera, C. Barrot, J.U. Becker, Seeding strategies for viral marketing: An empirical comparison, Journal of Marketing, 2011, 75:
[17] T.N. Dinh, H. Zhang, D.T. Nguyen, M.T. Thai, Cost-effective viral marketing for tme-critical campaigns in large-scale social networks,
IEEE/ACM Transactions on Networking, 2014, 22(6): 2001-2011.
[18] A. Mochalova, A. Nanopoulos, A targeted approach to viral marketing, Electronic Commerce Research and Applications, 2014, 13: 283-294.
[19] D. Kempe, J. Kleinberg, E, Tardos, Maximizing the spread of influence through a social network, THEORY OF COMPUTING, 2015, 11(4):
[20] M. Samadi, A. Nikolaev, R. Nagi, A subjective evidence model for influence maximization in social networks, Omega, 2016, 59(B): 263-278.
[21] H. Zhang, D.T. Nguyen, S. Das, H. Zhang, M.T. Thai, Least cost influence maximization across multiple social networks, IEEE/ACM
Transactions on Networking, 2016, 24(2): 929-939.
[22] S. Bharathi, D. Kempe, M. Salek, Competitive influence maximization in social networks, X. Deng, F. C. Graham (eds) Internet and Network
Economics, WINE2007, Lecture Notes in Computer Science, vol. 4858, 2007.
[23] H. Zhang, H. Zhang, A. Kuhnle, M.T. Thai, Profit maximization for multiple products in online social networks, Proceedings of the IEEE
International Conference on Computer Communications (INFOCOM), 2016.
[24] F.M. Bass, A new product growth for model consumer durables, Management Science, 1969, 15(5): 215-227.
[25] J.T. Gardner, K. Sohn, J.Y. Seo, J.L. Weaver, Analysis of an epidemiological model of viral marketing: when viral marketing efforts fall flat,
Journal of Marketing Development and Competitiveness, 2013, 7(4): 25-46.
[26] K. Sohn, J. Gardner, J. Weaver, Viral marketing -- more than a buzzword, Journal of Applied Business and Economics, 2013, 14(1): 21-42.
[27] S. Li, Z. Jin, Global dynamics analysis of homogeneous new products diffusion model, Discrete Dynamics in Nature and Society, 2013, 2013:
55-71.
105-147.
158901.
940623.
[28] S. Li, Z. Jin, Modeling and analysis of new products diffusion on heterogeneous networks, Journal of Applied Mathematics, 2014, 2014:
[29] H.S. Rodrigues, M. Fonseca, Viral marketing as epidemiological model, Proceedings of the 15th International Conference on Computational
and Mathematical Methods in Science and Engineering, 2015, pp. 946-955.
[30] H.S. Rodrigues, M. Fonseca, Can information be spread as a virus? Viral marketing as epidemiological model, Mathematical Methods in the
[31] P. Jiang, X. Yan, L. Wang, A viral product diffusion model to forecast the market performance of products, Discrete Dynamics in Nature and
[32] W. Wang, P. Fergola, C. Tenneriello, Innovation diffusion model in patch environment, Applied Mathematics and Computation, 2003, 134:
[33] Y. Yu, W. Wang, Y. Zhang, An innovation diffusion model for three competitive products, Computers and Mathematics with Applications,
[34] X. Wei, N. Valler, B.A. Prakash, I. Neamtiu, M. Faloutsos, C. Faloutsos, Competing memes propagation on networks: A network science
perspective, IEEE Journal on Selected Areas in Communications, 2013, 31(6): 1049-1060.
Applied Sciences, 2016, 39: 4780-4786.
Society, 2017, 2017: 9121032.
51-67.
2003, 46: 1473-1481.
11
2520151050Number of susceptible individuals3002001000 Time (a)543210Number of infected individuals3002001000 Time (b)2.52.01.51.00.50.0Number of positive individuals3002001000 Time (c)0.40.30.20.10.0Number of negative individuals3002001000 Time (d)Figure 10. The time plots of S (t), I(t), P(t), and N(t) for different I-viscosity rates.
[35] M. Bampo, M. Ewing, D. Mather, D. Stewart, M. Wallace, The effects of the social structure of digital networks on viral marketing perfor-
mance, Information Systems Research, 2008, 19(3): 273-290.
[36] A. Siri, T. Thaiupathump, Measuring the performance of viral marketing based on the dynamic behavior of social Networks, Proceedings of
the IEEE International Conference on Industrial Engineering and Engineering Management, 2013, 432.
[37] P. Pastor-Satorras, A. Vespignani, Epidemic spreading in scale-free networks, Physical Review Letters, 2001, 86(14): 3200.
[38] P. Pastor-Satorras, A. Vespignani, Epidemic dynamics in finite size scale-free networks, Physical Review E, 2002, 65(3): 035108.
[39] L.X. Yang, X. Yang, The spread of computer viruses over a reduced scale-free network, Physica A, 2014, 396(15): 173-184.
[40] L.X. Yang, X. Yang, The effect of network topology on the spread of computer viruses: a modelling study, International Journal of Computer
Mathematics, DOI: 10.1080/00207160.2016.1226499.
[41] P. Van Mieghem, J. Omic, R. Kooij, Virus spread in networks, IEEE/ACM Transactions on Networking, 2009, 17(1): 1-14.
[42] F.D. Sahneh, C. Scoglio, P. Van Mieghem, Generalized epidemic mean-field model for spreading processes over multilayer complex networks,
IEEE/ACM Transactions on Networking, 2013, 21(5): 1609-1620.
[43] L.X. Yang, M. Draief, X. Yang, The impact of the network topology on the viral prevalence: a node-based approach, Plos One, 2015, 10:
[44] L.X. Yang, M. Draief, X. Yang, Heterogeneous virus propagation in networks: a theoretical study. Mathematical Methods in the Applied
[45] L.X. Yang, X. Yang, Y. Wu, The impact of patch forwarding on the prevalence of computer virus: A theoretical assessment approach, Applied
e0134507.
Sciences, 2017, 40(5): 1396-1413.
Mathematical Modelling, 2017, 43: 110-125.
[46] V.M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, G. Pappas, Optimal resource allocation for network protection against spreading
processes, IEEE Transactions on Control of Network Systems, 2014, 1(1): 99-108.
[47] H. Shakeri, F.D. Sahneh, C. Scoglio, Optimal information dissemination strategy to promote preventive behaviours in multilayer networks.
Mathematical Bioscience and Engineering, 2015, 12(3): 609-623.
[48] L.X. Yang, M. Draief, X. Yang, The optimal dynamic immunization under a controlled heterogeneous node-based SIRS model, Physic A,
[49] C. Nowzari, V.M. Preciado, G.J. Pappas, Analysis and control of epidemics: A survey of spreading processes on complex networks, IEEE
[50] T.R. Zhang, L.X. Yang, X. Yang, Y. Wu, Y.Y. Tang, The dynamic malware containment under a node-level epidemic model with the alert
[51] J. Bi, X. Yang, Y. Wu, Q. Xiong, J. Wen, Y.Y. Tang, On the optimal dynamic control strategy of disruptive computer virus, Discrete Dynamics
2016, 450: 403-415.
Control Systems, 2016, 36(1): 26-46.
compartment, Physica A, 2017, 470: 249-260.
in Nature and Society, 2017, 2017: 8390784.
12
20151050Number of susceptible individuals3002001000 Time (a)543210Number of infected individuals3002001000 Time (b)0.250.200.150.100.050.00Number of positive individuals3002001000 Time (c)0.300.250.200.150.100.050.00Number of negative individuals3002001000 Time (d)Figure 11. The time plots of S (t), I(t), P(t), and N(t) for different P-viscosity rates.
Figure 12. The expected overall profit versus (a) the entrance rate, (b) the I-exit rate, (c) the P-exit rate, and (d) the N-exit rate.
13
1612840Number of susceptible individuals3002001000 Time (a)543210Number of infected individuals3002001000 Time (b)0.300.250.200.150.100.050.00Number of positive individuals3002001000 Time (c)0.250.200.150.100.050.00Number of negative individuals3002001000 Time (d)3500300025002000150010005000Overall profit1.00.80.60.40.20.0(a)450400350300250200150Overall profit0.80.60.40.20.0(b)280260240220200180160140Overall profit0.400.300.200.100.00(c)240236232228224Overall profit1.00.90.80.70.60.5(d)Figure 13. The expected overall profit versus (a) the P-comment rate, and (b) the N-comment rate.
Figure 14. The expected overall profit versus (a) the P-infection force, and (b) the N-infection force.
Figure 15. The overall profit versus (a) the P-viscosity rate, and (b) the I-viscosity rate.
14
250200150100500Overall profit1.00.80.60.40.20.0(a)300250200150100500Overall profit1.00.80.60.40.20.0(b)200150100500Overall profit1.00.80.60.40.20.0(a)200180160140120100Overall profit1.00.80.60.40.20.0(b)750700650600550500Overall profit1.00.80.60.40.2(a)500450400350300Overall profit0.80.60.40.20.0(b) |
1608.06196 | 5 | 1608 | 2019-12-11T16:38:45 | A Framework for the Construction of Generative Models for Mesoscale Structure in Multilayer Networks | [
"cs.SI",
"cond-mat.stat-mech",
"nlin.AO",
"physics.soc-ph",
"stat.ME"
] | Multilayer networks allow one to represent diverse and coupled connectivity patterns --- e.g., time-dependence, multiple subsystems, or both --- that arise in many applications and which are difficult or awkward to incorporate into standard network representations. In the study of multilayer networks, it is important to investigate mesoscale (i.e., intermediate-scale) structures, such as dense sets of nodes known as communities, to discover network features that are not apparent at the microscale or the macroscale. The ill-defined nature of mesoscale structure and its ubiquity in empirical networks make it crucial to develop generative models that can produce the features that one encounters in empirical networks. Key purposes of such generative models include generating synthetic networks with empirical properties of interest, benchmarking mesoscale-detection methods and algorithms, and inferring structure in empirical multilayer networks. In this paper, we introduce a framework for the construction of generative models for mesoscale structures in multilayer networks. Our framework provides a standardized set of generative models, together with an associated set of principles from which they are derived, for studies of mesoscale structures in multilayer networks. It unifies and generalizes many existing models for mesoscale structures in fully-ordered (e.g., temporal) and unordered (e.g., multiplex) multilayer networks. One can also use it to construct generative models for mesoscale structures in partially-ordered multilayer networks (e.g., networks that are both temporal and multiplex). Our framework has the ability to produce many features of empirical multilayer networks, and it explicitly incorporates a user-specified dependency structure between layers. | cs.SI | cs |
A framework for the construction of generative models
for mesoscale structure in multilayer networks
Marya Bazzi,1, 2, 3, ∗ Lucas G. S. Jeub,1, 4, 5, ∗ Alex Arenas,6 Sam D. Howison,1 and Mason A. Porter1, 7, 8
1Oxford Centre for Industrial and Applied Mathematics, Mathematical Institute,
University of Oxford, Oxford OX2 6GG, United Kingdom
2The Alan Turing Institute, London NW1 2DB, United Kingdom
3Warwick Mathematics Institute, University of Warwick, Coventry CV4 7AL, United Kingdom
4Center for Complex Networks and Systems Research, School of Informatics and Computing,
Indiana University, Bloomington, Indiana 47408, USA
5ISI Foundation, Turin, Italy
6Departament d'Enginyeria Inform`atica i Matem`atiques,
Universitat Rovira i Virgili, 43007 Tarragona, Spain
7CABDyN Complexity Centre, University of Oxford, Oxford OX1 1HP, United Kingdom
8Department of Mathematics, University of California,
Los Angeles, Los Angeles, California 90095, USA
Multilayer networks allow one to represent diverse and coupled connectivity patterns -- e.g.,
time-dependence, multiple subsystems, or both -- that arise in many applications and which are
difficult or awkward to incorporate into standard network representations. In the study of multi-
layer networks, it is important to investigate mesoscale (i.e., intermediate-scale) structures, such
as dense sets of nodes known as communities, to discover network features that are not apparent
at the microscale or the macroscale. The ill-defined nature of mesoscale structure and its ubiquity
in empirical networks make it crucial to develop generative models that can produce the features
that one encounters in empirical networks. Key purposes of such generative models include gen-
erating synthetic networks with empirical properties of interest, benchmarking mesoscale-detection
methods and algorithms, and inferring structure in empirical multilayer networks. In this paper, we
introduce a framework for the construction of generative models for mesoscale structures in mul-
tilayer networks. Our framework provides a standardized set of generative models, together with
an associated set of principles from which they are derived, for studies of mesoscale structures in
multilayer networks.
It unifies and generalizes many existing models for mesoscale structures in
fully-ordered (e.g., temporal) and unordered (e.g., multiplex) multilayer networks. One can also use
it to construct generative models for mesoscale structures in partially-ordered multilayer networks
(e.g., networks that are both temporal and multiplex). Our framework has the ability to produce
many features of empirical multilayer networks, and it explicitly incorporates a user-specified de-
pendency structure between layers. We discuss the parameters and properties of our framework,
and we illustrate examples of its use with benchmark models for community-detection methods and
algorithms in multilayer networks.
I.
INTRODUCTION
One can model many physical, technological, biologi-
cal, financial, and social systems as networks. The sim-
plest type of network is a graph [1], which consists of
a set of nodes (which represent entities) and a set of
edges between pairs of nodes that encode interactions be-
tween those entities. One can consider either unweighted
graphs or weighted graphs, in which each edge has a
weight that quantifies the strength of the associated in-
teraction. Edges can also incorporate directions to rep-
resent asymmetric interactions or signs to differentiate
between positive and negative interactions.
However, this relatively simple structure cannot cap-
ture many of the possible intricacies of connectivity pat-
terns between entities. For example, in temporal net-
works [2, 3], nodes and/or edges change in time; and
∗ Both authors contributed equally.
in multiplex networks [4], multiple types of interactions
can occur between the same pairs of nodes. To better
account for the complexity, diversity, and dependencies
in real-world interactions, one can represent such con-
nectivity patterns using "multilayer networks" (see Sec-
tion II A) [4 -- 8]. We use the term single-layer network
(which is also called a "monolayer network" or a "graph")
for a multilayer network with a single layer (i.e., an 'ordi-
nary' network), and we use the term "network" to refer
to both single-layer and multilayer networks.
By using a single multilayer network instead of several
independent single-layer networks, one can account for
the fact that connectivity patterns in different layers of-
ten "depend" on each other. (We use the term dependent
in a probabilistic sense throughout the paper: an object
A depends on B if and only if P(AB) (cid:54)= P(A).) For ex-
ample, the connectivity patterns in somebody's Facebook
friendship network today may depend both on the con-
nectivity patterns in that person's Facebook friendship
network last year (temporal) and on the connectivity pat-
terns in that person's Twitter followership network today
(multiplex). Data sets that have multilayer structures are
increasingly available (e.g., see Table 2 of [4]). A natu-
ral type of multilayer network consists of a sequence of
dependent single-layer networks, where layers may corre-
spond to different temporal snapshots, different types of
related interactions that occur during a given time inter-
val, and so on. Following existing terminology [8, 9], we
refer to an instance of a node in one "layer" as a "state
node" (see Section II A).
There is a diverse set of models for multilayer networks.
(We overview them in Section II C.) Many of these mod-
els take a specific type of dependency (e.g., temporal) as
their starting point. In the present paper, we introduce
a framework for the construction of generative models
for multilayer networks that incorporate a wide variety
of structures and dependencies.
It is broad enough to
unify many existing, more restrictive interlayer specifica-
tions, but it is also easy to customize to yield multilayer
network models for many specific cases of interest. Key
purposes of such generative models include (1) generat-
ing synthetic networks with empirical features of interest,
(2) benchmarking methods and algorithms for detecting
mesoscale structures, and (3) inferring structure in em-
pirical multilayer networks.
A unifying framework
A key feature of multilayer networks is their flexibil-
ity, which allows one to incorporate many different types
of data as part of a single structure. In this spirit, our
goal is to provide a general, unifying framework that en-
ables users to construct generative models of multilayer
networks with a large variety of features of interest in em-
pirical multilayer networks by appropriately constraining
the parameter space. We accomplish this in two consec-
utive steps. First, we partition the set of state nodes of
a multilayer network. Second, we allocate edges, given a
multilayer partition. We focus on modeling dependency
at the level of partitions (as was done in [10]), rather than
with respect to edges. Additionally, we treat the process
of generating a multilayer partition separately from that
of generating edges for a given multilayer partition. This
modular approach yields random structures that can cap-
ture a wide variety of interlayer-dependency structures,
including temporal and/or multiplex networks, appear-
ance and/or disappearance of entities, uniform or nonuni-
form dependencies between state nodes from different
layers, and others. For a specified interlayer-dependency
structure, one can then use any (single-layer or multi-
layer) network model with a planted partition (i.e., a
planted-partition network model ) to generate a wide va-
riety of network features, including weighted edges, di-
rected edges, and spatially-embedded layers.
The flexibility of our framework to generate multilayer
networks with a specified dependency structure between
different layers makes it possible to (1) gain insight into
whether, when, and how to build interlayer dependen-
2
cies into methods for studying many different types of
multilayer networks and (2) generate tunable "bench-
mark models" that allow a principled comparison for
community-detection (and, more generally, "meso-set-
detection") tools for multilayer networks, including for
complicated situations that arise in many applications
(such as networks that are both temporal and multiplex)
but thus far have seldom or never been studied. In many
benchmark models, one plants a partition of a network
into well-separated "meso-sets" (e.g., communities), and
one thereby imposes a so-called "ground truth" (should
one wish to use such a notion) [11] that a properly de-
ployed meso-set-detection method ought to be able to
find. Benchmark networks with known structural prop-
erties can be important for (1) analyzing and compar-
ing the performance of different meso-set-detection tools;
(2) better understanding the inner workings of meso-set-
detection tools; and (3) determining which tool(s) may
be most appropriate in a given situation.
One can also use our framework to generate synthetic
networks with desired empirical properties, to generate
null networks, and to explore "detectability limits" of
mesoscale structures. (See, for example, the study of de-
tectability thresholds in [10] for a model that is a special
case of our framework.) With some further work, it is
also possible to use our framework to develop models for
statistical inference.
In our concluding discussion (see
Section VII), we suggest directions for how to apply our
framework to the task of statistical inference. Our inten-
tion in designing such a flexible framework is to ensure
that the generative models that it provides remain useful
as researchers consider progressively more general multi-
layer networks in the coming years.
Paper outline
Our paper proceeds as follows. In Section II, we give an
introduction to multilayer networks, overview mesoscale
structure in networks, and review related work on gener-
ative models for mesoscale structure. In Section III, we
formally introduce the notation that we use throughout
the paper.
In Section IV, we explain how we generate
a multilayer partition with a specified dependency struc-
ture between layers. We also give examples of how to
constrain the parameter space of our framework to gen-
erate several different types of multilayer networks and
discuss what we expect to be common use cases (includ-
ing temporal structure [10, 12, 13] and multiplex struc-
ture [9, 13]) in detail. In Section V, we describe how we
generate edges that are consistent with the planted parti-
tion. In Section VI, we illustrate the use of our framework
as a way to construct benchmark models for multilayer
community detection. In Section VII, we summarize our
main results and briefly discuss possible extensions of
our work to enable statistical inference on empirical mul-
tilayer networks with our framework.
Along with this paper, we include code [14] that users
3
multilayer network, a node can be present in a variety
of different states, where each state is also characterized
by a variety of different aspects. In this setting, edges
connect state nodes, each of which is the instantiation of
a given node in a particular state. The set of all state
nodes of a given entity corresponds to a single physi-
cal node (which represents the entity), and the set of all
state nodes in a given state is in one layer of a multi-
layer network. In the remainder of this paper, we use the
terms "physical node" and "node" interchangeably and
the terms "layer" and "state" interchangeably. One can
think of the aspects as features that one needs to specify
to identify the state of a node. In other words, a state is
a collection of exactly one element from each aspect. For
convenience, we introduce a mapping that assigns an in-
teger label to each element of an aspect. That is, we map
the la elements of the ath aspect to the elements of a set
{1, . . . , la} of integers. Aspects can be unordered (e.g.,
social-media platform) or ordered (e.g., time). Most em-
pirical investigations of multilayer networks focus on a
single aspect (e.g., temporal [16 -- 18] or multiplex [19 --
21]). However, many real-world situations include more
than one aspect (e.g., a multiplex network that changes
over time). For an ordered aspect, we require that the
mapping respects the order of the aspect (e.g., ti → i for
time, where t1 ≤ . . . ≤ tla is a set of discrete time points).
A multilayer network can include an arbitrary number of
ordered aspects and an arbitrary number of unordered
aspects, and one can generalize these ideas further (e.g.,
by introducing a time horizon) [4].
To illustrate the above ideas, consider a hypotheti-
cal social network with connections on multiple social-
media platforms ('Facebook', 'Twitter', and 'LinkedIn')
between the same set of people at different points in time.
In this example network, there are two aspects: social-
media platform and time.
(One can consider 'type of
connection' (e.g., 'friendship' and 'following') as a third
aspect, but we restrict our example to two aspects for
simplicity.) The first aspect is ordered, and the num-
ber of its elements is equal to the number of time points
or time intervals. (For simplicity, we often refer simply
to "time points" in our discussions.) The second aspect
is unordered and consists of three elements: 'Facebook'
(which we label with the integer "1"), 'Twitter' (which
we label with "2"), and 'LinkedIn' (which we label with
"3"). If we assume that the time resolution is daily and
spans the year 2010, an example of a state is the tuple
('01-Jan-2010', 'Twitter'), which is (1, 2) in our short-
hand notation. We show a multilayer representation of
this example social network in Fig. 1.
Edges in a multilayer network can occur either between
nodes in the same state (i.e., intralayer edges) or between
nodes in different states (i.e., interlayer edges). An ex-
ample of an intralayer edge in Fig. 1 is (1, (1, 1)) ↔ (2,
(1, 1)), indicating that entity 1 is friends with entity 2
on Facebook at time 1. All interlayer edges in Fig. 1 are
diagonal (because they connect state nodes that corre-
spond to the same physical node). Interlayer edges be-
Figure 1. Toy example of a multilayer network with three
physical nodes and two aspects. We represent undirected in-
tralayer edges using solid black lines, directed interlayer edges
using dotted red lines with an arrowhead, and undirected in-
terlayer edges using dashed blue arcs. The first aspect is
ordered and corresponds to time.
It has two time points
(which we label as "1" and "2"). Therefore, L1 = {1, 2}.
The second aspect is unordered and represents a social-media
platform.
It has three elements: Facebook (labeled "1"),
Twitter (labeled "2"), and LinkedIn (labeled "3"). There-
fore, L2 = {1, 2, 3}.
In this example, a state node takes
the form (i, (α1, α2)), with physical node i ∈ {1, 2, 3}, as-
pect α1 ∈ {1, 2}, and aspect α2 ∈ {1, 2, 3}. The total number
of layers is l = L1 × L2 = 6.
can modify to readily incorporate different types of "null
distributions" (see Section IV A), "interlayer-dependency
structures" (see Section IV B), and planted-partition net-
work models (see Section V). The model instantiations
that one needs for generating the figures in Section VI
are available at https://dx.doi.org/10.5281/zenodo.
3304059.
II. BACKGROUND AND RELATED WORK
A. Multilayer networks
The simplest type of network is a graph G = (V,E),
where V = {1, . . . , n} is a set of nodes (which correspond
to entities) and E ⊆ V×V is a set of edges. Using a graph,
one can encode the presence or absence of connections
(the edges) between entities (the nodes). However, in
many situations, it is desirable to include more detailed
information about connections between entities. A com-
mon extension is to allow each edge to have a weight,
which one can use to represent the strength of a connec-
tion. We assign a weight to each edge using a weight
function w : E → R.
As we mentioned in Section I, one can also general-
ize the notion of a graph to encode different aspects of
connections between entities, such as connections at dif-
ferent points in time or multiple types of relationships.
We adopt the framework of multilayer networks [4, 6 --
8, 15] to encode such connections in a network.
In a
(1,(1,1))(2,(1,1))timeFacebook(1,(2,1))(2,(2,1))(1,(1,2))(2,(1,2))(3,(1,2))Twitter(1,(2,2))(2,(2,2))(1,(1,3))(2,(1,3))(3,(1,3))LinkedIn(1,(2,3))(2,(2,3))(3,(2,3))tween layers at different times for a given social-media
platform are ordinal (because they connect state nodes
with successive time labels [22]) and directed. Interlayer
edges between concurrent layers that correspond to dif-
ferent social-media platforms are categorical and undi-
rected. (In this example, such edges occur between state
nodes from all pairs of concurrent layers, although one
can envision situations in which interlayer edges occur
only between state nodes from a subset of such layers.)
An example of an ordinal intralayer edge in Fig. 1 is (1,
(1, 1)) → (1, (2, 1)), indicating a connection from entity
1 in Facebook at time 1 to entity 1 in Facebook at time
2. An example of a categorical intralayer edge in Fig. 1 is
(1, (1, 1)) ↔ (1, (1, 2)), indicating a connection between
node 1 in Facebook at time 1 and node 1 in Twitter at
time 1. One can also imagine other types of interlayer
edges in an example like the one in Fig. 1, as there may be
edges between state nodes at successive times and differ-
ent social-media platforms (e.g., (1, (1, 1)) → (1, (2, 2))).
B. Mesoscale structures in networks
Given a (single-layer or multilayer) network represen-
tation of a system, it is often useful to apply a coarse-
graining technique to investigate features that lie be-
tween those at the microscale (e.g., nodes, pairwise in-
teractions between nodes, or local properties of nodes)
and those at the macroscale (e.g., total edge weight, de-
gree distribution, or mean clustering coefficient) [1]. One
thereby studies mesoscale features such as community
structure [23 -- 26], core -- periphery structure [27, 28], role
structure [29], and others.
Our framework can produce multilayer networks with
any of the above mesoscale structures. Notwithstand-
ing this flexibility, an important situation is multilayer
networks with "community structure", which are the
most commonly studied type of mesoscale structure [1].
Community detection is part of the standard toolkit for
studying single-layer networks [23, 24, 30], and efforts
at community detection in multilayer networks have led
to insights in applications such as brain and behavioral
networks in neuroscience [31], financial correlation net-
works [16], committee and voting networks in political
science [32, 33], networks of interactions between bacte-
rial species [21], disease-spreading networks [12], social
networks in Indian villages [34], and much more.
Loosely speaking, a community in a network is a set
of nodes that are "more densely" connected to each
other than they are to nodes in the rest of the net-
work [23, 24, 30, 35, 36]. Typically, a 'good commu-
nity' should be a set of nodes that are 'surprisingly
well-connected' in some sense, but what one means by
'surprising' and 'well-connected'
is often application-
dependent and subjective. In many cases, a precise defi-
nition of "community" depends on the method that one
uses to detect communities. In particular, many popu-
lar community-detection approaches in single-layer and
4
multilayer networks define communities as sets in a par-
tition of a network that optimizes a quality function such
as modularity [1, 24, 37]; stability [38 -- 40]; Infomap and
its variants [9, 41]; likelihood functions that are derived
from stochastic block models (SBMs), which are models
for partitioning a network into sets of nodes with sta-
tistically homogeneous connectivity patterns [21, 42 -- 45];
and others [4, 46, 47]. In this paper, we refer to a par-
tition of the set of nodes of a single-layer network as
a single-layer partition and to a partition of the set of
state nodes of a multilayer network as a multilayer parti-
tion. The two primary differences between a community
in a multilayer partition and a community in a single-
layer partition are that (1) the former can include state
nodes from different layers; and (2) "induced communi-
ties" (see Section III) in one layer of a multilayer network
may depend on connectivity patterns in other layers. For
many notions of (single-layer or multilayer) community
structure -- including the most prominent methods --
one cannot exactly solve a community-assignment prob-
lem in polynomial time (unless P = NP) [30, 48 -- 50]; and
popular scalable heuristics currently have few or no the-
oretical guarantees on how closely an identified partition
resembles an optimal partition. These issues apply more
generally to the field of cluster analysis, such as in graph
partitioning [51], and many of the problems that plague
community detection also apply to detecting other kinds
of mesoscale structures.
Throughout our paper, to make it clear which results
and observations apply to community structure in par-
ticular and which apply to mesoscale structure more gen-
erally, we use the term "community" when referring to
a set in a partition of the set of nodes (or the set of
state nodes) of a network that corresponds to commu-
nity structure and the term "meso-set" (see Section III)
when referring to a set in a partition that corresponds to
any type of mesoscale structure. (In particular, a com-
munity is a type of meso-set.)
C. Generative models for mesoscale structure
The ubiquity and diversity of mesoscale structures in
empirical networks make it crucial to develop genera-
tive models of mesoscale structure that can produce fea-
tures that one encounters in empirical networks. Broadly
speaking, the goal of such generative models is to con-
struct synthetic networks that resemble real-world net-
works when one appropriately constrains and/or cali-
brates the parameters of a model using information about
a scenario or application. Generative models of mesoscale
structure can serve a variety of purposes, such as (1) gen-
erating benchmark network models for comparing meso-
set-detection methods and algorithms [10, 52 -- 56]; (2)
undertaking statistical inference on empirical networks
[10, 43, 57]; (3) generating synthetic networks with a de-
sired set of properties [20, 58]; (4) generating null models
to take into account available information about an em-
pirical network [59]; and (5) investigating "detectability
limits" for mesoscale structure, as one can plant par-
titions that, under suitable conditions, cannot subse-
quently be detected algorithmically, despite the fact that
they exist by construction [10, 60, 61].
One of the main challenges in constructing a realis-
tic generative model (even for single-layer networks) is
the breadth of possible empirical features in networks.
The available generative models for mesoscale structure
in single-layer networks usually focus on replicating a
few empirical features at a time (rather than all of
them at once): heterogeneous degree distributions and
community-size distributions [43, 53, 62], edge-weight
distribution [52, 57, 63], spatial embeddedness [12, 64],
and so on. Multilayer networks inherit all of the empiri-
cal features of single-layer networks, and they also have a
key additional one: dependencies between layers. These
interlayer dependencies can be ordered (as in most mod-
els of temporal networks), unordered (as in multiplex net-
works), combinations of these, or something more compli-
cated. However, despite this variety, existing generative
models for mesoscale structure in multilayer networks al-
low only a restrictive set of interlayer dependencies. They
assume either a temporal structure [10, 12, 54, 65 -- 67], a
simplified multiplex structure with the same planted par-
titions across all layers [20, 44, 68 -- 70], or independent
groups of layers such that layers in the same group have
identical planted partitions [9, 21]. Using an alternative
approach, a very recent model is able to generate multi-
layer partitions that satisfy the constraint that nonempty
induced meso-sets in different layers that correspond to
the same meso-set in the multilayer partition are iden-
tical [71]. Recent work [13] on the link between multi-
layer modularity maximization and maximum-likelihood
estimation of multilayer SBMs allows either temporal
or multiplex interlayer dependencies with induced parti-
tions that can vary across layers, but it makes restrictive
assumptions on interlayer dependencies (e.g., all layers
have the same set of nodes, interdependencies are "diag-
onal" and "layer-coupled", and so on). Importantly, in
all aforementioned generative models of mesoscale struc-
ture in multilayer networks, interlayer dependencies are
either (1) not explicitly specifiable or (2) special cases of
the framework that we discuss in the present paper.
III. NOTATION
We now present a comprehensive set of notation for
multilayer networks. Different subsets of notation are
useful for different situations.
We consider a multilayer network M = (VM ,EM ,V,L)
with n = V nodes (i.e., physical nodes) and l = L
layers (i.e., states). We use d to denote the number of
aspects and La = {1, . . . , la} to denote the labels of the
ath aspect (where a ∈ {1, . . . , d}). We use O to denote
the set of ordered aspects and U to denote the set of
unordered aspects. For each ordered aspect a ∈ O, we
5
assume that the labels La reflect the order of the aspect.
That is, for all α, β ∈ La, we require that α < β if and
only if α precedes β. We say that a multilayer network is
fully-ordered if U = ∅, unordered if O = ∅, and partially-
ordered otherwise. The set L = L1 × . . . × Ld of states
is the Cartesian product of the aspects, where a state
α ∈ L is an integer-valued vector of length d and each
entry specifies an element of the corresponding aspect.
Note that l = L =(cid:81)d
a=1 la.
We use (i, α) ∈ VM ⊆ V × L to denote the state node
(i.e., "node-layer tuple" [4]) of physical node i ∈ V in
state α ∈ L. We include a state node in VM if and only
if the corresponding node exists in that state. The edges
EM ⊆ VM × VM in a multilayer network connect state
nodes to each other. We use ((i, α), (j, β)) to denote a
directed edge from (i, α) to (j, β). For two state nodes,
(i, α) and (j, β), that are connected to each other via
a directed edge ((i, α), (j, β)) ∈ EM , we say that (i, α)
is an in-neighbor of (j, β) and (j, β) is an out-neighbor
of (i, α). We categorize the edges into intralayer edges
EL, which have the form ((i, α), (j, α)) and link entities i
and j in the same state α, and interlayer (i.e., coupling)
edges EC, which have the form ((i, α), (j, β)) for α (cid:54)= β.
We thereby decompose the edge set as EM = EL ∪ EC.
We define a weighted multilayer network by intro-
ducing a weight function w : EM → R (analogous to
the weight function for weighted single-layer networks),
which encodes the edge weights within and between lay-
ers. For an unweighted multilayer network, w(e) = 1 for
all e ∈ EM . We encode the connectivity pattern of a
multilayer network using an adjacency tensor A, which
is analogous to the adjacency matrix for single-layer net-
works, with entries
i,α =(cid:40)w(((i, α), (j, β))) ,
0 ,
Aj,β
((i, α), (j, β)) ∈ EM ,
otherwise .
(1)
Note that GM = (VM ,EM ) is a graph on the state
nodes of the multilayer network M . We refer to GM
as the flattened network of M . The adjacency matrix
of the flattened network is the "supra-adjacency ma-
trix" [4, 15, 72, 73] of the multilayer network. One ob-
tains a supra-adjacency matrix by flattening [74] an ad-
jacency tensor (see Eq. (1)) of a multilayer network. The
multilayer network and the corresponding flattened net-
work encode the same information [4, 75], provided one
keeps track of the correspondence between the nodes in
the flattened network and the physical nodes and lay-
ers of the multilayer network. In a similar vein, aspects
provide a convenient way to keep track of the correspon-
dence between state nodes and, for example, temporal
and multiplex relationships.
{S1, . . . ,Snset}, where(cid:83)nset
We denote a multilayer partition with nset sets by S =
s=1 Ss = VM and Ss∩Sr = ∅ for
s (cid:54)= r. We represent a partition S using a partition tensor
S with entries Si,α, where Si,α = s if and only if the state
node (i, α) is in the set Ss. We refer to a partition of a
temporal network (a common type of multilayer network)
as a temporal partition and a partition of a multiplex
network (another common type of multilayer network)
as a multiplex partition. A multilayer partition induces a
partition Sα = {S1α, . . . ,Snsetα} on each layer, where
Ssα = {i ∈ V : (i, α) ∈ Ss}. We refer to a set Ss
of a partition S as a meso-set, to Sα as the induced
partition of S on layer α, and to Ssα as the induced
meso-set of Ss on layer α. A community is a set Ss in a
partition that corresponds to community structure. We
call s ∈ {1, . . . , nset} the label of meso-set Ss. One way to
examine overlapping meso-sets is by identifying multiple
state nodes from a single layer with the same physical
node.
IV. GENERATING MULTILAYER PARTITIONS
The systematic analysis of dependencies between layers
is a key motivation for analyzing a single multilayer net-
work, instead of examining several single-layer networks
independently. The goal of our partition-generation pro-
cess is to model interlayer dependency in a way that can
incorporate diverse types of dependencies. We now mo-
tivate our partition-modeling approach, and we describe
it in detail in Sections IV A -- D.
The complexity of dependencies between layers can
make it difficult to explicitly specify a joint probabil-
ity distribution for meso-set assignments, especially for
unordered or partially-ordered multilayer networks. To
address this issue, we require only the specification of
conditional probabilities for a state node's meso-set as-
signment, given the assignments of all other state nodes.
The idea of conditional models is old and follows nat-
urally from Markov-chain theory [76, 77]. Specifying
conditional models (which capture different dependency
features separately) rather than joint models (which try
to capture many dependency features at once) is con-
venient for numerous situations. For example, condi-
tionally specified distributions have been applied to areas
such as spatial data modeling [78], imputation of missing
data [77], secure disclosure of information [79], depen-
dence networks for combining databases from different
sources [80], and Gibbs sampling [81, 82].
A problem with conditional models is that the differ-
ent conditional probability distributions are not neces-
sarily compatible, in the sense that there may not ex-
ist a joint distribution that realizes all conditional dis-
tributions [80, 82 -- 85]. Although several methods have
been developed in recent years for checking the compat-
ibility of discrete conditional distributions, these either
make restrictive assumptions on the conditional distri-
butions or have scalability constraints that significantly
limit practical use [77, 86]. Nevertheless, the employment
of conditional models (even if potentially incompatible) is
common [87], and they have been useful in many applica-
tions, provided that one cautiously handles any potential
incompatibility [77]. For our use case, potential incom-
patibility arises for unordered or partially-ordered mul-
6
tilayer networks. An issue that can result from it is the
non-uniqueness of a joint distribution. We carefully de-
sign our partition-generation process such that it is well-
defined irrespective of whether conditional distributions
are compatible. In particular, we show that convergence
is guaranteed and we address non-uniqueness by appro-
priately sampling initial conditions (see Appendix B). We
also suggest empirical checks to ensure that a generated
partition reflects planted interlayer dependencies.
In our framework, we define conditional probabilities
in two parts: we separately specify (1) independent layer-
specific random components and (2) interlayer dependen-
cies. For a choice of interlayer dependencies, there are
several features that one may want to allow in a multi-
layer partition. These include variation in the numbers
and sizes of meso-sets across layers (e.g., meso-sets can
gain state nodes, lose state nodes, appear, and disap-
pear) and the possibility for these meso-set variations
to incorporate features of the application at hand. (For
example, in a temporal network, one may not want a
meso-set to reappear after it disappears.) We ensure that
such features are possible for any choice of interlayer de-
pendency via independent layer-specific null distributions
that specify the set of possible meso-set assignments for
each layer and determine the expected size and expected
number of meso-sets in the absence of interlayer depen-
dencies.
Interlayer dependencies should reflect the type of mul-
tilayer network that one is investigating. For example,
in a temporal network, dependencies tend to be stronger
between adjacent layers and weaker for pairs of layers
that are farther apart. It is common to assume that in-
terlayer dependencies are uniform across state nodes for
a given pair of layers (i.e., interlayer dependencies are
"layer-coupled" [4]) and occur only between state nodes
that correspond to the same physical node (i.e., inter-
layer dependencies are "diagonal" [4]) [12, 16, 21, 33, 61,
72, 73, 88]. However, these assumptions are too restric-
tive in many cases (e.g., situations in which dependencies
are state-node-dependent or in which dependencies exist
between state nodes that do not correspond to the same
physical node) [9, 46, 70, 89 -- 91]. To ensure that one
can relax these assumptions, we allow dependencies to
be specified at the level of state nodes (or at the level of
layers, when a user assumes that dependencies are layer-
coupled). We encode these interlayer dependencies in
a user-specified interlayer-dependency tensor that deter-
mines the extent to which a state node's meso-set assign-
ment in one layer "depends directly" on the assignment of
state nodes in other layers (see Sections IV B and C). Our
independence assumption on the null distributions allows
us to encode all of the interlayer dependencies in a single
object (an interlayer-dependency tensor). The entries of
an interlayer-dependency tensor specify an "interlayer-
dependency network" and correspond to the causal links
for the flow of information (in the information-theoretic
sense) between different layers of a multilayer network.
Therefore, they should reflect any constraints that one
wishes to impose on the direct flow of information be-
tween layers. Longer paths in an interlayer dependency
network yield indirect dependencies between structures
in different layers.
After specifying the interlayer-dependency structure,
we define the conditional meso-set assignment probabil-
ities such that we either sample a state node's meso-
set assignment from the corresponding null distribution
or obtain it by copying the assignment of another state
node (based on the interlayer-dependency tensor). Using
these conditional probabilities, we define an iterative up-
date process on the meso-set assignments of state nodes
to generate multilayer partitions with dependencies be-
tween induced partitions in different layers. When updat-
ing the meso-set assignments of state nodes, we respect
the order of an aspect (e.g., temporal ordering). For a
fully-ordered multilayer network, our update process re-
duces to sequentially sampling an induced partition for
each layer based on the induced partitions of previous
layers. For an unordered multilayer network, our update
process defines a Markov chain on the space of multilayer
partitions. We sample partitions from a stationary dis-
tribution of this Markov chain. This sampling strategy is
known as (pseudo-)Gibbs sampling [80 -- 82, 87]. (We use
the word "pseudo" because the conditional probabilities
that we use to define the Markov chain are not necessarily
compatible.) For a partially-ordered multilayer network,
our update process combines these two sampling strate-
gies.
In Section IV A, we describe possible choices for the
independent layer-specific null distributions.
In Sec-
tion IV B, we explain our framework for generating a mul-
tilayer partition with general interlayer dependencies. In
Section IV C, we focus on the specific situation in which
interlayer dependencies are layer-coupled and diagonal,
and we also assume that a physical node is present in
all layers (i.e., the network is "fully interconnected" [4]).
In Section IV D, we illustrate the properties of example
temporal and multiplex partitions that are generated by
models that we construct from our framework. Addition-
ally, we take advantage of the tractability of the special
case of temporal networks to highlight some of its prop-
erties analytically.
A. Null distribution
We denote the null distribution of layer α by Pα
the set of all null distributions by P0 = {Pα
0 and
0 , α ∈ L}.
A simple choice for the null distributions is a categorical
distribution, where for each layer α and each meso-set
label s, we fix the probability pα
s that an arbitrary state
node in layer α is assigned to a meso-set s in the absence
of interlayer dependencies. That is,
7
s=1 pα
tilayer partition and (cid:80)nset
where nset is the total number of meso-sets in the mul-
s = 1 for all α ∈ L. The
set {1, . . . , nset} is the set of meso-set labels, and the
support of a null distribution is the set of labels that
have nonzero probability.
In the absence of interlayer
dependencies, a categorical null distribution corresponds
to specifying independent multinomial distributions for
the sizes of induced meso-sets on each layer and fixing
the expected size npα
s of each induced meso-set. There-
fore, by choosing the probabilities pα
s , one has some con-
trol over the expected number and sizes of meso-sets in
a sampled multilayer partition. A natural choice for pα
is to sample it from a Dirichlet distribution, which is the
conjugate prior for the categorical distribution [92, 93].
One can think of the Dirichlet distribution, which is the
multivariate form of the beta distribution, as a proba-
bility distribution over the space of all possible categori-
cal distributions with a given number of categories. Any
other (probabilistic or deterministic) choice for pα is also
possible. We give further detail about the Dirichlet dis-
tribution in Appendix A, where we discuss how one can
vary its parameters to control the expected number and
sizes of meso-sets in the absence of interlayer dependen-
cies. This can allow a user to generate, for example, a null
distribution with equally-sized meso-sets or a null distri-
bution with a few large meso-sets and many small meso-
sets. Furthermore, irrespective of the particular choice
of categorical distribution, it may be desirable to have
meso-sets that have a nonzero probability of obtaining
state nodes from the null distribution in some, but not
all, layers. In Appendix A, we give examples of how one
can sample the support of the null distributions before
the probability vectors to incorporate this property when
modeling the birth and/or death of meso-sets in temporal
networks and the presence and/or absence of meso-sets
in multiplex networks.
In general, the choice of the null distributions can have
a large effect on the set of sampled multilayer parti-
tions and ought to be guided by one's use case. For
our numerical examples in Section VI, we fix a value
of nset ∈ {1, . . . , nl}, where n is the number of physi-
cal nodes in each layer and l the number of layers (see
Section III); and we use a symmetric Dirichlet distri-
bution with parameters q = nset and θ = 1 (see Ap-
pendix A) to sample probability vectors pα of length
nset. This produces multilayer partitions in which the
expected meso-set labels are the same across layers (and
given by {1, . . . , nset}) in the absence of interlayer de-
pendencies and for which the expected induced meso-set
sizes (which are npα
s in the absence of interlayer depen-
dencies) differ across layers.
B. General interlayer dependencies
Pα
0 [s] =(cid:40)pα
s ,
0 ,
s ∈ {1, . . . , nset} ,
otherwise ,
(2)
We denote the user-specified interlayer-dependency
tensor by P , where P j,β
i,α is the probability that state
node (j, β) copies its meso-set assignment from state
node (i, α), for any two state nodes (i, α), (j, β) ∈ VM ,
and where P is fixed throughout the copying process.
The probability that state node (j, β) copies its meso-set
assignment from an arbitrary state node when state node
(j, β)'s meso-set assignment is updated is
pj,β = (cid:88)(i,α)∈VM
P j,β
i,α ,
(3)
where we require that pj,β ≤ 1 for all state nodes
(j, β) ∈ VM . We also require that all intralayer proba-
bilities are 0; that is, P j,α
i,α = 0 for all i, j ∈ V and α ∈ L.
We say that a state node (j, β) depends directly on a
state node (i, α) if and only if P j,β
i,α is nonzero. By ex-
tension, we say that a layer β depends directly on a
layer α if there exists at least one state node in layer
β that depends directly on a state node in layer α.
The interlayer-dependency tensor induces the interlayer-
dependency network, whose edges are all interlayer, di-
rected, and pointing in the direction of information flow
between layers. The in-neighbors (see Section III) of a
state node (j, β) in this network consists of the state
nodes from which (j, β) can copy a meso-set assignment
with nonzero probability. The support of the null distri-
bution Pβ
0 corresponds to the only possible meso-set as-
signments for a state node (j, β) whenever the state node
does not copy its assignment from one of its in-neighbors
in the interlayer-dependency network.
For a given null distribution P0 and interlayer-
dependency tensor P , a multilayer partition that results
from our sampling process depends on four choices: (1)
the way in which we update a state node assignment at a
given step; (2) the order in which we update state node
assignments; (3) the initial multilayer partition; and (4)
the criterion for convergence of the iterative update pro-
cess. We discuss points (1), (2), and (3) in the remainder
of this subsection. We describe the sampling process in
more detail and discuss convergence in Appendix B.
Update equation
A single meso-set-assignment update depends only on
the choice of state node to update and on the current
multilayer partition. Let τ be an arbitrary update step
of the copying process. Suppose that we are updating
the meso-set assignment of state node (j, β) at step τ
and that the current multilayer partition is S(τ ) (with
partition tensor S(τ )). We update the meso-set assign-
ment of state node (j, β) either by copying the meso-set
assignment in S(τ ) from one of its in-neighbors in the
interlayer-dependency network or by obtaining a new,
random meso-set assignment from the null distribution
Pβ
0 for layer β.
In particular, with probability pj,β, a
state node (j, β) copies its meso-set assignment from one
of its in-neighbors in the interlayer-dependency network;
and with probability 1 − pj,β, it obtains its meso-set as-
signment from the null distribution Pβ
0 . This yields the
following update equation at step τ of our copying pro-
cess:
8
P[Sj,β(τ + 1) = sS(τ )]
=(cid:88)(i,α)∈VM
P j,β
i,α δ(Si,α(τ ), s)
(4)
+ (1 − pj,β) Pβ
0 [Sj,β = s] .
The update equation (4) is at the heart of our frame-
work. It is clear from Eq. (4) that the set of null distribu-
tions P0 is responsible for the specification of meso-set as-
signments in the absence of interlayer dependencies (i.e.,
if P j,β
i,α = 0 for all (i, α), (j, β)). In general, pj,β deter-
mines the relative importance of interlayer dependencies
and the null distribution on the meso-set assignment of
state node (j, β). Specifically, when pj,β = 0, the meso-
set assignment of (j, β) depends only on the null distri-
bution; and when pj,β = 1, the meso-set assignment of
(j, β) depends only on the meso-set assignments of its
in-neighbors in the interlayer-dependency network.
Update order
The order in which we update meso-set assignments of
state nodes via Eq. (4) can influence a generated mul-
tilayer partition. As we mentioned in Section II A, an
aspect of a multilayer network can be either ordered or
unordered, and the update order is of particular impor-
tance when generating a multilayer partition with at least
one ordered aspect.
In particular, the structure of the
interlayer-dependency tensor should reflect the causality
that arises from the order of the aspect's elements. For an
ordered aspect, structure in a given layer should depend
directly only on structure in previous layers. Formally,
for each ordered aspect a ∈ O of a multilayer network,
we require that
P j,β
i,α > 0 ⇒ αa ≤ βa ,
(5)
where αa denotes the element of state α corresponding
to aspect a and where (as we stated in Section III) we
require that the labels of an aspect's elements reflect the
ordering of those elements [94]. For example, if we think
of the interlayer edges in Fig. 1 as interlayer edges in the
interlayer-dependency network, then Eq. (5) states that
all edges with nonzero edge weights must respect the ar-
row of time. That is, it is impossible to have edges of the
form ((j, (2, α2)), (i, (1, α2))), with nodes i, j ∈ {1, 2, 3}
and aspect α2 ∈ {1, 2, 3}.
The update order for the state nodes also needs to
reflect the causality from the ordered aspects. In partic-
ular, if a ∈ O is an ordered aspect and we update a state
node in a layer β, then the final meso-set assignment for
state nodes in layers α with αa < βa should already be
fixed. For example, in Fig. 1, an edge direction should re-
spect the arrow of time; and it is also necessary that the
assignment of all state nodes in the first time point are
fixed before one updates the assignments of state nodes
in the second time point. To achieve the latter, we di-
vide the layers into sets of "order-equivalent" layers, such
that two layers α and β are order-equivalent if and only
if αa = βa for all a ∈ O. We also say that layer α pre-
cedes layer β if and only if αa < βa for all a ∈ O. (For
example, the three layers in Fig. 1 that correspond to
the first time point are order-equivalent and precede the
three layers that correspond to the second time point.)
Based on this equivalence relation, we obtain an ordered
set of equivalence classes by inheriting the order from the
ordered aspects. If we sort the classes of order-equivalent
layers based on "lexicographic" order [95] of the ordered
aspects, then (as a consequence of Eq. (5)) the meso-set
assignment of state nodes in a given layer depends only on
the assignment of state nodes in order-equivalent or pre-
ceding layers. This ensures that our partition-generation
process reflects notions of causality that arise in multi-
layer networks with at least one ordered aspect.
9
same distribution.) For an unordered multilayer network,
our sampling algorithm reduces to (pseudo-)Gibbs sam-
pling, because all layers are order-equivalent and there
is thus only one class of order-equivalent layers. For a
partially-ordered multilayer network, there are multiple
non-singleton classes of order-equivalent layers. We use
(pseudo-)Gibbs sampling on each class, conditional on
the meso-set assignment of state nodes in preceding lay-
ers.
In Appendix B, we explain our sampling process in
more detail. We describe our (pseudo-)Gibbs sampling
procedure for each class of order-equivalent layers, and
we show pseudo-code that one can use to sample parti-
tions in unordered, partially-ordered, and fully-ordered
multilayer networks in Algorithm 1. We also discuss
the convergence properties of our sampling procedure for
unordered and partially-ordered multilayer networks, in-
cluding the effect of the potential incompatibility of the
distributions that are defined by Eq. (4).
Sampling process
C. Layer-coupled and diagonal interlayer
dependencies
The general idea of our sampling process is to simul-
taneously sample the meso-set assignment of state nodes
within each class of order-equivalent layers and to se-
quentially sample the meso-set assignment of state nodes
in non-order-equivalent layers, conditional on the fixed
assignment of state nodes in preceding layers.
from the null distribution (i.e., Si,α(0) ∼ Pα
More specifically, our sampling algorithm proceeds as
follows. First, we sample an initial multilayer partition
0 ). Sec-
ond, we sample a partition for the first class of order-
equivalent layers using (pseudo-)Gibbs sampling. In par-
ticular, we iteratively sample a layer uniformly at ran-
dom from the first class of order-equivalent layers and
update the meso-set assignment of all state nodes in that
layer [96] based on Eq. (4). This defines a Markov chain
on a subspace of multilayer partitions. We repeat the
update process for sufficiently many iterations such that
we approximately sample the meso-set assignments of
the first class of order-equivalent layers from a station-
ary distribution of this Markov chain. Third, we sample
state node assignments for subsequent classes of order-
equivalent layers in the same way, based on a fixed state-
node assignment from preceding layers. In particular, at
each update step τ in Eq. (4), a state node can either
copy a fixed meso-set assignment from an in-neighbor in
a preceding layer, copy a current meso-set assignment
from an in-neighbor in an order-equivalent layer, or ob-
tain a meso-set assignment from the null distribution.
For a fully-ordered multilayer network (i.e., a multi-
layer network with U = ∅), each class of order-equivalent
layers consists only of a single layer. Consequently,
one needs only a single update for each state node
for the sampling process to converge. (Subsequent up-
dates would constitute independent samples from the
As we mentioned at the beginning of Section IV, a par-
ticularly useful restriction of the interlayer-dependency
tensor that still allows us to represent many situations of
interest is to assume that it is layer-coupled and diago-
nal. For simplicity, we also assume that the multilayer
network is fully interconnected. Under these assump-
tions, we can express the interlayer-dependency tensor
P using a layer-coupled interlayer-dependency tensor (cid:101)P
with elements P j,β
α . The probability that
state node (j, β) copies its meso-set assignment from an
arbitrary state node when (j, β)'s meso-set assignment is
updated is given by
i,α = δ(i, j)(cid:101)P β
pβ = (cid:88)α∈L(cid:101)P β
α .
(6)
(7)
α = 0 for all
α ∈ L. The update equation (Eq. (4)) then simplifies to
As before, we require that pβ ≤ 1 and (cid:101)P α
P[Sj,β(τ + 1) = sS(τ )]
=(cid:88)α∈L(cid:101)P β
+ (1 − pβ) Pβ
α δ(Sj,α(τ ), s)
0 [Sj,β = s] ,
(which is now independent of state nodes) and the null
α quantifies the extent to
which an induced partition in layer β depends directly on
an induced partition in layer α. By considering different
which depends on the interlayer-dependency tensor (cid:101)P
distributions P0. Each term (cid:101)P β
(cid:101)P , one can generate multilayer networks that correspond
to several important scenarios, including temporal net-
works, multiplex networks, and multilayer networks with
10
(a) Layer-coupled temporal
(b) Layer-coupled multiplex
dependencies
dependencies
Figure 2.
Layer-coupled interlayer dependency tensors
(which, in this case, are matrices) for different types of multi-
layer networks with a single aspect. (a) In a typical temporal
network, an induced partition in a layer depends directly only
on the induced partition in the previous layer. Therefore, the
only nonzero elements of the layer-coupled interlayer depen-
dency tensor occur in the first superdiagonal. (b) In a typical
multiplex network, an induced partition in a layer depends di-
rectly on the induced partitions in all other layers. We show
a layer-coupled example. The copying probability in Eq. (6)
is pβ for the temporal layer-coupled interlayer-dependency
matrix in panel (a) and p for the multiplex layer-coupled
interlayer-dependency matrix in panel (b). We suppress the
subscript β in panel (b), as the copying probability is the
same for all layers.
more than one aspect (e.g., with combinations of tempo-
ral and multiplex features). That is, the above restriction
reduces the dimension of the interlayer-dependency ten-
sor significantly, while still allowing one to analyze several
very important situations.
In Fig. 2, we show layer-coupled interlayer-dependency
tensors for two types of single-aspect multilayer networks:
a temporal network and a multiplex network. As we men-
tioned in Section IV, it is useful to think of interlayer
dependencies as causal links for the flow of information
between layers. In a temporal network, it is typical to
assume that an induced partition in a layer depends di-
rectly only on induced partitions in the previous layer.
There are thus l − 1 copying probabilities (one for each
pair of consecutive layers), which we are free to choose.
Common examples include choosing the same probability
for each pair of consecutive layers [10, 12] or making some
of the probabilities significantly smaller than the others
to introduce change points [44, 97]. In a multiplex net-
work, an induced partition in any layer can in principle
depend directly on induced partitions in all other layers.
This yields l(l − 1) copying probabilities to choose. In
Fig. 2b, we illustrate the simplest case, in which each
layer depends equally on every other layer. The layer-
coupled interlayer-dependency tensors in Fig. 2 are ma-
trices, so we sometimes refer to them and other examples
of layer-coupled interlayer-dependency tensors with a sin-
gle aspect as layer-coupled interlayer-dependency matri-
Figure 3. Block-matrix representation of a layer-coupled
interlayer-dependency tensor for a multilayer network that
is both temporal and multiplex. This example has more
than one aspect, and it combines the features of the exam-
ples in Fig. 2.
It has two classes of order-equivalent layers
(where each corresponds to one time point), as indicated by
the presence of two diagonal blocks. An induced partition
in a layer depends directly on the induced partitions of its
order-equivalent layers and on the induced partition of the
corresponding layer in the preceding class of order-equivalent
layers. If we think of the interlayer edges in Fig. 1 as edges in
an interlayer-dependency network, this matrix with diagonal
blocks of size 3 × 3 would be the corresponding layer-coupled
interlayer-dependency tensor.
ces.
We can also generate multilayer networks with more
than one aspect and can thereby combine temporal and
multiplex features. In Fig. 3, we illustrate how to con-
struct a layer-coupled interlayer-dependency tensor to
generate such a multilayer network on a simple exam-
ple with two aspects, one of which is multiplex and the
other of which is temporal.
D. Temporal and multiplex partitions
In Fig. 4 and Fig. 5, we show example multilayer parti-
tions that we obtain with the interlayer-dependency ten-
sors of Fig. 2. The examples in Fig. 4 are temporal,
and the examples in Fig. 5 are multiplex. For simplicity,
we assume in Fig. 2a that dependencies between con-
tiguous layers are uniform (i.e., pβ = p ∈ [0, 1] for all
β ∈ {2, . . . , l}). To illustrate the effect of the interlayer
dependencies, we also show a heat map of the normalized
mutual information (NMI) [98] between induced parti-
tions in different layers. NMI is a measure of similarity
between partitions, so we expect the values of NMI to
0p2000pl00eP=ePβα=δ(α+1,β)pβ,pβ=pβ≤10pppppp0eP=ePβα=(1−δ(α,β))p,p=(l−1)p≤10p1,1p1,1p1,200p1,10p1,10p1,1p1,1000p1,2000p2,2p2,2p2,2p2,200p2,2p2,20α2=1α2=2β2=1β2=2eP=ePβ1,β2α1,α2=(1−δ(α1,β1))δ(α2,β2)pβ1,β2+δ(α1,β1)δ(α2+1,β2)pβ1,β211
(a) p = 0
(b) p = 0.5
(c) p = 0.85
(a) p = 0
(b) p = 0.5
(c) p = 0.85
(d) p = 0.95
(e) p = 0.99
(f) p = 1
(d) p = 0.95
(e) p = 0.99
(f) p = 1
Figure 4. Example temporal partitions for (n, l) = (150, 100).
(Recall that n is the number of physical nodes and l is the
number of layers.) We use the interlayer-dependency ten-
sor from Fig. 2a with uniform probabilities pβ = p for all
β ∈ {1, . . . , l} and a Dirichlet null distribution with q = 1,
θ = 1, and nset = 5 (see Appendix A). For (a) p = 0, (b)
p = 0.5, (c) p = 0.85, (d) p = 0.95, (e) p = 0.99, and (f) p = 1,
, top) for a
we show color-coded meso-set assignments (
single example output partition and NMI values [98] (0
1,
bottom) between induced partitions in different layers aver-
aged over a sample of 10 output partitions. The parameter
values match those in the numerical examples in Section VI
(with the exception of p = 0, which we include for complete-
ness). We choose a node ordering for each visualization that
(whenever possible) emphasizes "persistent" mesoscale struc-
ture [16]. We show only the first 15 layers of each multilayer
partition, because (as one can see in the NMI heat maps) sim-
ilarities between induced partitions for p < 1 decay steeply
with the number of layers when dependencies exist only be-
tween contiguous layers.
reflect the planted dependencies. As expected, for the
temporal examples, partitions are most similar for adja-
cent layers. Similarities decay with the distance between
layers and increase with the value of p. For the multiplex
examples, we obtain approximately uniform similarities
between pairs of layers (for all pairs of layers), where
the similarities increase with the value of p. We use the
examples of interlayer dependency of Figs. 4 and 5, as
well as non-uniform and multi-aspect examples, in our
Figure 5. Example multiplex partitions for (n, l) = (1000, 15).
We use the interlayer-dependency tensor in Fig. 2b and a
Dirichlet null distribution with q = 1, θ = 1, and nset = 10
(see Appendix A). We perform 200 updating iterations (see
Appendix B). For (a) p = 0, (b) p = 0.5, (c) p = 0.85, (d)
p = 0.95, (e) p = 0.99, and (f) p = 1, where p = (l− 1)p is the
probability that a state node copies its assignment from an-
other state node, we show color-coded meso-set assignments
, top) for a single example output partition and NMI
(
values [98] (0
1, bottom) between induced partitions in
different layers averaged over a sample of 10 output parti-
tions.
(For the temporal case in Fig. 4, note that p = p.)
The parameter values match those in the numerical examples
in Section VI (with the exception of p = 0, which we include
for completeness). We choose a node ordering that (whenever
possible) emphasizes "persistent" mesoscale structure [16].
numerical experiments of Section VI.
To provide a detailed illustration of the steps that re-
sult in a multilayer partition, we focus on the temporal
examples in Fig. 4. For the important special case of
temporal interlayer dependencies, the generative model
for multilayer partitions simplifies significantly. In par-
ticular, there is a single ordered aspect, so the layer index
α ∈ N is a scalar and the order of the layers corresponds
to temporal ordering. Furthermore, as we mentioned in
Section IV B, for a fully-ordered multilayer network, we
require that the order of the meso-set-assignment update
process in Eq. (4) respects the order of the layers. The
update order of state nodes (1, α) . . . (n, α) in any given
151015150100150layernodePartition150100150100layerlayerNMI151015150100150layernodePartition150100150100layerlayerNMI151015150100150layernodePartition150100150100layerlayerNMI151015150100150layernodePartition150100150100layerlayerNMI151015150100150layernodePartition150100150100layerlayerNMI151015150100150layernodePartition150100150100layerlayerNMI15101515001000layernodePartition151015151015layerlayerNMI15101515001000layernodePartition151015151015layerlayerNMI15101515001000layernodePartition151015151015layerlayerNMI15101515001000layernodePartition151015151015layerlayerNMI15101515001000layernodePartition151015151015layerlayerNMI15101515001000layernodePartition151015151015layerlayerNMI0
layer α can be arbitrary (so we can update them simulta-
neously), but each update is conditional on the meso-set
assignment of state nodes in layer α − 1.
The update process that we described in Section IV B
reduces to three steps:
(1) initialize (in an arbitrary
order) the meso-set assignments in layer α = 1; (2)
take the meso-set assignment of (i, α + 1) to be that of
(i, α) with probability p, and sample the meso-set as-
signment of (i, α + 1) from Pα+1
with complementary
probability 1 − p; and (3) repeat steps (1) and (2) until
α + 1 = l. As we mentioned in Section IV B, conver-
gence is not an issue for this case (or, more generally,
for any fully-ordered multilayer network), as we need
only one iteration through the layers. This three-step
generative model for temporal partitions was also sug-
gested by Ghasemian et al [50]. They used it to derive
a detectability threshold for the case in which the null
distributions are uniform across meso-sets (i.e., θ → ∞
in Section IV A) and intralayer edges are generated in-
dependently using the standard SBM. In other words,
one replaces the degree-corrected SBM in Section V with
the non-degree-corrected SBM of [42]. In Appendix C,
we highlight properties of a sampled temporal partition
that illustrate how the interplay between p and the null
distributions affects the evolution of meso-sets across lay-
ers (e.g., growth, birth, and death of induced meso-sets).
The properties that we highlight hold for any choice of
null distribution. In the same appendix, we subsequently
illustrate that the particular choice of null distributions
can greatly influence resulting partitions. For example, a
non-empty overlap between the supports of null distribu-
tions that correspond to contiguous layers is a necessary
condition for meso-sets to gain new state nodes over time.
The properties and observations in Appendix C are in-
dependent of one's choice of planted-partition network
model.
V. GENERATING NETWORK EDGES
There are diverse different types of multilayer networks
[4, 8]. One common type of empirical multilayer net-
work to study is one with only intralayer edges. There
are also many empirical multilayer networks with both
intralayer and interlayer edges (e.g., multimodal trans-
portation networks [99]), as well as ones with only in-
terlayer edges (e.g., temporal networks with edge delays,
such as departures and arrivals of flights between air-
ports [5, 100]). One can use our framework to generate
all three types of examples, provided the underlying edge
generation model is a planted-partition network model.
Having generated a multilayer partition S with de-
pendencies between induced partitions in different layers,
the simplest way to generate edges is to use any single-
layer planted-partition network model (e.g., SBMs [42,
43, 49, 57, 63, 101], models for spatially-embedded net-
works [12, 64], and so on) and to generate edges for each
layer independently. This yields a multilayer network
12
with only intralayer edges, such that any dependencies
between different layers result only from dependencies
between the partitions that are induced on the differ-
ent layers. For our numerical experiments in Section VI,
we use a single-layer network model that is a slight
variant (avoiding the creation of self-edges and multi-
edges) of the degree-corrected SBM (DCSBM) bench-
mark from [43], where "DCSBM benchmark" designates
the specific type of DCSBM that was used in the nu-
merical experiments of [43]. We include pseudocode for
our implementation of the DCSBM benchmark in Algo-
rithm 3 of Appendix D.
One can also include dependencies between layers
other than those that are induced by planted mesoscale
structures. For example, one can introduce dependen-
cies between the parameters of a single-layer planted-
partition network model by (1) sampling them from a
common probability distribution (e.g., interlayer degree
correlations [4, 102] in a DCSBM) or by (2) introduc-
ing interlayer edge correlations, given a single-layer par-
tition on each layer [103]. For temporal networks, one
can also incorporate "burstiness" [2, 3, 104] in the inter-
event-time distribution of edges. In such a scenario, the
probability for an edge to exist in a given layer depends
not only on the induced partition on that layer but also
on the existence of the edge in previous layers. For ex-
ample, one can use a Hawkes process to specify the time
points at which edges are active [105, 106].
In Appendix D, we describe a generalization of the
DCSBM in [43] to multilayer networks that one can use
to generate intralayer edges and/or interlayer edges. Our
generalization constitutes a framework within which we
formulate the parameters of a single-layer DCSBM in a
multilayer setting. One can use our multilayer DCSBM
(M-DCSBM) framework to incorporate some of the fea-
tures that we described in the previous paragraph (e.g.,
degree correlations) in a multilayer network with in-
tralayer and/or interlayer edges.
VI. NUMERICAL EXAMPLES
In this section, we use our framework to construct
benchmark models for multilayer community-detection
methods and algorithms. We use the examples of
interlayer-dependency tensors from Figs. 2 and 3 to gen-
erate benchmark models. We also consider a variant of
Fig. 2b in which we split the layers into groups, use uni-
form dependencies between layers in the same groups,
and treat layers in different groups as independent of each
other. These examples cover commonly studied temporal
and multiplex dependencies, and they illustrate how one
can generate benchmark multilayer networks with more
than one aspect. We focus on a couple of popular qual-
ity functions for multilayer community detection in our
numerical examples, rather than investigating any given
method or algorithm in detail.
We compare the behavior of several variants of [107],
which are similar to the the locally greedy Louvain com-
putational heuristic [108], to optimize a multilayer mod-
ularity objective function [16, 33] using the standard
Newman -- Girvan null model (which is a variant of a "con-
figuration model" [109]). Modularity is an objective func-
tion that is often used to partition sets of nodes into
communities that have a larger total internal edge weight
than the expected total internal edge weight in the same
sets in a "null network" [16], which is generated from
some null model. Modularity maximization consists of
finding a partition that maximizes this difference. For
our numerical experiments, we use the generalization of
modularity to multilayer networks of [33]. For multilayer
modularity, the strength of the interactions between dif-
ferent layers are governed by an interlayer-coupling ten-
sor that controls the incentive for state nodes in different
layers to be assigned to the same community. We use
multilayer modularity with uniform interlayer coupling,
so the strength of the interactions between different lay-
ers of the network depends on a layer-independent and
node-independent interlayer coupling weight ω ≥ 0. We
use diagonal and categorical (i.e., between all pairs of lay-
ers) interlayer coupling with weight ω for the multiplex
examples in Section VI A. We use diagonal and ordinal
(i.e., between contiguous layers) interlayer coupling with
weight ω for the temporal examples in Section VI B. In
Appendix E, we describe the Louvain algorithm and the
variants of it that we use in this section.
We compare the results of multilayer modularity max-
imization with those of multilayer InfoMap [110] [9],
which uses an objective function called the "map equa-
tion" (which is not an equation), based on a discrete-time
random walk and ideas from coding theory, to coarse-
grain sets of nodes into communities [111].
In multi-
layer InfoMap, one uses a probability r ∈ [0, 1] called
the "relaxation rate" to control the relative frequency
with which a random walker remains in the same layer
or moves to other layers.
(A random walker cannot
change layers when r = 0.) The relaxation rate thus con-
trols the interactions between different layers of a mul-
tilayer network. We allow the random walker to move
to all other layers when r (cid:54)= 0 for the multiplex exam-
ples in Section VI A, and we allow the random walker
to move only to adjacent layers for the temporal exam-
ples in Section VI B. In contrast to multilayer modularity
(where ω = 0 yields single-layer modularity), single-layer
InfoMap is not equivalent to choosing r = 0 in mul-
tilayer InfoMap because placing state nodes that cor-
respond to the same physical node in the same commu-
nity can contribute positively to the quality function even
when r = 0 [9]. Consequently, we compute single-layer
InfoMap separately and reference it by the data point
"s" on the horizontal axis.
In all experiments in this section, we generate a mul-
tilayer partition using our copying process in Section IV
(see Algorithm 1 in Appendix B) and a multilayer net-
work for a fixed planted partition using a slight variant
of the DCSBM benchmark network model in [43] that
13
avoids generating self-edges and multi-edges (see Algo-
rithm 3 in Appendix D). This produces multilayer net-
works that have only intralayer edges and in which the
connectivity patterns in different layers depend on each
other. Following [43], we parametrize the DCSBM bench-
mark in terms of its distribution of expected degrees and
a community-mixing parameter µ ∈ [0, 1] that controls
the strength of the community structure in the sampled
network edges. For µ = 0, all edges lie within commu-
nities; for µ = 1, edges are distributed independently of
the communities, where the probability of observing an
edge between two state nodes in the same layer depends
only on the expected degrees of those two state nodes.
We use a truncated power law for the distribution of ex-
pected degrees.
The DCSBM benchmark imposes community structure
as an expected feature of an ensemble of networks that
it generates. The definition of the mixing parameter
µ of the DCSBM benchmark ensures that the planted
partition remains community-like -- as intra-community
edges are more likely to be observed and inter-community
edges are less likely to be observed than in a network that
is generated from a single-block DCSBM with the same
expected degrees -- for any value of µ < 1. Consequently,
given sufficiently many samples from the same DCSBM
benchmark (i.e., all samples have the same planted par-
tition and same expected degrees), one should be able to
identify the planted community structure for any value
of µ < 1 (where the necessary number of samples goes
to infinity as µ → 1). This feature makes the DCSBM
benchmark an interesting test for the ability of multilayer
community-detection methods to aggregate information
from multiple layers.
We use NMI [98] to compare the performance of dif-
ferent community-detection algorithms. For each of our
partitions, we compute the mean of the NMI between the
partition induced on each layer by the output partition
and that induced by the planted partition. That is,
(cid:104)NMI(cid:105)(S,T ) =
1
l (cid:88)α∈L
NMI(Sα,T α) .
In particular,
The quantity (cid:104)NMI(cid:105) is invariant under permutations
of the meso-set labels within a layer. Consequently,
(cid:104)NMI(cid:105) is well-suited to comparing multilayer community-
detection methods with single-layer community-detection
methods.
it allows us to test whether
multilayer community-detection methods can exploit de-
pendencies between layers of a multilayer network when
p (cid:29) 0 (see Eq. (6)). In Appendix F, we show numerical
experiments in which we compute NMI between multi-
layer partitions. We denote the NMI between two multi-
layer partitions by mNMI.
In all of our numerical experiments in Sections VI A
and B, we sample the benchmark networks in the fol-
lowing way. For each value of p, we generate 10 sample
partitions. For each sample partition and value of µ, we
generate 10 sample multilayer networks. This yields 100
benchmark instantiations for each pair (p, µ). We run
each community-detection algorithm 10 times on each
In Figs. 6 -- 9, we show (cid:104)NMI(cid:105) between
instantiation.
planted and recovered multilayer partitions averaged over
sample partitions, sample networks, and algorithmic runs
for each value of µ. The results for different planted par-
titions are generally similar. The only exception is In-
foMap on temporal networks with p = 0.99 and p = 1,
where we observe large differences between results for
different partitions for certain values of µ.
Figures 6 -- 9 correspond to different choices for the
interlayer-dependency tensor.
In each figure, rows cor-
respond to different choices for the community-detection
algorithm, and columns correspond to different values
of the copying probabilities (with the strength of inter-
layer dependencies increasing from left to right). All
benchmark instantiations that we use for Figs. 6 -- 10
are available at https://dx.doi.org/10.5281/zenodo.
3304059.
A. Multiplex examples
In this section, we consider two stylized examples of
multiplex networks. Multiplex networks arise in a variety
of different applications, including international relations
and trade [112 -- 114], social networks [115], and ecologi-
cal networks [116]. In our multiplex examples, we con-
sider simple dependency structures in which we expect
multilayer community-detection methods to outperform
single-layer methods by exploiting interlayer dependen-
cies.
In Fig. 6, we consider multiplex networks with uni-
form dependencies between community structure in dif-
ferent layers.
In Fig. 7, we consider multiplex net-
works with nonuniform dependencies between commu-
nity structure in different layers.
In both figures, we
parametrize the amount of interlayer dependency in a
network by the probability p (see Eq. (6)) that a state
node copies its community assignment from a neighbor in
the interlayer-dependency network. All multilayer net-
works have n = 1000 physical nodes and l = 15 lay-
ers. Each node is present in every layer, so there are
a total of 15000 state nodes.
In Fig. 2b, we show the
layer-coupled interlayer-dependency matrix that we use
to generate the uniform multiplex networks. For the
nonuniform multiplex networks, we split the layers into
3 groups of 5 layers each. We use uniform dependencies
between layers in the same group, and layers in differ-
ent groups are independent of each other. The resulting
layer-coupled interlayer-dependency matrix is block diag-
onal with diagonal blocks as in Fig. 2b and 0 entries on
the off-diagonal blocks. We use a Dirichlet null distribu-
tion with nset = 10, θ = 1, and q = 1 (see Appendix A)
to specify expected community sizes and the M-DCSBM
benchmark (see Appendix D) with ηk = 2, kmin = 3, and
kmax = 150 to generate intralayer edges. We perform 200
iterations of our update process (see Appendix B).
Comparing our results for GenLouvain (Figs. 6a -- e
14
and 7a -- c) and GenLouvainRand with reiteration and
post-processing (Figs. 6f -- j and 7d -- f), we see that the
choice of optimization heuristic for a given quality func-
tion can significantly affect the quality of resulting iden-
tified partitions. In particular, for GenLouvain, we ob-
serve two distinct regimes and what appears to be a sharp
transition between them [117]. For ω < 1, we obtain a
partition that is of similar quality to what we obtain by
maximizing single-layer modularity; however, for ω > 1,
we obtain a partition with identical induced partitions
for each layer. We call the latter an aggregate partition.
Although the aggregate partition can be more similar to
the planted partition than the single-layer partition when
p is sufficiently large (e.g., this occurs in Figs. 6d and e),
we do not observe an interval of ω values between the
two regimes in which GenLouvain recovers the planted
partition better than both the single-layer and aggregate
partitions. By contrast, GenLouvainRand with reiter-
ation and post-processing identifies partitions that match
the planted partition more closely than either the single-
layer or aggregate partitions in most cases. The excep-
tions are uniform multiplex networks with p = 0.5 (see
Fig. 6f), where it is unable to exploit the weak depen-
dencies to outperform the single-layer case; and p = 1
(Fig. 6j), where the aggregate partition is always best.
Most of the improvement in the results for GenLou-
vainRand over those for GenLouvain comes from re-
iteration. The additional randomization helps smooth
out the transition at ω ≈ 1. Post-processing only yields
a minor improvement in the value of (cid:104)NMI(cid:105). However,
its effect is more pronounced if we compute the mNMI
between multilayer partitions (see Appendix F).
Multilayer InfoMap exhibits some problematic be-
havior in these benchmark experiments. Our results
for multilayer InfoMap are noticeably worse than those
that we obtain with single-layer InfoMap (correspond-
ing to the data point "s" on the horizontal axis) for
networks with comparatively weak community structure
(specifically, µ ≥ 0.4), unless the planted partition for dif-
ferent layers is very similar (i.e., unless p ≥ 0.99). Fur-
thermore, the methods that are based on multilayer mod-
ularity outperform multilayer InfoMap in our experi-
ments for networks with weak community structure and
similar layers (i.e., when both µ and p are close to 1). In-
foMap does not identify meaningful community struc-
ture in networks with µ > 0.7 in any of our numerical ex-
amples, whereas GenLouvain and GenLouvainRand
identify meaningful structure even for networks with very
weak community structure (e.g., with µ = 0.9) for suffi-
ciently large values of ω.
Our results for nonuniform multiplex networks in Fig. 7
are similar to those that we showed for the uniform
multiplex networks in Fig. 6.
In particular, we see
that GenLouvainRand can exploit dependencies be-
tween community structure in different layers (although
the improvement over single-layer modularity is less pro-
nounced than in the uniform examples), whereas Gen-
Louvain cannot. The main difference is that for p = 1,
GenLouvain
15
(a) p = 0.5
(b) p = 0.85
(c) p = 0.95
(d) p = 0.99
(e) p = 1
GenLouvainRand
(f) p = 0.5
(g) p = 0.85
(h) p = 0.95
(i) p = 0.99
(j) p = 1
InfoMap
(k) p = 0.5
(l) p = 0.85
(m) p = 0.95
(n) p = 0.99
(o) p = 1
Figure 6. Multiplex networks with uniform interlayer dependencies. Effect of interlayer coupling strength ω and relaxation
rate r on the ability of different community-detection algorithms to recover planted partitions as a function of the community-
mixing parameter µ in benchmark networks with uniform multiplex dependencies (see Fig. 2b). Each multilayer network has
1000 nodes and 15 layers, and each node is present in all layers. All NMI values are means over 10 runs of the algorithms and
100 instantiations of the benchmarks. (See the introduction of Section VI.) Each curve corresponds to the mean NMI values
that we obtain for a given value of µ, and the shaded area around a curve corresponds to the minimum and maximum NMI
values that we obtain with the 10 sample partitions for a given value of p.
the aggregate partitions from GenLouvain and Gen-
LouvainRand do not recover the planted partition for
sufficiently large values of ω, because the induced parti-
tions are not identical across layers in the planted parti-
tion. In principle, multilayer InfoMap should have an
advantage over methods based on maximizing multilayer
modularity in this case study, as the former's quality
function is designed to detect breaks in community struc-
ture, whereas multilayer modularity forces some persis-
tence of community labels between any pair of layers. In
practice, however, multilayer InfoMap correctly identi-
fies the planted community structure only when it is par-
ticularly strong (as we show in Appendix F, it correctly
identifies the different groups of layers for networks with
µ ≤ 0.3); and it is outperformed by single-layer InfoMap
for networks with µ ≥ 0.4.
We suspect that at least some of the shortcomings of
multilayer InfoMap in these experiments are due to the
use of a Louvain-like optimization heuristic, rather than
from flaws in InfoMap's quality function. As we have
seen from the results with the heuristics GenLouvain
and GenLouvainRand, seemingly minor adjustments
of an optimization heuristic can have large effects on the
quality of the results. We are thus hopeful that similar
adjustments can also improve the results for multilayer
InfoMap.
B. Temporal examples
Temporal networks arise in many different applications
[2, 3], such as the study of brain dynamics [17], financial-
asset correlations [16], and scientific citations [18]. When
representing a temporal network as a multilayer network,
one orders the layers in a causal way, such that structure
in a particular layer depends directly only on structure
in previous layers (and not in future layers). To gen-
µ=0µ=0.1µ=0.2µ=0.3µ=0.4µ=0.5µ=0.6µ=0.7µ=0.8µ=0.9µ=110−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIiGenLouvain
(a) p = 0.85, pc = 0
(b) p = 0.95, pc = 0
(c) p = 1, pc = 0
GenLouvainRand
(d) p = 0.85, pc = 0
(e) p = 0.95, pc = 0
(f) p = 1, pc = 0
InfoMap
(g) p = 0.85, pc = 0
(h) p = 0.95, pc = 0
(i) p = 1, pc = 0
Figure 7. Multiplex networks with nonuniform interlayer de-
pendencies. Effect of interlayer coupling strength ω and re-
laxation rate r on the ability of different community-detection
algorithms to recover planted partitions as a function of the
community-mixing parameter µ in a multiplex benchmark
with nonuniform interlayer dependencies. Each multilayer
network has 1000 nodes and 15 layers, and each node is
present in all layers. The layer-coupled interlayer-dependency
matrix is a block-diagonal matrix with diagonal blocks of
size 5 × 5. For each diagonal block, we set the value in the
interlayer-dependency matrix to a value p (so each diagonal
block has the same structure as the matrix in Fig. 2b); for
each off-diagonal block, we set the value to pc = 0, thereby
incorporating an abrupt change in community structure. All
NMI values are means over 10 runs of the algorithms and 100
instantiations of the benchmarks. Each curve corresponds to
the mean NMI values that we obtain for a given value of µ,
and the shaded area around a curve corresponds to the min-
imum and maximum NMI values that we obtain with the 10
sample partitions for a given value of p.
erate multilayer networks that have such structure, we
use our sampling process for fully-ordered multilayer net-
works and the interlayer-dependency tensor of Fig. 2a.
We consider two stylized examples of temporal net-
works. In Fig. 8, we show results for temporal networks
that have uniform dependencies between consecutive lay-
ers (and hence tend to evolve gradually). To generate
these networks, we set pβ = p for all layers in Fig. 2a.
In Fig. 9, we show results for temporal networks with
16
change points. To generate these networks, we set pβ = p
for all layers except layers 25, 50, and 75, for which
pβ = pc = 0, resulting in abrupt changes in community
structure. Each multilayer network in these two exam-
ples has n = 150 physical nodes and l = 100 layers. Each
node is present in every layer, so there are a total of
15000 state nodes. We use a Dirichlet null distribution
to specify expected community sizes and set nset = 5,
θ = 1, and q = 1 (see Appendix A). For the tempo-
ral networks with change points in Fig. 9, we choose the
support of the null distribution so that communities after
a change point have new labels. We use the M-DCSBM
benchmark (see Appendix D) with ηk = 2, kmin = 3, and
kmax = 30 to generate intralayer edges.
Both multilayer-modularity-based algorithms
(i.e.,
GenLouvain and GenLouvainRand) can exploit in-
terlayer dependencies for these temporal benchmark net-
works and identify partitions with significantly larger
(cid:104)NMI(cid:105) than those that we obtain with single-layer mod-
ularity (i.e., with ω = 0). Typically, the peak of (cid:104)NMI(cid:105)
seems to occur when 1 (cid:47) ω (cid:47) 4. When p < 1, one ex-
pects (cid:104)NMI(cid:105) to decrease for sufficiently large values of
ω, as increasing ω further favors "persistence" [16] in
the output partition that is not present in the multilayer
planted partition.
For multilayer InfoMap, the results are less promis-
ing. For most parameter choices, the best result for mul-
tilayer InfoMap is at best similar and often worse than
the result for single-layer InfoMap. (The (cid:104)NMI(cid:105) value
for single-layer InfoMap is the data point that we la-
bel with "s" on the horizontal axis.) An exception are
the results for p = 1 and uniform temporal dependencies
(see Fig. 8o). In this example (where induced partitions
are the same across layers), increasing the value of the
relaxation rate r enhances the recovery for all sampled
planted partitions when µ ≤ 0.4 and for a subset of sam-
pled planted partitions when µ = 0.5 and µ = 0.6. The
results for multilayer InfoMap on temporal benchmarks
with uniform interlayer dependencies with p = 0.99 (see
Fig. 8n for µ = 0.3 and µ = 0.4) and p = 1 (see Fig. 8o
for µ = 0.5 and µ = 0.6) are the only instances where we
observe large differences in results for different partitions
that are generated by our model with the same parameter
values.
Comparing results for GenLouvain (see Figs. 8a -- e
and 9a -- c) and GenLouvainRand with reiteration and
post-processing (see Figs. 8f -- j and 9d -- f), we see that
the difference in results between the two optimization
heuristics for multilayer modularity is even more pro-
nounced in these temporal examples than in the mul-
tiplex examples in Section VI A. In particular, GenLou-
vain exhibits an abrupt change in behavior near ω = 1;
this is related to the transition behavior that was de-
scribed in [16]. As we explained in Section VI A (where
we also observed this phenomenon), this transition occurs
for the following reason: for values of ω that are above
a certain threshold [16], only interlayer merges occur in
the first phase of the Louvain heuristic. This abrupt
µ=0µ=0.1µ=0.2µ=0.3µ=0.4µ=0.5µ=0.6µ=0.7µ=0.8µ=0.9µ=110−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIi10−210000.20.40.60.81ωhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIiGenLouvain
17
(a) p = 0.5
(b) p = 0.85
(c) p = 0.95
(d) p = 0.99
(e) p = 1
GenLouvainRand
(f) p = 0.5
(g) p = 0.85
(h) p = 0.95
(i) p = 0.99
(j) p = 1
InfoMap
(k) p = 0.5
(l) p = 0.85
(m) p = 0.95
(n) p = 0.99
(o) p = 1
Figure 8. Temporal networks with uniform interlayer dependencies. Effect of interlayer coupling strength ω and relaxation
rate r on the ability of different community-detection algorithms to recover planted partitions as a function of the community-
mixing parameter µ in a temporal benchmark with uniform interlayer dependencies (i.e., pβ = p ∈ [0, 1] for all β ∈ {2, . . . , l}
in Fig. 2a). Each multilayer network has 150 nodes and 100 layers, and each node is present in all layers. All NMI values are
means over 10 runs of the algorithms and 100 instantiations of the benchmark. (See the introduction of Section VI.) Each curve
corresponds to the mean NMI values that we obtain for a given value of µ, and the shaded area around a curve corresponds to
the minimum and maximum NMI values that we obtain with the 10 sample partitions for a given value of p.
transition no longer occurs with the additional random-
ization in GenLouvainRand, which exhibits smooth be-
havior as a function of ω. However, unlike in our multi-
plex experiments, we observe benefits from the behavior
of GenLouvain in some situations, especially for net-
works with weak community structure (specifically, for
µ ≥ 0.8). This phenomenon first becomes noticeable for
networks with p = 0.95, and it becomes more pronounced
for progressively larger values of p. Compare Figs. 8c -- e
with Figs. 8h -- j; and compare Figs. 9b and c with Figs. 9e
and f.
Our results for temporal benchmark networks with
change points (see Fig. 9) are mostly similar to those
for temporal benchmark networks with uniform depen-
dencies when considering (cid:104)NMI(cid:105) to compare planted and
recovered partitions. Only the results for p = 1 are
noticeably different.
(Compare Figs. 9c, f, and i with
Figs. 8e, j, and o.) Because of the change points, the
induced planted partitions for each layer are not identi-
cal, even when p = 1. Consequently, unlike in Fig. 8,
the results for p = 1 in Fig. 9 are qualitatively similar
to those for smaller values of p. In principle, one might
expect multilayer InfoMap to have an advantage over
multilayer-modularity-based methods in this experiment,
as the former's quality function is designed to detect
abrupt changes in community structure, whereas max-
imizing multilayer modularity always favors some persis-
tence of community labels from one layer to the next.
However, this theoretical advantage is not borne out in
our experiment. When comparing the planted and recov-
ered partitions using the NMI between multilayer parti-
tions, we see that multilayer InfoMap can correctly re-
cover the change points only for p = 1 and µ = {0, 0.1}
(see Appendix F).
µ=0µ=0.1µ=0.2µ=0.3µ=0.4µ=0.5µ=0.6µ=0.7µ=0.8µ=0.9µ=1024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIi18
(a) p = 0.85, a = 0.1 (b) p = 0.85, a = 0.5 (c) p = 0.85, a = 0.9
(d) p = 0.95, a = 0.1 (e) p = 0.95, a = 0.5 (f) p = 0.95, a = 0.9
GenLouvain
(a) p = 0.85, pc = 0
(b) p = 0.95, pc = 0
(c) p = 1, pc = 0
GenLouvainRand
(d) p = 0.85, pc = 0
(e) p = 0.95, pc = 0
(f) p = 1, pc = 0
InfoMap
(g) p = 0.85, pc = 0
(h) p = 0.95, pc = 0
(i) p = 1, pc = 0
Figure 9. Temporal networks with nonuniform interlayer de-
pendencies. Effect of interlayer coupling strength ω and re-
laxation rate r on the ability of different community-detection
algorithms to recover planted partitions as a function of the
community-mixing parameter µ in a temporal benchmark
with nonuniform interlayer dependencies. Each multilayer
network has 150 nodes and 100 layers, and each node is
present in all layers. Every 25th layer (i.e., for layers 25,
50, and 75), we set the value of pβ in Fig. 2a to pc = 0,
thereby introducing an abrupt change in community struc-
ture; and we set all other values of pβ in Fig. 2a to p. All
NMI values are means over 10 runs of the algorithms and 100
instantiations of the benchmark. Each curve corresponds to
the mean NMI values that we obtain for a given value of µ,
and the shaded area around a curve corresponds to the min-
imum and maximum NMI values that we obtain with the 10
sample partitions for a given value of p.
(g) p = 0.99, a = 0.1 (h) p = 0.99, a = 0.5 (i) p = 0.99, a = 0.9
Figure 10. Multi-aspect networks with uniform interlayer de-
pendencies. Effect of the strength of temporal interlayer cou-
pling ωt and multiplex interlayer coupling ωm on the ability of
maximization of multilayer modularity to recover the planted
partition in two-aspect multilayer networks that we generate
using our framework. The first aspect is temporal (and thus
ordered) and the second aspect is multiplex (and thus un-
ordered). The heat maps show the mean ((cid:104)NMI(cid:105), 0
1)
over all layers of the NMI between induced planted parti-
tions and recovered community structure. A black cross indi-
cates the maximum value of (cid:104)NMI(cid:105). The dependence between
structure in different layers increases from top to bottom, and
the importance of the temporal aspect versus the multiplex
aspect increases from left to right. We average our results for
each pair of parameters over 10 runs of GenLouvainRand
with reiteration. The generated networks have n = 100 nodes
and l = 100 layers with LT = LM = 10, so there are a total
of 10000 state nodes. We fix the community-mixing parame-
ter of the M-DCSBM benchmark to be µ = 0.5.
C. Multi-aspect examples
lows:
In this section, we illustrate the ability of our frame-
work to generate multilayer networks with more than
one aspect. A common situation that gives rise to mul-
tilayer networks with two aspects is a multiplex net-
work that changes over time (e.g., citations patterns that
change over time [118]). In our framework, such a situ-
ation corresponds to the interlayer-dependency tensor in
Fig. 3. For the illustrative examples in this section, we
use uniform multiplex and temporal dependencies; and
we parametrize the interlayer dependency tensor as fol-
αt,αm = δ(αt, βt)(1 − δ(αm, βm))(1 − a)p/(lm − 1)
+ δ(αt + 1, βt)δ(αm, βm)ap ,
(cid:101)P βt,βm
where a controls the balance between multiplex and tem-
poral dependencies and p controls the overall strength of
the interlayer dependencies.
To recover communities, we optimize a multi-aspect
µ=0µ=0.1µ=0.2µ=0.3µ=0.4µ=0.5µ=0.6µ=0.7µ=0.8µ=0.9µ=1024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIi024681000.20.40.60.81ωhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIis00.20.40.60.8100.20.40.60.81rhNMIi0.7300.20.40.60.810246810ωmωt0.7600.20.40.60.810246810ωmωt0.8300.20.40.60.810246810ωmωt0.7800.20.40.60.810246810ωmωt0.7900.20.40.60.810246810ωmωt0.8800.20.40.60.810246810ωmωt0.8700.20.40.60.810246810ωmωt0.8100.20.40.60.810246810ωmωt0.8600.20.40.60.810246810ωmωtgeneralization,
Q(S) = (cid:88)(i,α)∈VM
(j,β)∈VM
(cid:20)(cid:16)Aj,β
i,α −
+ C β
i,αkβ
kα
2mβ
j,β
α (cid:17)δ(α, β)
α δ(i, j)(cid:21)δ(Si,α, Sj,β) ,
(8)
of the multilayer modularity function that was intro-
duced in [33].
We specify the interlayer-coupling tensor C (a multi-
aspect generalization of the "interslice coupling" of [33]),
such that it reflects the planted interlayer dependencies,
by writing
C βt,βm
αt,αm = δ(αt, βt)(1 − δ(αm, βm))ωm
+ δ(αt + 1, βt)δ(αm, βm)ωt ,
where ωt denotes the coupling parameter for the tempo-
ral dependencies and ωm denotes the coupling parameter
for the multiplex dependencies.
In Fig. 10, we illustrate the effects of the two inter-
layer coupling parameters, ωt and ωm, on the extent to
which multilayer modularity maximization can recover
a planted partition. We use GenLouvainRand with
reiteration but without post-processing to find a local
optimum of Eq. (8). For all of the values of p and a
that we consider in Fig. 10, we see some improvement
in the performance of multilayer modularity maximiza-
tion with nonzero interlayer coupling compared with the
case where both ωt = 0 and ωm = 0. As the latter
case corresponds to independently maximizing modular-
ity on each layer of a network, this demonstrates that
multilayer modularity is able to exploit the interlayer de-
pendencies to better recover the planted partition. As
expected, increasing a (which gives more weight to tem-
poral dependencies) leads to a shift of the region of the
parameter space with good planted-partition recovery to
larger values of ωt and smaller values of ωm. For pro-
gressively larger p, we observe a small overall increase in
the value of (cid:104)NMI(cid:105), but its dependence on ωt and ωm
remains similar.
VII. CONCLUSIONS
We introduced a unifying and flexible framework for
the construction of generative models for mesoscale struc-
tures in multilayer networks. The three most important
features of our framework are the following: (1) it in-
cludes an explicitly parametrizable tensor P that con-
trols interlayer-dependency structure; (2) it can generate
an extremely general, diverse set of multilayer networks
(including, e.g., temporal, multiplex, "multilevel" [119],
and multi-aspect multilayer networks with uniform or
nonuniform dependencies between state nodes); and (3)
it is modular, as the process of generating a partition is
separate from the process of generating edges, enabling
a user to first generate a partition and then use any
19
planted-partition network model. Along with our pa-
per, we provide publicly available code [14] that users
can modify to readily incorporate different types of null
distributions (see Section IV A), interlayer-dependency
structures (see Section IV B), and planted-partition net-
work models (see Section V).
The ability to explicitly specify interlayer-dependency
structure makes it possible for a user to control which
layers depend directly on each other (by deciding which
entries in the interlayer-dependency tensor are nonzero)
and the strengths of such dependencies (by varying the
magnitude of entries in the interlayer-dependency ten-
sor). One can thereby generate multilayer networks with
either a single aspect or multiple aspects (e.g., tempo-
ral and/or multiplex networks) and vary dependencies
between layers from the extreme case in which induced
partitions in a planted multilayer partition are the same
across layers to the opposite extreme, in which induced
partitions in a planted multilayer partition are gener-
ated independently for each layer from a null distribution
for that layer. To the best of our knowledge, this level
of generality is absent from existing generative models
for mesoscale structures in multilayer networks, as those
models tend to only consider networks with a single as-
pect (e.g., temporal or multiplex) or limited interlayer-
dependency structures (e.g., with the same induced par-
titions in a planted multilayer partition across all layers).
We illustrated several examples of generative models
that one can construct from our framework, with a focus
on a few special cases of interest, rather than on trying
to discuss as many situations as possible. We focused
on community structure in our numerical experiments,
because it is a commonly studied mesoscale structure,
but one can also use our framework to construct genera-
tive models of intra-layer mesoscale structures other than
community structure (e.g., core -- periphery structure, bi-
partite structure, and so on) by taking advantage of the
flexibility of our framework's ability to use any single-
layer planted-partition network model. For our single-
aspect examples, we assumed that interlayer dependen-
cies exist either between all contiguous layers (a special
case of temporal networks), between all layers (a special
case of multiplex networks), or between all contiguous
groups of layers (another special case of multiplex net-
works). For both our temporal and multiplex examples,
we considered both uniform and nonuniform interlayer
dependencies. We also combined some of these scenar-
ios in an example with two aspects, a temporal aspect
and a multiplex aspect. However, our framework's flexi-
bility allows us to construct generative models of multi-
layer networks with more realistic features. For example,
for temporal networks, one can introduce dependencies
between a layer and all layers that follow it (such that
Fig. 2a is an upper triangular matrix with nonzero en-
tries above the diagonal) to incorporate memory effects
[120]. One can also consider interlayer dependencies that
are not layer-coupled. For example, dependencies can be
diagonal but nonuniform, or they can be nonuniform and
exist only between sets of related nodes.
In Section VI, we consider the commonly studied case
of a multilayer network with only intralayer edges and
connectivity patterns in the different layers that depend
on each other. We use a slight variant of the DCSBM
benchmark from [43] to generate edges for each layer (see
Algorithm 3). However, other types of multilayer net-
works are also important [4], and one can readily com-
bine our approach for generating multilayer partitions
with different network generative models that capture
various important features. For example, one can use
an SBM to generate interlayer edges (e.g., using our M-
DCSBM framework, which we discuss in Appendix D), or
one can replace the degree-corrected SBM in Section V
with any other planted-partition network model or other
interesting models (e.g., other variants of SBMs [42, 49]
and models for networks whose structure is affected by
space (and perhaps spatially embedded) [12] or arbitrary
latent features [64]).
In all of these examples, depen-
dencies between connectivity patterns in different layers
arise only from a planted multilayer partition. It is also
possible to modify our network generation process (see
Section V) to incorporate additional dependencies be-
tween layers beyond those that are induced by a planted
mesoscale structure, such as by introducing dependencies
between a node's degree in different layers [102, 121] or
burstiness [104] in inter-event-time distributions of edges.
Our work has the potential for many useful and inter-
esting extensions, and we highlight three of these. First,
although we have given some illustrative numerical exam-
ples in Section VI, the area of benchmarking community-
detection methods in multilayer networks is far from fully
developed. Generative models are useful tools for un-
derstanding the behavior of community-detection meth-
ods in detail and thus for suggesting ways of improving
heuristic algorithms without losing scalability. One can
use our framework to construct benchmark models that
provide a test bed for gaining insight into the advan-
tages and shortcomings of community-detection meth-
ods and algorithms (and, more generally, of meso-set-
detection methods and algorithms). Importantly, we ex-
pect these benchmark models to be very informative for
detecting potential artifacts of algorithms that can some-
times be masked in real-world applications. Second, a
well-understood generative model can be a powerful tool
for statistical inference (i.e., inferring the structure of a
multilayer network rather than generating a multilayer
network with a planted structure) [24]. For temporal
networks, closed forms for the joint distribution of meso-
set assignments have been derived for models that are
special cases of our framework [10, 13]. These results
may be useful for statistical inference. Additionally, it
seems likely that it is possible to adapt Bayesian inference
techniques (including Gibbs sampling [122 -- 124] or varia-
tional methods [125]) that have been developed for SBMs
both for inferring a multilayer partition and for inferring
an interlayer-dependency tensor. A key advantage of the
generality of the framework that we have developed in the
20
present paper is that it may be possible to frame many
model-selection questions in terms of posterior estimation
of the interlayer-dependency tensor. Finally, it is impor-
tant to model interdependent data streams and not just
fixed data sets. For example, for any fully-ordered multi-
layer network, our generative model respects the causal-
ity of layers (e.g., temporal causality), and one can thus
update a multilayer network with a new layer without
the need to update any previous layers. It is critical to
develop generative models that are readily adaptable to
such situations, and our work in this paper is a step in
this direction.
Appendix A: Example null distributions
In this appendix, we discuss parameter choices for a
categorical null distribution and give concrete examples
that can be useful for modeling mesoscale structure in
temporal or multiplex networks.
In Section IV A, we described the general form of a
categorical null distribution:
Pα
0 [s] =(cid:40)pα
s ,
0 ,
s ∈ {1, . . . , nset} ,
otherwise ,
(A1)
where pα
is the probability for a state node in layer
s
α to be assigned to a meso-set s in the absence of in-
terlayer dependencies, nset is the number of meso-sets
in the multilayer partition, and (cid:80)nset
s = 1 for each
α ∈ L. The support Gα of the null distribution Pα
0 is
Gα = {s : Pα
0 [s] (cid:54)= 0}. We say that a label s is active in
a layer α if it is in the support of the null distribution
0 (i.e., if Pα
Pα
0 [s] (cid:54)= 0); and we say that a label is inactive
in layer α if it is in the complement of the support of Pα
(i.e., if Pα
s=1 pα
A natural choice is to sample pα from a Dirichlet dis-
tribution, which is the conjugate prior for the categori-
cal distribution [92, 93]. The Dirichlet distribution over
q variables has q parameters θ1, . . . , θq. Its probability
density function is
0 [s] = 0).
0
p(x1, . . . , xq) =
i=1 θi)
i=1 Γ(θi)
Γ ((cid:80)q
(cid:81)q
xθi−1
i
,
q(cid:89)i=1
where xi ∈ (0, 1) and θi > 0 for each i ∈ {1, . . . , q}.
The case in which all θi are equal is called a "symmet-
ric Dirichlet distribution", which we parametrize by the
common value θ (the so-called "concentration parame-
ter") of the parameters and the number q of variables.
The concentration parameter θ determines the types
of discrete probability distributions that one is likely to
obtain from the symmetric Dirichlet distribution. For
θ = 1, the symmetric Dirichlet distribution is the contin-
uous uniform distribution over the space of all discrete
probability distributions with nset states. As θ → ∞,
the Dirichlet distribution becomes increasingly concen-
trated near the discrete uniform distribution, such that
all entries in pα are approximately equal. As θ → 0,
it becomes increasingly concentrated away from the uni-
form distribution, such that pα tends to have 1 (or a few)
large entries and all other entries are close to 0. Conse-
quently, to have very heterogeneous meso-set sizes, one
would choose θ ≈ 1. To have all meso-sets be of simi-
lar sizes, one would choose a large value of θ. To have a
few large meso-sets and many small meso-sets, one would
choose θ to be sufficiently smaller than 1. The value
of nset also affects the amount of meso-set label overlap
across layers in the absence of interlayer dependencies.
For example, if pα is the same for all layers, then larger
values of nset incentivize less label overlap across layers
(because there are more possible labels for each layer)
and smaller values of nset incentivize more label overlap
across layers (because there are fewer possible labels for
each layer).
In some situations -- e.g., when modeling the birth and
death of communities in temporal networks or the ap-
pearance and disappearance of communities in multiplex
networks -- it is desirable to have meso-set labels that
have a nonzero probability in (A1) only in some layers.
For these situations, we suggest sampling the support of
the distributions before sampling the probabilities pα.
Given the supports for each layer, one then samples the
corresponding probabilities from a symmetric Dirichlet
distribution (or any other distribution over categorical
distributions). That is,
21
One can also allow labels to appear and disappear
when examining multiplex partitions. For example, given
a value for nset, one can generate the support for each
layer by allowing each label s ∈ {1, . . . , nset} to be
present with some probability q and absent with com-
plementary probability 1 − q. This yields a sets of active
and inactive meso-set labels for each layer. One can then
sample the nonzero probabilities in pα that correspond
to active labels from a Dirichlet distribution and set pα
s to
0 for each inactive label s. Because multiplex partitions
are unordered, there is no notion of one layer occurring
after another one, so we do not need to ensure that an
inactive label in a given layer is also inactive in "subse-
quent" layers.
Appendix B: Partition sampling process
In this appendix, we provide a detailed description of
the way in which we sample multilayer partitions, in-
cluding a discussion of the convergence properties of our
sampling process. As we mentioned in Section IV B, we
assume that the multilayer partitions are generated by
a copying process on the meso-set assignment of state
nodes. Recall that the conditional probability distribu-
tion for the updated meso-set assignment of a state node,
given the current state of the copying process (Eq. (4) in
Section IV B), is
α = 0 ,
(A2)
pα
Gα ∼ Dir(θ,Gα) ,
pα
G
= {s ∈ {1, . . . , nset} : Pα
α
where G
0 [s] = 0} is the com-
plement of the support, with nset = maxα∈L max(Gα).
A simple example for a birth/death process for meso-
sets is the following. First, fix a number of meso-sets
and a support (i.e., active community labels) for the first
layer. One then sequentially initializes the supports for
the other layers by removing each meso-set in the sup-
port of the previous layer with probability rd ∈ [0, 1] and
adding a number, sampled from a Poisson distribution
with rate rb ∈ [0,∞), of new meso-sets (with new labels
that are not active in any previous layer). In temporal
networks, for example, this ensures that if a meso-set la-
bel is not in the support of a given layer, then the label
is also not in the support of any subsequent layers. For
this process, the expected number (cid:104)Gα(cid:105) of meso-sets in a
layer approaches rb/rd as one iterates through the layers.
Therefore, one should initialize the size of the support
for the first layer close to this value to avoid transients
in the number of meso-sets. For this process, the life-
time of meso-sets follows a geometric distribution. The
nature of the copying process that we use to introduce de-
pendencies between induced partitions in different layers
typically implies that meso-sets that have been removed
from the support of the null distribution do not lose all
of their members instantly, but instead shrink at a speed
that depends on the values of the copying probabilities
in the interlayer-dependency tensor.
P[Sj,β(τ + 1) = sS(τ )]
P j,β
i,α δ(Si,α(τ ), s)
=(cid:88)(i,α)∈VM
pj,β =(cid:88)(i,α)∈VM
+ (1 − pj,β) Pβ
P j,β
i,α ,
0 [Sj,β = s] ,
(B1)
where P0 is a given set of independent layer-specific null
distributions and P is a given interlayer-dependency ten-
sor. Further recall that a multilayer network can have
both ordered aspects and unordered aspects, where we
denote the set of ordered aspects by O and the set of
unordered aspects by U. Our goal is to sample multi-
layer partitions that are consistent with generation by
Eq. (B1) while respecting the update order from its or-
dered aspects (if present). Recall that two layers, α and
β, are order-equivalent (which we denote by α ∼O β) if
αa = βa for all a ∈ O. Based on this equivalence relation,
we obtain an ordered set of equivalence classes L/∼O by
inheriting the order from the ordered aspects (where, for
definiteness, we consider the lexicographic order [95] over
ordered aspects). We want to simultaneously sample the
meso-set assignment of state nodes within each class of
order-equivalent layers and we want to sequentially sam-
ple the meso-set assignment of state nodes in non-order-
equivalent layers, conditional on the fixed assignment of
state nodes in preceding layers (see Algorithm 1).
function SamplePartition(P , P0, O, nupd)
for (i, α) ∈ Vm do
Si,α ∼ Pα
0
end for
for [α] ∈ L/∼O do
(cid:46) Initialize partition tensor
using null distributions
(cid:46) Loop over ordered aspects
in lexicographic order
(cid:46) Sample uniformly from
order-equivalent layers
(cid:46) Loop over nodes in some
for τ ∈ {1, . . .[α] nupd} do
α ∼ U ([α])
for i ∈ V do
Si,α ∼ P[Si,αS]
order
(cid:46) Update (i, α) according to
Eq. (B1)
end for
end for
end for
return S
end function
ALG. 1. Pseudocode for generating multilayer partitions with
interlayer-dependency tensor P , null distributions Pα
0 , and or-
dered aspects O. The parameter nupd is the expected number
of updates for each state node.
Scan order and compatibility
To sample the induced partitions for each class of
order-equivalent layers, we use a technique that resem-
bles Gibbs sampling [81]. As in Gibbs sampling, we de-
fine a Markov chain on the space of multilayer partitions
by updating the meso-set assignment of state nodes by
sampling from Eq. (B1).
In Gibbs sampling, one as-
sumes that the conditional distributions that are used
to define this Markov chain are compatible, in the sense
that there exists a joint distribution that realizes these
conditional distributions [82 -- 85]. However, for a general
interlayer-dependency tensor, there is no guarantee that
the distributions that are defined by Eq. (B1) are com-
patible. Following [80], we use the term "pseudo-Gibbs
sampling" to refer to Gibbs sampling from a set of po-
tentially incompatible conditional distributions. We can
define different Markov chains by changing the way in
which we select which conditional distribution to apply at
each step (i.e., which state node to update at each step).
The order in which one cycles through the conditional
distributions is known as the scan order [87]. We use the
term sampling Markov chain for the Markov chain that is
defined by pseudo-Gibbs sampling with a specified scan
order. Common scan orders are cycling through con-
ditional distributions in a fixed order and sampling the
update distribution uniformly at random from the set
of conditional distributions. In pseudo-Gibbs sampling,
the choice of scan order deserves careful attention.
In
pseudo-Gibbs sampling, different scan orders correspond
to sampling from different distributions [87]. (By con-
trast, in Gibbs sampling, the choice of scan order influ-
ences only the speed of convergence.) In particular, when
cycling through conditional distributions in a fixed order,
22
conditional distributions that are applied later have an
outsized influence on the stationary distributions of the
sampling Markov chain [87]. Sampling the update distri-
bution uniformly at random mitigates this problem, at
the expense of introducing computational overhead.
We can improve on a purely random sampling strategy
by exploiting the structure of the interlayer-dependency
tensor. In particular, note that the conditional distribu-
tions for state nodes in the same layer are independent
(as we assume that the interlayer-dependency tensor has
no intralayer contributions) and hence compatible. When
updating a set of state nodes from a given layer, we can
update them in any order or even update them concur-
rently. To take advantage of this fact, we first sample a
layer uniformly at random from the current class of order-
equivalent layers and then update all state nodes in that
layer. The sequence of layer updates defines a Markov
chain on the space of multilayer partitions, and its con-
vergence properties determine the level of effectiveness of
our sampling algorithm.
Convergence guarantees
We now discuss two key properties -- aperiodicity and
ergodicity -- that determine the convergence behavior of
finite Markov chains.
First, note that sampling layers uniformly at random
guarantees that the Markov chain is aperiodic. To see
this, note that a sufficient condition for aperiodicity is
that, for all states, there is a nonzero probability to tran-
sition from the state to itself. This clearly holds for our
sampling chain, as it is possible for two consecutive up-
dates to update the same layer, and (because the proba-
bility distributions in Eq. (B1) remain unchanged at the
second update) there is a positive probability that the
second update does not change the partition.
Second, note that if pi,α < 1 for all state nodes
(i, α) ∈ VM such that α ∈ [α], where [α] is a class of
order-equivalent layers, then the sampling Markov chain
for that class is ergodic over a subspace of multilayer par-
titions that includes the support G[α] =(cid:81)α∈[α] Gα of the
null distributions. We have already shown that the sam-
pling Markov chain is aperiodic, so all that remains is to
verify that there exists a sample path from any arbitrary
initial partition S 0 to any arbitrary multilayer partition
S g ∈ G[α] in the support of the null distributions. Such
a sample path clearly exists, as
P(cid:2)Si,α(τ + 1) = Sg
i,α(cid:3)
i,α Si,α(τ ) = S0
(1 − pi,α)Pα
0 [Sg
i,α] > 0 .
≥
1
[α]
Therefore, one can achieve the desired transition using
one update for each state node.
Sample paths of a finite, aperiodic Markov chain con-
verge in distribution to a stationary distribution of the
Markov chain. However, different sample paths can con-
verge to different distributions, and the eventual station-
ary distribution can depend both on the initial condition
and on the transient behavior of the sample path. If the
Markov chain is ergodic, the stationary distribution is
unique, so it is independent of the initial condition and
transient behavior.
After sufficiently many updates (i.e., by specifying a
sufficiently large value for the expected number nupd of
updates for each state node in Algorithm 1), we approx-
imately sample the state of the Markov chains for each
class of order-equivalent layers from their stationary dis-
tributions. For fully-ordered multilayer networks (i.e., for
multilayer networks with U = ∅), setting nupd = 1 is suf-
ficient for convergence, because the equivalence classes
include only a single layer in this case and subsequent
updates are thus independent samples from the same dis-
tribution.
distributions when (cid:80)(i,α)∈VM
Sampling initial conditions in an 'unbiased' way can
be important for ensuring that one successfully explores
the space of possible partitions, as the updating process
is not necessarily ergodic over the support of the null
P j,β
i,α = 1 for some state
nodes. For example, if pi,α = 1 for all (i, α) ∈ VM , then
any partition in which all state nodes in each weakly con-
nected component of the interlayer-dependency network
have the same meso-set assignment is an absorbing state
of the Markov chain.
However, provided the updating process has con-
verged, any partition that one generates should still re-
flect the desired dependencies between induced partitions
for different layers. Therefore, to circumvent the problem
of non-unique stationary distributions when the updating
process is not ergodic, we reinitialize the updating pro-
cess by sampling from the null distribution for each par-
tition that we want to generate. Reinitializing the initial
partition from a fixed distribution for each sample always
defines a unique joint distribution, which is a mixture of
all possible stationary distributions when the updating
process is not ergodic. When the updating process is
ergodic, it is equivalent to sample partitions by reinitial-
izing or to sample multiple partitions from a single long
chain. Using a single long chain is usually more efficient
when one needs many samples and it is not problematic
if there is some dependence between samples [126].
In
our case, however, we usually need only a few samples
with the same parameters, and ensuring independence
tends to be more important than ensuring perfect con-
vergence (provided the generated partitions exhibit the
desired interlayer-dependency structure). Using multiple
chains thus has clear advantages even when the updat-
ing process is ergodic, and it is necessary to use multiple
chains when it is not ergodic.
Convergence tests
It is difficult to determine whether a Markov chain has
converged to a stationary distribution, mostly because it
23
(a) p = 0.5
(b) p = 0.85
(c) p = 0.95
(d) p = 0.99
(e) p = 1
Figure 11. Autocorrelation of the sampling Markov chain,
as measured by mNMI. On the horizontal axis, we show the
value of nupd that we use to generate the first partition in the
comparison. The lag is the number of additional updates per
state node that we use to generate the second partition in the
comparison. We average results over a sample of 100 indepen-
dent chains with different initial partitions. The shaded area
indicates one standard deviation above and below the mean.
Note that the large amount of noise for small values of the
lag is not a result of differences between chains in the sample;
instead, it is an inherent feature of all chains in the sample.
is difficult to distinguish the case of a slow-mixing chain
becoming stuck in a particular part of state space from
the case in which the chain has converged to a station-
ary distribution. There has been much work on trying to
define convergence criteria for Markov chains [127], but
none of the available approaches are entirely successful.
In practice, one usually runs a Markov chain (or chains)
for a predetermined number of steps. One checks manu-
ally for a few examples that the resulting chains exhibit
behavior that is consistent with convergence by examin-
ing autocorrelations between samples of the same chain
and cross-correlations between samples of independent
chains with the same initial state. When feasible, one
can also check whether parts of different, independent
lag=1lag=5lag=10lag=50lag=100lag=20005010015020000.050.10.15nupdmNMI05010015020000.10.2nupdmNMI05010015020000.10.20.30.4nupdmNMI05010015020000.20.40.6nupdmNMI05010015020000.51nupdmNMI24
pendent of nupd (so the curves in Fig. 11 should become
flat). The results in Fig. 11 suggest that the number of
updates that we need for convergence increases moder-
ately with p, where nupd ≈ 50 is sufficient for convergence
even when p = 1.
In Fig. 12, we examine whether the
dependency pattern between induced partitions in differ-
ent layers -- we characterize such a pattern by the NMI
between induced partitions in different layers -- has con-
verged using the mean absolute distance
2
d(S,T ) =
l(l−1) (cid:88)α<β
NMI(Sα,Sβ) − NMI(T α,T β)
(B2)
between the NMI matrices between induced partitions
in a multilayer partition. (We showed examples of such
NMI matrices in Figs. 4 and 5.) As with mNMI, the
mean absolute distance d should become independent of
nupd once the Markov chain has converged to a station-
ary distribution. This yields estimates for the minimum
number of updates for convergence that are consistent
with those from the results in Fig. 11. It is always safe
to use a larger number of updates to sample partitions,
and the results from Figs. 11 and 12 suggest that our
choice of nupd = 200 is conservative.
Figs. 11 and 12 reveal additional important informa-
tion about the behavior of our sampling process. We can
estimate the mixing time of the sampling Markov chain
at stationarity from Fig. 11, because the mixing time
corresponds to the lag that is necessary for the mNMI
to converge to 0. The mixing time at stationarity in-
creases with p and becomes infinite as p → 1, because
the Markov chain converges to an absorbing state. From
Fig. 12, we observe that, for all values of p, the mean
absolute distance d between NMI matrices converges to
a value near 0 and becomes essentially independent of
the lag. This corroborates our assumption that different
partitions that we generate from our sampling process
have similar interlayer-dependency structure.
Appendix C: A generative model for temporal
networks
(a) p = 0.5
(b) p = 0.85
(c) p = 0.95
(d) p = 0.99
(e) p = 1
Figure 12. Convergence of the dependency pattern be-
tween induced partitions in different layers, as measured by
the mean absolute distance d between NMI matrices (see
Eq. (B2)). On the horizontal axis, we show the value of nupd
that we use to generate the first partition in the comparison.
The lag is the number of additional updates per state node
that we use to generate the second partition in the compar-
ison. We average results over a sample of 100 independent
chains with different initial partitions. The shaded area in-
dicates one standard deviation above and below the mean.
chains or different parts of the same chain are consistent
with sampling from the same distribution.
To estimate the number of updates that we need in
the numerical experiments of Section VI A, we examine
the autocorrelation of the Markov chain in two differ-
ent ways.
In Fig. 11, we consider the multilayer NMI
(mNMI) between sampled partitions at different steps of
the Markov chain. We are interested in the behavior of
the mNMI both as a function of nupd (the expected num-
ber of updates per state node that we use to generate the
first partition in the comparison) and the lag (the num-
ber of additional updates per state node that we use to
generate the second partition in the comparison). As the
Markov chain converges to a stationary distribution, the
value of the mNMI for a given lag should become inde-
In this appendix, we examine the generative model for
temporal networks that we considered in Section IV D.
In this model, we assume uniform dependencies be-
tween contiguous layers (i.e., pβ = p ∈ [0, 1] for all
β ∈ {2, . . . , l} in Fig. 2a). For this choice of interlayer-
dependency tensor, our generative model reduces to Al-
gorithm 2.
In this case (and, more generally, for any
fully-ordered multilayer network), convergence is auto-
matic, because we need only one iteration through the
layers.
A first important feature of the generative model in
Algorithm 2 is that it respects the arrow of time. In par-
ticular, meso-set assignments in a given layer depend only
on meso-set assignments in the previous layer (e.g., the
previous temporal snapshot) and on the null distributions
lag=1lag=5lag=10lag=50lag=100lag=200050100150200024·10−3nupdd0501001502000246·10−2nupdd05010015020000.10.2nupdd05010015020000.20.40.6nupdd05010015020000.51nupddfunction TemporalPartition(p, P0)
S = 0
for i ∈ V do
Si,1 ∼ P1
0
end for
for α ∈ 2 . . . l do
for i ∈ V do
(cid:46) Initialize partition tensor of
appropriate size
(cid:46) Loop over nodes in some
order
(cid:46) Initialize induced partition
on first layer using null
distribution
(cid:46) Loop over layers in
sequential order
(cid:46) Loop over nodes in some
if rand() < p then (cid:46) With probability p
order
else
Si,α = Si,α−1
Si,α ∼ Pα
0
(cid:46) Copying update (Step C)
(cid:46) With probability 1 − p
(cid:46) Reallocation update (Step
R)
end if
end for
end for
return S
end function
ALG. 2. Pseudocode for generating partitions of a temporal
network with uniform interlayer dependencies p between suc-
cessive layers (i.e., pβ = p for all β ∈ {1, . . . , l} in Fig. 2a).
P0. That is, for all s ∈ {1, . . . , nl} and all α ∈ {2, . . . , l},
we have
P [ Si,α = s Sα−1] = pδ(Si,α−1, s)
+ (1 − p)Pα
0 [Si,α = s] ,
(C1)
where Sα is the n-node partition that is induced on layer
α by the multilayer partition S. The value of p deter-
mines the relative importance of the previous layer and
the null distribution. When p = 0, meso-set assignments
in a given layer depend only on the null distribution of
that layer (i.e., on the second term of the right-hand side
of Eq. (C1)). When p = 1, meso-set assignments in a
given layer are identical to those of the previous layer
(and, by recursion, to meso-set assignments in all previ-
ous layers).
Using Eq. (C1), we see that the marginal probability
that a given state node has a specific meso-set assignment
is
0 [Si,α = s] ,
= P1
P [Si,α = s] = pP [Si,α−1 = s]
+ (1 − p)Pα
0 [Si,1 = s] pα−1
α−1(cid:88)β=2
+ (1 − p)
+ (1 − p)Pα
Pβ
0 [Si,β = s] pα−β
0 [Si,α = s] , α > 1 .
Computing marginal probabilities can be useful for com-
puting expected meso-set sizes for a given choice of null
distributions.
25
We now highlight how the copying update (i.e., Step
C) and the reallocation update (i.e., Step R) in Algo-
rithm 2 govern the evolution of meso-set assignments be-
tween consecutive layers. Steps C and R deal with the
movement of nodes by first removing some nodes ("sub-
traction") and then reallocating them ("addition"). In
Step C, a meso-set assignment s in layer α can lose a
number of nodes that ranges from 0 to all of them. It can
keep all of its nodes in layer α + 1 (i.e., Ssα+1 = Ssα),
lose some of its nodes (i.e., Ssα+1 ⊂ Ssα), or disappear
entirely (i.e., Ssα+1 = ∅ and Ssα (cid:54)= ∅). The null distri-
bution in Step R is responsible for a meso-set assignment
s gaining new nodes (i.e., Ssα+1 (cid:54)⊂ Ssα) or for the ap-
pearance of a new meso-set label (i.e., Ssα+1 (cid:54)= ∅ and
Ssα = ∅). When defining the null distributions P0, it is
necessary to consider the interplay between Step C and
Step R.
To illustrate how the meso-set-assignment copying pro-
cess and the null distribution in Algorithm 2 can interact
with each other, we give the conditional probability that
a label disappears in layer α and the conditional probabil-
ity that a label appears in layer α. For all s ∈ {1, . . . , nl}
and all α ∈ {2, . . . , l}, the conditional probability that a
label disappears in layer α is
P [Ssα = ∅ Sα−1]
= [(1 − p) (1 − Pα
× [p + (1 − p) (1 − Pα
0 [Si,α = s])](cid:12)(cid:12)Ssα−1(cid:12)(cid:12)
0 [Si,α = s])]n−(cid:12)(cid:12)Ssα−1(cid:12)(cid:12) .
cess and simplifies to (1− p)(cid:12)(cid:12)Ssα−1(cid:12)(cid:12) when Pα
The expression (C2) depends only on our copying pro-
0 [Si,α = s] =
0 (i.e., when the probability of being assigned to label s
is 0 using the null distribution of layer α). Furthermore,
for progressively larger Pα
0 [Si,α = s], the probability that
a label disappears is progressively smaller.
For all s ∈ {1, . . . , nl} and all α ∈ {2, . . . , l}, the con-
ditional probability that a label appears in layer α is
(C2)
P(cid:2) Ssα (cid:54)= ∅ Ssα−1 = ∅(cid:3)
= 1 −(cid:20)p + (1 − p)(cid:18) (cid:88)Srα−1∈Sα−1
Pα
0 [Si,α = r](cid:19)(cid:21)n
.
(cid:80)Srα−1∈Sα−1
larger values of (cid:80)Srα−1∈Sα−1
(C3)
The expression (C3) gives the probability that at least
one node in layer α has the label s, given that
no node in layer α − 1 has the label s. When
Pα
0 [Si,α = r] = 0, the probability that a
label appears depends only on our meso-set-assignment
copying process and is given by 1 − pn. Furthermore,
Pα
0 [Si,α = r] reduce the
probability that a label appears in layer α.
All discussions thus far in this appendix hold for any
choice of P0. In the next two paragraphs, we give two ex-
amples to illustrate some features of the categorical null
distribution from Section IV A. In particular, we focus on
the effect of the support of a categorical null distribution
on a sampled multilayer partition. (See Section IV A for
definitions of some of the notation that we use below.)
The support Gα of a categorical null distribution Pα
0 is
Gα = {s : pα
s (cid:54)= 0}, where s ∈ {1, . . . , nset}. An impor-
tant property of the support for Fig. 2a is that overlap
between Gα and Gα+1 (i.e., Gα+1∩Gα (cid:54)= ∅) is a necessary
condition for a meso-set in layer α to gain new members
in layer α + 1.
s = npα
Let cα denote the vector of expected induced meso-set
sizes in layer α (i.e., cα
s ), and suppose that the
probabilities pα are the same in each layer (i.e., pα = p
for all α). The expected number of meso-set labels is
then the same for each layer, and the expected number
of nodes with meso-set label s is also the same in each
layer and is given by cα
s . This choice produces a temporal
network in which nodes change meso-set labels across
layers in a way that preserves both the expected number
of induced meso-sets in a layer and the expected sizes of
induced meso-sets in a layer.
Now suppose that we choose the pα values such that
their supports do not overlap (i.e., Gα ∩ Gβ = ∅ for all
α (cid:54)= β). At each Step C in Algorithm 2, an existing
meso-set label can then only lose members; and with
probability 1 − pn, at least one new label will appear
in each subsequent layer. For this case, one expects pcα
s
members of meso-set s in layer α to remain in meso-set
s in layer α + 1 and (1 − p)cα
s members of meso-set s in
layer α to be assigned to new meso-sets (because labels
are nonoverlapping) in layer α + 1. This choice thus pro-
duces multilayer partitions in which the expected num-
ber of new meso-set labels per layer is nonzero (unless
p = 1) and the expected size of a given induced meso-set
decreases in time.
Appendix D: M-DCSBM sampling procedure
In this appendix, we discuss a generalization to mul-
tilayer networks of the degree-corrected SBM (DCSBM)
from Ref. [43]. In other words, it is a multilayer DCSBM
(M-DCSBM). The parameters of a general, directed M-
DCSBM are a multilayer partition S (which determines
the assignment of state nodes to meso-sets), a block ten-
sor W (which determines the expected number of edges
between meso-sets in different layers), and a set σ of
state-node parameters (which determine the allocation
of edges to state nodes in meso-sets). The probability of
observing an edge (or the expected number of edges, if
we allow multi-edges) from state node (i, α) to state node
(j, β) with meso-set assignments r = Si,α and s = Sj,β
in a M-DCSBM is
P(cid:104)Aj,β
i,α = 1(cid:105) = σβ
i,α W s,β
r,α σj,β
α ,
(D1)
where W s,β
r,α is the expected number of edges from state
nodes in layer α and meso-set Sr to state nodes in layer
β and meso-set Ss, the quantity σβ
i,α is the probability
for an edge starting in meso-set Sr in layer α and ending
in layer β to be attached to state node (i, α) (note that
function DCSBM(S, σ, W )
A = 0
for α ∈ L do
for r ∈ 1 . . .S do
for s ∈ r . . .S do
26
(cid:46) Initialize adjacency tensor
of appropriate size
(cid:46) Loop over layers
(cid:46) Sample number of edges
from a Poisson distribution
if r = s then
m = Poisson(W r,α
r,α /2)
else
m = Poisson(W s,α
r,α )
end if
e = 0
while e < m do
(cid:46) Count sampled edges
i = Sample(Srα, σSrα,α)
(cid:46) Sample node i from induced
community r in layer α
with probability σi,α
j = Sample(Ssα, σSsα,α)
(cid:46) Sample node j from induced
if i (cid:54)= j & Aj,α
community s in layer α
with probability σj,α
i,α = 0 then
(cid:46) Reject self-edges or
multi-edges
j,α = 1
i,α = 1, Ai,α
Aj,α
e = e + 1
end if
end while
end for
end for
end for
return A
end function
ALG. 3. Sampling multilayer networks from a DCSBM with
community assignments S, node parameters σ, and block ten-
sor W .
i,α), and σj,β
the dependence on Sr is implicit in σβ
α is the
probability for an edge starting in layer α and ending in
meso-set Ss in layer β to be attached to state node (j, β).
(Note that the dependence on Ss is implicit in σj,β
α .) For
an undirected M-DCSBM, both the block tensor W and
the state-node parameters σ are symmetric. That is,
W r,α
s,β = W s,β
The above M-DCSBM can generate multilayer net-
works with arbitrary expected layer-specific in-degrees
and out-degrees for each state node.
(The DCSBM
of [43] can generate single-layer networks with arbitrary
expected degrees.) Given a multilayer network with ad-
jacency tensor A, the layer-α-specific in-degree of state
node (j, β) is
r,α and σi,α
β = σβ
i,α.
and the layer-β-specific out-degree of state node (i, α) is
Aj,β
i,α ,
kj,β
α =(cid:88)i∈V
i,α =(cid:88)j∈V
kβ
Aj,β
i,α .
The layer-α-specific in-degree and out-degree of state
node (i, α) are the "intralayer in-degree" and "intralayer
out-degree" of (i, α).
For an undirected multilayer
network, layer-β-specific in-degrees and out-degrees are
equal (i.e., ki,α
i,α). We refer to their common value
as the "layer-β-specific degree" of a state node. For an
ensemble of networks generated from an M-DCSBM, the
associated means are
β = kβ
(cid:104)kj,β
α (cid:105) = σj,β
α
S(cid:88)r=1
W s,β
r,α ,
s = Sj,β
(D2)
and
(cid:104)kβ
i,α(cid:105) = σβ
i,α
S(cid:88)s=1
W s,β
r,α ,
r = Si,α .
(D3)
As we mentioned in Section V, we consider undirected
multilayer networks with only intralayer edges for our
experiments in Section VI. The block tensor W thus does
not have any interlayer contributions (i.e., W s,β
r,α = 0 if
α (cid:54)= β). Furthermore, we can reduce the number of node
parameters that we need to specify the M-DCSBM to a
single parameter σi,α = σα
α for each state node
(i, α).
We
degrees
ei,α = (cid:104)kα
for the state
nodes from a truncated power law [128] with exponent
ηk, minimum cutoff kmin, and maximum cutoff kmax.
We then construct the block tensor W and state-node
parameters σ for the M-DCSBM from the sampled
expected degrees e and the meso-set assignments S. Let
sample
i,α(cid:105), where kα
expected
i,α =(cid:80)j∈VM
intralayer
Aj,α
i,α,
i,α = σi,α
the
κs,α = (cid:88)i∈Ssα
ei,α ,
Ss ∈ S
be the expected degree of meso-set s in layer α; and let
wα =
1
2(cid:88)i∈V
ei,α
be the expected number of edges in layer α. Conse-
quently,
σi,α =
ei,α
κs,α
,
s = Si,α
is the probability for an intralayer edge in layer α to
be attached to state node (i, α), given that the edge is
attached to a state node that is in layer α and is part of
the community Si,α.
The elements
W s,β
r,α = δ(α, β)(cid:18)(1 − µ)δ(r, s)κs,α + µ
κr,ακs,α
2wα (cid:19)
(D4)
of the block tensor give, for r (cid:54)= s, the expected num-
ber of edges between state nodes in meso-set s in layer
β and state nodes in meso-set r in layer α. For s = r
27
and β = α, the block-tensor element W s,β
r,α gives twice
the expected number of edges. One way to think of the
DCSBM benchmark is that we categorize each edge that
we want to sample as an intra-meso-set edge with prob-
ability 1 − µ or as a "random edge" (i.e., an edge that
can be either an intra-meso-set edge or an inter-meso-set
edge) with probability µ. To sample an edge, we sample
two state nodes (which we then join by an edge). We
call these two state nodes the "end points" of the edge.
We sample the two end points of an intra-meso-set edge
with a frequency that is proportional to the expected de-
gree of their associated state nodes, conditional on the
end points being in the same meso-set. By contrast, we
sample the two end points of a random edge with a fre-
quency proportional to the expected degree of their as-
sociated state nodes (without conditioning on meso-set
assignment). We assume that the total number of edges
in layer α is sampled from a Poisson distribution [129]
with mean wα. Although our procedure for sampling
edges describes a potential algorithm for sampling net-
works from the DCSBM benchmark, it usually is more
efficient to sample edges separately for each pair of meso-
sets.
In Algorithm 3, we show pseudocode for the specific
instance of the model in Eq. (D1) that we use to sam-
ple intralayer network edges (independently for each in-
duced partition) for a given multilayer partition in our
numerical experiments of Section VI. The only difference
between Algorithm 3 and the sampling algorithm of [43]
is that we use rejection sampling to avoid creating self-
edges and multi-edges. (In other words, if we sample an
edge that has already been sampled or that is a self-edge,
we do not include it in the multilayer network; instead,
we resample.) Rejection sampling is efficient provided all
blocks of the network are sufficiently sparse, such that
the probability of generating multi-edges is small. For
dense blocks of a network, we instead sample edges from
independent Bernoulli distributions with success proba-
bility Eq. (D1). This algorithm for sampling networks
from a DCSBM is very efficient; it scales linearly with
the number of edges in a network.
In the above discussion, we defined the parameters
in Eq. (D1) to generate intralayer edges in a multilayer
network by specifying layer-specific in-degrees and out-
degrees. That is, the layer-β-specific in-degree and out-
degree of state node (i, α) are 0 if β (cid:54)= α. We can also
extend the model in Eq. (D1) to generate interlayer edges.
For a directed multilayer network with interlayer edges,
we sample expected layer-β-specific in-degrees ei,α
and
β
out-degrees eβ
i,α for each state node (i, α) and layer β
from appropriate distributions. Given expected layer-
specific degrees e and a multilayer partition S, we then
construct the block tensor W and state-node parameters
σ for the M-DCSBM analogously to the special case that
we described above. Let
κs,α
β = (cid:88)i∈Ssα
ei,α
β ,
κβ
s,α = (cid:88)i∈Ssα
eβ
i,α , Ss ∈ S
28
be the expected layer-β-specific in-degree and out-degree
of meso-set s in layer α; and let
wβ
α =(cid:88)i∈V
eβ
i,α =(cid:88)i∈V
ei,β
α
GenLouvain
be the expected number of edges from layer α to layer β.
(Note the consistency constraint on expected in-degrees
and expected out-degrees.) It then follows that
σi,α
β =
ei,α
β
κs,α
β
,
σβ
i,α =
eβ
i,α
κβ
s,α
,
s = Si,α ,
(a) p = 0.85,
(b) p = 0.95
(c) p = 1
GenLouvainRand, no PP
and
W s,β
r,α = (1 − µ)δ(r, s)
κβ
s,α + κs,β
α
2
+ µ
κβ
r,ακs,β
α
wβ
α
.
For directed networks, the expected layer-specific in-
degrees and out-degrees generated by the above model
do not correspond exactly to the values from the input
parameters e, except when µ = 1.
Appendix E: The Louvain algorithm and its variants
In this appendix, we describe the Louvain algorithm
and variants of the Louvain algorithm that we use in the
numerical experiments in Section VI.
The Louvain algorithm [108] for maximizing (single-
layer or multilayer) modularity proceeds in two phases,
which are repeated iteratively. Starting from an initial
partition, one considers the state nodes one by one (in
some order) and places each state node in a set that re-
sults in the largest increase of modularity. (If there is
no move that improves modularity, a state node keeps
the same assignment.) One repeats this first phase of
the algorithm until reaching a local maximum.
In the
second phase of the Louvain algorithm, one obtains a
new modularity matrix by aggregating the sets of state
nodes that one obtains after the convergence of the first
phase. One then applies the algorithm's first phase to
the new modularity matrix and iterates both phases un-
til one converges to a local maximum. The two Louvain-
like algorithms that we use in Section VI differ in how
they select which moves to make. The first is GenLou-
vain, which always chooses the move that maximally in-
creases modularity; the second is GenLouvainRand,
which chooses modularity-increasing moves at random,
such that the probability of a particular move is pro-
portional to the resulting increase in the quality func-
tion. (The latter is a variant of the algorithm "Louvain-
Rand" in [16]; in that algorithm, one chooses modularity-
increasing moves uniformly at random.) We use "reiter-
ation" and "post-processing" to improve the output of
GenLouvainRand. Reiteration entails taking an out-
put partition of GenLouvainRand as an initial parti-
tion and reiterating the algorithm until the output par-
tition no longer changes. Post-processing entails using
(d) p = 0.85
(e) p = 0.95
(f) p = 1
GenLouvainRand
(g) p = 0.85
(h) p = 0.95
(i) p = 1
InfoMap
(j) p = 0.85
(k) p = 0.95
(l) p = 1
Figure 13. Effect of interlayer coupling strength ω and relax-
ation rate r on the ability of different community-detection
algorithms to recover planted partitions as a function of the
community-mixing parameter µ in a uniform multiplex bench-
mark (see Fig. 2b). Each multilayer network has 1000 nodes
and 15 layers, and each node is present in all layers.
the Hungarian algorithm [130] to optimize the "persis-
tence" [16] (i.e., the number of interlayer edges for which
both end points have the same community assignment) of
each output partition without changing the induced par-
titions on each layer. All Louvain variants and related
functionality are available at [107].
Appendix F: Multilayer NMI experiments
In this appendix, we calculate the multilayer NMI
(mNMI) between the multilayer output partition and
the planted multilayer partition for the numerical experi-
µ=0µ=0.1µ=0.2µ=0.3µ=0.4µ=0.5µ=0.6µ=0.7µ=0.8µ=0.9µ=110−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMIs00.20.40.60.8100.20.40.60.81rmNMIs00.20.40.60.8100.20.40.60.81rmNMIs00.20.40.60.8100.20.40.60.81rmNMIGenLouvain
GenLouvain
29
(a) p = 0.85, pc = 0
(b) p = 0.95, pc = 0
(c) p = 1, pc = 0
(a) p = 0.85
(b) p = 0.95
(c) p = 1
GenLouvainRand, no PP
GenLouvainRand, no PP
(d) p = 0.85, pc = 0
(e) p = 0.95, pc = 0
(f) p = 1, pc = 0
(d) p = 0.85
(e) p = 0.95
(f) p = 1
GenLouvainRand
GenLouvainRand
(g) p = 0.85, pc = 0
(h) p = 0.95, pc = 0
(i) p = 1, pc = 0
(g) p = 0.85
(h) p = 0.95
(i) p = 1
InfoMap
InfoMap
(j) p = 0.85, pc = 0
(k) p = 0.95, pc = 0
(l) p = 1, pc = 0
(j) p = 0.85
(k) p = 0.95
(l) p = 1
Figure 14. Effect of interlayer coupling strength ω and relax-
ation rate r on the ability of different community-detection
algorithms to recover planted partitions as a function of the
community-mixing parameter µ in a multiplex benchmark
with nonuniform interlayer dependencies. Each multilayer
network has 1000 nodes and 15 layers, and each node is
present in all layers. The layer-coupled interlayer-dependency
matrix is a block-diagonal matrix with diagonal blocks of
size 5 × 5. For each diagonal block, we set the value in the
interlayer-dependency matrix to a value p (so each diagonal
block has the same structure as the matrix in Fig. 2b); for
each off-diagonal block, we set the value to pc = 0, thereby
incorporating an abrupt change in community structure. We
define the null distributions in these experiments so that there
is no overlap in community labels between different groups of
layers.
ments in Figs. 6 -- 9. One needs to be cautious when inter-
preting values of mNMI; they depend on how one deter-
mines the correspondences between communities in dif-
ferent layers, and these correspondences can be ambigu-
Figure 15. Effect of interlayer coupling strength ω and relax-
ation rate r on the ability of different community-detection
algorithms to recover planted partitions as a function of the
community-mixing parameter µ in a temporal benchmark
with uniform interlayer dependencies (i.e., pβ = p ∈ [0, 1]
for all β ∈ {2, . . . , l} in Fig. 2a). Each multilayer network
has 150 nodes and 100 layers, and each node is present in all
layers.
ous. For example, in a temporal network, if a community
in one layer splits into multiple communities in the next
layer, there are multiple plausible ways to define labels
across layers (e.g., all new communities get new labels
or the largest new community keeps the original label).
Moreover, different quality functions reward interlayer-
assignment labeling in different ways, and mNMI con-
flates this issues with how well a quality function recov-
ers structure within layers. In particular, a small value of
mNMI can hide an optimal value of (cid:104)NMI(cid:105) (as (cid:104)NMI(cid:105) = 1
is necessary, but not sufficient, to have mNMI = 1).
We include only a subset of the values of p and p
µ=0µ=0.1µ=0.2µ=0.3µ=0.4µ=0.5µ=0.6µ=0.7µ=0.8µ=0.9µ=110−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMI10−210000.20.40.60.81ωmNMIs00.20.40.60.8100.20.40.60.81rmNMIs00.20.40.60.8100.20.40.60.81rmNMIs00.20.40.60.8100.20.40.60.81rmNMIµ=0µ=0.1µ=0.2µ=0.3µ=0.4µ=0.5µ=0.6µ=0.7µ=0.8µ=0.9µ=1024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMIs00.20.40.60.8100.20.40.60.81rmNMIs00.20.40.60.8100.20.40.60.81rmNMIs00.20.40.60.8100.20.40.60.81rmNMIGenLouvain
(a) p = 0.85, pc = 0
(b) p = 0.95, pc = 0
(c) p = 1, pc = 0
GenLouvainRand, no PP
(d) p = 0.85, pc = 0
(e) p = 0.95, pc = 0
(f) p = 1, pc = 0
GenLouvainRand
(g) p = 0.85, pc = 0
(h) p = 0.95, pc = 0
(i) p = 1, pc = 0
InfoMap
(j) p = 0.85, pc = 0
(k) p = 0.95, pc = 0
(l) p = 1, pc = 0
Figure 16. Effect of interlayer coupling strength ω and relax-
ation rate r on the ability of different community-detection
algorithms to recover planted partitions as a function of the
community-mixing parameter µ in a temporal benchmark
with nonuniform interlayer dependencies. Each multilayer
network has 150 nodes and 100 layers, and each node is
present in all layers. Every 25th layer (i.e., for layers 25, 50,
and 75), we set the value of pβ in Fig. 2a to pc = 0 (thereby
incorporating an abrupt change in community structure); we
set all other values of pβ in Fig. 2a to p. We define the null
distributions in these experiments so that there is no overlap
in community labels between different groups of layers.
that we considered in Figs. 6 and 8, as these suffice for
the purpose of this appendix.
In the numerical exper-
iments of Section VI, we observed that post-processing
does not have a major effect on (cid:104)NMI(cid:105). This suggests
that any misassignment across layers that underempha-
sizes the "persistence" of a multilayer partition (which
post-processing tries to mitigate [16]) does not affect
an algorithm's ability to identify structure within lay-
30
ers. (Recall that post-processing relabels an assignment
without changing the induced partitions.) We include fig-
ures without post-processing in the experiments of this
appendix, as we expect the effect to be more noticeable
when examining NMI values between multilayer parti-
tions (which accounts for assignments both within and
across layers).
In Figs. 13 and 14, we use the same benchmark net-
works as in the multiplex examples in Figs. 6 and 7, re-
spectively. In Figs. 15 and 16, we use the same bench-
mark networks as in the temporal examples of Figs. 8
and 9, respectively. All mNMI values are means over
10 runs of the algorithms and 100 instantiations of the
benchmark. (See the introduction of Section VI for more
details on how we generate these instantiations.) Each
curve in each figure corresponds to the mean mNMI val-
ues that we obtain for a given value of the community-
mixing parameter µ, and the shaded area around a curve
corresponds to the minimum and maximum mNMI val-
ues that we obtain with the 10 sample partitions for a
given value of p or p.
For experiments with nonuniform interlayer dependen-
cies in Figs. 14 and 16, it seems that InfoMap is better
at detecting abrupt differences ("breaks", such as in the
form of change points for temporal examples) in commu-
nity structure than both GenLouvain and GenLou-
vainRand, especially for the multiplex case (where this
manifests for all examined values of p). However, multi-
layer InfoMap correctly identifies the planted commu-
nity structure only when it is particularly strong (specif-
ically, for µ ≤ 0.3). Recall from our experiments in
Figs. 7 and 9 that both GenLouvain and GenLouvain-
Rand are better than InfoMap at detecting an induced
partition within a layer (especially in cases where the
planted community structure is quite weak). The rea-
son that multilayer modularity maximization does not
perfectly recover breaks in community structure of the
planted multilayer partition is because multilayer modu-
larity maximization with uniform ordinal or categorical
coupling (see the introduction of Section VI) incentivizes
"persistence" of community labels between layers (and
nonzero persistence is achievable even when one inde-
pendently samples induced partitions on different lay-
ers) [16]. However, by design, our benchmark networks
have no persistence whenever there is a break in commu-
nity structure because of how we defined the support of
the null distributions. Therefore, we do not expect mul-
tilayer modularity maximization to recover the planted
labels between layers when pc = 0; this manifests as a de
facto maximum in the mNMI between the output parti-
tion and the planted partition.
ACKNOWLEDGEMENTS
MB acknowledges a CASE studentship award from
the EPSRC (BK/10/41). MB was also supported by
The Alan Turing Institute under the EPSRC grant
µ=0µ=0.1µ=0.2µ=0.3µ=0.4µ=0.5µ=0.6µ=0.7µ=0.8µ=0.9µ=1024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMI024681000.20.40.60.81ωmNMIs00.20.40.60.8100.20.40.60.81rmNMIs00.20.40.60.8100.20.40.60.81rmNMIs00.20.40.60.8100.20.40.60.81rmNMIEP/N510129/1.
LGSJ acknowledges a CASE stu-
dentship award from the EPSRC (BK/10/39). MB,
LGSJ, AA, and MAP were supported by FET-Proactive
project PLEXMATH (FP7-ICT-2011-8; grant #317614)
funded by the European Commission; and MB, LGSJ,
and MAP were also supported by the James S. McDon-
nell Foundation (#220020177). MAP was also supported
by the National Science Foundation (grant #1922952)
through the Algorithms for Threat Detection (ATD) pro-
gram. Computational resources that we used for this re-
search were supported in part by the National Science
Foundation under Grant No. CNS-0521433, in part by
Lilly Endowment, Inc. through its support for the In-
diana University Pervasive Technology Institute, and in
part by the Indiana METACyt Initiative. The Indiana
METACyt Initiative at Indiana University Bloomington
was also supported in part by Lilly Endowment, Inc. We
thank Sang Hoon Lee, Peter Mucha (and his research
group), Brooks Paige, and Roxana Pamfil for helpful
comments.
31
[1] M. E. J. Newman, Networks, 2nd ed. (Oxford University
Press, 2018).
[2] P. Holme and J. Saramaki, "Temporal networks," Phys.
Rep. 519, 97 -- 125 (2012).
in temporal multilayer networks, with an application to
correlation networks," Multiscale Model. Simul. 14, 1 --
41 (2016).
[17] R. F. Betzel and D. S. Bassett, "Multi-scale brain net-
[3] P. Holme, "Modern temporal network theory: A collo-
works," Neuroimage 160, 73 -- 83 (2017).
quium," Eur. Phys. J. B 88, 234 (2015).
[4] M. Kivela, A. Arenas, M. Barth´elemy, J. P. Gleeson,
Y. Moreno, and M. A. Porter, "Multilayer networks,"
J. Complex Netw. 2, 203 -- 271 (2014).
[5] S. Boccaletti, G. Bianconi, R. Criado, C. I. Del Genio,
J. G´omez-Gardenes, M. Romance, I. Sendina-Nadal,
Z. Wang, and M. Zanin, "The structure and dynamics
of multilayer networks," Phys. Rep. 544, 1 -- 122 (2014).
[6] A. Aleta and Y. Moreno, "Multilayer networks in a nut-
shell," Annu. Rev. Condens. Matter Phys. 10 (2019).
[7] G. Bianconi, Multilayer networks: structure and func-
tion (Oxford University Press, 2018).
[8] M. A. Porter, "WHAT IS ... A multilayer network," No-
tices Amer. Math. Soc. 65 (2018).
[9] M. De Domenico, A. Lancichinetti, A. Arenas,
and
M. Rosvall, "Identifying modular flows on multilayer
networks reveals highly overlapping organization in in-
terconnected systems," Phys. Rev. X 5, 011027 (2015).
[10] A. Ghasemian, P. Zhang, A. Clauset, C. Moore, and
L. Peel, "Detectability thresholds and optimal algo-
rithms for community structure in dynamic networks,"
Phys. Rev. X 6, 031005 (2016).
[11] L. Peel, D. B. Larremore, and A. Clauset, "The ground
truth about metadata and community detection in net-
works," Science Advances 3, e1602548 (2017).
[12] M. Sarzynska, E. A. Leicht, G. Chowell, and M. A.
Porter, "Null models for community detection in spa-
tially embedded, temporal networks," J. Complex Netw.
4, 363 -- 406 (2015).
[13] A. R. Pamfil, S. D. Howison, R. Lambiotte,
and
M. A. Porter, "Relating modularity maximization and
stochastic block models in multilayer networks," SIAM
Journal on Mathematics of Data Science 1, 667 -- 698
(2019).
[14] L. G. S. Jeub and M. Bazzi, "A generative model for
mesoscale structure in multilayer networks," https://
github.com/MultilayerGM (2016 -- 2019).
[15] M. De Domenico, A. Sol`e-Ribalta, E. Cozzo, M. Kivela,
Y. Moreno, M. A. Porter, S. G`omez, and A. Arenas,
"Mathematical
formulation of multilayer networks,"
Phys. Rev. X 3, 041022 (2013).
[16] M. Bazzi, M. A. Porter, S. Williams, M. McDonald,
D. J. Fenn, and S. D. Howison, "Community detection
[18] D. Hric, K. Kaski, and M. Kivela, "Stochastic block
model reveals maps of citation patterns and their evo-
lution in time," J. Informetr. 12, 757 -- 783 (2018).
[19] L. Cantini, E. Medico, S. Fortunato, and M. Caselle,
"Detection of gene communities in multi-networks re-
veals cancer drivers," Sci. Rep. 5, 17386 (2015).
[20] C. De Bacco, E. A. Power, D. B. Larremore,
and
C. Moore, "Community detection, link prediction, and
layer interdependence in multilayer networks," Phys.
Rev. E 95, 042317 (2017).
[21] N. Stanley, S. Shai, D. Taylor, and P. J. Mucha, "Clus-
tering network layers with the strata multilayer stochas-
tic block model," IEEE Trans. Network Sci. Eng. 3, 95 --
105 (2016).
[22] It is also possible to have ordinal layering in aspects
other than time.
[23] M. A. Porter, J.-P. Onnela, and P. J. Mucha, "Com-
munities in networks," Notices Amer. Math. Soc. 56,
1082 -- 1097, 1164 -- 1166 (2009).
[24] S. Fortunato and D. Hric, "Community detection in net-
works: A user guide," Phys. Rep. 659 (2016).
[25] G. Rossetti and R. Cazabet, "Community discovery in
dynamic networks: A survey," ACM Comput. Surv. 51,
35 (2018).
[26] H. Cherifi, G. Palla, B. K. Szymanski, and X. Lu, "On
community structure in complex networks: Challenges
and opportunities," arXiv:1908.04901 (2019).
[27] P. Csermely, A. London, L.-Y. Wu,
and B. Uzzi,
"Structure and dynamics of core -- periphery networks,"
J. Complex Netw. 1, 93 -- 123 (2013).
[28] P. Rombach, M. A. Porter, J. H. Fowler, and P. J.
Mucha, "Core -- periphery structure in networks (revis-
ited)," SIAM Rev. 59, 619 -- 646 (2017).
[29] R. A. Rossi and N. K. Ahmed, "Role discovery in net-
works," IEEE Trans. Knowl. Data Eng. 27, 1112 -- 1131
(2015).
[30] S. Fortunato, "Community detection in graphs," Phys.
Rep. 486, 75 -- 174 (2010).
[31] M. Vaiana and S. F. Muldoon, "Multilayer brain
, 1 -- 23
https://doi.org/10.1007/
networks," Journal of Nonlinear Science
(2018),
s00332-017-9436-8.
available
at
[32] P.J. Mucha and M. A. Porter, "Communities in multi-
slice voting networks," Chaos 20 (2010).
[33] P. J. Mucha, T. Richardson, K. Macon, M. A. Porter,
and J.-P. Onnela, "Community structure in time-
dependent, multiscale, and multiplex networks," Sci-
ence 328, 876 -- 878 (2010).
[34] E. Omodei and A. Arenas, "Untangling the role of di-
verse social dimensions in the diffusion of microfinance,"
Applied Network Science 95, 14 (2016).
[35] M. T. Schaub, J.-C. Delvenne, M. Rosvall,
and
R. Lambiotte, "The many facets of community detec-
tion in complex networks," Applied Network Science 2,
4 (2017).
[36] L. G. S. Jeub, P. Balachandran, M. A. Porter, P. J.
Mucha,
and M. W. Mahoney, "Think locally, act
locally: The detection of small, medium-sized, and
large communities in large networks," Phys. Rev. E 91,
012821 (2015).
[37] M. E. J. Newman, "Finding community structure in net-
works using the eigenvectors of matrices," Phys. Rev. E
74, 036104 (2006).
[38] G. Petri and P. Expert, "Temporal stability of network
partitions," Phys. Rev. E 90, 022813 (2014).
[39] R. Lambiotte, J.-C. Delvenne, and M. Barahona, "Ran-
dom walks, Markov processes and the multiscale mod-
ular organization of complex networks," IEEE Trans.
Network Sci. Eng. 1, 76 -- 90 (2015), (see also the precur-
sor paper at arXiv:0812.1770, 2008).
[40] J.-C. Delvenne, S. N. Yaliraki, and M. Barahona, "Sta-
bility of graph communities across time scales," Proc.
Nat. Acad. Sci. U.S.A. 107, 12755 -- 12760 (2010).
[41] M. Rosvall and C. T. Bergstrom, "Maps of random
walks on complex networks reveal community struc-
ture," Proc. Nat. Acad. Sci. U.S.A. 105, 1118 -- 1123
(2008).
[42] P. W. Holland, K. B. Laskey,
and S. Leinhardt,
"Stochastic blockmodels: First steps," Soc. Networks
5, 109 -- 137 (1983).
[43] B. Karrer and M. E. J. Newman, "Stochastic blockmod-
els and community structure in networks," Phys. Rev.
E 83, 016107 (2011).
[44] T. P. Peixoto, "Inferring the mesoscale structure of lay-
ered, edge-valued, and time-varying networks," Phys.
Rev. E 92, 042807 (2015).
[45] I. Kloumann, J. Ugander,
and J. Kleinberg, "Block
models and personalized PageRank," Proc. Nat. Acad.
Sci. U.S.A. 114, 33 -- 38 (2016).
[46] L. G. S. Jeub, M. W. Mahoney, P. J. Mucha, and M. A.
Porter, "A local perspective on community structure
in multilayer networks," Network Science 5, 144 -- 163
(2017).
[47] J. D. Wilson, J. Palowitch, S. Bhamidi, and A. B. No-
bel, "Community extraction in multilayer networks with
heterogeneous community structure," J. Mach. Learn.
Res. 18, 1 -- 49 (2017).
[48] U. Brandes, D. Delling, M. Gaertler, R. Goke, M. Hoe-
fer, Z. Nikoloski, and D. Wagner, "On modularity clus-
tering," IEEE Trans. Knowl. Data Eng. 20, 172 -- 188
(2008).
[49] A. Z. Jacobs and A. Clauset, "A unified view of genera-
tive models for networks: Models, methods, opportuni-
ties, and challenges," in NIPS Workshop on Networks:
From Graphs to Rich Data (2014) arXiv:1411.4070.
32
[50] A. Ghasemian, H. Hosseinmardi,
and A. Clauset,
"Evaluating overfit and underfit in models of network
community structure," IEEE Trans. Knowl. Data Eng.
(2019), available at 10.1109/TKDE.2019.2911585.
[51] S. E. Schaeffer, "Graph clustering," Comput. Sci. Rev.
1, 27 -- 64 (2007).
[52] A. Lancichinetti and S. Fortunato, "Benchmark graphs
for testing community detection algorithms on directed
and weighted graphs with overlapping communities,"
Phys. Rev. E 80, 1 (2009).
[53] A. Lancichinetti, S. Fortunato,
and F. Radicchi,
"Benchmark graphs for testing community detection al-
gorithms," Phys. Rev. E 78, 046110 (2008).
[54] C. Granell, R. K. Darst, A. Arenas, S. Fortunato,
and S. G´omez, "A benchmark model to assess commu-
nity structure in evolving networks," Phys. Rev. E 92,
012805 (2015).
[55] A. Condon and R. M. Karp, "Algorithms for graph
partitioning on the planted partition model," Random
Struct. Algor. 18, 116 -- 140 (2000).
[56] M. Girvan and M. E. J. Newman, "Community struc-
ture in social and biological networks," Proc. Nat. Acad.
Sci. U.S.A. 99, 7821 -- 7826 (2002).
[57] T. P. Peixoto, "Nonparametric weighted stochastic
block models," Phys. Rev. E 97, 012306 (2018).
[58] L. G. S. Jeub, O. Sporns, and S. Fortunato, "Multires-
olution consensus clustering in networks," Sci. Rep. 8,
3259 (2018).
[59] S. Paul and Y. Chen, "Null models and modularity
based community detection in multi-layer networks,"
arXiv:1608.00623 (2016).
[60] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborova,
"Inference and phase transitions in the detection of
modules in sparse networks," Phys. Rev. Lett. 107,
065701 (2011).
[61] D. Taylor, R. S. Caceres, and P. J. Mucha, "Super-
resolution community detection for layer-aggregated
multilayer networks," Phys. Rev. X 7, 031056 (2017).
[62] G. K. Orman, V. Labatut, and H. Cherifi, "Towards
realistic artificial benchmark for community detection
algorithms evaluation," Int. J. Web Based Communities
9, 349 -- 370 (2013).
[63] C. Aicher, A. Z. Jacobs, and A. Clauset, "Learning la-
tent block structure in weighted networks," J. Complex
Netw. 3, 221 -- 248 (2014).
[64] M. E. J. Newman and T. P. Peixoto, "Generalized com-
munities in networks," Phys. Rev. Lett. 115, 088701
(2015).
[65] X. Zhang, C. Moore, and M. E. J. Newman, "Random
graph models for dynamic networks," Eur. Phys. J. B
90, 200 (2017).
[66] Y. Hulovatyy and T. Milenkovi´c, "SCOUT: Simultane-
ous time segmentation and community detection in dy-
namic networks," Sci. Rep. 6, 37557 (2016).
[67] M. Q. Pasta and F. Zaidi, "Network generation model
based on evolution dynamics to generate benchmark
graphs," arXiv:1606.01169 (2016).
[68] S. Paul and Y. Chen, "Consistent community detection
in multi-relational data through restricted multi-layer
stochastic blockmodel," Electron. J. Stat. 10, 3807 --
3870 (2016).
[69] T. Vall`es-Catal`a, F. A. Massucci, R. Guimer`a,
and
M. Sales-Pardo, "Multilayer stochastic block models re-
veal multilayer structure of complex networks," Phys.
Rev. X 6, 011036 (2016).
[70] P. Barbillon, S. Donnet, E. Lazega, and A. Bar-Hen,
"Stochastic block models for multiplex networks: an ap-
plication to networks of researchers," J. Roy. Stat. Soc.
A 180, 295 -- 314 (2016).
[71] Y. Huang, A. Panahi, H. Krim, and L. Dai, "Commu-
nity detection and improved detectability in multiplex
networks," arXiv:1909.10477 (2019).
[72] M. De Domenico, A. Sol`e-Ribalta, S. G`omez,
and
A. Arenas, "Navigability of interconnected networks un-
der random failures," Proc. Nat. Acad. Sci. U.S.A. 111,
8351 -- 8356 (2014).
[73] S. G´omez, A. D´ıaz-Guilera, J. G´omez-Gardenes,
C. J. P´erez Vicente, Y. Moreno, and A. Arenas, "Diffu-
sion dynamics on multiplex networks," Phys. Rev. Lett.
110, 028701 (2013).
[74] Flattening (i.e., 'matricizing') [4] a tensor T entails writ-
ing its entries in matrix form. Consequently, starting
from a tensor T with elements T β
α , one obtain a matrix
(cid:101)T with entries (cid:101)T α, β, where there are bijective mappings
between the indices.
[75] T. G. Kolda and B. W. Bader, "Tensor decompositions
and applications," SIAM Rev. 51, 455 -- 500 (2009).
[76] M. S. Bartlett, An Introduction to Stochastic Processes,
3rd ed. (Press Syndicate of the University of Cambridge,
Cambridge, UK, 1978).
[77] S. van Buuren, Flexible Imputation of Missing Data, 2nd
ed. (Chapman & Hall/CRC Interdisciplinary Statistics,
Boca Raton, FL, USA, 2018).
[78] J. E. Besag, "Spatial interaction and the statistical anal-
ysis of lattice systems," J. Roy. Stat. Soc. B 36, 192 -- 236
(1974).
[79] S. E. Fienberg and A. B. Slavkovic, "Preserving the
confidentiality of categorical statistical data bases when
releasing information for association rules," Data Min.
Knowl. Discov. 11, 155 -- 180 (2005).
[80] D. Heckerman, D. M. Chickering, C. Meek, R. Roundth-
waite, and C. Kadie, "Dependency networks for infer-
ence, collaborative filtering, and data visualization," J.
Mach. Learn. Res. 1, 49 -- 75 (2000).
[81] Alan E. Gelfand, "Gibbs sampling," J. Am. Stat. Assoc.
95, 1300 -- 1304 (2000).
[82] J. P. Hobert and G. Casella, "Functional compatibil-
ity, Markov chains, and Gibbs sampling with improper
posteriors," J. Comput. Graph. Stat. 7, 42 -- 60 (1998).
[83] B. C. Arnold and S. J. Press, "Compatible conditional
distributions," J. Am. Stat. Assoc. 84, 152 -- 156 (1989).
[84] H.-Y. Chen, "Compatibility of conditionally specified
models," Stat. Probab. Lett. 80, 670 -- 677 (2010).
[85] S.-H. Chen and E. H. lp, "Behavior of the Gibbs sampler
when conditional distributions are potentially incom-
patible," J. Stat. Comput. Simul. 85, 3266 -- 3275 (2015).
[86] K.-L. Kuo and Y. J. Wang, "A simple algorithm for
checking compatibility among discrete conditional dis-
tributions," Comput. Stat. Data Anal. 55, 2457 -- 2462
(2011).
[87] K.-L. Kuo and Y. J. Wang, "Pseudo-Gibbs sampler
for discrete conditional distributions," Ann. Inst. Stat.
Math. 71, 93 -- 105 (2017).
[88] D. S. Bassett, N. F. Wymbs, M. A. Porter, P. J. Mucha,
J. M. Carlson, and S. T. Grafton, "Dynamic reconfigu-
ration of human brain networks during learning," Proc.
Nat. Acad. Sci. U.S.A. 118, 7641 -- 7646 (2011).
33
[89] J. M. Buld´u and M. A. Porter, "Frequency-based brain
networks: From a multiplex framework to a full multi-
layer description," Network Neuro. 2, 418 -- 441 (2017).
[90] U. Aslak, M. Rosvall, and S. Lehmann, "Constrained
information flows in temporal networks reveal intermit-
tent communities," Phys. Rev. E 97, 062312 (2018).
[91] E. Valdano, C. Poletto,
and V. Colizza, "Infection
propagator approach to compute epidemic thresholds on
temporal networks: impact of immunity and of limited
temporal resolution," Eur. Phys. J. B 88, 1 -- 11 (2015).
[92] H. Raiffa and R. Schlaifer, Applied Statistical Decision
Theory, Wiley Classics Library (Wiley-Interscience,
New York City, NY, USA, 2000).
[93] A. Agarwal and H. Daum´e III, "A geometric view of
conjugate priors," Mach. Learn. 81, 99 -- 113 (2010).
[94] For a fully-ordered multilayer network (i.e., where
U = ∅), condition (5) is equivalent to the existence
of a matrix representation of the flattened interlayer-
dependency tensor that is upper triangular. (See Fig. 2a
for an example.) In the case of a partially-ordered mul-
tilayer network, the same equivalence holds if we "ag-
gregate" [15] the interlayer-dependency tensor over un-
ordered aspects.
[95] One defines lexicographic order for the Cartesian prod-
uct of ordered sets similarly to the way that words are
ordered in a dictionary. For two elements e, f ∈ E =
E1 × . . . × En, we define e ≺ f if e1 < f1 or there exists
i such that ei < fi and ei(cid:48) = fi(cid:48) for all i(cid:48) < i.
[96] The order in which we update state nodes in the same
layer has no effect on the sampling process, because
their conditional distributions are independent. One can
even update them in parallel.
[97] L. Peel and A. Clauset, "Detecting change points in the
large-scale structure of evolving networks," in Proceed-
ings of the 29th Conference on Artificial Intelligence
(AAAI Press, Palo Alto, California, USA, 2015) pp.
2914 -- 2920.
[98] Different choices for normalizing mutual information
yield different versions of NMI [131]. We use joint-
entropy normalization, which entails that
NMI(S,T ) =
I(S,T )
H(S,T )
,
where S and T denote two multilayer partitions, I de-
notes mutual information, and H denotes joint entropy.
This variant of the NMI has the desirable property that
1 − NMI(S,T ) = NVI(S,T ) =
VI(S,T )
H(S,T )
,
where NVI is a normalized version of variation of in-
formation (VI) [132, 133]. Variation of information is a
metric for comparing partitions, and NVI preserves its
metric properties [134].
[99] R. Gallotti and M. Barth´elemy, "Anatomy and effi-
ciency of urban multimodal mobility," Sci. Rep. 4, 6911
(2014).
[100] M. Zanin and F. Lillo, "Modelling the air transport with
complex networks: A short review," Eur. Phys. J. Spec.
Top. 215, 5 -- 21 (2013).
[101] S. Galhotra, A. Mazumdar, S. Pal, and B. Saha, "The
geometric block model," AAAI-18 Thirty-Second AAAI
Conference on Artificial Intelligence (2018).
[102] K.-M. Lee, J. Y. Kim, W.-K. Cho, K.-I. Goh, , and I.-
M. Kim, "Correlated multiplexity and connectivity of
multiplex random networks," New J. Phys. 14, 033027
(2012).
[103] A. R. Pamfil, S. D. Howison, and M. A. Porter, "Edge
correlations in multilayer networks," arXiv:1908.03875
(2019).
[104] R. Lambiotte, L. Tabourier,
and J.-C Delvenne,
"Burstiness and spreading on temporal networks," Eur.
Phys. J. B 86, 320 (2013).
[105] D. J. Daley and D. Vere-Jones, An Introduction to the
Theory of Point Processes, 2nd ed., Vol. 1 (Springer-
Verlag, Heidelberg, Germany, 2003).
[106] A. G. Hawkes, "Spectra of some self-exciting and mu-
tually exciting point processes," Biometrika 58, 83 -- 90
(1971).
[107] L. G. S. Jeub, M. Bazzi, I. S. Jutla, and P. J. Mucha,
"A generalized Louvain method for community detec-
tion implemented in MATLAB," https://github.com/
GenLouvain/GenLouvain (2011 -- 2019), version 2.2.
[108] V. D. Blondel, J.-L. Guillaume, R. Lambiotte,
and
E. Lefebvre, "Fast unfolding of communities in large
networks," J. Stat. Mech: Theory Exp. 2008, P10008
(2008).
[109] B. K. Fosdick, D. B. Larremore, J. Nishimura,
and
J. Ugander, "Configuring random graph models with
fixed degree sequences," SIAM Rev. 60, 315 -- 355 (2018).
[110] We use version 0.18.2 of the InfoMap code with the
"--two-level" option. The code is available at http:
//mapequation.org/code.
[111] M. Rosvall and C. T. Bergstrom, "An information-
theoretic framework for resolving community structure
in complex networks," Proc. Nat. Acad. Sci. U.S.A. 18,
7327 -- 7331 (2007).
[112] S. J. Cranmer, E. J. Menninga, and P. J. Mucha, "Kan-
tian fractionalization predicts the conflict propensity of
the international system," Proc. Nat. Acad. Sci. U.S.A.
112, 11812 -- 11816 (2015).
[113] M. Barigozzi, G. Fagiolo, and D. Garlaschelli, "Multi-
network of international trade: A commodity-specific
analysis," Phys. Rev. E 81, 046104 (2010).
[114] R. Mastrandrea, T. Squartini, G. Fagiolo, and D. Gar-
laschelli, "Reconstructing the world trade multiplex:
The role of intensive and extensive biases," Phys. Rev.
E 90, 062804 (2014).
[115] W. Fan and A. Yeung, "Similarity between community
structures of different online social networks and its im-
pact on underlying community detection," Commun.
Nonlinear Sci. Numer. Simul. 20, 1015 -- 1025 (2015).
[116] S. K´efi, V. Miele, E. A. Wieters, S. A. Navarrete, and
E. L. Berlow, "How structured is the entangled bank?
The surprisingly simple organization of multiplex eco-
logical networks leads to increased persistence and re-
silience," PLoS Biol. 14, 1 -- 21 (2016).
[117] We observe some erratic behavior at the transition as
the interlayer coupling ω approaches 1 from below. For
values of ω near 1 but smaller than 1, the GenLouvain
algorithm has a tendency to place all state nodes in
a single community. This observation is related to the
transition behavior that was described in [16]. For values
of ω above a certain threshold [16] only interlayer merges
occur in the first phase of Louvain.
[118] M. Starnini, A. Baronchelli, and R. Pastor-Satorras,
"Effects of temporal correlations in social multiplex net-
34
works," Sci. Rep. 7 (2017).
[119] A. Lomi, G. Robins, and M. Tranmer, "Introduction to
multilevel social networks," Soc. Networks 44, 266 -- 268
(2016).
[120] M. Rosvall, A. V. Esquivel, A. Lancichinetti, J. D. We-
stand, and R. Lambiotte, "Memory in network flows
and its effects on spreading dynamics and community
detection," Nat. Commun. 5, 4630 (2014).
[121] V. Nicosia and V. Latora, "Measuring and modeling
correlations in multiplex networks," Phys. Rev. E 92,
032805 (2015).
[122] T. A. B. Snijders and K. Nowicki, "Estimation and pre-
diction for stochastic blockmodels for graphs with latent
block structure," J. Classif. 14, 75 -- 100 (1997).
[123] K. Nowicki and T. A. B. Snijders, "Estimation and pre-
diction for stochastic blockstructures," J. Am. Stat. As-
soc. 96, 1077 -- 1087 (2001).
[124] T. P. Peixoto, "Bayesian stochastic blockmodeling,"
arXiv:1705.10225 (2017).
[125] P. Latouche, E. Birmele, and C. Ambroise, "Variational
Bayesian inference and complexity control for stochastic
block models," Stat. Modelling 12, 93 -- 115 (2012).
[126] L. Tierney, "Markov chains for exploring posterior dis-
tributions," Ann. Statist. 22, 1701 -- 1728 (1994).
[127] M. K. Cowles and B. P. Carlin, "Markov chain Monte
Carlo convergence diagnostics: A comparative review,"
J. Am. Stat. Assoc. 91, 883 -- 904 (1996).
[128] A power law with cutoffs xmin and xmax and exponent τ
is a continuous probability distribution with probability
density function
(cid:40)
p(x) =
C x−η , xmin ≤ x ≤ xmax ,
0 ,
otherwise ,
where
η − 1
− x
is the normalization constant.
−(η−1)
min
C =
x
−(η−1)
max
[129] The choice of a Poisson distribution for the number of
edges ensures that this approach for sampling edges is
approximately consistent with sampling edges indepen-
dently from Bernoulli distributions with success proba-
bilities Eq. (D1). The exact distribution for the number
of edges is a Poisson -- binomial distribution, from which
it is difficult to sample; a Poisson -- binomial distribution
is well-approximated by a Poisson distribution if none
of the individual edge probabilities are too large.
[130] H. W. Kuhn, "The Hungarian method for the assign-
ment problem," Naval Res. Logist. Quart. 2, 83 -- 97
(1955).
[131] Y. Y. Yao, "Information-theoretic measures for knowl-
edge discovery and data mining," in Entropy Measures,
Maximum Entropy Principle and Emerging Applica-
tions, Studies in Fuzziness and Soft Computing, Vol.
119, edited by Karmeshu (Springer-Verlag, Heidelberg,
Germany, 2003) pp. 115 -- 136.
[132] M. Meila, "Comparing clusterings by the variation of
information," in Learning Theory and Kernel Machines,
Lecture Notes in Computer Science, Vol. 2777, edited
by B. Scholkopf and M. K. Warmuth (Springer-Verglag,
Heidelberg, Germany, 2003).
[133] M. Meila, "Comparing clusterings -- An information
based distance," J. Multivar. Anal. 98, 873 -- 895 (2007).
[134] M. Li, J. H. Badger, X. Chen, S. Kwong, P. Kearney,
and H. Zhang, "An information-based sequence distance
and its application to whole mitochondrial genome phy-
logeny," Bioinformatics 7, 194 -- 154 (2001).
35
|
1305.6489 | 2 | 1305 | 2013-12-06T09:19:57 | Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective | [
"cs.SI",
"physics.soc-ph"
] | Sensor placement for the purpose of detecting/tracking news outbreak and preventing rumor spreading is a challenging problem in a large scale online social network (OSN). This problem is a kind of subset selection problem: choosing a small set of items from a large population so to maximize some prespecified set function. However, it is known to be NP-complete. Existing heuristics are very costly especially for modern OSNs which usually contain hundreds of millions of users. This paper aims to design methods to find \emph{good solutions} that can well trade off efficiency and accuracy. We first show that it is possible to obtain a high quality solution with a probabilistic guarantee from a "{\em candidate set}" of the underlying social network. By exploring this candidate set, one can increase the efficiency of placing social sensors. We also present how this candidate set can be obtained using "{\em graph sampling}", which has an advantage over previous methods of not requiring the prior knowledge of the complete network topology. Experiments carried out on two real datasets demonstrate not only the accuracy and efficiency of our approach, but also effectiveness in detecting and predicting news outbreak. | cs.SI | cs | Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective
Junzhou Zhao1, John C. S. Lui2, Don Towsley3, Xiaohong Guan1 and Pinghui Wang2
1MOE KLINNS Lab, Xi'an Jiaotong University
2Department of Computer Science & Engineering, The Chinese University of Hong Kong
3Computer Science Department, University of Massachusetts at Amherst
{jzzhao,phwang,xhguan}@sei.xjtu.edu.cn, [email protected], [email protected]
3
1
0
2
c
e
D
6
]
I
S
.
s
c
[
2
v
9
8
4
6
.
5
0
3
1
:
v
i
X
r
a
Abstract
Sensor placement for the purpose of detecting/tracking news
outbreak and preventing rumor spreading is a challenging
problem in a large scale online social network (OSN). This
problem is a kind of subset selection problem: choosing a
small set of items from a large population so to maximize
some prespecified set function. However, it is known to be
NP-complete. Existing heuristics are very costly especially
for modern OSNs which usually contain hundreds of mil-
lions of users. This paper aims to design methods to find
good solutions that can well trade off efficiency and accu-
racy. We first show that it is possible to obtain a high quality
solution with a probabilistic guarantee from a "candidate set"
of the underlying social network. By exploring this candidate
set, one can increase the efficiency of placing social sensors.
We also present how this candidate set can be obtained us-
ing "graph sampling", which has an advantage over previous
methods of not requiring the prior knowledge of the com-
plete network topology. Experiments carried out on two real
datasets demonstrate not only the accuracy and efficiency of
our approach, but aslo effectiveness in detecting and predict-
ing news outbreak.
I. Introduction
The rising popularity of online social networks (OSNs) has
made information sharing and discovery much easier than
ever before. Such social networks shift the role of partici-
pants from few content producers with many consumers to
both producers and consumers of content. While this fun-
damental change enables information diversity in the Inter-
net, it introduces the problem of what information sources
to subscribe to or follow due to users' limited attention ca-
pacities. For example, journalists need to discover breaking
news from OSNs in a timely manner, while government of-
ficers may want to prevent damages caused by destructive
riots arose from OSNs (e.g., the England Riots in 2011), or
twitter users may want to track valuable information by fol-
lowing limited twitter accounts. Hence, it is important to
decide which subset of social network accounts to choose as
information sources such that the total information obtained
is maximized.
The task of selecting a small number of accounts (or
nodes) to cover as much valuable information as possible
Copyright c(cid:13) 2021, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
is feasible in modern OSNs because messages are shared
by users, e.g., a tweet related to breaking news can be
retweeted, reposted or shared by the followers or friends in
social networks. Therefore, one only needs to read one par-
ticipant's tweets and obtain the information about the event.
Here, we say that diffusible tweets triggered by some users
and the associated participants form many information cas-
cades, and the social network accounts which we prefer to
select to monitor are called social sensors. Our problem is
how to select a finite number of social sensors which can
discover as many important cascades as possible.
and
optimal
Challenges: Selecting a small set of items from a large
population to maximize some prespecified set function
is a classical combinatorial optimization problem and
its solution has widespread application, e.g, set cover
problem(Khuller, Moss, and Naor 1999; Fujito 2000),
in-
fluence maximization(Kempe, Kleinberg, and Tardos 2003;
sens-
Li, qiao Zhao, and Lui 2012)
ing(Leskovec et al. 2007; Krause 2008).
However, all
these works assume that the complete data (i.e., network
topology) is available in advance. For modern OSNs, the
network topology is usually not available. This is because
many of these OSNs have hundreds of millions of accounts,
and OSN service providers usually limit the request rates.
This makes the task of discovering the entire network
topology very difficult, if not impossible. Secondly, even
if we know the network topology, the underlying subset
selection problem is NP-complete. When the objective
function is submodular, a greedy algorithm (GA) can find
a solution with the lower bound of 1 − 1/e ≈ 63% to
the optimal solution(Nemhauser, Wolsey, and Fisher 1978),
and its execution time is polynomial to the size of network.
However,
the algorithm does not scale to handle large
graphs like modern OSNs since they usually have hundreds
of millions of nodes. The current state-of-the-art approach
is the Accelerated Greedy (AG)(Minoux 1978). However,
it is not guaranteed to be efficient all the time, i.e., in the
worst case,
it is as inefficient as the greedy algorithm.
Thirdly and most importantly, the purpose of placing social
sensors is to capture "future" important events, i.e., sensors
selected based on historical data should have good predic-
tive capability of future information cascades. However,
users in OSNs are highly dynamic, e.g., everyday many
new users join in and many existing users drop out. This
will lead to a poor predictive capability of sensors selected
based solely on old historical data. To improve sensors' pre-
dictive capability, one has to periodically reselect sensors.
Therefore, we need a computationally efficient social sensor
placement algorithm that can accurately capture important
future events.
Proposed Approach: The above challenges inspire us
to develop computationally efficient, cheaper (no need
to have the topology of an OSN beforehand) methods
that provide quality guarantees.
In this paper, we intro-
duce an approach based on graph sampling(LOVASZ 1993;
Ribeiro and Towsley 2010). The basic idea is that by care-
fully choosing a set of candidate sensors, we can select
the final sensors from this candidate set. By sampling, the
search space can be reduced dramatically and efficiency is
increased. In this study, we show that graph sampling can
be used to find solutions with probabilistic quality guaran-
tees.
Results: We conduct experiments on two real datasets
Sina Weibo and Twitter, which are the two most popular
microblogs in the world, and compare our results with ex-
isting state-of-the-art methods. We not only demonstrate
our approach is computationally efficient, but we also show
that random walk based sampling can produce higher quality
candidate sets than vertex sampling. Finally, we apply our
method to Sina Weibo and show the effectiveness of sensors'
detection and prediction capability on discovering events.
This paper is organized as follows. In Section II, we intro-
duce notations and formulate the problem. The basic frame-
work of the proposed method is introduced in Section III
along with performance guarantee analysis. Experiments are
conducted in Section IV. Section V summarizes the related
works, and Section VI concludes.
II. Problem Statement
Let us first introduce some notations we use in this paper,
and then formally present the problem formulation.
Notations and Problem Formulation
Let G(V, E, C) denote the OSN under study, where V is the
set of nodes, E is the set of edges, and C is the set of infor-
mation cascades. An information cascade (or cascade for
short) c ∈ C is represented by a set of participating times
{tcu : u ∈ V, c ∈ C, tcu ≥ 0}, where tcu denotes the time
that node u first participates cascade c. If u never joins c dur-
ing our observation then tcu = ∞. The size of a cascade is
the number of users with a finite participating time, denoted
by size(c), i.e., size(c) = {u : u ∈ V ∧ tcu < ∞}. Also,
let tc denote the time cascade c begins, i.e., tc = minu tcu.
A summary of these notations is shown in Table 1.
The social sensor placement problem is to select a set of
nodes S ⊂ V as social sensors within budget B, where
S ≤ B ≪ V , so as to maximize a reward function
F (S), which is a set function F : 2V → R≥0 and satis-
fies F (∅) = 0. The optimal sensor set OP T satisfies
OP T = arg max
F (S).
S⊂V ∧S≤B
(1)
Table 1: Frequently used notations.
Notation
G(V, E, C)
tcu
tc
N b(u)
B, B ′
K
F (·)
C, Ck
S, Sk
S ∗
α
OP T
δs(S)
ξp(α)
Description
Social network, V , E and C are node/edge/cascade sets.
The time user u participates cascade c.
The start time of cascade c, tc = minu tcu.
Neighboring nodes of node u.
Budget of finding sensors and candidates respectively.
Greedy algorithm stops after K rounds, where K ≤ B.
Reward function we want to optimize.
Set of candidates or candidates at round k.
Set of sensors or sensors obtained after round k.
Top α% of the nodes ordered by reward gain decreasingly.
The optimal solution of problem (1).
Reward gain of node s with respect to S.
Sample size with confidence p and percentile α.
The reward function, in general, is determined by require-
ments of the problem under study(Leskovec et al. 2007). In
this paper, we want to trade off importance (quantified by
size(c)) against timeliness (quantified by tcu − tc), which
results in the following,
F (S) = Xc∈C
size(c)
1 + minu∈S{tcu − tc}
.
(2)
That is, if the sensor set S can cover as many large size
cascades as early as possible, the reward will be high.
(1)
is
problem
Submodularity and Greedy Algorithm
Optimization
NP-
complete(Kempe, Kleinberg, and Tardos 2003). However,
when F is a) nondecreasing, i.e., if S ⊆ T ⊆ V , then
F (S) ≤ F (T ), and b) submodular, i.e., if S ⊆ T ⊆ V ,
then F (S ∪ {s}) − F (S) ≥ F (T ∪ {s}) − F (T ),
∀s ∈ V \T , the greedy algorithm can obtain an approx-
imate solution that is at least 1 − 1/e ≈ 63% of the
optimal(Nemhauser, Wolsey, and Fisher 1978). It is easy to
show that Eq. (2) possesses these two properties.
The greedy algorithm can be stated as follows. It runs for
at most B rounds to obtain a set S of size S ≤ B. In each
round, it finds a node s ∈ V \S that maximizes the reward
gain δs(S) , F (S ∪ {s}) − F (S), then s is added into S in
this round. This process repeats K rounds until S = B or
δs(S) = 0. The computation complexity of this algorithm is
O(K · V ). Note that this greedy algorithm is not scalable
for large scale OSNs since graphs of these OSNs usually
have large number of nodes (or V is very large).
To speed up the greedy algorithm, Leskovec et
al(Leskovec et al. 2007) use a Cost-Effective Lazy Forward
(CELF) approach, also known as Accelerated Greedy (AG)
proposed in (Minoux 1978) to reduce the computation times
of δs(S) in each round by further utilizing the submodular-
ity of F . The basic idea is that the reward gain of a node in
the current round cannot be better than its reward gain in the
previous round, i.e., if k > l, then δs(Sk) ≤ δs(Sl), ∀s ∈
V \Sk, where Sk, 1 ≤ k ≤ K is the selected nodes after the
k-th round by the greedy algorithm. However, it is important
to note that AG/CELF does not guarantee an improvement
on computational efficiency, i.e., in the worst case, it is as
inefficient as the naive greedy algorithm(Minoux 1978).
III. Search Space Reduction
The inefficiency of the above mentioned algorithms is due to
the large search space and the absence of an efficient search
method. For example, to find at most B sensors from the
node set V , there are PB
n=1(cid:0)V
n (cid:1) = O(2V ) possible solu-
tions. Hence, we modify our problem, and consider how to
find some acceptable good solutions at a much lower com-
putational cost. In the following, we first describe the basic
framework of our approach and present the definition of ac-
ceptable good solution of our algorithm. We then formally
show the performance guarantees of the proposed approach,
along with its variants and cost analysis.
The Basic Framework
In order to reduce search space, we consider using a candi-
date set Ck ⊆ V \Sk−1 to represent the search space at round
k. This forms the basic search space reduction framework
as described in Alg. 1 (We sometimes suppress the subscript
k if there is no ambiguity).
Algorithm 1: The basic framework
Input: Nodes V , budget B.
Output: Sensors S.
1 S = ∅;
2 while S < B, do
3
4
5
6 end
Generate candidate set C ⊆ V \S;
Select a node s∗ such that s∗ = arg maxs∈C δs(S);
S = S ∪ {s∗};
The only difference between Alg. 1 and the original
greedy algorithm is the process at line 3.
In the original
algorithm, one selects a node s∗ from V \S that maximizes
the reward gain δs(S). Here, we select s∗ from a candidate
set C ⊆ V \S to maximize δs(S). Intuitively, the accuracy
of this algorithm should be arbitrary close to the greedy al-
gorithm as C → V \S at each round but with a reduction in
computational cost. Furthermore, if the sample size at each
round is the same, then Alg. 1 becomes V /C times faster
than the original greedy algorithm. In later sub-section, we
will present algorithms on how to generate the candidate set
C. Let us first define what we mean by acceptable good so-
lutions.
Acceptable Good Solutions
At round k, suppose we rank the nodes in V \Sk−1 by reward
gain in a decreasing order, and denote the top α% of the
nodes by S∗
α, we
say s∗ is an acceptable good sensor found in round k. It is
obvious that one needs to set α to be small, say less than 1, so
to find acceptable good sensors. All acceptable good sensors
found after K rounds form the acceptable good solution of
Alg. 1.
α, where α ∈ (0, 100]. If s∗ falls into S∗
C
5000
4500
4000
3500
3000
2500
2000
1500
1000
500
0
p=0.90
p=0.95
p=0.99
p=0.90
p=0.95
p=0.99
100
)
%
(
p
a
l
r
e
v
O
80
60
40
20
0
0.2
0.4
0.6
α
0.8
1
2000 4000 6000 8000
C<k
(a) Candidates size C.
(b) Overlap percentile.
Figure 1: (a) Reduction of C as we increase α. (b) For a
small network of V = 10000 and Ck = 1000 nodes, there
is a high degree of overlap.
The candidate set size C will affect the likelihood that at
α. Formally, we can calculate
least one node in C falls into S∗
the probability that at least k nodes in C falls into S∗
α as
P rob{C ∩ S∗
α ≥ k} =
S ∗
α
Xi=k
α
α
i (cid:1)(cid:0)V \S ∗
(cid:0)S ∗
C−i (cid:1)
(cid:0)V
C(cid:1)
,
(3)
which follows a hypergeometric distribution. For k = 1, this
is equivalent to
P rob{C ∩ S∗
α ≥ 1} = 1 − (1 − α%)C.
(4)
In order to achieve a confidence level that P rob{C ∩ S∗
1} ≥ p, we can determine the lower bound on C as
α ≥
C ≥ (cid:24) ln(1 − p)
ln(1 − α%)(cid:25) .
(5)
Fig. 1a shows the relationship between C and α with
three different confidence levels of p, which we set to 0.90,
0.95 and 0.99. One interesting observation is that, when α
varies from 0.1 to 1 (or top 0.1% to 1%), C drops quickly,
which means that the search space size can be dramatically
reduced. For example, if we want to choose a node in top
1% (or α = 1) of the best nodes from the whole population,
then one can be sure that one of the 458 nodes will be a
good sensor with probability greater than 0.99. There is one
technical issue we need to pay attention:
Dealing with small networks. When the network is small,
the advantage of using our framework is not significant.
We can further improve the efficiency of Alg. 1 by exploit-
ing the submodular property of reward functions as used in
(Minoux 1978; Leskovec et al. 2007). One conclusion from
Eq. (3) is that, when V is small, at round k, the overlap
i=1 Ci and current
candidates Ck, i.e., C<k ∩ Ck, is large and increases as
C<k increasing. An example is illustrated in Fig. 1b. In
the example, we have a small network and its size is set to
V = 10000. At each round, 1000 candidates are selected.
We show the least overlap percentile versus selected candi-
date set size C<k with a given confidence p. For exam-
ple, when 1000 candidates have been selected in the previ-
ous rounds, for a newly 1000 selected candidates, there is a
guarantee that at least 8% of them have been selected in pre-
vious rounds with probability greater than 0.99. For those
between previous candidates C<k = Sk−1
overlapped nodes, we can reduce the calculations of updat-
ing reward gain by utilizing the submodular property. This
will reduce the computational complexity of our framework.
To achieve this, we can store the candidate node u and
its reward gain δu in a tuple hu, δu, #ui. Here #u is the
round during which the reward gain of node u is calculated
or updated. For candidates Ck, we only need to calculate the
reward gain of newly selected nodes and we do not need to
update the reward gain of previously selected nodes imme-
diately. We arrange nodes in Ck as a priority queue Q by
descending order of reward gain. Then we access the head
v of Q to check whether #v equals to the current round k.
If yes, then v is added into S; otherwise, update v's reward
gain, and put v into Q again. This way, the times of updat-
ing reward gain of sampled nodes can be reduced and Alg. 1
will be at least as efficient as AG/CELF when dealing with
small networks.
Performance Analysis
We conclude from our previous discussion that we can prob-
abilistically guarantee in selecting an acceptable sensor at
each round from a small candidate set C. Here, we quantify
the quality of the final sensor set obtained after K rounds.
That is, how close the solution obtained by Alg. 1 is to the
optimal solution of problem (1)? The following theorem an-
swers this question.
Theorem 1. Denote the set of sensors obtained by Alg. 1
after round k as Sk = {s∗
k}, 1 ≤ k ≤ K.
Let λk = δs∗
k =
arg maxs∈V \Sk−1 δs(Sk−1). Let λ = min1≤k≤K λk, then
(Sk−1) ∈ (0, 1], where s∗
(Sk−1)/δs∗
1, · · · , s∗
k
k
F (SK) ≥ (1 −
1
eλ )F (OP T ).
(6)
Proof: Please refer to the Appendix.
Remark: Theorem 1 indicates an important property of
Alg. 1, i.e., if at each step the reward gain δs∗ (S) is bounded
by a factor λ, then the final solution is bounded by an-
other factor 1 − 1/eλ. When λ ≈ 1, our final solution is
1 − 1/e ≈ 63% of the OP T . Hence, Alg. 1 guarantees a
good solution when λ is close to one. Note that in general,
one cannot guarantee that λ is close to one all the time. For
example, the reward gain of the second best node is much
less than the best node in current round.
In such a case,
finding the best node is like finding a needle in a haystack,
which illustrates the intrinsic difficulty due to the reward dis-
tribution. Nevertheless, one can still accept the approximate
solution if we believe the second best solution has a reward
which is not significantly different from the best solution.
r = SK
One can also understand the quality of Alg. 1 from an-
other point of view. We define cover ratio as the frac-
tion of nodes in OP T that are in all candidate sets, i.e.,
k=1 Ck ∩ OP T /K. Intuitively, the higher the cover
ratio, the better the quality of the final solution. Assume the
size of candidate set equal in each round, and denote it by
ξp(α) with confidence p and percentile α. The following
theorem presents a lower bound on the expectation of cover
ratio for fixed p and α.
Theorem 2. If we set α = 100K/V at each round, then
E[r] ≥ 1 − 1/ep.
Proof: Please refer to the Appendix.
Remark: Because p can be very close to 1, 1 − 1/ep will
be very close to 1 − 1/e ≈ 0.63. In fact, the cover ratio
can be further improved by increasing sample size at each
round, e.g., we can derive in a similar manner that if we set
α = 50K/V , then the expected cover ratio will be at least
0.82, or 82% of those sensors in OP T .
Generating C via Graph Sampling Methods
In previous discussion, we did not specify precisely how to
generate the candidate set C. In fact, C can be generated by
randomly selecting nodes in V . This does not exploit any
structural properties of OSNs, hence the performance dis-
cussed in previous sub-section can be viewed as the worst
case guarantee. Here, we show how to use graph sampling
to generate C. The main advantage of using graph sam-
pling is that one does not need to know the complete graph
topology prior to executing the sensor placement algorithm.
This is one main advantage of our framework as compare
with the current state-of-the-art approaches(Minoux 1978;
Leskovec et al. 2007). Furthermore, we also want to explore
how different graph sampling methods may affect sensor
quality. Hence, we make two modification to Alg. 1:
• Instead of selecting new candidates in each round, we
construct one candidate set C at the beginning of the al-
gorithm;
• When a node v is sampled, we select a candidate node,
say s, from v or one of v's neighbors (i.e., {v} ∪ N b(v))
which can maximize the reward gain and we put s into C.
The second change is useful in filtering out noisy tweets in
OSNs (e.g., tweets containing unimportant cascades), and
reduces the candidate set size. Nodes with large reward gain
in the neighborhood are more preferred to be in C.
Vertex sampling (VS) and random walk (RW) are two
popular graph sampling methods. We design two variants
of Alg. 1 based on vertex sampling and random walk re-
spectively, they are illustrated in Algs. 2 and 3.
Algorithm 2: Combining with vertex sampling
Input: Network G, sensor budget B, candidate budget B′.
Output: Sensors S.
1 C = ∅;
2 while C < B′, do
3
4
Choose a node v ∈ V \C;
Select a node s∗ such that
s∗ = arg maxs∈N b(v)∪{v} δs(C);
C = C ∪ {s∗};
5
6 end
7 S = Greedy(C, B) ; /* choose B sensors from C
using the greedy algorithm */
Each of these algorithms contains two steps. In the first
step, the candidate set C with budget B′ are constructed. In
the second step, the final sensors S are chosen. In line 3 of
Algorithm 3: Combining with random walk
Input: Network G, sensor budget B, candidate budget B′.
Output: Sensors S.
1 C = ∅;
2 Set u = u0 which is randomly chosen from V ;
3 while C < B′, do
4
5
Choose a node v ∈ N b(u);
Select the node s∗ such that s∗ = arg maxs∈N b(v) δs(C);
C = C ∪ {s∗};
Set u = v;
6
7
8 end
9 S = Greedy(C, B) ; /* choose B sensors from C
using the greedy algorithm */
Alg. 2 and line 4 of Alg. 3, we can use various attribute infor-
mation within an OSN to bias the selection. Such attributes
of a user can be the number of posts/friends/followers and
so on. For example, when using random walk to build the
candidate set (Alg. 3), we can choose a neighboring node
with probability proportion to its degree or activity (#posts),
which will bias a random walk toward high degree or activ-
ity nodes. Intuitively, large degree nodes are more likely to
be information sources or information hubs, and high activ-
ity nodes are more likely to retweet tweets. The comparison
of using different attributes to bias our node selection will
be discussed in Section IV. Although vertex sampling can-
not be biased without knowing attributes of every node in
advance, in order to study functions of different attributes,
we will assume we know this complete information and let
vertex sampling be biased by different attributes.
Sampling Cost Analysis
The computational cost of social sensor selection is defined
to be the number of times that the reward gain of nodes
is calculated or updated. Because of the second change in
Alg. 2 and Alg. 3, there will be additional cost in obtain-
ing samples C. Here, we analyze the cost of sampling using
uniform vertex sampling (UVS) (for Alg. 2) and uniform
random walk (URW) (for Alg. 3).
For UVS in Alg. 2, the average cost to obtain candidate
set C is
CostUVS = E[
B ′
Xi=1
(di + 1)] = B′(1 + E[dUVS]),
where di is the degree of i-th node in C, and E[dUVS] is
the average node degree obtained by UVS. Let M denote
the maximum degree in the network, and θd the fraction of
nodes with degree d. Then E[dUVS] = PM
d=1 dθd , davg.
For power law networks with degree distribution θd =
1
Z d−a, we obtain
E[dUVS] =
1
Z
M
Xd=1
d1−a.
(7)
For URW, the average cost to obtain candidate set C can
Table 2: Dataset summary
Dataset
Nodes
Edges
Cascades
Sina Weibo Twitter
1.7M
22M
7M
0.3M
1.7M
11M
be derived similarly, that is
CostURW = E[
B ′
Xi=1
di] = B′ · E[dURW],
where E[dURW] is the average node degree under URW, i.e.,
. For power law networks, it be-
E[dURW] = PM
comes
d=1 d dθd
davg
E[dURW] =
1
Zdavg
M
Xd=1
d2−a.
(8)
Equations (7) and (8) reveal the difference between UVS
and URW. Both of them are functions of a, the exponent of
the power law degree distribution. The difference is that,
for UVS, E[dUVS] is always finite when a > 2, which means
that the average cost of obtaining a sample equal the average
degree, and it is usually small and bounded by the Dunbar
number. For URW, E[dURW] is finite if a > 3; otherwise the
average cost can become arbitrarily large as M increases.
To limit the cost of creating candidate set, we can use sim-
ple heuristics to avoid searching a local maximum reward
gain node from all the neighbors. For example, we can limit
the searching scope to the top n most active neighbors. In
our experiments, n can be set very small (e.g., 10), so the
cost of obtaining samples will be bounded by O(B′ · n).
IV. Experiments
To evaluate the performance of previous discussed methods,
we present experimental results on two datasets collected
from Sina Weibo and Twitter, respectively. Then, we con-
duct experiments on Sina Weibo to study the detection ca-
pability, which measures the ability to detect cascades, as
well as prediction capability, which measures the ability to
capture future cascades using the senors selected based on
historial data.
Experiment on Sina Weibo and Twitter
Dataset Sina Weibo is one of the most popular microblog-
ging sites in China. Similar to Twitter, users in Weibo are
connected by the following relationships. Tweets can be
retweeted by one's followers and form cascades. We col-
lected a portion of Weibo network using the Breath First
Search (BFS) method along the following relationships. For
a user, his tweets and neighbors are all collected. We extract
URL links contained in tweets, and consider them as the rep-
resentation of cascades. The Twitter dataset contains tweets
and network, which are from (Link 2011) and (Link 2010),
respectively. Similar to Weibo, URL links and hashtags con-
tained in tweets are extracted to form cascades. Table 2 sum-
marizes the statistics of these two networks.
GAξ
0.9(α)
ξ
0.9(0.5α)
95%
90%
3.0
x106
d
r
a
w
e
R
2.5
2.0
1.5
1.0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
p
u
-
d
e
e
p
S
9000
8000
7000
6000
5000
4000
3000
2000
1000
0
AG/CELF
ξ
0.9(α)
ξ
0.9(0.5α)
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
α
d
r
a
w
e
R
3.5
3.0
2.5
2.0
1.5
1.0
x105
95%
90%
p
u
-
d
e
e
p
S
90000
80000
70000
60000
50000
40000
30000
20000
10000
0
GA
Uniform
Degree
Activity
AG/CELF
Uniform
Degree
Activity
200 400 600 800 1000 1200 1400
200 400 600 800 1000 1200 1400
C
C
(a) Reward (Weibo)
(b) Speed-up (Weibo)
(a) Reward (Weibo)
(b) Speed-up (Weibo)
α
α
x105
GAξ
0.9(α)
ξ
0.9(0.5α)
95%
90%
1.6
1.4
1.2
1.0
0.8
0.6
d
r
a
w
e
R
0.4
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
12000
10000
p
u
-
d
e
e
p
S
8000
6000
4000
2000
0
AG/CELF
ξ
0.9(α)
ξ
0.9(0.5α)
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
α
10.0
d
r
a
w
e
R
8.0
6.0
4.0
2.0
0.0
x103
95%
90%
p
u
-
d
e
e
p
S
160000
140000
120000
100000
80000
60000
40000
20000
0
GA
Uniform
Degree
Activity
AG/CELF
Uniform
Degree
Activity
200 400 600 800 1000 1200 1400
200 400 600 800 1000 1200 1400
C
C
(c) Reward (Twitter)
(d) Speed-up (Twitter)
(c) Reward (Twitter)
(d) Speed-up (Twitter)
Figure 2: Evaluating the basic framework on real datasets.
Figure 3: Vertex sampling on real datasets (B = 100).
Cost(algorithm)
Evaluating the basic framework We first evaluate the
performance of Alg. 1 without any network information.
We choose B sensors where B ranges from 0.1% to 1%
of the total number of nodes, and compare the quality of
sensors and speed-up of the algorithm with the greedy al-
gorithm and AG/CELF. Speed-up of an algorithm is defined
as Cost(greedy algorithm)
, where Cost(A) represents the cost of
algorithm A, i.e., number of times of calculating or updat-
ing reward gains. The sample size at each round is fixed to
ξ0.9(α) and ξ0.9(0.5α) respectively, where α = 100B/V .
In the reward curves of Fig. 2, two dashed lines repre-
sent 90% and 95% of the total reward by the greedy algo-
rithm respectively. We show the rewards of sensors with
different sizes. One can observe that the accuracy in to-
tal reward of the sampling approach is within 90% of the
greedy algorithm, and that it is more computational efficient
than AG/CELF from the speed curves. When sample size
increases from ξ0.9(α) to ξ0.9(0.5α), the reward increases
to about 95% of that produced by the greedy algorithm, but
with a slight reduction in speedup. Hence, one can adjust
the sample size to trade off between accuracy and efficiency.
Evaluating the vertex sampling framework Next, we
evaluate the benefit of using attribute information within an
OSN, in particular, in reducing the size of the candidate set
and reducing the computational cost of Alg. 2. For ver-
tex sampling, we consider the following variants: (a) uni-
formly selecting a node from the network; (b) select a node
from the network with a probability proportional to its de-
gree; (c) select the node from the network with a probability
proportional to its activity (say # posts). The aim is to se-
lect B = 100 sensors. Each experiment is run 10 times,
and the averaged results are shown in Fig. 3. From the re-
ward curves, we observe that vertex sampling by degree is
the best follows by sampling by activity, and uniform vertex
sampling is the worst. However, from the speed-up curves
we can see that uniform vertex sampling is the most effi-
cient approach. Sampling by degree is the most expensive
method. But the sampling approaches are in general much
more efficient than AG/CELF.
Evaluating the random walk framework We now eval-
uate the performance of the random walk algorithm as de-
scribed in Alg. 3. Note that this algorithm does not require
the knowledge of the network topology in advance. We have
three variants: (a) select a neighboring node uniformly; (b)
select a neighboring node with a probability proportional to
its degree; (c) select a neigbhoring node with a probabil-
ity proportional to its activity. The other settings are simi-
lar to vertex sampling, and the results are shown in Fig. 4.
Again, we can see that degree is the best attribute for ran-
dom walk, it is also the most expensive one. Comparing
random walk with vertex sampling, we observe that random
walk can achieve higher accuracy but at a higher computa-
tional cost, as is shown in Fig. 5. Both of them are more
efficient than AG/CELF. Furthermore, the random walk al-
gorithm does not require a full topology beforehand.
Application Study on Sina Weibo
For a set of selected sensors, we are interested in its detec-
tion and prediction capabilities. For detection, it means how
many or how timely a set of sensors can discover informa-
tion cascades from a given dataset. For prediction, it means
how well a set of sensors selected based on historical dataset
can generalize to a future events, e.g., a set of sensors are se-
lected based on a past week's data, and we want to know
how well they perform on a future week's data. We conduct
experiments on Sina Weibo to study these two capabilities
of sensors selected by different methods.
Detection Capability Analysis We compare the detection
quality of our algorithm with two baselines: a) randomly
x105
3.5
d
r
a
w
e
R
3.0
2.5
2.0
1.5
10.0
x103
95%
90%
d
r
a
w
e
R
8.0
6.0
4.0
2.0
p
u
-
d
e
e
p
S
35000
30000
25000
20000
15000
10000
5000
0
GA
Uniform
Degree
Activity
AG/CELF
Uniform
Degree
Activity
200 400 600 800 1000 1200 1400
200 400 600 800 1000 1200 1400
C
C
(c) Reward (Twitter)
(d) Speed-up (Twitter)
Figure 4: Random walk on real datasets (B = 100).
x104
5
4
3
2
1
p
u
-
d
e
e
p
S
VS-uniform
VS-degree
VS-activity
RW-uniform
RW-degree
RW-activity
0
2.0 2.2 2.4 2.6 2.8 3.0 3.2 3.4
x105
Reward
(a) Weibo
p
u
-
d
e
e
p
S
6
5
4
3
2
1
0
x104
VS-uniform
VS-degree
VS-activity
RW-uniform
RW-degree
RW-activity
3
4
8
9
10
x103
5
7
6
Reward
(b) Twitter
Figure 5: Comparing vertex sampling with random walk in
Speedup and Reward.
choose a set of nodes as sensors; b) choosing sensors by
utilizing friendship paradox(Christakis and Fowler 2010).
Friendship paradox randomly selects a neighbor of a ran-
domly sampled node as a sensor, and it is proved to be
able to sample larger degree nodes than random node se-
lection(Feld 1991).
We then apply the method of Alg. 3 in which random walk
is biased by neighbors' activity and totally 50,000 Weibo ac-
counts are collected, which form the candidate set. We use
the posts between Jan 1, 2012 to Sep. 1, 2012 to evaluate the
quality of a node. From these candidates we choose B sen-
sors where B ranges from 2,000 to 10,000 using the reward
function in Eq. (2). We also introduce two other measures
to evaluate sensor quality: (a) the number of cascades sen-
sors can detect; (b) the detecting lead-time, which measures
the time interval that the sensors first detect a cascade in ad-
vance of the peak time of the cascade. It can be considered as
the warning time for outbreaks a set of sensors can provide.
The results are shown in Fig. 6. We observe that sensors ob-
tained by Alg. 3 can discover around two to six times more
cascades and provide earlier warning time (about two days)
than the other two baseline methods.
95%
90%
GA
Uniform
Degree
Activity
20000
15000
10000
p
u
-
d
e
e
p
S
5000
0
AG/CELF
Uniform
Degree
Activity
RW-activity
Friendship paradox
Random
12
x105
s
t
c
e
t
e
d
#
8
4
200 400 600 800 1000 1200 1400
200
400
C
800
1000
600
C
(a) Reward (Weibo)
(b) Speed-up (Weibo)
0
2000
4000
6000
8000 10000
#sensors
(a) #detects
)
r
u
o
h
(
e
m
i
t
-
d
a
e
l
.
g
v
A
RW-activity
Friendship paradox
Random
400
350
300
250
200
150
100
50
0
100 101 102 103 104 105 106
Cascade size
(b) Lead-time
Figure 6: Detection ability comparison.
)
%
(
s
e
d
a
c
s
a
c
f
o
n
o
i
t
c
a
r
F
50
40
30
20
10
0
CELF on week i
CELF on week 0
0
5 10 15 20 25 30 35
Prediction steps (week)
30
25
20
15
10
)
%
(
s
e
d
a
c
s
a
c
f
o
n
o
i
t
c
a
r
F
CELF
RW-uniform
RW-degree
RW-activity
20
40
60
80 100
#sensors
(a) #detects by T0 (B = 100).
(b) One step prediction.
Figure 7: Prediction ability of sensors.
Prediction Capability Analysis We study prediction in
the scheme of choosing sensors based on historical data and
testing them on future data. We want to answer: Are selected
sensors based on historical data still good for capturing fu-
ture cascades? Here we mainly compare the results with the
method presented in (Leskovec et al. 2007), which chooses
sensors using CELF. For our framework, we use Alg. 3 to
select the sensor. The Sina Weibo data collected by BFS
used in previous section will be our ground truth data, and
we split time into granularity of a week.
For the convenience of description, let Ti, i ≥ 0 denote
the sensors selected by the CELF algorithm using the ith
week data. Fig. 7a has two curves: "CELF on week 0" rep-
resents running CELF on week 0 data only, while "CELF
on week i" represent running CELF on the ith week data.
The figure depicts the fraction of cascade detected at differ-
ent weeks. The black curve corresponds to "CELF on week
0" while the red curve corresponds to "CELF on week i".
We can see that the senors in T0 (or "CELF on week 0") is
reducing its predictive capability as time evolves. However,
if we use Ti (or "CELF on week i"), we can have a much
higher predictive capability. This implies that social network
is highly dynamic and one needs to execute the sensor se-
lection algoirthm more often, rather than relying on sensors
selected based on old histrical data.
Next, we study the prediction performance of our method.
We choose 1,000 candidates by random walk biased by
uniform/degree/activity respectively, from which we select
B sensors where B ranges from 20 to 100, and compare
the one-week prediction capability with aforementioned
"CELF" approach. The result is shown in Fig. 7b. One in-
teresting observation is that our approach is at least as good
as the "CELF" approach. Random walk biased by users'
)
%
(
.
v
o
r
p
m
i
s
t
c
e
e
d
#
t
5
4
3
2
1
0
10
)
%
(
.
v
o
r
p
m
i
s
t
c
e
e
d
#
t
5
4
3
2
1
0
2 3 4 5
)
%
(
.
v
o
r
p
m
i
s
t
c
e
e
d
#
t
5
4
3
2
1
0
1
2
3
#active days a week
#cascades a day
15
12
14
11
#cascades a week
13
Figure 8: One step prediction improvements relative to
"greedy" under different regularization rules.
activity is the best, which can improve about 3% of detects
on the testing data. Since our approach is more computa-
tionally efficient than CELF, hence, one can apply it more
often so to have a good predictive capability on information
cascade, e.g., better than results of "CELF on week i".
To understand why our random walk approach has
good predictive capability, one can consider the candidate-
selecting step as a pruning or regularizing process, which
are common techniques used to avoid overfitting of deci-
sion trees(Witten and Frank 2005, Chapter 6). For example,
when using uniform random walk to collecting candidates,
it prefers to select high degree nodes of the network. This
can be considered as a rule to regularize the search scope,
which can avoid choosing unimportant users who join into
large cascades just by chance. To demonstrate this, we use
the following regularization rules to constraint search scopes
and then apply the CELF to see whether there is any im-
provements,
• #cascades in a week. The search scope is limited to users
who have joined at least x cascades in the history data;
• #active days in a week. The search scope is limited to
users who have been active at least x days in the history
data;
• #cascades per day. The search scope is limited to users
who participates at least x cascades per day.
Fig. 8 depicts the results. We observe some improvements
of prediction performance when using different constraints,
and users' activity in history is the best rule, which is consis-
tent with the results in Fig. 7b. This shows that our random
walk algorithm has the intrinsic property to regularize the
searching scope similar to the above regularization rules.
V. Related Work
In this section, we briefly review some related work, which
are categorized into three groups:
Influence maximization: One important topic related to our
work is how to identify k most influential nodes in a social
network. Domingos et al(Domingos and Richardson 2001)
first posed this problem in the area of marketing.
Kempe et al(Kempe, Kleinberg, and Tardos 2003) proved
the problem is NP-complete under both indepen-
that
dent cascade model and threshold model.
They also
provided an approximation solution which has a con-
stant factor bound. However, computing the influence
spread given a seed set by Monte Carlo simulations is
not scalable. Other works(Chen, Wang, and Yang 2009;
Li, qiao Zhao, and Lui 2012) tried to scale up the Monte
Carlo simulation. In our work, we do not assume any cas-
cade or threshold model, but rather, exploit the attributes of
OSNs to determine the B sensor nodes.
Optimal sensing: Optimal sensing problems(Krause 2008;
Leskovec et al. 2007) are closely related to our work, which
aim to find optimal observers or optimal sensor place-
ment strategies to measure temperature, gas concentra-
tion or detect outbreaks in networks(Leskovec et al. 2007;
Christakis and Fowler 2010). Our work can be considered
as an extension of Leskovec's work(Leskovec et al. 2007) in
which the authors proposed the CELF approach to speedup
the greedy algorithm. It is similar to the AG posed by Mi-
noux(Minoux 1978). There are several differences between
their work and ours. First, we study the problem with-
out assuming the knowledge on the complete OSN topol-
ogy. Second, our work aims to speedup the greedy algo-
rithm via graph sampling, and that we can tradeoff a small
loss of accuracy but obtain large improvement in efficiency.
Furthermore, the performance of our algorithm is guaran-
teed with high probability. The last property is important
since AG/CELF can be as inefficiency as the greedy al-
gorithm in the worst case(Minoux 1978). Third, we ex-
ploit the meta information within in social networks.
In
(Leskovec et al. 2007), authors considered the problem as a
discrete optimizing problem without considering contextual
information in OSNs. In our experiments, we find that con-
textual information can be used to reduce sample size and
improve efficiency.
Graph sampling and optimizing. Graph sampling meth-
ods are used to measure properties of nodes and edges
in graphs,
such as degree distribution(LOVASZ 1993;
Ribeiro and Towsley 2010). To the best of our knowledge,
this is the first work which uses graph sampling methods
to maximize a set function. Lim et al(Lim et al. 2011) and
Maiya et al(Maiya and Berger-Wolf 2010) both use differ-
ent sampling methods to estimate the top k largest centrality
nodes in a graph, i.e., degree centrality, betweenness central-
ity, closeness centrality and eigenvector centrality. However
these top k largest centrality nodes are not the top k optimal
sensors which are defined by a set function F (·). Our work
can be considered as a combination of ordinary optimiza-
tion(Ho, Sreenivas, and Vakili 1992) with greedy algorithm.
It uses the property of greedy algorithm that if the reward
gain at each round is bounded by factor λ, then the final so-
lution obtained by the greedy algorithm is bounded by factor
1 − 1/eλ as shown in Theorem 1.
VI. Conclusions
Many OSNs are large in scale and there is an urgent need
on how to select reliable information sources to subscribe so
one can track/detect information cascades. This can be for-
mulated as a sensor placement problem and previous work
used heuristic greedy algorithms. However, it is impractical
to run these greedy algorithms on a OSN composed of mil-
lions of users. Hence we propose sampling approach to find
these good sensors.
We show that one can significantly reduce the complexity
by sampling the huge search space, and still can guarantee
to have good solutions with high probabilistic guarantees.
Hence, the sampling approach is a good method to trade off
efficiency and accuracy. We evaluate various graph sam-
pling approaches, and find that random walk based sampling
methods perform better than vertex sampling based meth-
ods. This indicates that structural information of OSNs is
important and random walks are suitable for obtaining better
samples, while previous discrete optimization approaches
failed to utilize this information. We apply our framework
on Sina Weibo, and the results demonstrate that using our
algorithm, one can effectively detect information cascade.
Since our algorithm is computationally efficient, one can ex-
ecute it more often so to find new sensor nodes to accurately
predict future information cascade.
References
P.,
and
2001. Mining the network value of
[Chen, Wang, and Yang 2009] Chen, W.; Wang, Y.; and
Yang, S. 2009. Efficient influence maximization in social
networks. In KDD'09, 199 -- 208.
[Christakis and Fowler 2010] Christakis, N. A., and Fowler,
J. H. 2010. Social network sensors for early detection of
contagious outbreaks. PLoS ONE 5.
[Domingos and Richardson 2001] Domingos,
Richardson, M.
customers. In KDD'01.
[Feld 1991] Feld, S. L.
1991. Why your friends have
more friends than you do. American Journal of Sociology
96(6):1464 -- 1477.
[Fujito 2000] Fujito, T. 2000. Approximation algorithms for
submodular set cover with applications. IEICE TRANS. INF.
& SYST.
[Ho, Sreenivas, and Vakili 1992] Ho, Y. C.; Sreenivas, R. S.;
and Vakili, P. 1992. Ordinal optimization of deds. Discrete
Event Dynamic Systems: Theory and Applications 2:61 -- 88.
[Kempe, Kleinberg, and Tardos 2003] Kempe, D.; Klein-
berg, J.; and Tardos, E. 2003. Maximizing the spread of
influence through a social network. KDD'03.
[Khuller, Moss, and Naor 1999] Khuller, S.; Moss, A.; and
Naor, J. S. 1999. The budgeted maximum coverage problem.
Information Processing Letters 70:39 -- 45.
[Krause 2008] Krause, A. 2008. Optimizing Sensing Theory
and Applications. Ph.D. Dissertation, School of Computer
Science Carnegie Mellon University.
[Leskovec et al. 2007] Leskovec, J.; Krause, A.; Guestrin,
C.; Faloutsos, C.; VanBriesen, J.; and Glance, N. 2007.
Cost-effective outbreak detection in networks. KDD'07
420 -- 429.
[Li, qiao Zhao, and Lui 2012] Li, Y.; qiao Zhao, B.; and Lui,
J. C. 2012. On modeling product advertisement in large
scale online social networks. IEEE/ACM Transitions on Net-
working.
[Lim et al. 2011] Lim, Y.; Ribeiro, B.; Menasche, D. S.;
Basu, P.; and Towsley, D. 2011. Online estimating the top k
nodes of a network. IEEE NSW.
social
network
or
is
news
What
a
twitter
tweets.
476 million
twitter,
media?
[Link 2010] 2010.
a
http://an.kaist.ac.kr/traces/WWW2010.html.
[Link 2011] 2011.
http://snap.stanford.edu/data/twitter7.html.
[LOVASZ 1993] LOVASZ, L.
1993. Random walks on
graphs: A survey. BOLYAI SOCIETY MATHEMATICAL
STUDIES 1 -- 46.
[Maiya and Berger-Wolf 2010] Maiya, A. S., and Berger-
Wolf, T. Y. 2010. Online sampling of high centrality in-
dividuals in social networks. PAKDD.
[Minoux 1978] Minoux, M. 1978. Accelerated greedy algo-
rithms for maximizing submodular set functions. Optimiza-
tion Techniques.
[Nemhauser, Wolsey, and Fisher 1978] Nemhauser, G. L.;
Wolsey, L. A.; and Fisher, M. L. 1978. An analysis of
approximations for maximizing submodular set functions.
Mathematical Programming 14:265 -- 294.
[Ribeiro and Towsley 2010] Ribeiro, B., and Towsley, D.
2010. Estimating and sampling graphs with multidimen-
sional random walks. IMC'10.
[Witten and Frank 2005] Witten, I. H., and Frank, E. 2005.
Data Mining: Practical Machine Learning Tools and Tech-
niques. Morgan Kaufmann.
Appendix
Proof of Theorem 1
Proof. By utilizing the non-decreasing property of F , we
have
F (OP T ) − F (Sk−1) ≤F (OP T ∪ Sk−1) − F (Sk−1)
=F (OP T \Sk−1 ∪ Sk−1) − F (Sk−1).
Assume OP T \Sk−1 = {z1, · · · , zm}, m ≤ K, and let j =
1, · · · , m, we have
Zj = F (Sk−1 ∪{z1, · · · , zj})−F (Sk−1∪{z1, · · · , zj−1}).
With some algebraic manipulation, we have
F (OP T ) − F (Sk−1) ≤
m
Xj=1
Zj.
Now notice that
Zj ≤F (Sk−1 ∪ {zj}) − F (Sk−1)
=δzj (Sk−1) ≤
1
λ
δs∗
k
(Sk−1)
=
1
λ
(F (Sk) − F (Sk−1)).
Then we get an iterative formula of F (Sk),
F (OP T ) − F (Sk−1) ≤
m
Xj=1
Zj ≤
K
λ
(F (Sk) − F (Sk−1)).
Iteratively, we can derive the following relationship,
F (Sk) ≥ [1 − (1 −
λ
K
)k]F (OP T ).
Finally, let k = K. We conclude that
F (SK) ≥ [1 − (1 −
λ
K
)K ]F (OP T ) ≥ (1 −
1
eλ )F (OP T ).
Proof of Theorem 2
Proof. Let yi denote the number of nodes in OP T that have
been covered after the i-th round and ¯yi be its expectation.
Further, let qi denote the probability that an uncovered node
in OP T will be covered in the i-th round. Then the expec-
tation of yi is
¯yi = ¯yi−1 + qi,
(9)
For α% = K/V and confidence p, we are pretty sure that
one of the K nodes will fall in ξp(α) with probability at least
p. Hence, the probability of sampling an uncovered node of
OP T in round i is
qi ≥ p
K − ¯yi−1
K
.
Substituting the above equation into Eq. (9), we get
¯yi ≥ ¯yi−1 + p
K − ¯yi−1
K
.
Iteratively, it can be written in the following form,
¯yi ≥ (1 −
p
K
)i ¯y0 + K[1 − (1 −
p
K
)i]
Since ¯y0 = 0, we get
¯yi ≥ K[1 − (1 −
p
K
)i].
After the K-th round, we conclude
E[r] =
¯yK
K
≥ 1 − (1 −
p
K
)K ≥ 1 −
1
ep .
|
1605.07915 | 2 | 1605 | 2017-06-12T14:05:19 | Cross-validation estimate of the number of clusters in a network | [
"cs.SI",
"physics.soc-ph"
] | Network science investigates methodologies that summarise relational data to obtain better interpretability. Identifying modular structures is a fundamental task, and assessment of the coarse-grain level is its crucial step. Here, we propose principled, scalable, and widely applicable assessment criteria to determine the number of clusters in modular networks based on the leave-one-out cross-validation estimate of the edge prediction error. | cs.SI | cs |
Cross-validation estimate of the number of clusters in a network
Tatsuro Kawamoto∗1 and Yoshiyuki Kabashima2
1Artificial Intelligence Research Center, National Institute of Advanced
Industrial Science and Technology, 2-3-26 Aomi, Koto-ku, Tokyo, Japan
2Department of Mathematical and Computing Science, Tokyo Institute of Technology,
4259-G5-22, Nagatsuta-cho, Midori-ku, Yokohama, Kanagawa 226-8502, Japan
(Dated: June 15, 2021)
Network science investigates methodologies that summarise relational data to obtain better inter-
pretability. Identifying modular structures is a fundamental task, and assessment of the coarse-grain
level is its crucial step. Here, we propose principled, scalable, and widely applicable assessment
criteria to determine the number of clusters in modular networks based on the leave-one-out cross-
validation estimate of the edge prediction error.
INTRODUCTION
Mathematical tools for graph or network analysis have wide applicability in various disciplines of science. In fact,
many datasets, e.g., biological, information, and social datasets, represent interactions or relations among elements
and have been successfully studied as networks [1, 2] using the approaches of machine learning, computer science, and
statistical physics. In a broad sense, a major goal is to identify macroscopic structures, including temporal structures,
that are hidden in the data. To accomplish this goal, for example, degree sequences, community and core -- periphery
structures, and various centralities have been extensively studied. Here, we focus on identifying modular structures,
namely, graph clustering [3, 4]. Popular modular structures are the community structure (assortative structure) and
disassortative structure [5 -- 8], although any structure that has a macroscopic law of connectivity can be regarded as
a modular structure. The Bayesian approach using the stochastic block model [9], which we will describe later, is a
powerful tool for graph clustering. In general, graph clustering consists of two steps: selecting the number of clusters
and determining the cluster assignment of each vertex. These steps can be performed repeatedly. Some methods
require the number of clusters to be an input, whereas other methods determine it automatically. The former step is
called model selection in statistical frameworks, and this step is our major focus.
The selection of the number of clusters is not an obvious task. For example, as shown in Fig. 1, more complex
structures can be resolved by using a model that allows a larger number of clusters. However, because the whole
purpose of graph clustering is to coarse grain the graph, the partition with excessively high resolution is not desirable.
This issue is also related to the level of resolution that is required in practice. The role of the model selection
frameworks and criteria is to suggest a possible candidate, or candidates, for the numbers of clusters to be analysed.
Which framework and criterion to use for model selection and its assessment is an inevitable problem that all
practitioners face, as multiple candidates have been proposed in the literature. A classical prescription is to optimise
an objective function that defines the strength of a modular structure, such as the modularity [10, 11] and the map
equation [12, 13]; combinatorial optimisation among all of the possible partitions yields both the number of clusters
and the cluster assignments. Although it might seem to be unrelated to statistical frameworks, it should be noted that
modularity maximisation has been shown to be equivalent to likelihood maximisation of a certain type of stochastic
block model [11, 14]. One can also use the spectral method and count the number of eigenvalues outside of the spectral
band [15 -- 17]; the reason for this prescription is the following: while the spectral band stems from the random nature
of the network, the isolated eigenvalues and corresponding eigenvectors possess distinct structural information about
the network. As another agnostic approach, an algorithm [18] that has a theoretical guarantee of the consistency for
the stochastic block model in sparse regime with sufficiently large average degree was recently proposed; a network is
called sparse when its average degree is kept constant as the size of the network grows to infinity, and typically, it is
locally tree-like. Finally, in the Bayesian framework, a commonly used principle is to select a model that maximises
the model's posterior probability [19 -- 23] or the model that have the minimum description length [24 -- 26], which leads
to Bayesian Information Criterion (BIC)-like criteria.
Minimisation of the prediction error is also a well-accepted principle for model selection, and cross-validation
estimates it adequately [27, 28]. This approach has been applied to a number of statistical models, including those
models that have hidden variables [29, 30]. Although the cross-validation model assessments for the stochastic block
model are also considered in [31 -- 33], they are either not of the Bayesian framework or performed by a brute-force
approach. A notable advantage of performing model selection using prediction error is that the assumed model is not
required to be consistent with the generative model of the actual data, whereas the penalty term in the BIC is derived
q = 2
q = 4
q = 6
2
q = 3
q = 5
Lower complexity
Higher complexity
FIG. 1. Partitions of the network of books about US politics. The inferred cluster assignments for various input
numbers of clusters q. The vertices with the same colour belong to the same cluster. The partition with large q has a higher
resolution and is obtained by fitting a model that has a higher complexity.
by explicitly using the assumption of model consistency. In this study, we propose an efficient cross-validation model
assessment in the Bayesian framework using the belief propagation (BP)-based algorithm.
Generally speaking, the prediction error can be used as a measure for quantifying the generalisation ability of the
model for unobserved data. In a data-rich situation, we can split the dataset into two parts, the training and test
sets, where the training set is used to learn the model parameters and the test set is used to measure the model's
prediction accuracy. We conduct this process for models that have different complexities, and we select the model
that has the least prediction error or the model that is the most parsimonious if the least prediction error is shared by
multiple models. In practice, however, the dataset is often insufficient to be used to conduct this process reliably. The
cross-validation estimate is a way to overcome such a data-scarce situation. In K-fold cross-validation, for example,
we randomly split the dataset into K (> 1) subsets, keep one of them as a test set while the remaining subsets are
used as the training sets, and measure the prediction error. Then, we switch the role of the test set to the training
set, pick one of the training sets as a new test set, and measure the prediction error again. We repeat this process
until every subset is used as a test set; then, we repeat the whole process for different random K-splits. The average
over all the cases is the final estimate of the prediction error of a given model's complexity.
For a dataset with N elements, the N -fold cross-validation is called the leave-one-out cross-validation (LOOCV);
hereafter, we focus on this approach. Note that the method of splitting is unique in the LOOCV. In the context of a
network, the dataset to be split is the set of edges and non-edges, and the data-splitting procedure is illustrated in
Fig. 2: for each pair of vertices, we learn the parameters while using the data without the information of edge existence
between the vertex pair; then, we measure whether we can correctly predict the existence or non-existence of an edge.
At first glance, this approach appears to be inefficient and redundant because we perform the parameter learning
N (N − 1)/2 times for similar training sets, which is true when the LOOCV is implemented in a straightforward
manner. Nevertheless, we show that such a redundant process is not necessary and that the prediction error can be
estimated efficiently using a BP-based algorithm. It is possible to extend the LOOCV estimate that we propose to
the K-fold cross-validation. As we mention in the Methods section, however, such an estimate has both conceptual
and computational issues, i.e., the LOOCV is an exceptionally convenient case.
The BP-based algorithm that we use to infer the cluster assignment was introduced by Decelle et al.
[21, 34].
This algorithm is scalable and performs well for sparse networks; this is favourable, because real-world networks are
typically sparse. Indeed, it is known that the BP-algorithm asymptotically achieves the information-theoretic bound
[35, 36] (when the number of clusters is 2) in the sense of accuracy when the network is actually generated from the
assumed model, the stochastic block model. In the original algorithm, the number of clusters q∗ is determined by
the Bethe free energy, which is equivalent to the approximate negative marginalised log-likelihood; among the models
of different (maximum) numbers of clusters, the most parsimonious model with low Bethe free energy is selected.
3
a
b
i
j
dataset
?
j
i
edge
training set
test set
?
j
i
non-edge
training set
test set
FIG. 2. The LOOCV error estimate of the network data. (a) The original dataset is given as the adjacency matrix A
of a network. (b) In each prediction, we hide a single piece of edge or non-edge information from A: this unobserved edge or
unobserved non-edge is the test set, and the adjacency matrix A\(i,j) without the information on that edge or non-edge is the
training set.
Despite its plausibility, however, it is known that this prescription performs poorly in practice. One of the reasons is
that the estimate using the Bethe free energy relies excessively on the assumption that the network is generated from
the stochastic block model, which is almost always not precisely correct. We show that this issue can be substantially
improved by evaluating cross-validation errors instead of the Bethe free energy while keeping the other parts of the
algorithm the same. With this improvement, we can conclude that the BP-based algorithm is not only an excellent
tool in the ideal case but is also useful in practice.
We denote the set of vertices and edges in the networks as V and E, and their cardinalities as N and L, respectively.
Throughout the current study, we consider undirected sparse networks, and we ignore multi-edges and self-loops for
simplicity.
RESULTS
Stochastic block model
Let us first explain how an instance of the stochastic block model is generated. The stochastic block model is
a random graph model that has a planted modular structure. The fraction of vertices that belong to cluster σ is
specified by γσ; accordingly, each vertex i has its planted cluster assignment σi ∈ {1, . . . , q∗}, where q∗ is the number
of clusters. The set of edges E is generated by connecting pairs of vertices independently and randomly according to
their cluster assignments. In other words, vertices i and j with cluster assignments σi = σ and σj = σ′ are connected
with probability ωσσ′ ; the matrix ω that specifies the connection probabilities within and between the clusters is
called the affinity matrix. Note that the affinity matrix ω is of O(N −1) when the network is sparse.
As the output, we obtain the adjacency matrix A. While the generation of network instances is a forward problem,
graph clustering is its inverse problem. In other words, we infer the cluster assignments of vertices σ or their probability
distributions as we learn the parameters (γ, ω), given the adjacency matrix A and the input (maximum) number of
4
clusters q. After we have obtained the results for various values of q, we select q∗. Note here that the input value q
is the maximum number of clusters allowed and that the actual number of clusters that appears for a given q can be
less than q.
Cross-validation errors
We consider four types of cross-validation errors. All of the errors are calculated using the results of inferences based
on the stochastic block model. We denote A\(i,j) as the adjacency matrix of a network in which Aij is unobserved,
i.e., in which it is unknown whether Aij = 0 or Aij = 1. We hereafter generally denote p(XY ) as the probability of
X that is conditioned on Y or the likelihood of Y when X is observed.
The process of edge prediction is two-fold: first, we estimate the cluster assignments of a vertex pair; then, we
predict whether an edge exists. Thus, the posterior predictive distribution p(Aij = 1A\(i,j)) of the model in which
the vertices i and j are connected given dataset A\(i,j), or the marginal likelihood of the learned model for the vertex
pair, is the following:
p(Aij = 1A\(i,j)) = Xσi,σj
p(Aij = 1σi, σj )p(σi, σjA\(i,j))
= hp(Aij = 1σi, σj)iA\(i,j) ,
(1)
where h· · ·iA\(i,j) is the average over p(σi, σjA\(i,j)) and we have omitted some of the conditioned parameters. The
error should be small when the prediction of edge existence for every vertex pair is accurate. In other words, the
probability distribution in which each element has probability of equation (1) is close, in the sense of the Kullback --
Leibler (KL) divergence, to the actual distribution, which is given as the empirical distribution. Therefore, it is
natural to employ, as a measure of the prediction error, the cross-entropy error function [37]
EBayes(q) = −log p(Aij A\(i,j))
= −
1
LXi<j(cid:20)Aij log p(Aij = 1A\(i,j))
+ (1 − Aij) log p(Aij = 0A\(i,j))(cid:21),
(2)
where X ≡Pi<j X(Aij)/L. Note that we have chosen the normalisation in such a way that EBayes is typically O(1)
in sparse networks. We refer to equation (2) as the Bayes prediction error, which corresponds to the LOOCV estimate
of the stochastic complexity [38]. As long as the model that we use is consistent with the data, the posterior predictive
distribution is optimal as an element of the prediction error because the intermediate dependence (σi, σj) is fully
marginalised and gives the smallest error.
Unfortunately, the assumption that the model that we use is consistent with the data is often invalid in practice.
In that case, the Bayes prediction error EBayes may no longer be optimal for prediction. In equation (2), we employed
− log p(Aij A\(i,j)) as the error of a vertex pair. Instead, we can consider the log-likelihood of cluster assignments
− log p(Aij σi, σj ) to be a fundamental element and measure h− log p(Aij σi, σj )iA\(i,j) as the prediction error of a
vertex pair. In other words, the cluster assignments (σi, σj) are drawn from the posterior distribution, and the error
of the vertex pair is measured with respect to those fixed assignments. Then, the corresponding cross-entropy error
function is
EGibbs(q) = h− log p(Aij σi, σj )iA\(i,j) .
(3)
We refer to equation (3) as the Gibbs prediction error. If the probability distribution of the cluster assignments is
highly peaked, then EGibbs will be close to EBayes, and both will be relatively small if those assignments predict the
actual network well. Alternatively, we can measure the maximum a posteriori (MAP) estimate of equation (3). In
other words, instead of taking the average over p(σi, σjA\(i,j)), we select the most likely assignments to measure the
error. We refer to EMAP(q) as the prediction error.
Finally, we define the Gibbs training error, which we refer to as Etraining. This error can be obtained by taking the
average over p(σi, σjA) instead in equation (3), i.e.,
Etraining(q) = h− log p(Aij σi, σj )iA.
(4)
a
political books
b
5
c
d
metadata
FIG. 3. Model assessments and inferred clusters in the network of books about US politics. (a) Bethe free
energy and (b) prediction and training errors as functions of the number of clusters q. The four data in (b) are, from top to
bottom, Gibbs prediction errors EGibbs (green triangles), MAP estimates EMAP of EGibbs (yellow squares), Bayes prediction
errors EBayes (red circles), and Gibbs training errors Etraining (blue diamonds). For each error, the constant term is neglected
and the standard error is shown in shadow. (c) The learned parameters, ω and γ, are visualised from q = 2 to 8. (d) The
cluster assignments that are indicated in the metadata of the dataset; the vertices with the same colour belong to the same
cluster.
Because we make use of the information regarding the edge existence when we take the average, the result is not a
prediction error, but is the goodness of fit of the assumed model to the given data.
At first glance, the cross-validation errors that we presented above might appear computationally infeasible because
we must know p(σi, σj A\(i,j)) with respect to every vertex pair. In the Methods section, however, we show that we
have analytical expressions of the cross-validation errors in terms of the outputs of BP; therefore, the model assessment
for the sparse networks is very efficient.
In the following subsections, we show the performances of these cross-validation errors for various networks relative
to the performance of the Bethe free energy.
Real-world networks
First, and most importantly, we show the performance of the Bethe free energy and cross-validation errors on
real-world networks. Figures 1 and 3 show the results on the network of books on US politics [39] (which we refer
to as political books). This network is a copurchase network whose vertices are books sold on Amazon.com, and each
edge represents a pair of books that was purchased by the same buyer; the metadata of the dataset has the labels
"conservative", "liberal", and "neutral."
Figure 3b shows that the cross-validation estimate of the Gibbs prediction error EGibbs saturates favourably, while
the Bethe free energy (Fig. 3a), Bayes prediction error EBayes, and Gibbs training error Etraining keep decreasing as
we increase the input number of clusters q. Although the MAP estimate of the Gibbs prediction error EMAP often
exhibits similar behaviour to the Gibbs prediction error EGibbs, we observe in the results of other datasets that it
does not appear to be distinctively superior to EGibbs.
karate club
network science
C. elegans
6
FIG. 4. Results of model assessments for various real-world networks. They are plotted in the same manner as
Figs. 3a and 3b.
Compared with the Gibbs prediction error EGibbs, the Bayes prediction error EBayes appears to be more sensitive
to the assumption that a network is generated by the stochastic block model, so that we rarely observe the clear
saturation of the LOOCV error. In a subsection below, we show how overfitting and underfitting occur by deriving
analytical expressions for the differences among the cross-validation errors.
How should we select the number of clusters q∗ from the obtained plots of cross-validation errors? Although this
problem is well defined when we select the best model, i.e., the model that has the least error, it is common to
select the most parsimonious model instead of the best model in practice. Then, how do we determine the "most
parsimonious model" from the results? This problem is not well defined, and there is no principled prescription
obtained by consensus.
However, there is an empirical rule called the "one-standard error" rule [27] that has often been used. Recall that
each cross-validation estimate is given as an average error per edge; thus, we can also measure its standard error. The
"one-standard error" rule suggests selecting the simplest model whose estimate is no more than one standard error
above the estimate of the best model. In the case of the political books network, the best model is the model in which
q = 6. Because the simplest model within the range of one standard error is q = 5, it is our final choice.
The actual partition for each value of q is shown in Figs. 1 and 3c. The cluster assignments indicated in the
metadata is presented in Fig. 3d for reference. In Fig. 3c, the learned values of the parameters ω and γ are visualised:
a higher value element of the affinity matrix ω is indicated in a darker colour, and the size of an element reflects the
fraction of the cluster size γσ. For q = 3, we can identify two communities and a cluster that is connected evenly to
those communities, as presumed in the metadata. For q = 5, in addition, the sets of core vertices in each community
are also detected. Note that recovering the labels in the metadata is not our goal. The metadata are not determined
based on the network structure and are not the ground-truth partition [54].
It should also be noted that we minimise the Bethe free energy in the cluster inference step in every case. When we
select the number of clusters q∗, i.e., in the model selection step, we propose to use the cross-validation errors instead
of the Bethe free energy.
The results of other networks are shown in Fig. 4. They are the friendship network of a karate club [40], coauthorship
network of scientists who work on networks [41] (see [42] for details of the datasets), and the metabolic network of
C. elegans [43]. We refer to those as karate club, network science, and C. elegans, respectively. The results are
qualitatively similar to the political books network. Note that the initial state dependency can be sensitive when the
input number of clusters q is large. Therefore, the results can be unstable in such a region.
From the results in Figs. 3 and 4, one might conclude that the Gibbs prediction error EGibbs is the only useful
criterion in practice. However, for example, when the holdout method is used instead of the LOOCV (see the Methods
section), it can be confirmed that the Bayes prediction error EBayes also behaves reasonably.
a
Political blogs
b
Political blogs
7
FIG. 5. Results of the model assessments for the network of hyperlinks between blogs on US politics. (a)
The results of the standard model and the learned parameters. (b) The results of the degree-corrected model and the learned
parameters.
The error for q = 1
For the karate club network in Fig. 4, we see that the errors keep decreasing except for the Gibbs prediction error
EGibbs. Recall that, for the stochastic block model with large q and low average degree to be detectable, the network is
required to exhibit sufficiently strong modular structure [21]. Thus, although we do not a priori know which prediction
error should be referred to, because the network has average degree smaller than 5, it is hard to believe that the errors
other than EGibbs are appropriate. The Gibbs prediction error EGibbs has the smallest error at q = 3, and the model
in which q = 2 has an error within the range of one standard error of q = 3. However, one might suspect that the
most parsimonious model is the model with q = 1, i.e., the model that we should assume is a uniform random graph,
and there is no statistically significant modular structure. In this case, the connection probability for an arbitrary
vertex pair is determined by a single parameter, i.e., p(Aij σiσj ) = ω, and it is simply ω = 2L/N (N − 1). Moreover,
there is no difference among the errors that we listed above. Hence,
EBayes = EGibbs = EMAP = Etraining ≈ 1 − log ω.
(5)
Here, we used the fact that ω = O(N −1) because we consider sparse networks. In every plot of cross-validation errors,
the constant and O(N −1) terms are neglected. The number of vertices and edges in the karate club network are
N = 34 and L = 78, respectively, i.e., − log ω ≃ 1.97, which is much larger than the errors for q = 2; we thus conclude
that the number of clusters q∗ = 2.
Degree-corrected stochastic block model
It has been noted that the standard stochastic block model that we explained above is often not suitable for
inferring clusters in real-world networks because many of them have a scale-free degree distribution, while the standard
stochastic block model is restricted to having a Poisson degree distribution. This inconsistency affects both the cluster
inference for a given q∗ and the model selection. For example, as shown in Fig. 5a, we found that all of the criteria
largely overfit for the political blogs network when the standard stochastic block model is used. The political blogs
network is a network of hyperlinks between blogs on US politics (we neglect the directions of the edges), which is
expected to have two clusters.
a
b
c
d
e
8
FIG. 6. Performance of the model assessment criteria on various stochastic block models. The results of (a) Bethe
free energy, (b) Bayes prediction error EBayes, (c) Gibbs prediction error EGibbs, (d) MAP estimate of the Gibbs prediction
error EMAP, and (e) Gibbs training error Etraining are shown. The lines in each plot represent the results of various values of ǫ.
The degree-corrected stochastic block model [44, 45] is often used as an alternative. This model has the degree-
correction parameter θi for each vertex in addition to γ and ω, where θ allows a cluster to have a heterogeneous
degree distribution. (See [44] for details of the model.) The cross-validation model assessment can be straightforwardly
extended to the degree-corrected stochastic block model: for the inference of cluster assignments, the BP algorithm
can be found in [46]; for the cross-validation errors, we only need to replace ωσi,σj for the probability p(Aij = 1σi, σj)
with θiωσi,σj θj in each case. As shown in Fig. 5b, the assessment is reasonable when a degree-corrected stochastic
block model is used. Although the error drops for q ≥ 5, it is better to discard this part because the numbers of
iterations until convergence become relatively large there; we regard it as the "wrong solution" that is mentioned in
Ref. [50].
When q = 1, we do not assume the Erdos-R´enyi random graph, but instead assume the random graph that has
the same expected degree sequence as the actual dataset [7], which is the model often used as the null model in
modularity. Thus, the probability that vertices i and j are connected is didj /2L. After some algebra, assuming that
didj/2L ≪ 1, the error for q = 1 is approximately
1 −
1
L
N
Xi=1
di log di + log(2L),
(6)
which is equal to equation (5) when the network is regular.
In the case of the political blogs network, the cross-
validation error for q = 1 is approximately 3.42. (It is 2.42 in the plot because the constant term is neglected.) Thus,
we obtain q∗ = 2.
Synthetic networks and the detectability threshold
It is important to investigate how well the cross-validation errors perform in a critical situation, i.e., the case in
which the network is close to the uniform random graph. To accomplish this goal, we observe the performance on
the stochastic block model, the model that we assume for the inference itself. As explained in the subsection of the
stochastic block model, the closeness to the uniform random graph is specified with the affinity matrix ω. Here, we
consider a simple community structure: we set ωin for the diagonal elements, and the remaining elements are set
to ωout, where ωin ≥ ωout. We parametrise the closeness to the uniform random graph, with ǫ = ωout/ωin; ǫ = 0
represents that the network consists of completely disconnected clusters, and ǫ = 1 represents the uniform random
graph. There is a phase transition point ǫ∗ above which it is statistically impossible to infer a planted structure. This
point is called the detectability threshold. Our interest here is to determine whether the planted number of clusters
q∗ can be correctly identified using the cross-validation errors when ǫ is set to be close to ǫ∗.
Figure 6 shows the Bethe free energy and cross-validation errors for the stochastic block models. In each plot, we
set q∗ = 4, each cluster has 1, 000 vertices, and the average degree c is set to 8. From bottom to top, the values of ǫ
are 0.1, 0.15, 0.2, and 0.25, while the detectability threshold is ǫ∗ ≃ 0.31 [21]. Note that when the value of ǫ is close
to ǫ∗, the inferred cluster assignments are barely correlated with the planted assignments; thus, the result is close to
a random guess anyway.
In all of the plots, the curves of validation become smoother as we increase the value of ǫ, which indicates that
it is difficult to identify the most parsimonious model. It is clear that the Bethe free energy and Bayes prediction
error EBayes perform better than the Gibbs prediction error EGibbs in the present case because the networks we
9
analyse correspond exactly to the model we assume. Figure 6 shows that the Gibbs prediction error EGibbs and its
MAP estimate EMAP underestimate q∗ near the detectability threshold. This finding is consistent with the results
that we obtained for the real-world networks that the Bethe free energy and Bayes prediction error EBayes tend to
overestimate. Indeed, under certain assumptions, we can derive that the Bayes prediction error EBayes identifies the
planted number of clusters all the way down to the detectability threshold, while the Gibbs prediction error EGibbs
strictly underfits near the detectability threshold. (See the Methods section for the derivation.) Therefore, there is a
trade-off between the Bayes prediction error EBayes and the Gibbs prediction error EGibbs; their superiority depends
on the accuracy of the assumption of the stochastic block model and the fuzziness of the network.
Relation among the cross-validation errors
We show how the model assessment criteria that we consider in this study are related. First, we derive the relation
among the errors EBayes, EGibbs, and Etraining. By exploiting Bayes' rule, we have
log p(Aij A\(i,j)) = log p(Aij σi, σj, A\(i,j))
+ log
p(σi, σjA\(i,j))
p(σi, σj A)
.
(7)
Note here that the left-hand side does not depend on σi and σj. If we take the average with respect to p(σi, σjA\(i,j))
on both sides,
log p(AijA\(i,j)) =Dlog p(Aijσi, σj , A\(i,j))E
+ DKL(cid:16)p(σi, σjA\(i,j)) p(σi, σj A)(cid:17) ,
where DKL(pq) is the KL divergence. Taking the sample average of the edges, we obtain
If we take the average over p(σi, σjA) in equation (8) instead,
EBayes = EGibbs − DKL(cid:0)p(σi, σjA\(i,j))p(σi, σjA)(cid:1).
Because the KL divergence is non-negative, we have
EBayes = Etraining + DKL(cid:0)p(σi, σjA)p(σi, σjA\(i,j))(cid:1).
Etraining ≤ EBayes ≤ EGibbs.
(8)
(9)
(10)
(11)
This inequality follows directly from Bayes' rule and applies broadly. Note, however, that the amounts of the errors
do not indicate the relationships among the numbers of clusters selected.
Under a natural assumption, we can also derive the inequality for the number of clusters selected. Let q be the trial
number of clusters. If the cluster assignment distributions for different values of q constitute a hierarchical structure,
i.e., a result with a small q can be regarded as the coarse graining of a result with a larger q, then the information
monotonicity [47, 48] of the KL divergence ensures that
training ≥ q∗
q∗
Bayes ≥ q∗
Gibbs.
(12)
In other words, the Bayes prediction error EBayes can only overfit when the Gibbs prediction error EGibbs estimates q∗
correctly, while the Gibbs prediction error EGibbs can only underfit when the Bayes prediction error EBayes estimates q∗
correctly. In addition, when the model predicts the edge existence relatively accurately, EMAP is biased in such a way
that the error becomes small. Therefore, EMAP tends to be smaller than EGibbs. As observed for real-world networks,
EGibbs typically performs well while EBayes often overfits in practice; equation (9) implies that detailed information
about the difference in the cluster assignment distribution is often not relevant and simply causes overfitting.
In addition to the relationship among the cross-validation errors, it is also fruitful to seek relationships between the
Bethe free energy and the prediction errors. We found that it is possible to express the Bethe free energy in terms of
the prediction errors. (See the Methods section for the derivation.)
DISCUSSION
10
To determine the number of clusters, we both proposed LOOCV estimates of prediction errors using BP and revealed
some of the theoretical relationships among the errors. They are principled and scalable and, as far as we examined,
perform well in practice. Unlike the BIC-like criteria, the prediction errors do not require the model consistency to
be applicable. Moreover, although we only treated the standard and degree-corrected stochastic block models, the
applicability of our LOOCV estimates is not limited to these models. With an appropriate choice of block models,
we expect that the present framework can also be used in the vast majority of real-world networks, such as directed,
weighted, and bipartite networks and networks that have positive and negative edges. This is in contrast to some
criteria that are limited to specific modular structures.
The code for the results of the current study can be found at [49]. (See the description therein for more details of
the algorithm.)
The selection of the number of clusters q∗ can sometimes be subtle. For example, as we briefly mentioned above,
when the inference algorithm depends sensitively on the initial condition, the results of the LOOCV can be unstable; all
of the algorithms share this type of difficulty as long as the non-convex optimisation problem is considered. Sometimes
the LOOCV curve can be bumpy in such a way that it is difficult to determine the most parsimonious model. For
this problem, we note that there is much information other than the prediction errors that help us to determine the
number of clusters q∗, and we should take them into account. For example, we can stop the assessment or discard
the result when (i) the number of iterations until convergence becomes large [50], as we have observed in Fig. 5b, (ii)
the resulting partition does not exhibit a significant behaviour, e.g., no clear pattern in the affinity matrix, or (iii)
the actual number of clusters does not increase as q increases. All of this information is available in the output of our
code.
It is possible that the difficulty of selecting the number of clusters q∗ arises in the model itself. Fitting with the
stochastic block models is flexible; thus, the algorithm can infer not only the assortative and disassortative structures
but also more complex structures. However, the flexibility also indicates that slightly different models might be able
to fit the data as good as the most parsimonious model. As a result, we can obtain a gradually decreasing LOOCV
curve for a broad range of q. Thus, there should be a trade-off between the flexibility of the model and the difficulty
of the model assessment.
Despite the fact that model assessment based on prediction accuracy is a well-accepted principle, to the best of our
knowledge, the method that is applicable to large-scale modular networks in the Bayesian framework is discussed in
this study for the first time. For better accuracy and scalability, we believe that there is more to be done. One might
investigate whether the LOOCV errors perform, in some sense, better than other BIC-like criteria. The relations
and tendencies of the LOOCV errors compared to other model assessment criteria would certainly provide interesting
future work even though it is unlikely that we can generally conclude the superiority of the criteria over the others
[28]. In practice, if resource allocation allows, it is always better to evaluate multiple criteria [51].
METHODS
Inference of the cluster assignments
Let us first explain the inference algorithm of the cluster assignment using the stochastic block model when the num-
ber of clusters q is given. For this part, we follow the algorithm introduced in [21, 34]: the expectation -- maximisation
(EM) algorithm using BP.
An instance of the stochastic block model is generated based on selected parameters, (γ, ω), as explained in the
subsection of the stochastic block model. Because the cluster assignment of each vertex and the edge generation
between each vertex pair are determined independently and randomly in the stochastic block model, its likelihood is
given by
p(A, σγ, ω, q) =
N
Yi=1
γσiYi<j
ωAij
σiσj (cid:0)1 − ωσiσj(cid:1)1−Aij .
(13)
The goal here is to minimise the free energy defined by f = −N −1 logPσ′ p(A, σ′γ, ω), which is equivalent to
maximising the marginal log-likelihood. Using the identity p(A, σγ, ω) = p(σA, γ, ω)p(Aγ, ω), the free energy f
can be expressed as
f = −
1
N
log
p(A, σγ, ω)
p(σA, γ, ω)
11
(14)
for an arbitrary σ. Taking the average over a probability distribution q(σ) on both sides, we obtain the following
variational expression.
f = −
q(σ) log
p(A, σγ, ω)
q(σ)
q(σ)
p(σA, γ, ω)
1
N Xσ
N"−Xσ
1
=
q(σ) log p(A, σγ, ω) +Xσ
− DKL (q(σ)p(σA, γ, ω))#.
q(σ) log q(σ)
(15)
When q(σ) is equal to the posterior distribution p(σA, γ, ω), the KL divergence disappears, and we should obtain the
minimum. We can interpret the first and second terms as corresponding to the internal energy and negative entropy,
respectively, and equation (15) as the thermodynamic relation of the free energy. For the first term, by substituting
equation (13), we have
−
q(σ) log p(A, σγ, ω)
1
N Xσ
N Xσ
1
= −
q(σ)"Xi
log γσi +Xi<j(cid:18)Aij log ωσiσj
+ (1 − Aij ) log(1 − ωσiσj )(cid:19)#
= −
1
N Xi Xσ
qi
σ log γσ −
1
N X(i,j)∈EXσσ′
qij
σσ′ log ωσσ′
+
c
2
+ O(N −1),
(16)
σ = hδσσi iσ and qij
where qi
h· · ·iσ is the average over q(σ). Therefore, the free energy minimisation in the variational expression requires two
operations: the inference of the marginal probabilities of the cluster assignments, qi
σσ′ , and the learning of the
parameters, (γ, ω). In the EM algorithm, they are performed iteratively.
σσ′ = (cid:10)δσ,σiδσ′σj(cid:11)σ are the marginal probabilities, where δxy is the Kronecker delta and
σ and qij
For the E-step of the EM algorithm, we infer the marginal probabilities of the cluster assignments using the current
estimates of the parameters. Whereas the exact marginalisation is computationally expensive in general, BP yields an
accurate estimate quite efficiently when the network is sparse, i.e., the case in which the network is locally tree-like.
Here, we do not go over the complete derivation of the BP equations, which can be found in [21, 52]. We denote ψi
σ
as the BP estimate of qi
σ, which is obtained by
ψi
σ =
1
Z i γσe−hσ Yk∈∂i Xσk
ψk→i
σk ωσkσ! ,
(17)
where Z i is the normalisation factor with respect to the cluster assignment σ, hσ = PN
σk ωσkσ, which is
due to the effect of non-edges (i, k) /∈ E, and ∂i indicates the set of neighbouring vertices of i. In equation (17), we
also have the so-called cavity bias ψi→j
for an edge (i, j) ∈ E; the cavity bias is the marginal probability of vertex i
without the marginalisation from vertex j. Analogously to equation (17), the update equation for the cavity bias is
obtained by
k=1Pσk
ψk
σ
ψi→j
σ =
1
Z i→j γσe−hσ Yk∈∂i\j Xσk
ψk→i
σk ωσkσ! ,
(18)
where ∂i\j indicates the set of neighbouring vertices of i except for j, and Z i→j is the normalisation factor. For the
BP estimate ψij
σσ′ of the two-point marginal qij
σσ′ for (i, j) ∈ E, we have
12
ψij
σσ′ =
1
Z ij ψi→j
σ ωσσ′ ψj→i
σ′
,
(19)
where Z ij is the normalisation factor with respect to the assignments σ and σ′.
With these marginals in hand, in the M-step of the EM algorithm, we update the estimate of the parameters to γ
and ω as
γσ =
1
N
ωσσ′ =
N
ψi
σ,
Xi=1
N 2γσγσ′ X(i,j)∈E
1
ωσσ′ (ψi→j
σ ψj→i
σ′ + ψj→i
Z ij
σ ψi→j
σ′
)
.
(20)
(21)
Here, we have used the fact that the network is undirected. These update rules can be obtained by simply taking the
derivatives with respect to the parameters in equation (16) with the normalisation constraint Pσ γσ = 1.
We recursively compute equation (18) and the parameter learning, equations (20) and (21), until convergence; then,
we obtain the full marginal using equation (17), which yields the estimates of the cluster assignments of the vertices.
Bethe free energy and derivation of the cross-validation errors
In the algorithm above, because we use BP to estimate the marginal probabilities, we are no longer minimising the
free energy. Instead, as an approximation of the free energy, we minimise the Bethe free energy, which is expressed as
fBethe = −
log Z i +
1
N Xi
1
N X(i,j)∈E
log Z ij −
c
2
,
(22)
where Z i and Z ij are the normalisation factors that appeared in equations (17) and (19). As mentioned in the
Introduction section, to determine the number of clusters q∗ from the Bethe free energy fBethe, we select the most
parsimonious model among the models that have low fBethe. This approach corresponds to taking the maximum
likelihood estimation of the parameters.
We now explain the derivations of the cross-validation errors that we used in the Results section. The LOOCV
estimate of the Bayes prediction error EBayes is measured by equation (2), and its element p(Aij = 1A\(i,j)) is
given as equation (1). The first factor in the sum of equation (1) is simply p(Aij = 1σi, σj) = ωσiσj , by the model
definition. An important observation is that because the cavity bias ψi→j
represents the marginal probability of
vertex i without the information from vertex j, this entity is exactly what we need for prediction in the LOOCV,
σj /Z ij, where
i.e., p(σi, σjA\(i,j)) = ψi→j
Z ij is defined in equation (19). Thus, we have p(Aij = 1A\(i,j)) = Z ij. By using the fact that L = O(N ) and
p(Aij = 1A\(i,j)) = O(N −1), EBayes(q) can be written as
. Additionally, recall that p(σi, σj Aij = 1, A\(i,j)) = ψi→j
σi ωσiσj ψj→i
σi ψj→i
σj
σi
EBayes(q) = 1 −
1
L X(i,j)∈E
log Z ij + O(N −1).
(23)
Equation (23) indicates that the prediction with respect to the non-edges contributes only a constant; thus, EBayes(q)
essentially measures whether the existence of the edges is correctly predicted in a sparse network.
The Gibbs prediction error EGibbs in equation (3) can be obtained in the same manner. Using the approximation
that the network is sparse, it can be written in terms of the cavity biases as
EGibbs(q) ≃ 1 −
1
L X(i,j)∈E Xσi,σj
σi ψj→i
ψi→j
σj
log ωσiσj .
(24)
The (MAP) estimate of the Gibbs prediction error EMAP(q) can be obtained by replacing ψi→j
in equation (24).
σi with δσi,argmax{ψi→j
σ
}
13
For the Gibbs training error Etraining in equation (4), we take the average over p(σi, σjA) instead of p(σi, σjA\(i,j)).
Thus, we have
Etraining(q) ≃ 1 −
1
L X(i,j)∈E Xσi,σj
σi ωσiσj ψj→i
ψi→j
σj
Z ij
log ωσiσj .
(25)
This training error can be interpreted as a part of the internal energy because it corresponds to the BP estimate of
the second term in equation (16).
Note that all of the cross-validation errors, equations (23) -- (25), are analytical expressions in terms of the parameters
and cavity biases. Therefore, we can readily measure those errors by simply running the algorithm once. It should
also be noted that using BP for the LOOCV itself is not totally new; this idea has been addressed in a different
context in the literature, e.g., Ref. [53].
Detectability of the Bayes and Gibbs prediction errors
Let us evaluate the values of the Bayes and Gibbs prediction errors, EBayes and EGibbs, for the stochastic block
model with the simple community structure, i.e., ωσσ′ = (ωin − ωout)δσσ′ + ωout. By substituting this affinity matrix
to equations (23) and (24), we obtain
EBayes(q) = 1 − log ωout
−
1
L X(i,j)∈E
EGibbs(q) = 1 − log ωout
log 1 +
ωin − ωout
ωout
ψi→j
σ ψj→i
σ !
q
Xσ=1
−(cid:18)log
ωin
ωout(cid:19) 1
L X(i,j)∈E
ψi→j
σ ψj→i
σ
.
q
Xσ=1
(26)
(27)
As we sweep the parameter ǫ = ωout/ωin → 1 in the stochastic block model that has 2 clusters, q = 2 is selected as
long as the prediction error for q = 2 is less than the error for q = 1. When the number of vertices N is sufficiently
large, ω = ωout + (ωin − ωout)P2
σ in equation (5). Thus,
σ=1 γ2
EBayes(q = 1) = EGibbs(q = 1)
= 1 − log ωout − log 1 +
ωin − ωout
ωout
γ2
σ! ,
(28)
2
Xσ=1
where we neglected the O(N −1) contribution. Let us presume that the cavity bias ψi→j
structure up to the detectability threshold ǫ∗ and ψi→j
of 2 clusters of equal size. We then have
is correlated with the planted
σ = γσ for ǫ ≥ ǫ∗, which is rigorously proven [35, 36] in the case
σ
EBayes(q = 2) = EBayes(q = 1)
(29)
in the undetectable region. In the case of equal size clusters, EBayes(q = 2) is strictly smaller thatn EBayes(q = 1) in
the detectable region because the last term in (26) is minimised when the distribution is uniform. In contrast, when
ψi→j
σ = γσ, the inequality log(1 + xy) > y log(1 + x) (x > 0, 0 < y < 1) ensures that
EGibbs(q = 2) > EGibbs(q = 1).
(30)
Therefore, assuming that the parameters γ and ω are learned accurately, the Bayes prediction error EBayes suggests
q∗ = 2 all the way down to the detectability threshold, while the Gibbs prediction error EGibbs strictly underfits near
the detectability threshold.
The Bethe free energy in terms of the prediction errors
We can also express the Bethe free energy fBethe in terms of the prediction errors. Ignoring the constant terms and
factors, we observe that the Bayes prediction error EBayes, equation (23), is one component of the Bethe free energy,
equation (22). The remaining part is the contribution of −Pi log Z i that arises as follows.
14
Let us consider hiding a vertex and the edges and non-edges that are incident to that vertex, instead of an edge.
We denote {Aij}j∈V as the set of adjacency matrix elements that are incident to vertex i, and A\i as the adjacency
matrix in which the information of {Aij}j∈V is unobserved. For the prediction of an edge's existence, for example,
because the unobserved vertex receives no information about its cluster assignment from its neighbours, we have
p(Aij = 1A\i) = Xσiσj
= Xσiσj
p(Aij = 1σiσj )p(σiσj A\i)
ωσiσj γσi ψj→i
σj
.
(31)
When we consider the prediction of the set of edges {Aij }j∈V , we find that all of the vertex pairs share the same
cluster assignment for vertex i. Therefore, using the approximation that the network is sparse, we have
p(σiA\i)
p({Aij}j∈V A\i) =Xσi
× Yj∈∂i
Xσj
× Yk /∈∂i Xσk
γσi e−hσi Yj∈∂i
≈Xσi
= Z i.
p(Aij = 1σiσj)p(σj A\i)
p(Aik = 0σiσk)p(σkA\i)!
Xσj
ψj→i
σj ωσj σi
(32)
Again, due to the sparsity, the prediction for the non-edges happened to be neglected, and it is essentially the
prediction of the edges. Analogously to equation (2), we can consider a leave-one-vertex-out version of the Bayes
prediction error, which we refer to as Ev
Bayes, as follows.
1
LXij (cid:20)Aij log p(Aij = 1A\i)
+ (1 − Aij ) log p(Aij = 0A\i)(cid:21)
log
Yj∈∂i
p(Aij = 1A\i) Yj /∈∂i
log p({Aij }j∈V A\i)
p(Aij = 0A\i)
Ev
Bayes(q) = −
= −
= −
= −
1
1
LXi
LXi
LXi
1
log Z i.
(33)
Again, the edges and non-edges that are incident to the unobserved vertex i share the same cluster assignment σi at
one end. In this definition, however, the prediction of an edge's existence is made twice for every edge. If the Bayes
prediction error EBayes is subtracted to prevent this over-counting, it is exactly the Bethe free energy fBethe up to the
constant terms and the normalisation factor.
Derivation of inequality (12)
Recall that the Bayes prediction error EBayes, Gibbs prediction error EGibbs, and Gibbs training error Etraining
are related via equations (9) and (10). We select the number of clusters q as the point at which the error function
saturates (i.e., stops decreasing) with increasing q. For a smaller q to be selected by EBayes than by EGibbs, the
15
FIG. 7. Schematic of the shapes of the error functions. As long as the gap between two error functions is nondecreasing,
the error with the smaller value does not saturate earlier than the other.
gap between them, DKL(cid:0)p(σi, σjA\(i,j))p(σi, σj A)(cid:1), must decrease (see Fig. 7). In this subsection, we explain the
information monotonicity of the KL divergence and when it is applicable in the present context.
Let us consider sets of variables X = {X1, . . . , Xm} and x = {x1, . . . , xn} (n > m). We first set a pair of
probability distributions ¯P (X) and ¯Q(X) on X. Then we define a pair of probability distributions P (x) and Q(x)
on x as refinements of ¯P (X) and ¯Q(X), respectively, if there exists a family of sets {xµ}m
µ=1 that is a partition of x,
i.e., xµ ∩ xµ′
= ∅ for µ 6= µ′ and ∪µxµ = x, that satisfies P (xµ) = ¯P (Xµ) and Q(xµ) = ¯Q(Xµ) for any µ. In other
words, X can be regarded as the coarse graining of x. An example is given in Fig. 8. Note, however, that if X is
actually constructed as the coarse graining of x, the above condition trivially holds. In general, a family that satisfies
the above condition might not exist; even if it exists, it might not be unique.
The information monotonicity of the KL divergence states that for P (x) and Q(x), which are the refinements of
¯P (X) and ¯Q(X), respectively, we have
DKL(P Q) ≥ DKL( ¯P ¯Q),
(34)
which is natural, because the difference between the distributions is more visible at a finer resolution. Equation (34)
is deduced by the convexity of the KL divergence. First, we can rewrite the right-hand side of equation (34) in terms
of P and Q as follows:
Thus, if
DKL( ¯P ¯Q) =
P (xµ) log
P (xµ)
Q(xµ)
;
m
Xµ=1
P (x) log
P (x)
Q(x)
≥ P (xµ) log
P (xµ)
Q(xµ)
Xx∈xµ
(35)
(36)
holds for an arbitrary µ, then equation (34) holds. We split xµ into x1 ∈ xµ and xµ\x1, and we denote the
corresponding probabilities as P1 := P (x1), Q1 := Q(x1), P c
1 := Q(xµ\x1). The right-hand
side of equation (36) is then
1 := P (xµ\x1), and Qc
(P1 + P c
1
Q1 + Qc
1 ) log(cid:18) P1 + P c
1(cid:19)
1 ) log(cid:18) P1
P1 + P c
1
= − (P1 + P c
Q1
P1
+
P c
1
P1 + P c
1
Qc
1
P c
1(cid:19)
≤ P1 log
+ P c
1 log
P1
Q1
P c
1
Qc
1
,
(37)
where we used the convexity of the logarithmic function. By repeating the same argument for the second term of
equation (37), we obtain equation (36). Although the KL divergence is our focus, the information monotonicity holds
more generally, e.g., for f -divergence [48].
We now use the information monotonicity to estimate the error functions.
In the present context, the sets of
variables X and x correspond to the cluster assignments of different q's, (σi, σj) with q and (σ′
j) with q′ (q′ > q),
for a vertex pair i and j. Because the labelling of the clusters is common to all of the vertices, we require that the
refinement condition is satisfied with the common family of sets for every vertex pair. Under this condition, the KL
i, σ′
16
FIG. 8. Example of the refinement of the probability distributions. We can regard P (x) and Q(x) as the refinements
of ¯P (X) and ¯Q(X), respectively, with x1 = {x1, x2}, x2 = {x3}, x3 = {x4, x5, x6}, x4 = {x7}, and x5 = {x8, x9} as a
possible correspondence. Note that the correspondence is not unique. If we refer only to Q(x) and ¯Q(X), the assignment of
{x1, x2}, {x3}, and {x8, x9} is exchangeable within X1, X2, and X5. However, ¯P (X5) does not coincide with P ({x1, x2}) or
P (x3); therefore, only X1 and X2 are exchangeable between {x1, x2} and {x3}. The same argument applies to {x4, x5, x6} and
{x8, x9}.
divergence is nondecreasing as a function of q, which indicates that EBayes does not saturate earlier than EGibbs.
Similarly, Etraining does not saturate earlier than EBayes. Although the refinement condition that we required above is
too strict to be satisfied exactly in a numerical calculation, it is what we naturally expect when the algorithm detects
a hierarchical structure or the same structure with excess numbers of clusters. Moreover, the argument above is only
a sufficient condition. Therefore, we naturally expect that EGibbs suggests a smaller number of clusters than EBayes
and Etraining quite commonly in practice. In addition, note that if we use a different criterion for the selection of q,
e.g., the variation of the slope of the error function, the above conclusion can be violated.
Holdout method and K-fold cross-validation
Other than the LOOCV, it is also possible to measure the prediction errors by the holdout method and the K-fold
cross-validation using BP. They can be conducted by randomly selecting the set of edges to be held out (i.e., the
holdout set) and running BP that ignores the cavity biases sent by the held-out edges. In the holdout method, unlike
the K-fold cross-validation, the test set is never used as the training set and vice versa. The results are listed in Fig. 9.
We observe that the overfitting of the Bayes prediction error EBayes appears to be prevented. Although the resulting
behaviours are somewhat reasonable, we have to bear in mind that they have following conceptual and computational
issues.
First, we cannot expect the cross-validation assessment to work at all when the holdout set is too large, or equiv-
alently, when the training set is too small. It is because, when a significant fraction of edges that are connected to
vertices in certain clusters are held out, it is impossible to learn the underlying block structure correctly [31]. Second,
when the holdout set has more than one edge, we actually need to run the whole algorithm twice for each holdout
set; first to compute the posterior distribution given the training set, and then, to evaluate the predictive distribution
for the holdout set based on the obtained posterior distribution. Then, we need to repeat this process as many times
as the number of holdout sets. Again, none of the above processes are required for the LOOCV, because we have
the analytical expression. Thus, the computational cost for the holdout method and the K-fold cross-validation are
orders of magnitude larger than the LOOCV.
Besides the above issues, a more delicate treatment is required in the K-fold cross-validation. When the unobserved
edges are connected, a prediction error is not given as an independent sum of the error per edge, and we need the
calculation as we have done in equation (32). Therefore, the precise measurement is even more time consuming. In
Fig. 9, we imposed the constraint that the edges are not connected in the holdout method. For the K-fold cross-
validation, we simply ignored the fact that the unobserved edges might be connected, although this discrepancy may
not be negligible.
We lose all the advantages that we had in the LOOCV when the holdout method and the K-fold cross-validation
are considered. However, when the computational efficiency can be compromised, the holdout method with small
holdout set can be a promising alternative.
a
political books
holdout method
10-fold cross-validation
17
b
holdout method
10-fold cross-validation
network science
FIG. 9. Cross-validation errors using the holdout method and the 10-fold cross-validation. As in Fig. 3, the four
data in each plot indicate the Gibbs prediction errors EGibbs (green triangles), MAP estimates EMAP of EGibbs (yellow squares),
Bayes prediction errors EBayes (red circles), and Gibbs training errors Etraining (blue diamonds). In the holdout method, we
randomly selected 1% of the edges (5 edges in (a) political books and 10 edges in (b) network science) as the holdout set. The
solid lines represent the average values obtained by repeating the prediction process 10 times and the shadows represent their
standard errors. For the K-fold cross-validation, we set K = 10. Although it is common to take average over different choices
of K partition, we omitted this averaging process.
Justification of the LOOCV estimates
It is a common mistake that one will make use of the information of the test set (the unobserved edge in the
present context) for the training of the model in the process of cross-validation. Precisely speaking, however, the
information of the unobserved edge does contribute to the training of the model in our procedure; thus, the cross-
validation estimate here is not correct in a rigorous sense. Nevertheless, the treatment that we propose is justified
because the contribution of the unobserved edge in the present setting is negligible. First, when we update the
distribution of the cluster assignment ψi→j
, we make use of the information of the unobserved edge when there are
loops in the network. Because we consider the sparse network, which is locally tree-like, the effect of the loops is
typically negligible. Second, the update equations (20) and (21) of the parameters in the maximisation step of the
EM algorithm contain the unobserved edge. However, because we consider the LOOCV in which only a single vertex
pair is unobserved, this discrepancy results in a difference of only O(N −1) to the parameter estimation. Therefore,
our analytical results in terms of BP are sufficiently accurate to serve as error estimates when using the LOOCV.
σ
This work was supported by JSPS KAKENHI No. 26011023 (TK) and No. 25120013 (YK).
ACKNOWLEDGMENTS
[1] Barabsi, A.-L. Network Science (Cambridge University Press, 2016), 1 edn.
[2] Newman, M. E. J. Networks: An Introduction (Oxford university press, 2010).
[3] Fortunato, S. Community detection in graphs. Phys. Rep. 486, 75 -- 174 (2010).
[4] Leger, J.-B., Vacher, C. & Daudin, J.-J. Detection of structurally homogeneous subsets in graphs. Stat. Comput. 24,
675 -- 692 (2014).
18
[5] Girvan, M. & Newman, M. E. J. Community structure in social and biological networks. Proc. Natl. Acad. Sci. U.S.A.
99, 7821 -- 7826 (2002).
[6] Radicchi, F., Castellano, C., Cecconi, F., Loreto, V. & Parisi, D. Defining and identifying communities in networks. Proc.
Natl. Acad. Sci. U.S.A. 101, 2658 -- 63 (2004).
[7] Newman, M. E. J. Finding community structure in networks using the eigenvectors of matrices. Phys. Rev. E 74, 036104
(2006).
[8] Lancichinetti, A., Fortunato, S. & Radicchi, F. Benchmark graphs for testing community detection algorithms. Phys. Rev.
E 78, 046110 (2008).
[9] Holland, P. W., Laskey, K. B. & Leinhardt, S. Stochastic blockmodels: First steps. Soc. Networks 5, 109 -- 137 (1983).
[10] Newman, M. E. J. & Girvan, M. Finding and evaluating community structure in networks. Phys. Rev. E 69, 026113
(2004).
[11] Zhang, P. & Moore, C. Scalable detection of statistically significant communities and hierarchies, using message passing
for modularity. Proc. Natl. Acad. Sci. U.S.A. 111, 18144 -- 18149 (2014).
[12] Rosvall, M. & Bergstrom, C. Maps of random walks on complex networks reveal community structure. Proc. Natl. Acad.
Sci. U.S.A. 105, 1118 -- 1123 (2008).
[13] Rosvall, M. & Bergstrom, C. T. Multilevel compression of random walks on networks reveals hierarchical organization in
large integrated systems. PloS One 6, e18209 (2011).
[14] Newman, M. E. J. Spectral methods for community detection and graph partitioning. Phys. Rev. E 88, 042822 (2013).
[15] Shi, J. & Malik, J. Normalized cuts and image segmentation.
IEEE Transactions on Pattern Analysis and Machine
Intelligence 22, 888 -- 905 (2000).
[16] Luxburg, U. A tutorial on spectral clustering. Stat. Comput. 17, 395 -- 416 (2007).
[17] Krzakala, F. et al. Spectral redemption in clustering sparse networks. Proc. Natl. Acad. Sci. U.S.A. 110, 20935 -- 40 (2013).
[18] Abbe, E. & Sandon, C. Recovering communities in the general stochastic block model without knowing the parameters.
In Cortes, C., Lawrence, N. D., Lee, D. D., Sugiyama, M. & Garnett, R. (eds.) Advances in Neural Information Processing
Systems 28, 676 -- 684 (Curran Associates, Inc., 2015).
[19] Nowicki, K. & Snijders, T. A. B. Estimation and prediction for stochastic blockstructures. J. Amer. Statist. Assoc. 96,
1077 -- 1087 (2001).
[20] Daudin, J. J., Picard, F. & Robin, S. A mixture model for random graphs. Stat. Comput. 18, 173 -- 183 (2008).
[21] Decelle, A., Krzakala, F., Moore, C. & Zdeborov´a, L. Asymptotic analysis of the stochastic block model for modular
networks and its algorithmic applications. Phys. Rev. E 84, 066106 (2011).
[22] Hayashi, K., Konishi, T. & Kawamoto, T. A tractable fully bayesian method for the stochastic block model. arXiv preprint
arXiv:1602.02256 (2016).
[23] Newman, M. E. J. & Reinert, G. Estimating the number of communities in a network. Phys. Rev. Lett. 117, 078301
(2016).
[24] Peixoto, T. P. Parsimonious module inference in large networks. Phys. Rev. Lett. 110, 148701 (2013).
[25] Peixoto, T. P. Hierarchical Block Structures and High-Resolution Model Selection in Large Networks. Physical Review X
4, 011047 (2014).
[26] Peixoto, T. P. Model selection and hypothesis testing for large-scale network models with overlapping groups. Phys. Rev.
X 5, 011033 (2015).
[27] Hastie, T. J., Tibshirani, R. J. & Friedman, J. H. The Elements of Statistical Learning : Data Mining, Inference, and
Prediction. Springer series in statistics (Springer, New York, 2009).
[28] Arlot, S. & Celisse, A. A survey of cross-validation procedures for model selection. Statist. Surv. 4, 40 -- 79 (2010).
[29] Celeux, G. & Durand, J.-B. Selecting hidden markov model state number with cross-validated likelihood. Comput. Stat.
23, 541 -- 564 (2008).
[30] Vehtari, A. & Ojanen, J. A survey of bayesian predictive methods for model assessment, selection and comparison. Stat.
Surv. 142 -- 228 (2012).
[31] Airoldi, E. M., Blei, D. M., Fienberg, S. E. & Xing, E. P. Mixed membership stochastic blockmodels.
In Koller, D.,
Schuurmans, D., Bengio, Y. & Bottou, L. (eds.) Advances in Neural Information Processing Systems 21, 33 -- 40 (Curran
Associates, Inc., 2009).
[32] Hoff, P. Modeling homophily and stochastic equivalence in symmetric relational data. In Platt, J. C., Koller, D., Singer,
Y. & Roweis, S. T. (eds.) Advances in Neural Information Processing Systems 20, 657 -- 664 (Curran Associates, Inc., 2008).
[33] Chen, K. & Lei, J. Network cross-validation for determining the number of communities in network data. arXiv preprint
arXiv:1411.1715 (2014).
[34] Decelle, A., Krzakala, F., Moore, C. & Zdeborov´a, L. Inference and Phase Transitions in the Detection of Modules in
Sparse Networks. Phys. Rev. Lett. 107, 065701 (2011).
[35] Mossel, E., Neeman, J. & Sly, A. Reconstruction and estimation in the planted partition model. Probab. Theory Relat.
Fields 1 -- 31 (2014).
[36] Massouli´e, L. Community detection thresholds and the weak ramanujan property. In Proceedings of the 46th Annual ACM
Symposium on Theory of Computing, STOC '14, 694 -- 703 (ACM, New York, NY, USA, 2014).
[37] Bishop, C. M. Pattern Recognition and Machine Learning (Information Science and Statistics) (Springer-Verlag New York,
Inc., Secaucus, NJ, USA, 2006).
[38] Levin, E., Tishby, N. & Solla, S. A. A statistical approach to learning and generalization in layered neural networks. In
Proceedings of the Second Annual Workshop on Computational Learning Theory, COLT '89, 245 -- 260 (1989).
[39] Newman, M. E. J. Modularity and community structure in networks. Proc. Natl. Acad. Sci. U.S.A. 103, 8577 -- 8582 (2006).
19
[40] Zachary, W. W. An information flow model for conflict and fission in small groups. J. Anthropol. Res. 33, 452 -- 473 (1977).
[41] Newman, M. E. J. Finding community structure in networks using the eigenvectors of matrices. Phys. Rev. E 74, 036104
(2006).
[42] Newman, M. E. J. http://www-personal.umich.edu/~mejn/netdata/. (2006) (Date of access: 11/05/2015).
[43] Duch, J. & Arenas, A. Community detection in complex networks using extremal optimization. Phys. Rev. E 72, 027104
(2005).
[44] Karrer, B. & Newman, M. E. J. Stochastic blockmodels and community structure in networks. Phys. Rev. E 83, 016107
(2011).
[45] Zhao, Y., Levina, E. & Zhu, J. Consistency of community detection in networks under degree-corrected stochastic block
models. Ann. Stat. 2266 -- 2292 (2012).
[46] Yan, X. et al. Model selection for degree-corrected block models. J. Stat. Mech. Theor. Exp. 2014, P05007 (2014).
[47] Csisz´ar, I. Axiomatic characterizations of information measures. Entropy 10, 261 (2008).
[48] Amari, S.-i. & Cichocki, A. Information geometry of divergence functions. Bulletin of the Polish Academy of Sciences:
Technical Sciences 58, 183 -- 195 (2010).
[49] Kawamoto, T. https://github.com/tatsuro-kawamoto/graphBIX. (2016) (Date of access: 13/09/2016).
[50] Newman, M. E. J. & Clauset, A. Structure and inference in annotated networks. Nat. Commun. 7, 11863 (2016).
[51] Domingos, P. A few useful things to know about machine learning. Commun. ACM 55, 78 -- 87 (2012).
[52] M´ezard, M. & Montanari, A. Information, Physics, and Computation (Oxford University Press, 2009).
[53] Opper, M. & Winther, O. Mean field approach to bayes learning in feed-forward neural networks. Phys. Rev. Lett. 76,
1964 -- 1967 (1996).
[54] Peel, L., Larremore, D. B. & Clauset, A. The ground truth about metadata and community detection in networks.
arXiv:1608.05878 (2016).
|
1609.03756 | 2 | 1609 | 2017-12-21T21:08:14 | Correlations of consumption patterns in social-economic networks | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | We analyze a coupled anonymized dataset collecting the mobile phone communication and bank transactions history of a large number of individuals. After mapping the social structure and introducing indicators of socioeconomic status, demographic features, and purchasing habits of individuals we show that typical consumption patterns are strongly correlated with identified socioeconomic classes leading to patterns of stratification in the social structure. In addition we measure correlations between merchant categories and introduce a correlation network, which emerges with a meaningful community structure. We detect multivariate relations between merchant categories and show correlations in purchasing habits of individuals. Our work provides novel and detailed insight into the relations between social and consuming behaviour with potential applications in recommendation system design. | cs.SI | cs |
Correlations of consumption patterns in social-economic
networks
Yannick Leo1, M´arton Karsai1,*, Carlos Sarraute2 and Eric Fleury1
1
2
*
Univ Lyon, ENS de Lyon, Inria, CNRS, UCB Lyon 1, LIP UMR 5668, IXXI, F-69342, Lyon, France
Grandata Labs, Bartolome Cruz 1818 V. Lopez. Buenos Aires, Argentina
Corresponding author: [email protected]
Abstract
We analyze a coupled anonymized dataset collecting the
mobile phone communication and bank transactions his-
tory of a large number of individuals. After mapping
the social structure and introducing indicators of socioe-
conomic status, demographic features, and purchasing
habits of individuals we show that typical consumption
patterns are strongly correlated with identified socioe-
conomic classes leading to patterns of stratification in
the social structure.
In addition we measure correla-
tions between merchant categories and introduce a cor-
relation network, which emerges with a meaningful com-
munity structure. We detect multivariate relations be-
tween merchant categories and show correlations in pur-
chasing habits of individuals. Our work provides novel
and detailed insight into the relations between social and
consuming behaviour with potential applications in rec-
ommendation system design.
1 Introduction
Social Network Analysis
(SNA) provides one
promising direction to explore such problems [7], due
to its enormous benefit from the massive flow of hu-
man behavioural data provided by the digital data
revolution [8]. The advent of this era was propa-
gated by some new data collection techniques, which
allowed the recording of the digital footprints and in-
teraction dynamics of millions of individuals [9, 10].
On the other hand, although social behavioural data
brought us detailed knowledge about the structure
and dynamics of social
it commonly
failed to uncover the relationship between social and
economic positions of individuals. Nevertheless, such
correlations play important roles in determining one's
socioeconomic status (SES) [11], social tie formation
preferences due to status homophily [12, 13], and in
turn potentially stand behind the emergent stratified
structure and segregation on the society level [4, 14].
However until now, the coupled investigation of indi-
vidual social and economic status remained a great
challenge due to lack of appropriate data recording
such details simultaneously.
interactions,
The consumption of goods and services is a cru-
cial element of human welfare. The uneven dis-
tribution of consumption power among individuals
goes hand in hand with the emergence and reserva-
tion of socioeconomic inequalities in general.
Indi-
vidual financial capacities restrict personal consumer
behaviour, arguably correlate with one's purchas-
ing preferences, and play indisputable roles in deter-
mining the socioeconomic position of an ego in the
larger society [1, 2, 3, 4, 5].
Investigation of rela-
tions between these characters carries a great poten-
tial in understanding better rational social-economic
behaviour [6], and project to direct applications in
personal marketing, recommendation, and advertis-
ing.
As individual economic status restricts one's capac-
ity in purchasing goods and services, it induces diver-
gent consumption patterns between people at differ-
ent socioeconomic positions [6, 1, 2]. This is reflected
by sets of commonly purchased products, which are
further associated to one's social status [15]. Con-
sumption behaviour has been addressed from vari-
ous angles considering e.g. environmental effects, so-
cioeconomic position, or social influence coming from
connected peers [1]. However, large data-driven stud-
ies combining information about individual purchas-
ing and interaction patterns in a society large pop-
ulation are still rare, although questions about cor-
relations between consumption and social behaviour
1
are of utmost interest.
In this study we address these crucial problems
via the analysis of a dataset, which simultane-
ously records the mobile-phone communication, bank
transaction history, and purchase sequences of mil-
lions of inhabitants of a single country over several
months. This corpus, one among the firsts at this
scale and details, allows us to infer the socioeconomic
status, consumption habits, and the underlying social
structure of millions of connected individuals. Using
this information our overall goal is to identify people
with certain financial capacities, and to understand
how much money they spend, on what they spend,
and whether they spend like their friends? More pre-
cisely, we formulate our study around two research
questions:
• Can one associate typical consumption patterns
to people and to their peers belonging to the
same or different socioeconomic classes, and if
yes how much such patterns vary between indi-
viduals or different classes?
• Can one draw relations between commonly pur-
chased goods or services in order to understand
better individual consumption behaviour?
After reviewing the related literature in Section 2,
we describe our dataset in Section 3, and introduce
individual socioeconomic indicators to define socioe-
conomic classes in Section 4. In Section 5 we show
how typical consumption patterns vary among classes
and relate them to structural correlations in the social
network. In Section 6 we draw a correlation network
between consumption categories to detect patterns of
commonly purchased goods and services. Finally we
present some concluding remarks and future research
ideas.
2 Related work
Earlier hypothesis on the relation between consump-
tion patterns and socioeconomic inequalities, and
their correlations with demographic features such as
age, gender, or social status were drawn from spe-
cific sociological studies [16] and from cross-national
social surveys [17]. However, recently available large
datasets help us to effectively validate and draw new
hypotheses as population-large individual level obser-
vations and detailed analysis of human behavioural
data became possible. These studies shown that per-
sonal social interactions, social influence [1], or ho-
mophily [22] in terms of age or gender [20] have strong
effects on purchase behaviour, knowledge which led
to the emergent domain of online social market-
ing [21]. Yet it is challenging to measure correla-
tions between individual social status, social network,
and purchase patterns simultaneously. Although so-
cioeconomic parameters can be estimated from com-
munication networks [18] or from external aggregate
data [19] usually they do not come together with indi-
vidual purchase records. In this paper we propose to
explore this question through the analysis of a com-
bined dataset proposing simultaneous observations of
social structure, economic status and purchase habits
of millions of individuals.
3 Data description
In the following we are going to introduce two
datasets extracted from a corpus combining the mo-
bile phone interactions with purchase history of indi-
viduals.
DS1: Ego social-economic data with
purchase distributions
Communication data used in our study records the
temporal sequence of 7,945,240,548 call and SMS in-
teractions of 111,719,360 anonymized mobile phone
users for 21 consecutive months. Each call detailed
record (CDR) contains the time, unique caller and
callee encrypted IDs, the direction (who initiate the
call/SMS), and the duration of the interaction. At
least one participant of each interaction is a client of a
single mobile phone operator, but other mobile phone
users who are not clients of the actual provider also
appear in the dataset with unique IDs. All unique
IDs are anonymized as explained below, thus indi-
vidual identification of any person is impossible from
the data. Using this dataset we constructed a large
social network where nodes are users (whether clients
or not of the actual provider), while links are drawn
between any two users if they interacted (via call or
SMS) at least once during the observation period. We
filtered out call services, companies, and other non-
human actors from the social network by removing
all nodes (and connected links) who appeared with
either in-degree kin = 0 or out-degree kout = 0.
We repeated this procedure recursively until we re-
ceived a network where each user had kin, kout > 0,
i. e. made at least one out-going and received at
least one in-coming communication event during the
nearly two years of observation. After construction
2
and filtering the network remained with 82,453,814
users connected by 1,002,833,289 links, which were
considered to be undirected after this point.
To calculate individual economic estimators we
used a dataset provided by a single bank. This data
records financial details of 6,002,192 people assigned
with unique anonymized identifiers over 8 consecutive
months. The data provides time varying customer
variables as the amount of their debit card purchases,
their monthly loans, and static user attributes such
as their billing postal code (zip code), their age and
their gender.
A subset of IDs of the anonymized bank and mobile
phone customers were matched1. This way of com-
bining the datasets allowed us to simultaneously ob-
serve the social structure and estimate economic sta-
tus (for definition see Section 4) of the connected in-
dividuals. This combined dataset contained 999,456
IDs, which appeared in both corpuses. However,
for the purpose of our study we considered only the
largest connected component of this graph. This way
we operate with a connected social graph of 992,538
people connected by 1,960,242 links, for all of them
with communication events and detailed bank records
available.
To study consumption behaviour we used purchase
sequences recording the time, amount, merchant cat-
egory code of each purchase event of each individual
during the observation period of 8 months. Purchase
events are linked to one of the 281 merchant cate-
gory codes (mcc) indicating the type of the actual
purchase, like fast food restaurants, airlines, gas sta-
tions, etc. Due to the large number of categories in
this case we decided to group mccs by their types into
28 purchase category groups (PCGs) using the cate-
gorization proposed in [23]. After analyzing each pur-
chase groups 11 of them appeared with extremely low
activity representing less than 0.3% (combined) of the
total amount of purchases, thus we decided to remove
them from our analysis and use only the remaining
K17 set of 17 groups (for a complete list see Fig.2a).
Note that the group named Service Providers (k1
with mcc 24) plays a particular role as it corresponds
to cash retrievals and money transfers and it repre-
sents around 70% of the total amount of purchases.
As this group dominates over other ones, and since
we have no further information how the withdrawn
1 The matching, data hashing, and anonymization proce-
dure was carried out without the involvement of the scientific
partner. After this procedure only anonymized hashed IDs
were shared disallowing the direct identification of individuals
in any of the datasets.
cash was spent, we analyze this group k1 separately
from the other K2-17 = K17\{k1} set of groups.
This way we obtained DS1, which collects the social
ties, economic status, and coarse grained purchase
habit informations of ∼ 1 million people connected
together into a large social network.
DS2: Detailed ego purchase distributions
with age and gender
From the same bank transaction trace of 6,002,192
users, we build a second data set DS2. This dataset
collects data about the age and gender of individu-
als together with their purchase sequence recording
the time, amount, and mcc of each debit card pur-
chase of each ego. To obtain a set of active users we
extracted a corpus of 4,784,745 people that were ac-
tive at least two months during the observation pe-
riod. Then for each ego, we assigned a feature set
P V (u) : {ageu, genderu, SEGu, r(ci, u)} where SEG
assigns a socioeconomic group (for definition see Sec-
tion 4) and r(ci, u) is an ego purchase distribution
vector defined as
r(ci, u) =
.
(1)
u(cid:80)
mci
mci
u
ci
This vector assigns the fraction of mci
u money spent
by user u on a merchant category ci during the obser-
vation period. We excluded purchases corresponding
to cash retrievals and money transfers, which would
dominate our measures otherwise. A minor fraction
of purchases are not linked to valid mccs, thus we
excluded them from our calculations.
This way DS2 collects 3,680,652 individuals, with-
out information about their underlying social net-
work, but all assigned with a P V (u) vector describing
their personal demographic and purchasing features
in details.
4 Measures of socioeconomic position
To estimate the personal economic status we used a
simple measure reflecting the consumption power of
each individual. Starting from the raw data of DS2,
which collects the amount and type of debit card pur-
chases, we estimated the economic position of individ-
uals as their average monthly purchase (AMP). More
precisely, in case of an ego u who spent mu(t) amount
in month t we calculated the AMP as
(cid:80)
t∈T mu(t)
Tu
(2)
Pu =
3
where Tu corresponds to the number of active
months of user u (with at least one purchase in each
month). After sorting people by their AMP values
we computed the normalized cumulative distribution
function of Pu as
(cid:80)f
(cid:80)
f(cid:48)=0 Pu(f(cid:48))
u Pu
C(f ) =
(3)
as a function of f fraction of people. This func-
tion (Fig.1a) appears with high variance and sug-
gests large imbalances in terms of the distribution of
economic capacities among individuals in agreement
with earlier social theory [27].
Fig. 1: Social class characteristics (a) Schematic
demonstration of user partitions into 9 socioe-
conomic classes by using the cumulative AMP
function C(f ). Fraction of egos belonging to
a given class (x axis) have the same sum of
u Pu)/n (y axis) for each class. (b)
Number of egos (green) and the average AMP
(cid:104)P(cid:105) (in USD) per individual (yellow) in differ-
ent classes.
AMP ((cid:80)
was the same equal to ((cid:80)
Subsequently we used the C(f ) function to assign
egos into 9 economic classes (also called socioeco-
nomic classes with smaller numbers assigning lower
classes) such that the sum of AMP in each class sj
u Pu)/n (Fig.1). We de-
cided to use 9 distinct classes based on the common
three-stratum model [25], which identifies three main
social classes (lower, middle, and upper), and for each
of them three sub-classes [26]. There are several ad-
vantages of this classification:
(a) it relies merely
on individual economic estimators, Pu, (b) naturally
partition egos into classes with decreasing sizes for
richer groups and (c) increasing (cid:104)P(cid:105) average AMP
values per egos (Fig.1b).
5 Socioeconomic correlations in
purchasing patterns
In order to address our first research question we
were looking for correlations between individuals in
different socioeconomic classes in terms of their con-
sumption behaviour on the level of purchase category
groups. We analyzed the purchasing behaviour of
people in DS1 after categorizing them into socioeco-
nomic classes as explained in Section 4.
First for each class sj we take every user u ∈ sj
and calculate the mk
u total amount of purchases they
spent on a purchase category group k ∈ K17. Then
we measure a fractional distribution of spending for
each PCGs as:
r(k, sj) =
,
(4)
(cid:80)
(cid:80)
mk
u∈sj
u
u∈s mk
u
where s = (cid:83)
j sj assigns the complete set of users.
In Fig.2a each line shows the r(k, sj) distributions
for a PCG as the function of sj social classes, and
lines are sorted (from top to bottom) by the total
amount of money spent on the actual PCG2. Interest-
ingly, people from lower socioeconomic classes spend
more on PCGs associated to essential needs, such as
Retail Stores (St.), Gas Stations, Service Providers
(cash) and Telecom, while in the contrary, other cat-
egories associated to extra needs such as High Risk
Personal Retail (Jewelry, Beauty), Mail Phone Or-
der, Automobiles, Professional Services (Serv.) (ex-
tra health services), Whole Trade (auxiliary goods),
Clothing St., Hotels and Airlines are dominated by
people from higher socioeconomic classes. Also note
that concerning Education most of the money is spent
by the lower middle classes, while Miscellaneous St.
(gift, merchandise, pet St.) and more apparently En-
tertainment are categories where the lowest and high-
est classes are spending the most.
From this first analysis we can already identify
large differences in the spending behaviour of peo-
ple from lower and upper classes. To further in-
vestigate these dissimilarities on the individual level,
we consider the K2-17 category set as defined in sec-
tion 3 (category k1 excluded) and build a spending
vector SV (u) = [SV2(u), ..., SV17(u)] for each ego u.
2 Note that in our social class definition the cumulative AMP
is equal for each group and this way each group represents the
same economic potential as a whole. Values shown in Fig.2a
assign the total purchase of classes. Another strategy would
be to calculate per capita measures, which in turn would be
strongly dominated by values associated to the richest class,
hiding any meaningful information about other classes.
4
0.00.20.40.60.81.0f0.00.20.40.60.81.0CW(f)CP(f)f(a)Class 1Class 4Class 2Class 3Class 5Class 8Class 6Class 7Class 9(a)(b)Fig. 2: Consumption correlations in the socioeconomic network (a) r(k, si) distribution of spending
in a given purchase category group k ∈ K17 by different classes sj. Distributions are normalised
as in Eq.4, i.e. sums up to 1 for each category. (b) Dispersion σSV (sj) for different socioeconomic
classes considering PCGs in K2-17 (dark blue) and the single category k1 (light blue). (c) (resp.
(d)) Heat-map matrix representation of dSV (si, sj) (resp. dk1(si, sj)) distances between the average
spending vectors of pairs of socioeconomic classes considering PCGs in K2-17 (resp. k1). (e) Shannon
entropy measures for different socioeconomic classes considering PCGs in K2-17 (dark pink) and in
k17 (light pink). (f ) (resp. (g)) Heat-map matrix representation of the average LSV (si, sj) (resp.
Lk1(si, sj)) measure between pairs of socioeconomic classes considering PCGs in K2-17 (resp. k1).
k∈K mk
out of his/her mu =(cid:80)
Here each item SVk(u) assigns the fraction of money
u/mu that user u spent on a category k ∈ K2-17
mk
u total amount of pur-
chases. Using these individual spending vectors we
calculate the average spending vector of a given so-
cioeconomic class as SV (sj) = (cid:104)SV (u)(cid:105)u∈sj . We as-
sociate SV (sj) to a representative consumer of class
sj and use this average vector to quantify differences
between distinct socioeconomic classes as follows.
The euclidean metric between average spending
the richest social classes appear with a very different
behaviour. This is due to their relative underspend-
ing in cash, which can be also concluded from Fig.2a
(first row). On the other hand as going towards lower
classes such differences decrease as cash usage starts
to dominate.
To explain better the differences between socioe-
conomic classes in terms of purchasing patterns, we
introduce two additional scalar measures. First, we
introduce the dispersion of individual spending vec-
tors as compared to their class average as
dSV (si, sj) = (cid:107)SV k(si) − SV k(sj)(cid:107)2,
(5)
σSV (sj) = (cid:104)(cid:107)SV k(sj) − SVk(u)(cid:107)2(cid:105)u∈sj ,
(6)
vectors is:
where (cid:107)(cid:126)v(cid:107)2 =(cid:112)(cid:80)
k v2
k assigns the L2 norm of a vec-
tor (cid:126)v. Note that the diagonal elements of dSV (si, si)
are equal to zero by definition. However, in Fig.2c
the off-diagonal green component around the diag-
onal indicates that the average spending behaviour
of a given class is the most similar to neighboring
classes, while dissimilarities increase with the gap be-
tween socioeconomic classes. We repeated the same
measurement separately for the single category of
cash purchases (PCG k1).
In this case euclidean
distance is defined between average scalar measures
as dk1(si, sj) = (cid:107)(cid:104)SV1(cid:105)(si) − (cid:104)SV1(cid:105)(sj)(cid:107)2.
Interest-
indicates that here
ingly, results shown in Fig.2d.
which appears with larger values if people in a given
class allocate their spending very differently. Second,
we also calculate the Shannon entropy of spending
patterns as
SSV (sj) =
−SV k(sj) log(SV k(sj))
(7)
(cid:88)
k∈K2-17
to quantify the variability of the average spending
vector for each class. This measure is minimal if each
ego of a class sj spends exclusively on the same sin-
gle PCG, while it is maximal if they equally spend on
each PCG. As it is shown in Fig.2b (light blue line
5
(a)(b)(d)(c)(e)(g)(f)with square symbols) dispersion decreases rapidly as
going towards higher socioeconomic classes. This as-
signs that richer people tends to be more similar in
terms of their purchase behaviour. On the other
hand, surprisingly,
in Fig.2e (dark pink line with
square symbols) the increasing trend of the corre-
sponding entropy measure suggests that even richer
people behave more similar in terms of spending be-
haviour they used to allocate their purchases in more
PCGs. These trends are consistent even in case of
k1 cash purchase category (see σSV1(sj) function de-
picted with dark blue line in in Fig.2b) or once we in-
clude category k1 into the entropy measure SSV17(sj)
(shown in Fig.2b with light pink line).
To complete our investigation we characterize the
effects of social relationships on the purchase habits
of individuals. We address this problem through an
overall measure quantifying differences between indi-
vidual purchase vectors of connected egos positioned
in the same or different socioeconomic classes. More
precisely, we consider each social tie (u, v) ∈ E con-
necting individuals u ∈ si and v ∈ sj, and for each
purchase category k we calculate the average absolute
difference of their purchase vector items as
dk(si, sj) = (cid:104)SVk(u) − SVk(v)(cid:105)u∈si,v∈sj .
(8)
Following that, as a reference system we generate a
corresponding configuration network by taking ran-
domly selected edge pairs from the underlying social
structure and swap them without allowing multiple
links and self loops.
In order to vanish any resid-
ual correlations we repeated this procedure in 5×E
times. This randomization keeps the degree, indi-
vidual economic estimators Pu, the purchase vector
SV (u), and the assigned class of each people un-
changed, but destroys any structural correlations be-
tween egos in the social network, consequently be-
tween socioeconomic classes as well. After generating
a reference structure we computed an equivalent mea-
rn(si, sj) but now using links (u, v) ∈ Ern of the
sure dk
randomized network. We repeated this procedure 100
rn(cid:105)(si, sj). In or-
times and calculated an average (cid:104)dk
der to quantify the effect of the social network we
simply take the ratio
Lk(si, sj) =
dk(si, sj)
(cid:104)dk
rn(cid:105)(si, sj)
(9)
and calculate its average LSV (si, sj) = (cid:104)Lk(si, sj)(cid:105)k
over each category group k ∈ K2-17 or respectively k1.
This measure shows whether connected people have
more similar purchasing patterns than one would ex-
pect by chance without considering any effect of ho-
mophily, social influence or structural correlations.
Results depicted in Fig.2f and 2g for LSV (si, sj) (and
Lk1(si, sj) respectively) indicates that the purchas-
ing patterns of individuals connected in the original
structure are actually more similar than expected by
chance (diagonal component). On the other hand
people from remote socioeconomic classes appear to
be less similar than one would expect from the uncor-
related case (indicated by the LSV (si, sj) > 1 values
typical for upper classes in Fig.2f). Note that we
found the same correlation trends in cash purchase
patterns as shown in Fig.2g. These observations do
not clearly assign whether homophily [12, 13] or so-
cial influence [1] induce the observed similarities in
purchasing habits but undoubtedly clarifies that so-
cial ties (i.e. the neighbors of an ego) and socioeco-
nomic status play deterministic roles in the emerging
similarities in consumption behaviour.
6 Purchase category correlations
To study consumption patterns of single purchase
categories PCGs provides a too coarse grained level
of description. Hence, to address our second ques-
tion we use DS2 and we downscale from the category
group level to the level of single merchant categories.
We are dealing with 271 categories after excluding
some with less than 100 purchases and the categories
linked to money transfer and cash retrieval (for a
complete list of IDs and name of the purchase cat-
egories considered see Table 1). As in Section 3 we
assign to each ego u a personal vector P V (u) of four
socioeconomic features: the age, the gender, the so-
cial economic group, and the distribution r(ci, u) of
purchases in different merchant categories made by
the central ego. Our aim here is to obtain an overall
picture of the consumption structure at the level of
merchant categories and to understand precisely how
personal and socioeconomic features correlate with
the spending behaviour of individuals and with the
overall consumption structure.
As we noted in section 5, the purchase spending
vector r(ci, u) of an ego quantifies the fraction of
money spent on a category ci. Using the spending
vectors of n number of individuals we define an over-
all correlation measure between categories as
n((cid:80)
((cid:80)
u r(ci, u))((cid:80)
u r(ci, u)r(cj, u))
.
(10)
u r(cj, u))
ρ(ci, cj) =
6
Fig. 3: Merchant category correlation matrix and graph (a) 163×163 matrix heatmap plot corre-
sponding to ρ(ci, cj) correlation values (see Eq. 10) between categories. Colors scale with the loga-
rithm of correlation values. Positive (resp. negative) correlations are assigned by red (resp. blue)
colors. Diagonal components represent communities with frames colored accordingly.(b) Weighted
G>
ρ correlation graph with nodes annotated with MCCs (see Table 1). Colors assign 17 communities
of merchant categories with representative names summarized in the figure legend.
Fig. 4: Socioeconomic parameters of merchant categories (a) Scatter plot of AF S(ci) triplets (for
definition see Eq. 11 and text) for 271 merchant categories summarized in Table 1. Axis assign
average age and SEG of purchase categories, while gender information are assigned by symbols. The
shape of symbols assigns the dominant gender (circle-female, square-male) and their size scales with
average values. (b) Similar scatter plot computed for communities presented in Fig.3b. Labels and
colors are explained in the legend of Fig.3a.
7
52111711525155335942274159435964411140114112451147225651581359477011412141314789530953315732594859935999792279917999939956917399421547844816519253995734573558115812581459685969597059925994721672307298731173927512752375427933794179967997899959675045504650655085511159957538458252005310554193114812732148997372799459457273598349005039501350725198551155325021571252315719595057337993504780118021806280715722507450945621563156995944597751315441594951225137566151395169517251935714762976356555641545154625973554276225599557156115935594156975681593159717296729778417832721072117932804959217929594059768641594673387221596572777427299799873618099799582118220(a)(b)Car sales and maintenanceHardware storesOffice supply storesIT servicesBooks and newspapersState services and educationHome supply storesNewsstand and duty-free shopsAmusement and recreationTravellingTransportation and commutingLeisureJewellery and gift shopsClothing 1Clothing 2Personal servicesHealth and medical services(a)(b)0 0.5 1female male0 0.5 1female male(a)(b)This symmetric formulae quantifies how much peo-
ple spend on a category ci if they spend on an other
cj category or vice versa. Therefore, if ρ(ci, cj) > 1,
the categories ci and cj are positively correlated and
if ρ(ci, cj) < 1, categories are negatively correlated.
Using ρ(ci, cj) we can define a weighted correlation
graph Gρ = (Vρ, Eρ, ρ) between categories ci ∈ Vρ,
where links (ci, cj) ∈ Eρ are weighted by the ρ(ci, cj)
correlation values. The weighted adjacency matrix
of Gρ is shown in Fig.3a as a heat-map matrix with
logarithmically scaling colors. Importantly, this ma-
trix emerges with several block diagonal components
suggesting present communities of strongly correlated
categories in the graph.
To identify categories which were commonly pur-
chased together we consider only links with positive
correlations. Furthermore, to avoid false positive cor-
relations, we consider a 10% error on r that can in-
duce, in the worst case 50% overestimation of the
correlation values. In addition, to consider only rep-
resentative correlations we take into account category
pairs which were commonly purchased by at least
1000 consumers. This way we receive a G>
ρ weighted
sub-graph of Gρ, shown in Fig.3b, with 163 nodes
and 1664 edges with weights ρ(ci, cj) > 1.5.
To identify communities in G>
ρ indicated by the
correlation matrix in Fig.3a we applied a graph parti-
tioning method based on the Louvain algorithm [28].
We obtained 17 communities depicted with differ-
ent colors in Fig.3b and as corresponding colored
frames in Fig.3a.
Interestingly, each of these com-
munities group a homogeneous set of merchant cat-
egories, which could be assigned to similar types of
purchasing activities (see legend of Fig.3b). In addi-
tion, this graph indicates how different communities
are connected together. Some of them, like Trans-
portation, IT or Personal Serv. playing a central
role as connected to many other communities, while
other components like Car sales and maintenance
and Hardware St., or Personal and Health and med-
ical Serv. are more like pairwise connected. Some
groups emerge as standalone communities like Office
Supp. St., while others like Books and newspapers
or Newsstands and duty-free Shops (Sh.) appear as
bridges despite their small sizes.
Note that the main categories corresponding to
everyday necessities related to food (Supermarkets,
Food St.) and telecommunication (Telecommunica-
tion Serv.) do not appear in this graph. Since they
are responsible for the majority of total spending,
they are purchased necessarily by everyone without
obviously enhancing the purchase in other categories,
thus they do not appear with strong correlations.
An average
categories and personal
Finally we turn to study possible correlations
between purchase
fea-
tures.
set AF S(ci) =
{(cid:104)age(ci)(cid:105),(cid:104)gender(ci)(cid:105),(cid:104)SEG(ci}(cid:105)) is assigned to
each of the 271 categories. The average (cid:104)v(ci)(cid:105) of
a feature v ∈ {age, gender, SEG} assigns a weighted
average value computed as:
feature
(cid:104)v(ci)(cid:105) =
u∈{u}i
αi(vu)vu
u∈{u}u
αi(v)
,
(11)
where vu denotes a feature of a user u from the {u}i
set of individuals who spent on category ci. Here
(cid:80)
(cid:80)
(cid:88)
αi(vu) =
(u∈{u}ivu=v)
r(ci, u)
ni(vu)
(12)
corresponds to the average spending on category ci
of the set of users from {u}i sharing the same value
of the feature v. ni(vu) denotes the number of such
users. In other words, e.g. in case of v = age and c742,
(cid:104)age(c742)(cid:105) assigns the average age of people spent
on Veterinary Services (mcc = 742) weighted by the
amount they spent on it. In case of v = gender we
assigned 0 to females and 1 to males, thus the average
gender of a category can take any real value between
[0, 1], indicating more females if (cid:104)gender(ci)(cid:105) ≤ 0.5
or more males otherwise.
We visualize this multi-modal data in Fig.4a as
a scatter plot, where axes scale with average age
and SEG, while the shape and size of symbols corre-
spond to the average gender of each category. To fur-
ther identify correlations we applied k-means cluster-
ing [29] using the AF S(ci) of each category. The ideal
number of clusters was 15 according to several crite-
ria: Davies-Bouldin Criterion, Calinski-Harabasz cri-
terion (variance ratio criterion) and the Gap method
[30]. Colors in Fig.4a assign the identified k-mean
clusters.
The first thing to remark in Fig.4a is that the av-
erage age and SEG assigned to merchant categories
are positively correlated with a Pearson correlation
coefficient 0.42 (p < 0.01).
In other words, elderly
people used to purchase from more expensive cate-
gories, or alternatively, wealthier people tend to be
older, in accordance with our intuition. At the same
time, some signs of gender imbalances can be also
concluded from this plot. Wealthier people appear to
be commonly males rather than females. A Pearson
correlation measure between gender and SEG, which
8
7296: Clothing Rental
7297: Massage Parlors
7298: Health and Beauty Spas
7299: General Serv.
7311: Advertising Serv.
7941: Sports Clubs
7991: Tourist Attractions
7992: Golf Courses
7993: Video Game Supp.
7994: Video Game Arcades
7995: Gambling
7996: Amusement Parks
7997: Country Clubs
7998: Aquariums
7999: Recreation Serv.
8011: Doctors
8021: Dentists, Orthodontists
8031: Osteopaths
5072: Hardware Supp.
5598: Snowmobile Dealers
5192: Newspapers
5193: Nursery & Flowers Supp.
5198: Paints
5199: Nondurable Goods
5200: Home Supply St.
5211: Materials St.
5231: Glass & Paint St.
5251: Hardware St.
5261: Nurseries & Garden St.
5271: Mobile Home Dealers
5300: Wholesale
5309: Duty Free St.
5950: Glassware, Crystal St.
5960: Dir Mark - Insurance
5962: Direct Marketing - Travel
5611: Men Cloth. St.
5621: Wom Cloth. St.
5963: Door-To-Door Sales
5631: Women?s Accessory Sh. 5964: Dir. Mark. Catalog
5641: Children?s Wear St.
5651: Family Cloth. St.
5655: Sports & Riding St.
5661: Shoe St.
5681: Furriers Sh.
5691: Cloth. Stores
5697: Tailors
5698: Wig and Toupee St.
5699: Apparel Accessory Sh.
5712: Furniture
5713: Floor Covering St.
5714: Window Covering St.
5718: Fire Accessories St.
5719: Home Furnishing St.
5722: House St.
5732: Elec. St.
5733: Music Intruments St.
5734: Comp.Soft. St.
5735: Record Stores
5811: Caterers
5812: Restaurants
5813: Drinking Pl.
5331: Variety Stores
5814: Fast Foods
5399: General Merch.
5912: Drug St.
5411: Supermarkets
5921: Alcohol St.
5422: Meat Prov.
5931: Secondhand Stores
5441: Candy St.
5932: Antique Sh.
5451: Dairy Products St.
5933: Pawn Shops
5462: Bakeries
5935: Wrecking Yards
5499: Food St.
5937: Antique Reproductions 7211: Laundries
5511: Cars Sales
5521: Car Repairs Sales
5940: Bicycle Sh.
5531: Auto and Home Supp. St. 5941: Sporting St.
5532: Auto St.
5533: Auto Access.
5541: Gas Stations
5542: Automated Fuel Dispensers 5945: Toy,-Game Sh.
5551: Boat Dealers
742: Veterinary Serv.
763: Agricultural Cooperative 5074: Plumbing, Heating Equip. 5599: Auto Dealers
5085: Industrial Supplies
780: Landscaping Serv.
5094: Precious Objects/Stones
1520: General Contr.
5099: Durable Goods
1711: Heating, Plumbing
5111: Printing, Office Supp.
1731: Electrical Contr.
5122: Drug Proprietaries
1740: Masonry & Stonework
5131: Notions Goods
1750: Carpentry Contr.
5137: Uniforms Clothing
1761: Sheet Metal
5139: Commercial Footwear
1771: Concrete Work Contr.
1799: Special Trade Contr.
5169: Chemicals Products
2741: Publishing and Printing 5172: Petroleum Products
2791: Typesetting Serv.
2842: Specialty Cleaning
4011: Railroads
4111: Ferries
4112: Passenger Railways
4119: Ambulance Serv.
4121: Taxicabs
4131: Bus Lines
4214: Motor Freight Carriers
4215: Courier Serv.
4225: Public Storage
4411: Cruise Lines
4457: Boat Rentals and Leases 5310: Discount Stores
4468: Marinas Serv. and Supp. 5311: Dep. St.
4511: Airlines
4582: Airports, Flying Fields
4722: Travel Agencies
4784: Tolls/Bridge Fees
4789: Transportation Serv.
4812: Phone St.
4814: Telecom.
4816: Comp. Net. Serv.
4821: Telegraph Serv.
4899: Techno St.
4900: Utilities
5013: Motor Vehicle Supp.
5021: Commercial Furniture
5039: Constr. Materials
5044: Photographic Equip.
5045: Computer St.
5046: Commercial Equipment 5561: Motorcycle Sh.
5571: Motorcycle Sh.
5047: Medical Equipment
5051: Metal Service Centers
5592: Motor Homes Dealers
5065: Electrical St.
5946: Camera and Photo St. 7273: Dating/Escort Serv.
5947: Gift Sh.
5948: Luggage & Leather St. 7277: Counseling Services
5949: Fabric St.
5942: Book St.
5943: Stationery St.
5944: Jewelry St.
7276: Tax Preparation Serv.
5965: Dir. Mark. Retail Merchant 7321: Credit Reporting Agencies
5966: Dir Mark - TV
5967: Dir. Mark.
5968: Dir. Mark. Subscription
5969: Dir. Mark. Other
5970: Artist?s Supp.
5971: Art Dealers & Galleries
5972: Stamp and Coin St.
5973: Religious St.
5975: Hearing Aids
5976: Orthopedic Goods
5977: Cosmetic St.
5978: Typewriter St.
5983: Fuel Dealers (Non Auto)
5992: Florists
5993: Cigar St.
5994: Newsstands
5995: Pet Sh.
5996: Swimming Pools Sales
5997: Electric Razor St.
5998: Tent and Awning Sh.
5999: Specialty Retail
6211: Security Brokers
6300: Insurance
7011: Hotels
7012: Timeshares
7032: Sporting Camps
7033: Trailer Parks, Camps
7210: Laundry, Cleaning Serv.
7333: Graphic Design
7338: Quick Copy
7339: Secretarial Support Serv.
7342: Exterminating Services
7349: Cleaning and Maintenance
7361: Employment Agencies
7372: Computer Programming
7375: Information Retrieval Serv. 8041: Chiropractors
7379: Computer Repair
8042: Optometrists
7392: Consulting, Public Relations 8043: Opticians
7393: Detective Agencies
7394: Equipment Rental
7395: Photo Developing
7399: Business Serv.
7512: Car Rental Agencies
7513: Truck/Trailer Rentals
7519: Mobile Home Rentals
7523: Parking Lots, Garages
7531: Auto Body Repair Sh.
7534: Tire Retreading & Repair
7535: Auto Paint Sh.
7538: Auto Service Shops
7542: Car Washes
7549: Towing Serv.
7622: Electronics Repair Sh.
7623: Refrigeration Repair
7629: Small Appliance Repair
7631: Watch/Jewelry Repair
7641: Furniture Repair
7692: Welding Repair
7699: Repair Sh.
7829: Picture/Video Production
7832: Cinema
7841: Video Tape Rental St.
7911: Dance Hall & Studios
7922: Theater Ticket
7929: Bands, Orchestras
7932: Billiard/Pool
7933: Bowling
8049: Chiropodists, Podiatrists
8050: Nursing/Personal Care
8062: Hospitals
8071: Medical Labs
8099: Medical Services
8111: Legal Services, Attorneys
8211: Elem. Schools
8220: Colleges Univ.
8241: Correspondence Schools
8244: Business Schools
8249: Training Schools
8299: Educational Serv.
8351: Child Care Serv.
8398: Donation
8641: Associations
8651: Political Org.
8661: Religious Orga.
8675: Automobile Associations
8699: Membership Org.
8734: Testing Lab.
8911: Architectural Serv.
8931: Accounting Serv.
8999: Professional Serv.
9211: Courts of Law
9222: Government Fees
9223: Bail and Bond Payments
9311: Tax Payments
9399: Government Serv.
9402: Postal Serv.
7216: Dry Cleaners
7217: Upholstery Cleaning
7221: Photographic Studios
7230: Beauty Sh.
7251: Shoe Repair/Hat Cleaning
7261: Funeral Serv.
7278: Buying/Shopping Serv.
Tab. 1: Codes and names of 271 merchant categories used in our study. MCCs were taken from the Merchant
Category Codes and Groups Directory published by American Express [23]. Abbreviations corre-
spond to: Serv. - Services, Contr. - Contractors, Supp. - Supplies, St. - Stores, Equip. - Equipment,
Merch. - Merchandise, Prov. - Provisioners, Pl. - Places, Sh. - Shops, Mark. - Marketing, Univ. -
Universities, Org. - Organizations, Lab. - Laboratories.
appears with a coefficient 0.29 (p < 0.01) confirmed
it. On the other hand, no strong correlation was ob-
served between age and gender from this analysis.
To have an intuitive insight about the distribution
of merchant categories, we take a closer look at spe-
cific category codes (summarized in Table 1). As
seen in Fig.4a elderly people tend to purchase in spe-
cific categories such as Medical Serv., Funeral Serv.,
Religious Organisations, Motorhomes Dealers, Dona-
tion, Legal Serv.. Whereas categories such as Fast
Foods, Video Game Arcades, Cinema, Record St., Ed-
ucational Serv., Uniforms Clothing, Passenger Rail-
ways, Colleges-Universities are associated to younger
individuals on average. At the same time, wealth-
ier people purchase more in categories as Snowmo-
bile Dealers, Secretarial Serv., Swimming Pools Sales,
Car Dealers Sales, while poorer people tend to pur-
chase more in categories related to everyday neces-
sities like Food St., General Merch., Dairy Products
St., Fast Foods and Phone St., or to entertainment as
Billiard or Video Game Arcades. Typical purchase
categories are also strongly correlated with gender as
categories more associated to females are like Beauty
Sh., Cosmetic St., Health and Beauty Spas, Women
Clothing St. and Child Care Serv., while others are
preferred by males like Motor Homes Dealers, Snow-
mobile Dealers, Dating/Escort Serv., Osteopaths, In-
struments St., Electrical St., Alcohol St. and Video
Game Arcades.
Finally we repeated a similar analysis on commu-
nities shown in Fig.3b, but computing the AF S on a
set of categories that belong to the same community.
Results in Fig.4b disclose positive age-SEG correla-
tions as observed in Fig.4a, together with somewhat
9
intuitive distribution of the communities.
ANR projects.
7 Conclusion
References
In this paper we analyzed a multi-modal dataset col-
lecting the mobile phone communication and bank
transactions of a large number of individuals living
in a single country. This corpus allowed for an in-
novative global analysis both in term of social net-
work and its relation to the economical status and
merchant habits of individuals. We introduced sev-
eral measures to estimate the socioeconomic status of
each individual together with their purchasing habits.
Using these information we identified distinct socioe-
conomic classes, which reflected strongly imbalanced
distribution of purchasing power in the population.
After mapping the social network of egos from mo-
bile phone interactions, we showed that typical con-
sumption patterns are strongly correlated with the
socioeconomic classes and the social network behind.
We observed these correlations on the individual and
social class level.
In the second half of our study we detected corre-
lations between merchant categories commonly pur-
chased together and introduced a correlation network
which in turn emerged with communities grouping
homogeneous sets of categories. We further analyzed
some multivariate relations between merchant cate-
gories and average demographic and socioeconomic
features, and found meaningful patterns of correla-
tions giving insights into correlations in purchasing
habits of individuals.
We identified several new directions to explore in
the future. One possible track would be to better
understand the role of the social structure and inter-
personal influence on individual purchasing habits,
while the exploration of correlated patterns between
commonly purchased brands assigns another promis-
ing directions. Beyond our general goal to better un-
derstand the relation between social and consuming
behaviour these results may enhance applications to
better design marketing, advertising, and recommen-
dation strategies, as they assign relations between co-
purchased product categories.
Acknowledgment
We thank M. Fixman for assistance. We acknowl-
edge the support from the SticAmSud UCOOL
project, INRIA, and the SoSweet (ANR-15-CE38-
0011-01) and CODDDE (ANR-13-CORD-0017-01)
[1] A. Deaton, Understanding Consumption. Claren-
don Press (1992).
[2] A. Deaton and J. Muellbauer, Economics and
Consumer Behavior. Cambridge University Press
(1980).
[3] T. Piketti, Capital in the Twenty-First Century.
(Harvard University Press, 2014).
[4] S. Sernau, Social Inequality in a Global Age.
(SAGE Publications, 2013).
[5] C. E. Hurst, Social Inequality. 8th ed. (Pearson
Education, 2015).
[6] J. E. Fisher, Social Class and Consumer Behavior:
the Relevance of Class and Status", in Advances
in Consumer Research Vol. 14, eds. M. Wallen-
dorf and P. Anderson, Provo, UT : Association
for Consumer Research, pp 492–496 (1987) .
[7] S. Wasserman, K. Faust, Social Network Analy-
sis: Methods and Applications. (Cambridge Uni-
versity Press, 1994).
[8] S. Lohr, The age of big data. (New York Times,
2012).
[9] D. Lazer, et. al. Computational Social Science.
Science 323, 721–723 (2009)
[10] A. Abraham, A-E. Hassanien, V. Smasel (eds.),
Computational Social Network Analysis: Trends,
Tools and Research Advances. (Springer-Verlag,
2010).
[11] P. Bourdieu, Distinction: A Social Critique of
the Judgement of Taste. Harvard University Press
(Cambridge MA) (1984).
[12] M. McPherson, L. Smith-Lovin, J. M. Cook,
Birds of a Feather: Homophily in Social Net-
works. Ann. Rev. Sociol. 27 415–444 (2001).
[13] P. F. Lazarsfeld, R. K. Merton, Friendship as a
Social Process: A Substantive and Methodologi-
cal Analysis. In Freedom and Control in Modern
Society. (New York: Van Nostrand, 1954) pp. 18–
66.
10
[14] D. B. Grusky, Theories of Stratification and In-
equality. In The Concise Encyclopedia of Sociol-
ogy. pp. 622-624. (Wiley-Blackwell, 2011).
[28] V. Blondel, et. al., Fast unfolding of communi-
ties in large networks. J. Stat.l Mech: theory and
experiment P10008 (2008).
[29] C. M. Bishop, Neural Networks for Pattern
Recognition. (Oxford University Press, Oxford,
England) (1995).
[30] R. Tibshirani, G. Walther, T. Hastie, Estimating
the number of clusters in a data set via the gap
statistic. J. Roy. Stat. Soc. B 63, 411-423 (2001).
[15] P. West, Conspicuous Compassion: Why Some-
times It Really Is Cruel To Be Kind. Civitas, In-
stitute for the Study of Civil Society (London)
(2004).
[16] T. W. Chang, Social status and cultural con-
sumption Cambridge University Press (2010)
[17] A. Deaton, The analysis of household surveys: a
microeconometric approach to development pol-
icy. World Bank Publications (1997)
[18] Y. Dong, et. al., Inferring user demographics and
social strategies in mobile social networks. Proc.
of the 20th ACM SIGKDD international confer-
ence on Knowledge discovery and data mining,
15–24 (2014)
[19] N. Eagle, M. Macy, R. Claxton, Network di-
versity and economic development. Science 328,
1029–1031 (2010)
[20] L. Kovanen, et. al., Temporal motifs reveal ho-
mophily, gender-specific patterns, and group talk
in call sequences. Proc. Nat. Acad. Sci., 110,
18070–18075 (2013)
[21] R. Felix, P. A. Rauschnabel, C. Hinsch, Elements
of strategic social media marketing: A holistic
framework. J. Business Res. online 1st (2016)
[22] W. Wood, T. Hayes, Social Influence on con-
sumer decisions: Motives, modes, and conse-
quences. J. Consumer Psych. 22, 324–328 (2012).
[23] Merchant Category Codes and Groups Direc-
tory. American Express @ Work Reporting Ref-
erence (http://tinyurl.com/hne9ct5) (2008) (date
of access: 2/3/2016).
[24] P. Martineau, Social classes and spending behav-
ior. Journal of Marketing 121–130 (1958).
[25] D.F. Brown, Social class and Status. In Mey, Ja-
cob Concise Encyclopedia of Pragmatics. Elsevier
p. 953 (2009).
[26] P. Saunders, Social Class and Stratification.
(Routledge, 1990).
[27] V. Pareto, Manual of Political Economy. Reprint
(New English Trans) edition (1971).
11
|
1405.1001 | 3 | 1405 | 2017-12-15T18:40:04 | Density decompositions of networks | [
"cs.SI",
"cs.DS",
"physics.soc-ph"
] | We introduce a new topological descriptor of a network called the density decomposition which is a partition of the nodes of a network into regions of uniform density. The decomposition we define is unique in the sense that a given network has exactly one density decomposition. The number of nodes in each partition defines a density distribution which we find is measurably similar to the degree distribution of given real networks (social, internet, etc.) and measurably dissimilar in synthetic networks (preferential attachment, small world, etc.). | cs.SI | cs | Density decompositions of networks
Glencora Borradaile1, Theresa Migler2, and Gordon Wilfong3
1 School of EECS Oregon State University
2 Cal Poly, San Luis Obispo
3 Bell Labs
Abstract. We introduce a new topological descriptor of a network called
the density decomposition which is a partition of the nodes of a network
into regions of uniform density. The decomposition we define is unique
in the sense that a given network has exactly one density decomposition.
The number of nodes in each partition defines a density distribution
which we find is measurably similar to the degree distribution of given
real networks (social, internet, etc.) and measurably dissimilar in syn-
thetic networks (preferential attachment, small world, etc.).
1
Introduction
A better understanding of the topological properties of real networks can be
advantageous for two major reasons. First, knowing that a network has certain
properties, e.g., bounded degree or planarity, can sometimes allow for the design
of more efficient algorithms for extracting information about the network or
for the design of more efficient distributed protocols to run on the network.
Second, it can lead to methods for synthesizing artificial networks that more
correctly match the properties of real networks thus allowing for more accurate
predictions of future growth of the network and more accurate simulations of
distributed protocols running on such a network.
We show that networks decompose naturally into regions of uniform density,
a density decomposition. The decomposition we define is unique in the sense that
a given network has exactly one density decomposition. The number of nodes in
each region defines a distribution of the nodes according to the density of the
region to which they belong, that is, a density distribution (Section 2). Although
density is closely related to degree, we find that the density distribution of a
particular network is not necessarily similar to the degree distribution of that
network. For example, in many synthetic networks, such as those generated by
popular network models (e.g. preferential attachment and small worlds), the
density distribution is very different from the degree distribution (Section 3.1).
On the other hand, for all of the real networks (social, internet, etc.) in our
data set, the density and degree distributions are measurably similar (Section 3).
Similar conclusions can be drawn using the notion of k-cores [40], but this suffers
from some drawbacks which we discuss in Section 2.3.
7
1
0
2
c
e
D
5
1
]
I
S
.
s
c
[
3
v
1
0
0
1
.
5
0
4
1
:
v
i
X
r
a
2
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
1.1 Related work
We obtain the density decomposition of a given undirected network by first
orienting the edges of this network in an egalitarian4 manner. Then we partition
the nodes based on their indegree and connectivity in this orientation.
Fair orientations have been studied frequently in the past. These orientations
are motivated by many problems. One such motivating problem is the following
telecommunications network problem: Source-sink pairs (si, ti) are linked by a
directed si-to-ti path ci (called a circuit). When an edge of the network fails, all
circuits using that edge fail and must be rerouted. For each failed circuit, the
responsibility for finding an alternate path is assigned to either the source or
sink corresponding to that circuit. To limit the rerouting load of any vertex, it
is desirable to minimize the maximum number of circuits for which any vertex
is responsible. Venkateswaran models this problem with an undirected graph
whose vertices are the sources and sinks and whose edges are the circuits. He
assigns the responsibility of a circuit's potential failure by orienting the edge to
either the source or the sink of this circuit. Minimizing the maximum number of
circuits for which any vertex is responsible can thus be achieved by finding an
orientation that minimizes the maximum indegree of any vertex. Venkateswaran
shows how to find such an orientation [42]. Asahiro, Miyano, Ono, and Zenmyo
consider the edge-weighted version of this problem [3]. They give a combina-
, (2 − )}-approximation algorithm where wmax and wmin are the
torial { wmax
maximum and minimum weights of edges respectively, and is a constant which
depends on the input [3]. Klostermeyer considers the problem of reorienting
edges (rather than whole paths) so as to create graphs with given properties,
such as strongly connected graphs and acyclic graphs [23]. De Fraysseix and de
Mendez show that they can find an indegree assignment of the vertices given
a particular properties [15]. Biedl, Chan, Ganjali, Hajiaghayi, and Wood give
a 13
8 -approximation algorithm for finding an ordering of the vertices such that
for each vertex v, the neighbors of v are as evenly distributed to the right and
left of v as possible [10]. For the purpose of deadlock prevention [45], Wittorff
describes a heuristic for finding an acyclic orientation that minimizes the sum
over all vertices of the function δ(v) choose 2, where δ(v) is the indegree of vertex
v. This objective function is motivated by a problem concerned with resolving
deadlocks in communications networks [46].
wmin
In our work we show that the density decomposition can isolate the densest
subgraph. The densest subgraph problem has been studied a great deal. Goldberg
gives an algorithm to find the densest subgraph in polynomial time using network
flow techniques [18]. There is a 2-approximation for this problem that runs in
linear time [12]. As a consequence of our decomposition, we find a subgraph
that has density no less than the density of the densest subgraph less one. There
are algorithms to find dense subgraphs in the streaming model [4,17]. There are
algorithms that find all densest subgraphs in a graph (there could be many such
subgraphs) [39].
4 An egalitarian orientation is one in which the indegrees of the nodes are as balanced
as possible as allowed by the topology of the network.
Density decompositions of networks
3
We consider many varied real networks in our study of the density decom-
position. We find our results to be consistent across biological, technical, and
social networks.
2 The density decomposition
In order to obtain the density decomposition of a given undirected network we
first orient the edges of this network in an egalitarian manner. Then we partition
the nodes based on their indegree and connectivity in this orientation.
The following procedure, the Path-Reversal algorithm, finds an egalitarian
orientation [11]. A reversible path is a directed path from a node v to a node u
such that the indegree of v, δ(v), is at least greater than the indegree of u plus
one: δ(v) > δ(u) + 1
Arbitrarily orient the edges of the network.
While there is a reversible path
reverse this path.
Since we are only reversing paths between nodes with differences in indegree
of at least 2, this procedure converges; the running time of this algorithm is
quadratic [11]. The orientation resulting from this termination condition sug-
gests a hierarchical decomposition of its nodes: Let k be the maximum indegree
in the orientation. Ring k, denoted Rk, contains all nodes of indegree k and
all nodes that reach nodes of indegree k. By the termination condition of the
above procedure, only nodes of indegree k or k − 1 are in Rk. Iteratively, given
Rk, Rk−1, . . . , and Ri+1, Ri contains all the remaining nodes with indegree i
along with all the remaining nodes that reach nodes with indegree i. Nodes in
Ri must have indegree i or i − 1 by the termination condition of the procedure.
By this definition, an edge between a node in Ri and a node in Rj is directed
from Ri to Rj when i > j and all the isolated nodes are in R0.
to number of nodes (
Density can be defined in two ways: either as the ratio of number of edges
E
V ) or as the ratio of number of edges to total number
2E
of possible edges (
V (V −1) ). In this discussion we use the former definition.
This definition of density is closely related to node degree (the number of edges
adjacent to a given node): the density of a network is equal to half the average
total degree.
We identify a set S of nodes in a graph by merging all the nodes in S into a
single node s and removing any self-loops (corresponding to edges of the graph
both of whose endpoints were in S). Our partition Rk, Rk−1, . . . , R0 induces
regions of uniform density in the following sense:
Density Property For any i = 0, . . . , k, identifying the nodes in ∪j>iRj and
deleting the nodes in ∪j<iRj leaves a network G whose
density is in the range (i−1, i] (for Ri sufficiently large).
4
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
In particular, Rk isolates a densest region in the network. Consider the net-
work Gi formed by identifying the nodes ∪j>iRj and deleting the nodes in
∪j<iRj; this network has one node (resulting from identifying the nodes ∪j>iRj)
of indegree 0 and Ri nodes of indegree i of i − 1, at least one of which must
have indegree i. Therefore, for any i, the density of Gi is at most i and density
at least
Ri(cid:29)i
−−−−→ i − 1.
(Ri − 1)(i − 1) + i
Ri + 1
In Section 2.1, we observe that this relationship between density and this
decomposition is much stronger.
2.1 Density and the Density Decomposition
In this section we discuss the following three properties:
Property D1 The density of a densest subnetwork is at most k. That is, there
is no denser region Rj for j > k.
Property D2 The density decomposition of a network is unique and does not
depend on the starting orientation.
Property D3 Every densest subnetwork contains only nodes of Rk.
These properties allow us to unequivocally describe the density structure of
a network. We summarize the density decomposition by the density distribution:
(R0,R1, . . .Rk−1,Rk), i.e. the number of nodes in each region of uniform
density. We will refer to a node in Ri as having density rank i.
The subnetwork of a network G induced by a subset S of the nodes of G is
defined as the set of nodes S and the subset of edges of G whose endpoints are
both in S; we denote this by G[S]. First we will note that both the densest sub-
network and the subnetwork induced by the nodes of highest rank have density
between k − 1 and k. Recall that k is the maximum indegree of a node in an
egalitarian orientation of G and that Ri is the set of nodes in the ith ring of the
density decomposition. We will refer to Rk as the densest ring.
We use the following two lemmas to prove Property D1.
Lemma 1. The density of the subnetwork induced by the nodes in Rk is in the
range (k − 1, k].
We could prove Lemma 5 directly with a simple counting argument on the in-
degrees of nodes in Rk (see Appendix A) or by using a network flow construction
similar to Goldberg's and the max flow-min cut theorem [18].
Lemma 2. The density of a densest subnetwork is in the range (k − 1, k].
The upper bound given in Lemma 6 may be proven directly by using a
counting argument for the indegrees of vertices in an egalitarian orientation of
the densest subnetwork (see Appendix A) or by using the relationship between
the density of the maximum density subgraph and the psuedoarboricity [24].
Density decompositions of networks
5
This upper bound proves Property D1 of the density decomposition. Prop-
erty D1 has been proven in another context. It follows from a theorem of Frank
and Gy´arf´as [14] that if (cid:96) is the maximum outdegree in an orientation that min-
imizes the maximum outdegree then the density of the network, d, is such that
(cid:100)d(cid:101) ≤ (cid:96).
Corollary 1. The subgraph induced by the nodes of Rk is at least as dense as
the density of the densest subgraph less one.
Note that the partition of the rings does not rely on the initial orientation,
or, more strongly, nodes are uniquely partitioned into rings, giving Property D2.
Theorem 1. The density decomposition is unique.
We can prove this by noting that the maximum indegree of two egalitarian
orientations for a given network is the same [11,3,42]. For a contradiction, we
consider two different egalitarian orientations of the same graph that yield two
distinct density decompositions. We then compare corresponding rings in each
orientation and find that they are in fact the same (see Appendix A).
The following theorem relies on the fact that the density decomposition is
unique and proves Property D3.
Theorem 2. The densest subnetwork of a network G is induced by a subset of
the nodes in the densest ring of G.
We could prove Theorem 6 directly by comparing the density of the subgraph
induced by the vertices in the densest subgraph intersected with the vertices in
Rk and the density of the densest subgraph (see Appendix A). Or we could use
integer parameterized max flow techniques [3,16].
Note that there are indeed cases where the densest subgraph is induced by
a strict subset of nodes in the top ring. For example, consider the graph, G,
consisting of K3 and K4 with a single edge connecting the two cliques. K4 is the
densest subgraph in G, however all of G is contained in the top ring (R2).
See Figure 1 for an example.
Fig. 1: The orientation shown is an egalitarian orientation. In this graph all nodes
are in the top ring. However, only the nodes in K4 are in the densest subgraph.
6
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
2.2 Interpretation of density rank
We can interpret orientations as assigning responsibility: if an edge is oriented
from node a to node b, we can view node b as being responsible for that con-
nection. Indeed several allocation problems are modelled this way [11,2,42,3,19].
Put another way, we can view a node as wishing to shirk as many of its du-
ties (modelled by incident edges) by assigning these duties to its neighbors (by
orienting the linking edge away from itself). Of course, every node wishes to
shirk as many of its duties as possible. However, the topology of the network
may prevent a node from shirking too many of its duties. In fact, the egalitarian
orientation is the assignment in which every node is allowed to simultaneously
shirk as many duties as allowed by the topology of the network. An example is
given in Figure 2; although nodes a and b both have degree 7, in the star network
(left) a can shirk all of its duties, but in the clique network (right) b can only
shirk half of its duties. There is a clear difference between these two cases that
is captured by the density rank of a and b that is not captured by the degree
of a and b. For example, if these were co-authorship networks, the star network
may represent a network in which author a only co-authors papers with authors
who never work with anyone else whereas the clique network shows that author
b co-authors with authors who also collaborate with others. One may surmise
that the work of author b is more reliable or respected than the work of author
a.
Fig. 2: Two egalitarian orientations for networks with 8 nodes. This example
generalizes to any number of nodes (Theorem 7).
Theorem 3. For a clique on n nodes, there is an orientation where each node
has indegree either (cid:98)n/2(cid:99) or (cid:98)n/2(cid:99) − 1.
A proof for Theorem 7 can be given by construction of such an egalitarian ori-
entation (see Appendix A) or by using a non-linear programming approach [36].
abDensity decompositions of networks
7
2.3 Relationship to k-cores
A k-core of a network is the maximal subnetwork whose nodes all have degree
at least k [40]. A k-core is found by repeatedly deleting nodes of degree less than
k while possible. For increasing values of k, the k-cores form a nesting hierarchy
(akin to our density decomposition) of subnetworks H0, H1, . . . , Hp where Hi is
an i-core and p is the smallest integer such that G has an empty (p + 1)-core.
For networks generated by the Gn,p model, most nodes are in the p-core [29,37]
For the preferential attachment model, all nodes except the initial nodes belong
to the c-core, where c is the number of edges connecting to each new node [1].
These observations are similar to those we find for the density distribution
(Section 3) and many of the observations we make regarding the similarity of
the degree and density distributions of real networks also hold for k-core de-
compositions [33]. However, the local definition of cores (depending only on the
degree of a node) provides a much looser connection to density than the density
decomposition, as we make formal in Lemma 7.
The density of the top core may be less then the density of the top ring. Also,
there are graphs for which the densest subgraph is not contained in the top core
(see Appendix B).
Lemma 3. Given a core decomposition H0, H1, . . . , Hk of a network, the sub-
network formed by identifying the nodes in ∪j>iHj and deleting the nodes in
∪j<iHj has density in the range [ i
2 , i) for Hi sufficiently large.
The proof of the above lemma can be found in Appendix B.
3 The similarity of degree and density distributions
The normalized density ρ and degree δ distributions for three networks (AS
2013, PHYS 2005, and DBLP) are given in Figure 3, illustrating the similarity
of the distributions. We quantify the similarity between the density and degree
distributions of these networks using the Bhattacharyya coefficient, β [8]. For
two normalized p and q, the Bhattacharyya coefficient is:
(cid:88)
i
β(p, q) =
√
pi · qi.
β(p, q) ∈ [0, 1] for normalized, positive distributions; β(p, q) = 0 if and only if
p and q are disjoint; β(p, q) = 1 if and only if p = q. We denote the Bhat-
tacharyya coefficient comparing the normalized density ρ and degree δ distribu-
tions, β(ρ, δ) for a network G by βρδ(G). Specifically,
(cid:88)
(cid:112)ρi · δi
βρδ(G) = β(ρ, δ) =
where ρi is the fraction of nodes in the ith ring of the density decomposition
of G and δi is the fraction of nodes of total degree i in G; we take ρi = 0 for
i
8
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
Fig. 3: In the AS network nodes represent autonomous systems and two au-
tonomous systems are connected if there is a routing agreement between
them [49] (44,729 nodes and 170,735 edges). In the PHYS network nodes repre-
sent condensed matter physicists and two physicists are connected if they have at
least one co-authored paper [34] (40,421 nodes and 175,692 edges). In the DBLP
network, nodes represent computer scientists and two computer scientists are
connected if they have at least one co-authored paper [48] (317,080 nodes and
1,049,866 edges). The (truncated) normalized density and degree distributions
are displayed. The degree distributions have long diminishing tails. AS 2013 has
67 non-empty rings, but rings 31 through 66 contain less than 1.5% of the nodes;
ring 67 contains 0.75% of the nodes. DBLP has 4 non-empty rings denser than
ring 30 that are disconnected; rings 32, 40, 52 and 58 contain 0.02%, 0.01%,
0.03% and 0.04% of the nodes, respectively.
i > k where k is the maximum ring index. Refer to Figure 4. For all the networks
in our data set, βρδ > 0.78. Note that if we exclude the Gnutella and Amazon
networks, βρδ > 0.9. We point out that the other networks are self-determining
in that each relationship is determined by at least one of the parties involved.
On the other hand, the Gnutella network is highly structured and designed and
the Amazon network is a is a one-mode projection of the buyer-product network
(which is in turn self-determining).
Perhaps this is not surprising, given the close relationship between density
and degree; one may posit that the density distribution ρ simply bins the degree
distribution δ. However, note that a node's degree is its total degree in the
undirected graph, whereas a node's rank is within one of its indegree in an
egalitarian orientation. Since the total indegree to be shared amongst all the
nodes is half the total degree of the network, we might assume that, if the
density distribution is a binning of the degree distribution, the density rank of a
node of degree d would be roughly d/2. That is, we may expect that the density
05101520253000.10.20.30.4 05101520253000.050.10.150.2 05101520253000.10.20.30.4 AS 2013 density distributionAS 2013 degree distributionDBLP density distributionDBLP degree distributionPHYS 2005 density distributionPHYS 2005 degree distributiondistribution is halved in range and doubled in magnitude (ρi ≈ 2δ2i). If this is
the case, then
Density decompositions of networks
9
If we additionally assume that our network has a power-law degree distribution
such as δx ∝ 1/x3,
(cid:112)ρiδi ≈(cid:88)
β(ρ, δ) ≈(cid:88)
(cid:115)
(cid:90) ∞
(cid:18)
d
d
(cid:112)
(cid:19)
β(ρ, δ) ≈
1
2
x3
2
2
(2x)3
2δdδ2d.
dx = 0.5
(after normalizing the distributions and using a continuous approximation of β).
Even with these idealized assumptions, this does not come close to explaining
βρδ being in excess of 0.78 for the networks in our data set. Further, for many
synthetic networks βρδ is small, as we discuss in the next section. We note that
this separation between similarities of density and degree distributions for the
empirical networks and synthetic networks can be illustrated with almost any
divergence or similarity measure for a pair of distributions.
3.1 The dissimilarity of degree and density distributions of random
networks
In contrast to the measurably similar degree and density distributions of real
networks, the degree and density distributions are measurably dissimilar for
networks produced by many common random network models; including the
preferential attachment (PA) model of Barabasi and Albert [6] and the small
world (SW) model of Watts and Strogatz [44]. We use βρδ(M ) to denote the
Bhattacharyya coefficient comparing the expected degree and density distribu-
tions of a network generated by a model M .
Preferential attachment networks In the PA model, a small number, n0, of nodes
seed the network and nodes are added iteratively, each attaching to a fixed
number, c, of existing nodes. Consider the orientation where each added edge
is directed toward the newly added node; in the resulting orientation, all but
the n0 seed nodes have indegree c and the maximum indegree is c. At most cn0
path reversals will make this orientation egalitarian, and, since cn0 is typically
very small compared to n (the total number of nodes), most of the nodes will
remain in the densest ring Rc. Therefore PA networks have nearly-trivial density
distributions: ρc ≈ 1. On the other hand the expected fraction of degree c nodes
is 2/(c + 2) [5]. Therefore βρδ(PA) ≈(cid:112)2/(c + 2).
Small-world networks A small-world network is one generated from a d-regular
networkby reconnecting (uniformly at random) at least one endpoint of every
edge with some probability. For probabilities close to 0, a network generated in
this way is close to d-regular; for probabilities close to 1, a network generated this
way approaches one generated by the random-network model (Gn,p) of Erdos
10
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
Fig. 4: Similarity (βρδ) of density and degree distributions for 9 diverse networks.
We introduced AS, PHYS, and DBLP in Figure 3. In the EMAIL network nodes
represent Enron email addresses and two addresses are connected if there has
been at least one email exchanged between them [22] (36,692 nodes and 183,831
edges). In the TRUST network nodes represent epinions.com members and two
members are connected if one trusts the other [41] (75,879 nodes and 405,740
edges). In the SDOT network nodes represent slashdot.org members and two
members are connected if they are friends or foes [28] (82,168 nodes and 504,
230 edges). In the WIKI network nodes represent wikipedia.org users and two
users are connected if one has voted for the other to be in an administrative
role [26] (7,115 nodes and 103,689 edges). In the Amazon network nodes repre-
sent products and two products are connected if they are frequently purchased
together [48] (334,863 nodes and 925,872 edges). In the Gnutella network nodes
represent network hosts and two hosts are connected if they share files [38]
(22,687 nodes and 54,704 edges). EMAIL , TRUST, and WIKI are naturally
directed networks. For these networks, we ignore direction and study the under-
lying undirected networks. Notice that both the Amazon and Gnutella networks
are highly structured. It is not surprising that these networks would have a
weaker connection between the density and degree distributions.
and R´enyi [13]. In the first extreme, βρδ(SW ) = 0 (Lemma 4 below) because
all the nodes have the same degree and the same rank. As the reconnection
probability increases, nodes are not very likely to change rank while the degree
distribution spreads slightly. In the second extreme, the highest rank of a node
is (cid:98)c/2(cid:99) + 1 [47] and, using an observation of the expected size of the densest
subnetwork5, with high probability nearly all the nodes have this rank. It follows
5 e-mail exchange between Glencora Borradaile and Abbas Mehrabian
1041050.750.80.850.90.951Network sizeBhattacharyya coefficient ASPHYSDBLPEMAILTRUSTSDOTWIKIAmazonGnutellaDensity decompositions of networks
11
(cid:115)
cc/2
e−c(c/2)!
,
that
βρδ(Gn,p) ≈
which approaches 0 very quickly as c grows. We verified this experimentally
finding that βρδ(Gn,p) < 0.5 for c ≥ 5.
Lemma 4. For d ≥ 3, βρδ(G) = 0 for any d-regular network G with d ≥ 3.
Proof. We argue that ρd = 0, proving the lemma since δd = 1 for a d-regular
network. For a contradiction, suppose ρd > 0. Then Rd = x for some x > 0,
where Rd is the set of nodes of G in the dth ring of G's density decomposition.
Note that the highest rank node in G has rank at most d, since there are no
nodes with degree > d. Let H be the subnetwork of H containing all the nodes
of Rd and all the edges of G both of whose endpoints are in Rd. H has at least
one node of indegree d and all other nodes have indegree at least d− 1; therefore
H must have at least d + (x − 1)(d − 1) edges. On the other hand, the total
degree of every node in H is at most d, so H has at most dx/2 edges. We must
have d + (x − 1)(d − 1) ≤ dx/2, which is a contradiction for d ≥ 3 and x > 0.
4 Conclusion
We have introduced the density decomposition and summarized the decomposi-
tion with the density distribution. We found that the hierarchy of vertices within
this decomposition are partitioned according to the density of the induced sub-
graphs. We found that the density and degree distributions are remarkably simi-
lar in real graphs and dissimilar in synthetic networks. In the appendix we discuss
using the density distribution to build more realistic random graph models.
References
1. Jose Alvarez-Hamelin, Luca DallAsta, Alain Barrat, and Alessandro Vespignani. k-
core decomposition of Internet graphs: hierarchies, self-similarity and measurement
biases. Networks and Heterogeneous Media, 3(2):371, 2008.
2. Yuichi Asahiro, Jesper Jansson, Eiji Miyano, and Hirotaka Ono. Upper and lower
degree bounded graph orientation with minimum penalty. In Proceedings in Com-
puting: The Australasian Theory Symposium, pages 139–146, 2012.
3. Yuichi Asahiro, Eiji Miyano, Hirotaka Ono, and Kouhei Zenmyo. Graph orien-
tation algorithms to minimize the maximum outdegree. International Journal of
Foundations of Computer Science, 18(2):197–215, 2007.
4. Bahman Bahmani, Ravi Kumar, and Sergei Vassilvitskii. Densest subgraph in
streaming and mapreduce. Proc. VLDB Endow., 5(5):454–465, January 2012.
5. Albert-L´aszl´o Barab´asi. Network Science. Cambridge University Press, Cambridge,
2016.
6. Albert-L´aszl´o Barab´asi and R´eka Albert. Emergence of scaling in random networks.
Science, 286(5439):509–512, 1999.
12
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
7. Vladimir Batagelj and Matjaz Zaversnik. An O(m) algorithm for cores decom-
position of networks. Advances of Data Analysis and Classification, 5:129–145,
2011.
8. Anil Kumar Bhattacharyya. On a measure of divergence between two statistical
populations defined by their probability distributions. Bull. Calcutta Math. Soc.,
35:99–109, 1943.
9. Ginestra Bianconi and Albert-Laszlo Barabsi. Competition and multiscaling in
evolving networks. EPL (Europhysics Letters), 54(4):436, 2001.
10. Therese Biedl, Timothy Chan, Yashar Ganjali, Mohammad Taghi Hajiaghayi, and
David R. Wood. Balanced vertex-orderings of graphs. Discrete Appl. Math.,
148:27–48, April 2005.
11. Glencora Borradaile, Jennifer Iglesias, Theresa Migler, Antonio Ochoa, Gordon
In Journal of Graph
Wilfong, and Lisa Zhang. Egalitarian graph orientations.
Algorithms and Applications, volume 21, pages 687–708, 2017.
12. Moses Charikar. Greedy approximation algorithms for finding dense components
in a graph. In Proceedings of the Third International Workshop on Approxima-
tion Algorithms for Combinatorial Optimization, pages 84–95, London, UK, 2000.
Springer-Verlag.
13. Paul Erdos and Alfr´ed R´enyi. On random graphs, I. Publicationes Mathematicae
(Debrecen), 6:290–297, 1959.
14. Andr´as Frank and A. Gy´arf´as. How to orient the edges of a graph? Colloquia
Mathematica Societatis J´anos Bolyai, 1:353–364, 1976.
15. Hubert de Fraysseix and Patrice Ossona de Mendez. Regular orientations, arboric-
ity, and augmentation. In Proceedings of the DIMACS International Workshop on
Graph Drawing, pages 111–118, London, UK, 1995. Springer-Verlag.
16. Giorgio Gallo, Michael Grigoriadis, and Robert Tarjan. A fast parametric maxi-
mum flow algorithm and applications. SIAM Journal on Computing, 18(1):30–55,
February 1989.
17. David Gibson, Ravi Kumar, and Andrew Tomkins. Discovering large dense sub-
graphs in massive graphs. In Proceedings of the 31st international conference on
very large data bases, pages 721–732. VLDB Endowment, 2005.
18. Andrew Goldberg. Finding a maximum density subgraph. Technical report, Uni-
versity of California at Berkeley, Berkeley, CA, USA, 1984.
19. Nicholas J. A. Harvey, Richard E. Ladner, L´aszl´o Lov´asz, and Tami Tamir. Semi-
matchings for bipartite graphs and load balancing. Journal of Algorithms, 59:53–
78, 2006.
20. Mark Jerrum and Gregory B. Sorkin. The metropolis algorithm for graph bisection.
Discrete Applied Mathematics, 82(13):155 – 175, 1998.
21. Jeong Han Kim and Van H. Vu. Generating random regular graphs. In Proceedings
of the thirty-fifth annual ACM symposium on Theory of computing, STOC '03,
pages 213–222, New York, NY, USA, 2003. ACM.
22. Bryan Klimt and Yiming Yang. Introducing the Enron Corpus. In First Conference
on Email and Anti-Spam, 2004.
23. William F. Klostermeyer. Pushing vertices and orienting edges. Ars Combinatorial,
24.
51:65–75, 1999.
(cid:32)Lukasz Kowalik. Approximation scheme for lowest outdegree orientation and graph
density measures.
In Proceedings of the 17th International Conference on Al-
gorithms and Computation, ISAAC'06, pages 557–566, Berlin, Heidelberg, 2006.
Springer-Verlag.
Density decompositions of networks
13
25. Silvio Lattanzi and D. Sivakumar. Affiliation networks.
In Proceedings of the
Forty-first Annual ACM Symposium on Theory of Computing, STOC '09, pages
427–434, New York, NY, USA, 2009. ACM.
26. Jure Leskovec, Daniel Huttenlocher, and Jon Kleinberg. Signed networks in social
media.
In Proceedings of the SIGCHI Conference on Human Factors in Com-
puting Systems, CHI '10, pages 1361–1370, New York, NY, USA, 2010. ACM.
http://snap.stanford.edu/data/.
27. Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. Graphs over time: Den-
sification laws, shrinking diameters and possible explanations. In Proceedings of
the eleventh ACM SIGKDD International Conference on Knowledge Discovery in
Data Mining, pages 177–187. ACM Press, 2005.
28. Jure Leskovec, Kevin Lang, Anirban Dasgupta, and Michael Mahoney. Community
structure in large networks: Natural cluster sizes and the absence of large well-
defined clusters. CoRR, abs/0810.1355, 2008. http://snap.stanford.edu/data/.
29. Tomasz (cid:32)Luczak. Size and connectivity of the k-core of a random graph. Discrete
Mathematics, 91(1):61–68, August 1991.
30. David W. Matula and Leland L. Beck. Smallest-last ordering and clustering and
graph coloring algorithms. J. ACM, 30(3):417–427, July 1983.
31. Julian Mcauley and Jure Leskovec. Discovering social circles in ego networks. ACM
Transactions on Knowledge Discovery from Data, 8(1):4:1–4:28, February 2014.
32. Brendan D. McKay and Nicholas C. Wormald. Uniform generation of random
regular graphs of moderate degree. J. Algorithms, 11(1):52–67, February 1990.
33. Theresa Migler. The Density Signature. PhD thesis, Oregon State University, 2014.
34. Mark Newman.
structure
http://www-
algorithm for detecting
community
Fast
in networks.
Phys. Rev. E,
personal.umich.edu/mejn/netdata/.
69:066133,
Jun 2004.
35. Mark Newman. Networks: An Introduction. Oxford University Press, Inc., New
York, NY, USA, 2010.
36. Jean-Claude Picard and Maurice Queyranne. A network flow solution to some
nonlinear 0-1 programming problems, with applications to graph theory. Networks,
12:141–159, 1982.
37. Boris Pittel, Joel Spencer, and Nicholas Wormald. Sudden emergence of a giant
k-core in a random graph. J. Comb. Theory Ser. B, 67(1):111–151, May 1996.
38. Matei Ripeanu, Ian Foster, and Adriana Iamnitchi. Mapping the Gnutella network:
Properties of large-scale peer-to-peer systems and implications for system design.
IEEE Internet Computing Journal, 6:2002, 2002. http://snap.stanford.edu/data/.
39. Barna Saha, Allison Hoch, Samir Khuller, Louiqa Raschid, and Xiao-Ning Zhang.
Dense subgraphs with restrictions and applications to gene annotation graphs. In
Proceedings of the 14th Annual international conference on Research in Computa-
tional Molecular Biology, RECOMB'10, pages 456–472, Berlin, Heidelberg, 2010.
Springer-Verlag.
40. Stephen Seidman. Network structure and minimum degree. Social Networks,
5(3):269–287, 1983.
41. Maryam Tahajod, Azadeh Iranmehr, and Nasim Khozooyi. Trust manage-
ment for semantic web.
In Computer and Electrical Engineering, 2009.
ICCEE '09. Second International Conference, volume 2, pages 3–6, 2009.
http://snap.stanford.edu/data/.
42. Venkat Venkateswaran. Minimizing maximum indegree. Discrete Appl. Math.,
143:374–378, September 2004.
14
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
43. Fabien Viger and Matthieu Latapy. Efficient and simple generation of random
simple connected graphs with prescribed degree sequence.
In The Eleventh In-
ternational Computing and Combinatorics Conference, pages 440–449. Springer,
2005.
44. Duncan Watts and Steven Strogatz. Collective dynamics of 'small-world' networks.
Nature, 393(6684):409–10, 1998.
45. W. Wimmer.
Ein Verfahren
in
mungen
verfahren-zur-verhinderung-von-verklemmungen-in-vermittlernetzen/,
October 1978.
Vermittlernetzen.
zur Verhinderung
von Verklem-
http://www.worldcat.org/title/
46. Vaughan Wittorff. Implementation of constraints to ensure deadlock avoidance in
networks, 2009. US Patent # 7,532,584 B2.
47. Pu Gao Xavier P´erez-Gim´enez and Cristiane Sato. Arboricity and spanning-tree
packing in random graphs with an application to load balancing. In Proceedings of
the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA
'14, pages 317–326. SIAM, 2014.
48. Jaewon Yang and Jure Leskovec. Defining and evaluating network communities
based on ground-truth. In Proceedings of the ACM SIGKDD Workshop on Min-
ing Data Semantics, MDS '12, pages 3:1–3:8, New York, NY, USA, 2012. ACM.
http://snap.stanford.edu/data/.
49. Yu Zhang. Internet AS-level Topology Archive. http://irl.cs.ucla.edu/topology/.
Density decompositions of networks
15
A Proofs
In this section we include proofs for theorems in Sections 2.1 and 2.2.
Lemma 5. The density of the subnetwork induced by the nodes in Rk is in the
range (k − 1, k].
Proof. All nodes in Rk have indegree k or k − 1 in G. Since any edge incident to
a node in Rk but not in G[Rk] is directed out of Rk in G, the indegree of every
node in G[Rk] is k or k − 1. Let nk be the number of nodes of indegree k in
G[Rk] and nk−1 be the number of nodes of degree k − 1 in G[Rk−1]. Therefore,
the number of edges in G[Rk] is knk + (k − 1)nk−1 and:
knk + (k − 1)nk−1
≤ k
density(G[Rk]) =
nk + nk−1
Since there is at least one node of indegree k in G[Rk], nk > 0. Therefore:
knk + (k − 1)nk−1
nk + nk−1
=
(k − 1)(nk + nk−1) + nk
nk + nk−1
> k − 1
Lemma 6. The density of a densest subnetwork is in the range (k − 1, k].
Proof. Let H be a densest subnetwork and let each edge of H inherit the orien-
tation of the same edge in an egalitarian orientation of G. Every node of H has
indegree at most k (when restricted to H). Therefore
density(H) ≤ nH k
nH
≤ k
where nH is the number of nodes in H. Furthermore, by Lemma 5, the density
of G[Rk] is greater than k − 1 and so the densest subnetwork must be at least
this dense.
Theorem 4. The density decomposition is unique.
Proof. The maximum indegree of two egalitarian orientations for a given net-
work is the same [11,3,42]. Suppose, for a contradiction, that there are two
egalitarian orientations (red and blue) for G, resulting in density decomposi-
tions R0, R1, . . . Rk and B0, B1, . . . Bk, respectively. Let i be the largest index
such that Ri (cid:54)= Bi.
We compare the orientation of the edges with one endpoint in S = Ri \ Bi
between the two orientations (illustrated in Figure 5). Since the orientations are
egalitarian:
1. All the edges between Bi and S are directed into S in the blue orientation.
2. All the edges between S and {∪k
j=i+1Rj}\ S are directed into S with respect
to both red and blue orientations.
j=0Rj} \ S are directed out of S with respect to
3. All edges between S and {∪i−1
the red orientation.
16
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
Fig. 5: Edges incident to S (grey region) in the proof of Theorem 4 in red and
blue orientations. S is the region in gray. Unoriented edges indicate that the
orientation could be in either direction.
Based on these orientations, we have:
Observation 5 The number of edges directed into S in the blue orientation is
at least the number of edges directed into S in the red orientation.
We will show that Ri ⊆ Bi; symmetrically Bi ⊆ Ri, completing the theorem.
With respect to the blue orientation, all nodes in S have indegree strictly less
than i. Further, by Observation 5, the total indegree shared amongst the nodes
in S with respect to the red orientation is at most that of the blue orientation.
Since all nodes in S have indegree i or i − 1 with respect to the red orientation,
and, by Observation 5, the total indegree shared amongst the nodes in S with
respect to the red orientation is at most that of the blue orientation, all nodes
in S have indegree i − 1 with respect to the red orientation.
In order for every node in S to have indegree i − 1 in the red orientation, all
nodes that are directed into S in the blue orientation, must also be directed into
S in the red orientation; in particular this is true about the edges between S and
Ri \ S. Therefore, none of the nodes in S (which have indegree i − 1) reaches a
node of Ri \ S of indegree i with respect to the red orientation. This contradicts
the definition of Ri; therefore S must be empty.
The following theorem relies on the fact that the density decomposition is
unique and proves Property D3.
Theorem 6. The densest subnetwork of a network G is induced by a subset of
the nodes in the densest ring of G.
...Density decompositions of networks
17
Proof. First note that the densest subnetwork is an induced subnetwork, for
otherwise, the subnetwork would be avoiding including edges that would strictly
increase the density. Let S be a set of nodes that induces a densest subnetwork
of G. Consider a density decomposition of G and let k be the maximum rank of
a node in G. Let Sk = S ∩ Rk and let ¯Sk = S \ Sk.
Let A be the set of edges in G[Sk], let C be the set of edges in G[ ¯Sk], and
let B be the edges of G[S] that are neither in G[Sk] or G[ ¯Sk]. We get
B + C ≤ (k − 1) ¯Sk
(1)
because all the edges in B and C have endpoints in ¯Sk and all the nodes in ¯Sk
have indegree at most k − 1 in the egalitarian orientation of G.
density(G[S]) =
A + B + C
Sk + ¯Sk
(2)
density(G[Sk]) =
=
A
Sk
density(G[S])(Sk + ¯Sk) − (B + C)
using Equation (2)
Sk
density(G[S]) ¯Sk − (B + C)
density(G[S]) ¯Sk − (k − 1) ¯Sk
Sk
Sk
(k − 1) ¯Sk − (k − 1) ¯Sk
Sk
by Lemma 6
by Inequality (1)
= density(G[S]) +
≥ density(G[S]) +
> density(G[S]) +
= density(G[S])
Therefore, removing the nodes of G[S] that are not in Rk produces a network of
strictly greater density.
Theorem 7. For a clique on n nodes, there is an orientation where each node
has indegree either (cid:98)n/2(cid:99) or (cid:98)n/2(cid:99) − 1.
Proof. Give the nodes of the clique an ordering, v1, v2, . . . vn. Orient the edges be-
tween v1 and v2, . . . , v(cid:98)n/2(cid:99)+1 toward v1 and edges between v1 and v(cid:98)n/2(cid:99)+2, . . . vn
toward v(cid:98)n/2(cid:99)+2, . . . vn. Clearly v1 has indegree (cid:98)n/2(cid:99). Similarly, for v2: Orient
the edges between v2 and v3, . . . , v(cid:98)n/2(cid:99)+2 toward v2 and edges between v2 and
v(cid:98)n/2(cid:99)+3, . . . vn toward v(cid:98)n/2(cid:99)+3, . . . vn. Clearly v2 has indegree (cid:98)n/2(cid:99). Continue
in this fashion until vn. It is immediate that v1, v2, . . . v(cid:98)n/2(cid:99) have indegree (cid:98)n/2(cid:99).
Now for the remaining nodes: Consider vi, (cid:98)n/2(cid:99) < i ≤ n. vi has n − i incom-
ing edges from nodes vi+1, . . . vn and also i − (cid:98)n/2(cid:99) − 1 incoming edges from
v1, . . . , vi−(cid:98)n/2(cid:99)−1. Therefore vi has indegree (cid:98)n/2(cid:99) − 1. Therefore all nodes in
the clique have indegree (cid:98)n/2(cid:99) or (cid:98)n/2(cid:99) − 1. Clearly such an orientation is egal-
itarian.
18
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
B k-cores
See Figure 7 for an example of a graph in which the densest subgraph is not
contained in the top core. Further, while the core decomposition of a network
can be found in time linear in the number of edges [30,7,12] as opposed to the
quadratic time required for the density decomposition [11], core decompositions
do not lend themselves to a framework for building synthetic networks, since it
is not clear how to generate a p-core at random, whereas density decompositions
do.
(a)
(b)
(c)
Fig. 6: The top ring (Figure 6b) contains vertices I, K, L, M, C, D, E, H, F, J, N
and O but C, D, N, and O are not in the top core (Figure 6c). The density of
the subgraph induced by the top ring is 21/12 = 1.75 while the density of the
subgraph induced by the top core is 13/8 = 1.625.
BKLJDFIECANPOMHBKLJDFIECANPOMHPBKLJDFIECANOMHDensity decompositions of networks
19
Fig. 7: Core 3, the top core, has density 1.5. The densest subgraph is the subgraph
induced by all vertices in core 2 and has density 1.56.
Recall that identifying the nodes in ∪j>iRj and deleting the nodes in ∪j<iRj
leaves a network G whose density is in the range (i − 1, i] (for Ri sufficiently
large). We find that the bound on density for the corresponding cores is much
looser.
Lemma 7. Given a core decomposition H0, H1, . . . , Hk of a network, the sub-
network formed by identifying the nodes in ∪j>iHj and deleting the nodes in
∪j<iHj has density in the range [ i
2 , i) for Hi sufficiently large.
Proof. Let n be the number of nodes in the described subnetwork: n = Hi + 1.
Let d be the degree of the node resulting from the identification of ∪j>iHj.
Since every node in Hi has degree at least i in the subnetwork, the density of
the subnetwork is at least
, from which the lower bound of the lemma
follows since d ≥ 0. This lower bound is also tight when Hi induces an i-regular
network.
2 (i·n+d)
n
1
Further, the i-core is witnessed by iteratively deleting nodes of degree at
most i while such nodes exist. The subnetwork will have the greatest density
(the most edges) if each deletion removes a node of degree exactly i. Then the
subnetwork has density at most i·(n−1)
.
n
20
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
Fig. 8
C Random networks with given density distributions
Based on the observation that real networks have similar density and degree
decompositions and that many synthetic networks have dissimilar density and
degree decompositions, we develop an abstract model, that, given a particular
density distribution, produces a network having that density distribution (Sec-
tion C). Applied naıvely, given a density distribution of a real network, this model
generates networks with realistic average path lengths (average number of hops
between pairs of nodes) and degree distributions; that is similar to the given
real network (Section C.2). In addition to having short average path lengths,
large-scale, real networks also tend to have high clustering coefficients [35]. The
clustering coefficient of a node v is the ratio of the number of pairs of neighbors
of v that are connected to the number of pairs of neighbors of v; the clustering
coefficient of a network is the average clustering coefficient of its nodes. Our
model, naıvely applied, unfortunately, but not surprisingly, results in networks
with very low clustering coefficients. However, we show that applying the ab-
stract model in a more sophisticated manner, using ideas from the small world
model of Watts and Strogatz [44], results in much higher clustering coefficients
(Section C.3) suggesting that real networks may indeed be hierarchies of small
worlds.
Our hierarchies of small worlds specification is just one way to tune our ab-
stract model; our model is quite flexible allowing for the easy incorporation of
other network generation techniques, which we discuss at the end of this paper.
A key observation that distinguishes our model from other network models is our
qualitatively different treatment of nodes. That is, our model begins by assigning
nodes to levels of the density decomposition. This sets nodes qualitatively apart
from each other; for example, a node assigned to a dense level of the decompo-
510152025303540455000.050.10.150.20.250.30.350.40.450.5np/2Bhattacharyya coeffi(cid:14)cientrandom graphs on 10,000 verticesDensity decompositions of networks
21
sition is treated very differently from a node assigned to a sparse level of the
decomposition.
Unlike our model, other network models, such as the small worlds model and
the classic random graph model (Gn,p), treat each node in the same way [44]. In
the preferential attachment model, in which nodes are attached one at a time to
some fixed number of existing nodes [6], one may argue that nodes are treated
differently since they arrive to the network at different times. However, when
each node arrives, it is treated the same way as nodes before it. Similarly more
recent network models, such as the affiliation network [25], community-guided
attachment and forest-fire models [27], nodes are not distinguished from one
another in a fixed way. We posit that in order to generate realistic networks,
in particular networks exhibiting the rich density hierarchy we have observed
in all the networks we have tested, one must assign nodes to classes and treat
those classes differently. There are existing models that treat nodes qualitatively
differently as we do. In the fitness, or Bianconi-Barab´asi model, each node has
an intrinsic value, or "fitness" [9]. As a network produced by this model evolves,
nodes with higher fitness are more likely to gain additional edges. In the planted
partition model the nodes of the graph are divided into (cid:96) groups of size (cid:96)/V ,
two nodes in the same group are connected with probability p and two nodes
from different groups are connected with probability r < p [20]. Thus nodes in
different groups are treated qualitatively differently.
Data sets We note that our conclusions on the similarity of density and degree
distributions of a given network are stronger for self-determining networks or
those networks that represent relationships, each of which is determined by at
least one of the parties in this relationship. Perhaps the clearest example of a
self-determining network is a social network in which nodes represent people and
an edge represents a friendship between two people. On the other hand a network
representing the transformers and power lines that connect them in a power grid
is clearly not self-determining as the transformers themselves do not determine
which other transformers they are connected to, but a power authority does. For
comparison, we include two non-self-determining networks.
Table 1 provides a list of the real networks that we study.
C.1 Models
Given a density distribution ρ, we can generate a network with n nodes having
this density distribution using the following abstract model:
Input: density distribution ρ and target size n
Output: a network G with n nodes and density distribution ρ
1: Initialize G to be a network with empty node set V
2: for i = ρ, . . . , 0 do
3:
4:
5:
Ri ← set of (cid:98)ρin(cid:99) nodes
add Ri to V
for each node v ∈ Ri do
22
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
Self-determining networks
Nodes
autonomous systems
computer scientists
email addresses
Name
AS
DBLP
Enron
Epinions epinions.com members
Facebook Facebook user
PHYS
Slashdot slashdot.org members
Wikivote wikipedia.org users
condensed matter physicists 40,421
82,168
7,115
routing agreements
# Nodes Edges
44,729
317,080 at least one co-authored paper
36,692
75,879
4,039
at least one email exchanged
self-indicated trust
Facebook friends
at least one co-authored paper
indication of friend or foe
votes for administrator role
Non-self-determining networks
# Edges Source
170,735
1,049,866
183,831
405,740
88234
175,692
504,230
103,689
[49]
[48]
[22]
[41]
[31]
[34]
[28]
[26]
Nodes
# Nodes Edges
334,863 pairs of frequently co-purchased items 925,872
22,687
Name
Amazon products
Gnutella network hosts
Table 1: Network data sets. For naturally directed networks (Enron, Epinions
and Wikivote), we ignore the directions and study the underlying undirected
network. We likewise ignore edge annotations (e.g. friend or foe in the Slashdot
network). We use three snapshots of the AS network (from 1999, 2005 and 2011)
and three snapshots of the PHYS network (for papers posted to arxiv.org prior
to 1999, 2003 and 2005). Note that the structure of the Gnutella network is given
by external system design specifications.
connections for file sharing
54,705
# Edges Source
[48]
[38]
6:
connect i nodes of V to v
Using this generic model, we propose two specific models, the random density
distribution model (RDD) and the hierarchical small worlds model (HSW), by
specifying how the neighbors are selected in Step 6. First we show that this ab-
stract model does indeed generate a network with the given density distribution:
Lemma 8. The network resulting from the abstract model has density distribu-
tion ρ.
Proof. We argue that the orientation given by, in Step 6, directing the added
edges into v is egalitarian. For a contradiction, suppose there is a reversible path.
There must be an edge on this path from a node x to a node y such that the
in-degree of y is strictly greater than the degree of x. By construction, then,
x was added after y and so an edge between x and y must oriented into x,
contradicting the direction required by the reversible path.
Finally, since the nodes in set Ri have indegree i according to this orientation,
the orientation is a witness to a density decomposition of the given distribution.
Notice that in this construction, nodes in Ri will have indegree i while a net-
work with the same density decomposition may have nodes in Ri with indegree
i−1. We could additionally specify the number of nodes in Ri that have indegree
i and indegree i − 1; this would additionally require ensuring that there is an
Density decompositions of networks
23
egalitarian orientation in which all the nodes destined to have indegree i − 1 in
Ri reach nodes of indegree i in Ri. We believe this is needlessly over-complicated
and, indeed, over-specification that will have little affect on the generation large
realistic networks.
Further notice that this abstract model may generate a network that is not
simple. Without further constraint, in Step 6, v may connect to itself (introduc-
ing a self-loop) or to a node that v is already connected to (introducing parallel
edges). We adopt a simple technique used for generating d-regular networks [32]:
we constrain the choice in Step 6 to nodes of V that are not v itself nor neigh-
bors of v. McKay and Wormald prove this constraint still allows for uniformity
of sampling of d-regular networks when d is sufficiently small (d = O(n1/3)) [21];
likewise, since i is small compared to Ri for large networks, adopting this tech-
nique should not affect our sampling. In our two specific models, described below,
we ensure the final network will be simple using this technique.
C.2 Random density distribution model
For the RDD model, we choose i nodes from V uniformly at random in Step 6.
We use this to model four networks in our data set (AS, DBLP, EMAIL, and
TRUST). For each given network, we generate another random network hav-
ing the given network's number of nodes and density distribution. Remarkably,
although we are only specifying the distribution of the nodes over a density de-
composition, the resulting degree distributions of the RDD networks are very
similar to the original networks they are modeling. We use the Bhattacharyya
coefficient to quantify the similarity between the normalized degree distribution
of an RDD network and the normalized degree distribution of the original net-
work; we denote this by βδδ (to distinguish from our use of the Bhattacharyya
coefficient to compare degree distributions to density distributions. For all four
models, βδδ > 0.93 (Figure 9). Further, the average path lengths of the RDD net-
works are realistic, within 2 of the average path lengths of the original networks
(Figure 10).
However, the clustering coefficients of the RDD networks are unrealistically
low (Figures 9 and 10). Upon further inspection, we find that, for example, the
PHYS networks have many more edges between nodes of a common ring of
its density decomposition than between rings as compared to the corresponding
RDD model. For the RDD model, we can compute the expected fraction of edges
that will have one endpoint in Ri and one endpoint in Rj. Since there are RjRi
j>i Rj))
such edges to choose from (for j > i) and at most Ri( 1
edges between Ri and Rj (for j > i), we would expect this fraction to be:
2 (Ri− 1) +(cid:80)
2 (Ri − 1) +(cid:80)
Rj
1
2 (Ri − 1) +(cid:80)
2 (Ri − 1)
1
1
j>i Rj for j > i and
j>i Rj for i = j
(3)
In Figure 11 we plot the difference between the actual fraction of edges connect-
ing Ri to Rj in the PHYS networks with this expected fraction for all values of
j − i. We see that when j − i = 0, or for edges with both endpoints in the same
24
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
ring, there is a substantially larger number of edges in the original networks
than is being captured by our model. This provides one explanation for the low
clustering coefficients produced by the RDD model.
Fig. 9: Clustering coefficient versus similarity of degree distribution (between
models and original networks, βδδ) for RDD and HSW models. Measurements
for the SW model networks are not shown as βδδ < 0.4 for all networks generated.
Dotted lines represent the clustering coefficients for the original networks.
C.3 Hierarchical small worlds model
We provide a more sophisticated model which addresses the unrealistically low
clustering coefficients of the RDD model by generating a small world (SW)
network among the nodes of each ring of the density decomposition. Recall that
a SW network on n nodes, average degree d and randomization p network is
created as follows: order the nodes cyclically and connect each node to the d
nodes prior to it; with probability p reconnect one endpoint of each edge to
another node chosen uniformly at random. The SW model provides a trade-
off between clustering coefficient and average path length: as p increases, the
clustering coefficient and the average path length decreases [44].
In the hierarchical small worlds (HSW) model, for nodes in Ri, we create a
SW network on Ri nodes and average degree i in the same way, except for how
we reconnect each edge with probability p. For an edge uv where u is a node
0.80.820.840.860.880.90.920.940.960.98100.10.20.30.40.50.60.70.8βδ δclustering coefficient ASDBLPEMAILTRUSTRDD modelHSW modelDensity decompositions of networks
25
Fig. 10: Clustering coefficient versus average path length for RDD, HSW, SW
and DS models. Colors indicate the network being modelled. Squares denote the
data for the original networks.
within d nodes prior to v in the cyclic order, we select a node x uniformly at
random from ∪j>iRj and replace uv with xv. For the densest ring, we select a
node uniformly at random from the densest ring.
This process is exactly equivalent to the following: order Ri cyclically; for
each v ∈ Ri, with probability p, connect each of the i nodes before v in this
order to v; if c ≤ i neighbors for v are selected in this way, select i − c nodes
uniformly at random from ∪j>iRj (or Ri if this is the densest ring) and connect
these to v. Clearly, this is a specification of neighbor selection for Step 6 of the
abstract model.
For the AS, DBLP, EMAIL, and TRUST networks in our data set, we gener-
ate a random network according to the HSW model that is of the same size and
density distribution of the original network. We do so for p = 0.1, 0.2, . . . , 0.9. As
with the SW model, the HSW model provides a similar trade-off between clus-
tering coefficient and average path length (Figure 10), although the relationship
is less strong. In addition, we observe a similar trade-off between p and degree
distribution: as p increases, the degree distribution approaches that of the orig-
inal network (Figure 9). This is in sharp contrast to the SW model which have
degree distributions far from the original (normal vs. close to power law).
246810121400.10.20.30.40.50.60.70.8average path lengthclustering coefficient ASDBLPEMAILTRUSTRDD modelHSW modelSW modelDS model26
Glencora Borradaile, Theresa Migler, and Gordon Wilfong
Fig. 11: Range of difference between the actual fraction of edges connecting Ri
to Rj and expected fraction (Equation (3)) over all j ≥ i as a function of j−i for
three PHYS networks. Error bars show max and min values of these differences
and dots indicate the average.
C.4 Comparing to the degree sequence model
We also compare our models (RDD and HSW) to a degree sequence (DS) model.
For a given degree distribution or sequence (assignment of degree to each node),
a DS model will generate a graph, randomly, having that degree sequence. We
use the model of Viger and Latapy which generates a connected, simple graph
by iteratively selecting neighbors for nodes (from highest remaining degree to be
satisfied to lowest) and randomly shuffling to prevent the process from getting
stuck (if no new neighbor exists that has not yet fulfilled its prescribed de-
gree) [43]. As with RDD and HSW we generate a network using this DS model
corresponding to the degree sequence of the AS, EMAIL, and TRUST networks.
The clustering coefficients of the resulting networks are much lower than in the
real networks (Figure 10); in the case of the AS network, this mismatch is less
extreme, most likely because this network has an extremely long tail with a
node with degree 4,171; many nodes would connect to these high degree nodes,
providing an opportunity for clustering. The average path lengths are close to
the original networks. Notably, the density distributions of the networks gener-
0246810121416−0.2−0.100.10.20.30.40.50.60.70.8difference in ring numberbias from expected fraction of edges 200320051999Density decompositions of networks
27
ated by the DS model are very similar to their degree distribution, all having
βρδ > 0.9.
These observations for the DS model add evidence to our proposal that in or-
der to generate realistic networks, one must distinguish between types of nodes;
doing so results in networks that resemble real networks. However, we must note
that the DS model suffers from two drawbacks. First, the algorithms for gener-
ating such networks are much less efficient than our models (RDD and HSW,
which run in linear time); in order to guarantee simplicity and connectivity, the
reshuffling required incurs a large computational overhead, particularly when the
degree sequence includes very high degree nodes (such as in the AS network).
Second, the amount of information required to specify network generation via
the DS model is much greater than our abstract model. In the former, the de-
gree of every node must be specified, or at least the number of nodes having
each degree. For example, the SLASH network has 457 unique degrees (and a
maximum degree of 2553) while only having 61 non-empty rings in the density
decomposition.
|
1603.04466 | 1 | 1603 | 2016-03-14T20:48:43 | Sequential Voting Promotes Collective Discovery in Social Recommendation Systems | [
"cs.SI",
"cs.AI",
"cs.HC",
"cs.IR",
"physics.soc-ph"
] | One goal of online social recommendation systems is to harness the wisdom of crowds in order to identify high quality content. Yet the sequential voting mechanisms that are commonly used by these systems are at odds with existing theoretical and empirical literature on optimal aggregation. This literature suggests that sequential voting will promote herding---the tendency for individuals to copy the decisions of others around them---and hence lead to suboptimal content recommendation. Is there a problem with our practice, or a problem with our theory? Previous attempts at answering this question have been limited by a lack of objective measurements of content quality. Quality is typically defined endogenously as the popularity of content in absence of social influence. The flaw of this metric is its presupposition that the preferences of the crowd are aligned with underlying quality. Domains in which content quality can be defined exogenously and measured objectively are thus needed in order to better assess the design choices of social recommendation systems. In this work, we look to the domain of education, where content quality can be measured via how well students are able to learn from the material presented to them. Through a behavioral experiment involving a simulated massive open online course (MOOC) run on Amazon Mechanical Turk, we show that sequential voting systems can surface better content than systems that elicit independent votes. | cs.SI | cs | Sequential Voting Promotes Collective Discovery
in Social Recommendation Systems
L. Elisa Celis†, Peter M. Krafft‡, Nathan Kobe†
† ´Ecole Polytechnique F´ed´ereal de Lausanne, Switzerland
‡Massachusetts Institute of Technology, USA
[email protected], [email protected], [email protected]
6
1
0
2
r
a
M
4
1
]
I
S
.
s
c
[
1
v
6
6
4
4
0
.
3
0
6
1
:
v
i
X
r
a
Abstract
One goal of online social recommendation systems is to har-
ness the wisdom of crowds in order to identify high qual-
ity content. Yet the sequential voting mechanisms that are
commonly used by these systems are at odds with existing
theoretical and empirical literature on optimal aggregation.
This literature suggests that sequential voting will promote
herding-the tendency for individuals to copy the decisions
of others around them-and hence lead to suboptimal con-
tent recommendation. Is there a problem with our practice,
or a problem with our theory? Previous attempts at answer-
ing this question have been limited by a lack of objective
measurements of content quality. Quality is typically defined
endogenously as the popularity of content in absence of so-
cial influence. The flaw of this metric is its presupposition
that the preferences of the crowd are aligned with underlying
quality. Domains in which content quality can be defined ex-
ogenously and measured objectively are thus needed in order
to better assess the design choices of social recommendation
systems. In this work, we look to the domain of education,
where content quality can be measured via how well students
are able to learn from the material presented to them. Through
a behavioral experiment involving a simulated massive open
online course (MOOC) run on Amazon Mechanical Turk, we
show that sequential voting systems can surface better con-
tent than systems that elicit independent votes.
Introduction
Many social media sites, news aggregators, Q&A websites,
massive open online courses (MOOCs), and other online
platforms such as Amazon, Yelp and YouTube rely on so-
cial recommendation in order to aggregate the opinions of
their many users. Content is then sorted or ranked using this
information. Recommendations are solicited by, e.g., allow-
ing users to like, rate, or, when presented with items in a
ranked order, upvote content, and aggregate opinions are of-
ten displayed publicly. Such sequential voting systems, in
which individual or aggregated previous votes are publicly
displayed and continuously updated, are now widespread on
the internet.
Yet literature on collective intelligence and the wisdom
of crowds suggests that these sequential voting systems
Copyright © 2016, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
may be suboptimal at surfacing high quality content. Se-
quential voting produces an avenue through which previ-
ous decisions can influence future decisions. Social influ-
ence through this avenue has been shown to exist across
a diversity of online systems, including social recommen-
dation systems (Salganik, Dodds, and Watts 2006; Much-
nik, Aral, and Taylor 2013; van de Rijt et al. 2014). How-
ever, the classic Condorcet jury theorem and related results
suggest that independent votes will yield better aggregation
than correlated ones (Ladha 1995). Further theoretical work
on "herding" and "information cascades" also suggests that
sequential votes can lead to group convergence on subopti-
mal outcomes (Bikhchandani, Hirshleifer, and Welch 1992;
Chamley 2004). Empirical work on aggregation for point es-
timation tasks has also lent support to these theoretical re-
sults (Lorenz et al. 2011). In summary, online ratings can ul-
timately be very different when votes are sequential instead
of independent, and the prevailing hypothesis is that these
differences may be detrimental in the sequential setting.
However, recent work has begun to question the universal-
ity of this prediction. Researchers have investigated whether
social influence actually leads to miscalibrated rankings
(Stoddard 2015) as well as whether social influence can
sometimes help improve rankings (Lerman and Hogg 2014;
Abeliuk et al. 2015). The results thus far support the idea
that sequential votes may not do much harm to collective
outcomes in social recommendation systems and leave open
the possibility that mechanisms that allow social influence
may in fact accelerate the discovery of good content and al-
low for effective rankings.
In order to assess the outcomes of sequential voting sys-
tems, this line of work makes one simple but potentially
problematic assumption. They assume that content quality is
equivalent to popularity as measured by independent private
votes. However, there is no reason a priori to privilege pop-
ularity in the independent context over the sequential one,
and doing so precludes the possibility that social interaction
might ultimately surface qualitatively better content. Do-
mains in which content quality can be defined exogenously
and measured objectively are thus needed in order to better
assess the design choices of social recommendation systems.
Our Contribution
To address this problem, we select a domain in which we
have an objective measure of underlying quality: the edu-
cation domain. Here, quality is measured by how well stu-
dents are able to learn from the material presented to them.
We measure learning in two ways: by testing students on
material related to the content they consume, and by ask-
ing students to self-report their skill level before and after
consuming content.1 This gave us two exogenous metrics of
quality, which allow us to objectively compare different con-
tent ranking methods.
We then designed an experiment to test the effect of
sequential voting on the quality of surfaced content. We
compare against independent voting, in which participants
cannot view previous votes. We further benchmark against
content curated by experts and randomly selected content.
Based on the convergence of the web industry on the use
of sequential voting systems, we posit that sequential voting
can actually lead to better content ranking than independent
voting.
We find that self-reported learning of content consumers
was significantly higher when the content was chosen by
sequential votes compared to all other conditions, includ-
ing the expert condition. Consistent with this trend, average
test scores are also always higher in the sequential condition,
though not statistically so. Hence, sequential voting can al-
low for the discovery of high-quality content without expert
intervention, suggesting a beneficial effect of social influ-
ence.
Approach
Our goal is to determine if sequential voting can select
better answers in a student forum than other types of cu-
ration methods, including independent votes and expert-
grading. The type of student forum we consider is common
in MOOCs and other online Q&A sites. It begins with a
single question (often posted by a user) followed by a se-
quence of answers posted by peers. These answers are then
voted on by other students. Rather than using an existing live
MOOC, we take an approach that has been used recently in
the education literature to better isolate aspects of learning,
e.g., (Coetzee et al. 2015) and use a simulated MOOC using
workers from Amazon Mechanical Turk (AMT) as students.
In this manner we simulated a MOOC forum in which con-
tent was generated, ranked and consumed by AMT workers
as participants.
Our goal was to quantitatively measure each participant's
skill after being exposed to filtered peer-generated content.
This was measured by 1) an exam on the material and 2)
by two survey questions answered at the end of the entire
course that asked participants to self-report their knowledge
before and after course completion. Each course progressed
through three phases:
• Content generation – which simulates students answering
questions in a forum,
1Self-reported learning can be a proxy for motivation (Schunk
2003), and is correlated with actual learning (Anaya 1999).
• Vote collection – which simulates the discovery of con-
tent from the generation phase via either sequential or in-
dependent upvotes, and
• Testing – which allows us to measure students' knowl-
edge after consuming content surfaced in the voting
phase.
See the Experiment section for more details.
Importantly, as is the case in many social recommenda-
tion systems, having a content generation phase allowed us
to present material generated by peer participants. We were
then able to study the effect that sequential vs independent
voting in the collection phase had on the testing phase. Par-
ticipants were allowed to engage in at most one of the three
phases in each course in order to isolate the learning that
occurs within each phase.
We hypothesized that students shown content discovered
by sequential votes would outperform those shown con-
tent discovered by independent votes due to an underlying
herding effect that allows for greater efficiency in identify-
ing good explanations.2 In addition, we compared against
benchmarks consisting of a random condition, in which ran-
dom answers were shown, and an expert condition, in which
the authors graded each explanation and explanations with
top grades were shown.
Experiment
We ran two simulated MOOC courses; one on introductory
programming, and another on introductory art styles. Each
course had five lessons: the Computer Science course taught
Assignment, If-Else Statements, For Loops, Functions and
Recursion, while the Art course taught the defining fea-
tures of Photorealism, Realism, Expressionism, Impression-
ism, Abstract, Cubism, Color-Field, Hard-Edge, Nanga and
Mughal. The authors are experts in computer science, and
one of the authors is knowledgeable in art. The lessons and
questions for the Computer Science course were developed
jointly, and the lessons and questions for the Art course were
developed by the knowledgeable author. In order to validate
the authors' decisions, two professors in Computer Science
and one professor in Art, each with more than 15 years ex-
perience teaching introductory courses in their respective ar-
eas, were consulted, as described in the External Validators
section.
Each of the two course began with a content phase in
which 10 participants answered a set of questions for each
lesson in the course and gave explanations for their answers.
This phase simulates populating the content of a forum. This
phase was followed by a voting phase that had 4 conditions
with 25 participants in each condition. In the voting phase,
participants voted on which explanations they thought were
good. One condition in this phase had independent votes and
three conditions had votes that were public to others present
in that condition. Finally, there was a testing phase that had 6
2Formal models for describing and predicting herd behavior
have emerged in many fields (see (Raafat, Chater, and Frith 2009)
for a summary); the exact mechanism through which herding or
social influence occurs is immaterial to our study, we simply allow
for it (or not) by showing (or hiding) votes.
Figure 1: The experimental design for both courses followed
the depiction above. Each panel (representing a phase)
was run as a separate batch of experiments. Within each
batch, participants were randomly assigned across condi-
tions within the phase. Participants were only allowed to par-
ticipate in one phase (and hence one condition) per course.
Arrows indicate dependencies between conditions across
phases. Blue conditions did not require participants.
conditions with 100 participants in each condition, with one
condition for each of the voting phase conditions in addition
to an expert graded condition and a random condition. Each
phase is described in more detail below; see Figure 1 for a
flowchart depicting the different phases and conditions.
Participants
Our experiment participants were recruited on Amazon Me-
chanical Turk (AMT), an online crowdsourcing platform
in which requesters can post discrete, typically short, tasks
with replicates called HITs. If an AMT worker finds and ac-
cepts a HIT, the worker gets paid upon successful comple-
tion. In our setting, each phase of each lesson corresponded
to a task, and each task had many HITs falling into each of
our different experimental conditions. We conducted our ex-
periments over a two-week period in May of 2015. All HITs
within a single phase of each lesson were posted simultane-
ously and completed in under 12 hours.
Workers within a course participated in at most one phase,
but were allowed to participate in both courses if they so de-
sired. We placed weak selection criteria on the AMT work-
ers, allowing workers with a minimum of 50 HITs com-
pleted and at least 90% of completed HITs approved (i.e.,
marked as correct by the job requester). The workers were
payed $3.5, $3.5 and $2 per HIT for the content phase, vot-
ing phase and testing phase respectively, leading to an effec-
tive hourly wage of $6.49 as measured by AMT.3 In total,
3We expect the hourly wage to actually be higher due to known
factors such as skimming, in which workers accept and work on
multiple HITs at once (Gong 2012).
Figure 2: Depicts a sample lesson from the Art course. Each
lesson contained a brief description of two styles of art along
with a sample painting corresponding to each, as depicted.
The sample lesson for the Computer Science course con-
tained a brief description of the topic along with a sample
piece of pseudocode and its correct output.
1211 unique workers participated in the experiment.
Experiment Phases
Content Phase During the content phase, participants
were presented with brief 3-5 sentence lessons (as illustrated
in Figure 2). In each lesson, the participants were prompted
to read the lesson, answer a question on the material, and
provide an explanation as to why they chose their answers.
In the Art course participants were shown a painting and
asked to identify the art style of the painting given two
choices (as illustrated in Figure 3). In the Computer Science
course, the participants were asked to give the output of a
short piece of pseudocode (as illustrated in Figure 4).
Voting Phase
In the voting phase, participants were pre-
sented with the same brief lessons as in the content phase.
The first part of the question was identical to the content
phase, but instead of being asked to provide an explanation,
participants were asked to upvote the explanations generated
in the content phase that they thought were good (as illus-
trated in Figure 5). The format was modeled after common
Q&A platforms and MOOC forums.
This phase had two types of conditions, one in which the
numbers of upvotes from previous participants were made
public and the other in which these numbers were kept hid-
den. Public upvotes allow for social influence as participants
can incorporate the information into their decisions to up-
vote. This type of condition forms our sequential condition.
We compared against a condition where the number of up-
votes were private (same as Figure 5, except the green boxes
were not displayed), which we call the independent condi-
tion.
Testing Phase During the testing phase, the goal was to
measure a participant's ability to learn solely from explana-
tions generated in the content phase and chosen by the voting
phase. No lesson was presented and vote information was
Figure 4: Depicts a sample question from the content phase
of the Computer Science course (for the lesson on For
Loops). The participant is shown a short piece of pseu-
docode, asked to type the output of the code, and asked to
give an explanation for their answer.
sisted of a short piece of pseudocode and asked for its out-
put, again without any explanation. As all questions had an
objective right answer, each question was worth 0 or 1 point,
depending on whether the answer was incorrect or correct.
Self-Reported Learning
Participants in all conditions were presented with the same
optional survey at the end of the course, which included a
self-assessment of learning. Participants reported their skill
levels on the topic (Computer Science or Art) before and af-
ter the course on a scale from 0 (none) to 4 (expert). We mea-
sure self-reported learning by taking the difference between
the before and after self-reported skill levels. While individ-
ual estimates of learning may be inflated overall, differences
across conditions must be real since participants were ran-
domly assigned to conditions.
External Validators
We further had external validators in art and computer sci-
ence grade the student explanations in order to indepen-
dently measure the quality of the content curated by the dif-
ferent conditions. This additional step was conducted due
to the unexpected finding (discussed below) that the expert-
curated condition did not outperform the other conditions,
and was sometimes significantly worse. The external valida-
tion confirmed that the expert condition had selected good
content as evaluated by external graders and lends weight to
the finding. Moreover, the topics and question format were
confirmed by the external validators to be similar to what is
used in their courses.
The external validators were professors who had no previ-
ous knowledge of the experiment and no prior collaboration
with the authors. Each has more than 15 years experience
teaching introductory courses in their field, and either has
developed or is in the process of developing a MOOC on
such material. The external validators were asked to grade
Figure 3: Depicts a sample question from the content phase
of the Art course (for the lesson on Photorealism and Real-
ism). The participant was shown a painting, asked whether
it represented a painting of type A or B, and asked to give an
explanation for their answer.
not shown. Instead, the participants were presented with the
questions asked in content and voting phases, along with two
explanations from the content phase (as illustrated in Figure
6). The two explanations the participants were shown varied
across conditions.
The participants were randomly assigned to one of four
different types of conditions: sequential, independent, ran-
dom and expert. The sequential conditions displayed the
top two most upvoted explanations from the sequential con-
ditions in the voting phase. We had three parallel repli-
cates of the sequential condition. The independent condi-
tion displayed the top two most upvoted explanations from
the independent condition of the voting phase. The random
condition displayed two explanations selected uniformly at
random from all the explanations generated in the content
phase. In the expert condition, the authors independently
manually graded the content. The authors' grades were av-
eraged into a final grade for each explanation, and the two
explanations with the best average grades were presented.
Ties were broken at random so that exactly two explanations
were presented in every condition.
The tests given to participants consisted of four multiple-
choice questions per lesson in the Art course similar to the
one depicted in Figure 3 but without the prompt for an expla-
nation, and one numerical question per lesson in the Com-
puter Science course. The computer science question con-
Figure 6: Depicts a sample testing phase: The student ex-
planations, which were generated in the content phase and
selected in the voting phase, are displayed in lieu of a les-
son.
man 2009; Szabo and Huberman 2010; Cheng et al. 2014),
which also strives to quantify the effect of social influence
on popularity (Salganik, Dodds, and Watts 2006; Krumme
et al. 2012; Stoddard 2015). Other work has examined the
impact of social influence on various online user behav-
iors more generally (Salganik and Watts 2008; Chen 2008;
Muchnik, Aral, and Taylor 2013; van de Rijt et al. 2014;
Wang, Wang, and Wang 2014). Our work contributes to
these areas by identifying the effect that social influence has
on the discovery of high quality content in a domain where
quality can be objectively defined.
There are many mechanisms used for social recommen-
dation systems. Variations, both on the allowable user in-
put and on the form of aggregation, exist. These variations
have been studied widely in theory and practice, and an
overview is outside the scope of this work (see, e.g., (Aska-
lidis and Stoddard 2013) and references cited within). We
select a specific form of of user input (upvotes on ranked
content) and the simplest and most common form of aggre-
gation (sorting by number of upvotes) since these choices
are prevalent in the education context. Most popular MOOC
forums, including Coursera, MIT-X, Harvard-X, and Stan-
ford Online, as well as Q&A websites such as Yahoo! An-
swers, Stack Overflow, Baidu Knows and Quora use varia-
tions of this type of sequential voting mechanism.
Analysis
We now present an overview of the participant responses fol-
lowed by the results of our experiments using both quality
Figure 5: Depicts a sample voting phase in the social condi-
tion. The independent condition does not display the green
boxes containing the previous upvotes. Only a portion of the
display is shown here. 10 explanations were presented at a
given time, sorted according to the number of upvotes re-
ceived thus far in the sequential condition and sorted ran-
domly in the independent condition.
on the "usefulness of the explanation to other students who
will have to answer similar questions", and assigned a grade
between 0-10 to each explanation generated in the content
phase (100 explanations in Art, and 50 explanations in CS).
Related Work
There are a number of avenues of research in computa-
tional social science related to our study. Our work is re-
lated to the large literature on identifying content quality,
which primarily strives to develop automated techniques for
quality prediction in online settings. One way to identify
the quality of content is based on the contributor's repu-
tation and past work (Chen et al. 2006; Dom and Paran-
jpe 2008). Specific content features can also be used, such
as the inclusion of references to external resources, the
length, the utility or the verifiability (Adamic et al. 2008;
Kelly et al. 2007; Kim and Oh 2009). Another growing
related area involves popularity prediction (Hogg and Ler-
Figure 7: Explanation grades given by external validators
normalized per-lesson to a 0-1 scale. Error bars are standard
errors of the mean. The plot shows that from the perspec-
tive of the external validators, explanations selected by the
sequential and independent conditions are indistinguishable,
while the explanations selected in the expert condition tend
to be better and the random condition tends to be worse; de-
spite this, we later see that the sequential condition tends
to outperform the rest with respect to self-reported learning
and demonstrated skill.
metrics, self-reported learning and test scores.4
Descriptive Statistics
The conditions for the testing phase were the sequential con-
ditions (3 replicates), the independent condition (1 repli-
cate), the random condition (1 replicate) and the expert-
curated condition (1 replicate). We used three runs of the
sequential condition because prior work suggests that so-
cial information may lead to different outcomes across repli-
cates (Salganik, Dodds, and Watts 2006). These different
outcomes occur because of herding amplifying the first few
votes in each replicate.
100 HITs for each testing condition were posted on AMT;
i.e., 600 HITs for the Art course and 600 HITs for the Com-
puter Science course. The dataset was filtered so that only
the results from workers who had completed all five lessons
were retained. In some cases we had more participants than
HITs, presumably from workers who clicked on our ad but
did not accept the HIT. The number of completed lessons per
condition ranged from 97 to 106 with an average of 100.92.
Explanation Quality
Our external validators independently graded all student ex-
planations on a 0-10 scale. The combined score is an expla-
nation's raw grade. If we think of the external validators as
instructors in the course, this would be the grade they assign
to an explanation posted on the course forum.
The overall average explanation grade in the Art course
was 6.13, and the average best explanation grade (across
lessons) in this course was 8.45. The average explanation
Figure 8: Self-reported skill levels before and after task com-
pletion, versus test scores. The test scores are more corre-
lated with self-reported skill after a lesson, suggesting that
self-reported learning can be thought of as a proxy for ac-
tual learning. Error bars are standard errors of the means.
Regression lines are fitted to the raw data.
grade in the Computer Science course was approximately
2.36, and the average best explanation grade in the Com-
puter Science course was 5.7.
We use these grades to evaluate the quality of the con-
tent selected by the different conditions. We focus on the
average grades of the two explanations selected in each con-
dition of the voting phase. We normalize the grades so that,
for each lesson, they lie on a 0-1 scale by dividing by the
maximum grade in a given lesson.5 We then compared the
average grade of the top explanations selected by each con-
dition (see Figure 7).
In both the CS and the Art courses the explanation grades
in the expert condition are significantly higher than the ex-
planation grades in the sequential condition (two-sided t-
test with p = 0.009976 for Computer Science and p =
0.0001374 for Art). We include this result to illustrate the
differences in explanation quality as judged by an exter-
nal validator. In particular, this shows that there is a range
4The code and data used for our analysis are available online:
https://github.com/pkrafft/Sequential-Voting-Promotes-Collective-
Discovery-in-Social-Recommendation-Systems.
5This is necessary as some lessons are naturally harder than
others. Without normalization the data across courses would not be
comparable.
0.000.250.500.751.00ArtCSCourseAverage Explanation GradesExperiment ConditionExpertSequentialIndependentRandomlllll0.000.250.500.751.0001234Self−Reported Level BeforeTest Scorelllll0.000.250.500.751.0001234Self−Reported Level AfterTest ScoreFigure 9: Comparison of self-reported learning scores. Error
bars are standard errors of the mean. The sequential condi-
tion produces a significant increase in self-reported learning
compared to the other conditions.
Figure 10: Comparison of test scores. Error bars are stan-
dard errors of the mean. The sequential condition remains
on average the best in terms of performance in both courses,
though not always significantly.
in explanation quality (especially in the Computer Science
course). This result also validates the authors' grades as used
in the expert-curated condition. Though not statistically sig-
nificantly, independent votes achieve identify higher graded
explanations than sequential votes in both courses, as would
be suggested by the literature on social influence. However,
our desired metric was the effect on the student, i.e., the test
scores and self-reported learning of a content consumer, not
the grades given by experts.
Learning
In the testing phase we took explanations selected in the
voting phase and assessed how well participants learned
when consuming that material as instruction. We measure
the change in self-reported skill level from before and after
the lessons. In addition, we measure the participants' knowl-
edge with a test on the subject material after the lesson was
completed.
The self-reported skill level before and after the course
was submitted on a 0-4 scale with 0 being "none" and 4
being "expert". The test scores are normalized to be from
0 to 1. The self-reported skill level after task completion
has a much higher correlation with test scores than the
self-reported skill level from before the task (0.31186 and
0.11505 respectively; see Figure 8). Hence, self-reported
skill after the course is a better proxy for actual skill level
than self-reported skill level before the course.
We find that self-reported learning in the sequential condi-
tion is significantly higher than in the independent condition
(two-sided t-test p < 0.0005312), in the random condition
(two-sided t-test p = 0.002109), and in the expert condition
(two-sided t-test p = 0.04359). These differences remain
significant controlling for the course type and the experi-
ment instance using mixed effects models (with fixed effects
for the course type and random effects for the particular ex-
periment instances). Breaking the analysis up by course, the
trends are the same in all comparisons (see Figure 9), how-
ever the comparison to the expert condition is not significant
in the Computer Science course, and the comparison to the
random condition is not significant in the Art course.
Consistent with these trends, average test scores were
higher in the sequential condition than in the independent,
random, and expert conditions, though these comparisons
were not statistically significant (see Figure 10). The sequen-
tial condition is significantly better than the expert condition
(two-sided t-test p = 0.02682) and random (two-sided t-test
p < 0.0001) in the Art course, though not the Computer Sci-
ence course. Those single comparisons are significant. Us-
ing the mixed effects model to look at both courses jointly,
the comparison to the expert condition, but not to random,
remains significant. The effect is weaker in one context (CS)
than the other (Art) because the sequential and independent
conditions were more similar in the CS test phase. Unlike
in the Art course, the CS voting phase resulted in similar
top explanations across sequential and independent condi-
tions, likely because the content-generation phase resulted
in fewer good explanations.
Herding
We hypothesized that the differences we observed in learn-
ing across conditions was due to a beneficial herding effect
which allows for greater efficiency in identifying good ex-
planations. To test this hypothesis, we examined the skew-
ness of the distribution of the ultimate number of votes each
explanation got per question. Following previous work (Gini
1912; Salganik, Dodds, and Watts 2006), we first take the
number of votes each explanation got and divide those num-
bers by the total number of votes per question. These nor-
malized popularity values are the "market shares" of popu-
larity of each explanation. We then use the average differ-
ence in market share between items as a measure of the
skewness of the distribution, or the "inequality" in popu-
larity. Higher inequality values in the sequential condition
compared to the independent condition indicates that herd-
ing may be occurring.
We find in the Art course that average inequality across
questions is significantly higher in the sequential condition
than the independent condition (two-sided t-test p < 1e-5),
suggesting a herding effect may be at play. We also find a
trend in the same direction in the Computer Science course,
0.000.250.500.751.001.25ArtCSCourseSelf−Reported LearningConditionExpertSequentialIndependentRandom0.000.250.500.75ArtCSCourseAverage Test ScoresConditionExpertSequentialIndependentRandomopposed to a true pretest-posttest) was used so that partic-
ipants would have the same context with which to address
their skill. Having a (quasi)-pretest-posttest design was fea-
sible for self-reported learning but not for actual test scores,
since taking a test requires more time than completing a sur-
vey. This is one of the main limitations of our work, and fur-
ther investigation is required in order to determine whether
the results on test scores are indeed significant.
In our statistical tests, we used a p-value cutoff of 0.05 for
declaring significance. If we instead use a Bonferroni cor-
rection, then the p-value cutoff would become 0.001. This
correction accounts for 50 tests, which is larger than the 30
tests in our final script for analyzing the data and larger than
the 17 that we report. Using this substantially more conser-
vative p-value, we still find that the sequential condition has
significantly higher self-reported learning than the indepen-
dent condition, but notably, the comparisons to the expert
condition are no longer significant.
Domain Differences. As is readily apparent in Figures 9
and 10, both the test scores and self-reported learning are
lower in the Computer Science course than in the Art course.
The disparity could be accounted for by the fact that the ex-
planations in the Computer Science course were much worse
than those in the Art course according to the grades assigned
by the external validators (see the section on Explanation
Quality); in other words, the content consumers had overall
lower-quality explanations to help them learn, which could
explain the lower learning scores overall.
Inadequacy of Experts.
In some cases, our evidence sug-
gests that the sequential condition is better than the expert
condition; in fact, in some cases even the random condition
was on average (although not significantly) better than the
expert condition. A priori, this result is very surprising, and
initially we were concerned that one reason for it could be
that the expert grading was performed poorly. The external
validators were brought on at this point to grade the con-
tent in order to independently validate the experts' decisions.
The fact that the external validation agreed with the author's
decisions gives weight to the conclusion that sequential vot-
ing can in fact outperform experts; hence we do not believe
this is a limitation of our work, but rather a point for further
reflection.
One possible explanation for why expert-selected content
could be worse is the mechanism used for curation: The ex-
perts did not vote on which pairs of explanations would be
best. They graded each explanation individually, and the ex-
planations with the top two grades were selected for use in
the expert condition. It is possible that sequential voting al-
lows for better joint selection of explanations compared to a
traditional grading method.
Herding. We hypothesized that the differences in learning
between the sequential and independent conditions was due
to a beneficial herding effect that led to better ranked con-
tent. Higher inequality values, measured with the Gini index
Figure 11: Average inequality (Gini index) over the mar-
ket share of upvotes. Error bars are standard errors of the
mean. Higher inequality values in the sequential condition
compared to the independent condition suggest that herding
may be occurring.
but the difference is not statistically significant (see Figure
11).
Discussion
Main Results. The results using our objective measure-
ments of quality paint a different picture than the grades
of the external validators. Participants' self-reported assess-
ments suggest that the sequential condition curates better
content than all other conditions. This finding is notable
since the sequential condition outperforms the independent
condition (which had equivalent grades from the external
validators), and since the sequential condition is not out-
performed by the expert condition (which had significantly
higher grades from the external validators). The differences
in self-reported learning across conditions cannot be due to
participants having a tendency to tell us what we want to
hear (i.e., report learning when none occurred) because of
the randomization of participants to different conditions.
Self-reported learning is an important metric since per-
ceived progress is strongly correlated to motivation (Schunk
2003). Moreover, self-reported learning can often be used
as a valid proxy for more direct measures of learn-
ing (Anaya 1999). Therefore, observing an improvement in
self-reported learning alone is enough reason to adopt the
sequential voting procedure.
Limitations. Participants' actual test scores follow the
trend observed in the self-reported assessments, though not
always with statistical significance. While we did not expect
to be under-powered, we believe that, due to the differences
in experimental design between the two measurements, we
were underpowered on test scores and not on self-reported
learning. Test scores used a standard between-subjects
design while self-reported learning used a quasi-pretest-
posttest between-subjects design (where the "pretest" and
"posttest" were both end-survey questions). The latter de-
sign should yield lower variance in the dependent variable,
and thus will have higher power. A quasi-pretest-posttest (as
0.00.10.20.30.4ArtCSCourseAverage Inequality(Gini 1912), in the sequential condition compared to inde-
pendent conditions indicate that herding may be occurring.
However our findings were not conclusive in the CS course.
The participants in the CS course only generated a few good
explanations, while the participants in the Art course gener-
ated many. This factor likely led to high "inequality" in the
distribution of votes for CS even in the independent condi-
tion, thereby diminishing the effect of herding.
Conclusion & Future Work
Despite many models of collective intelligence clearly pre-
dicting deficits in aggregate outcomes due to social influ-
ence, our work suggests that sequential voting may indeed
improve ranking and collective discovery in online social
recommendation systems. However, the mechanism through
which sequential voting has this positive effect remains un-
clear. While there is some evidence that herding may be
playing a role, for example, by emphasizing content that
might have been overlooked in the independent voting set-
ting, another possibility is that people are responding to oth-
ers with anticorrelated votes in an intelligent manner; be-
havior that has recently been observed empirically (Sipos,
Ghosh, and Joachims 2014). Our understanding of collec-
tive intelligence, even in this simple interaction context, is
clearly in a nascent stage; better models and further analy-
ses are required.
Future work that uses the education domain to achieve
objective measurements of underlying quality should also
address some of the limitations of our present work. For
example, we see teasing out the differences between self-
reported learning and test scores as an important topic for fu-
ture work. More comprehensive tests, delays between learn-
ing and testing, a true pre-test / post-test design, and larger
sample sizes of students could be employed in order to iden-
tify whether our null results on test scores are actually a
false negative. Interesting high-level questions in this vein
include: are participants implicitly distinguishing between
what they were taught as opposed to what they learned in
the self-assessment? How do test scores and self-reported
learning correlate, if at all, with reported confidence? What
type of model (if any) of social influence is warranted by the
results we observed, and can we increase the effects to pro-
duce better outcomes? And what other forms of information
can we make public in a way that improves learning?
Our work also leaves open the mechanism through which
information assimilation benefits learning. Understanding
this mechanism would allow us to predict how student
knowledge varies as a function of the type and amount of
information revealed, and could lead to designing systems
which maximize beneficial information, e.g., ranking con-
tent (as in (Lerman and Hogg 2014)) using learning as a
quality metric.
The difference we observed between the expert and se-
quential conditions also warrants further investigation. This
finding, if general, suggests that sequential voting might lead
not just to the crowd being able to discover better content
than it could through standard wisdom-of-crowds aggrega-
tion, but also better content than selected via expert grading.
Identifying the conditions under which crowds can outper-
form experts is an important open area of research in collec-
tive intelligence, and our work suggests that even a simple
interaction mechanism may at times achieve this goal.
Acknowledgments
We would like to thank the anonymous reviewers for their
insightful comments which have aided in the exposition of
this work. We would also like to thank our three external val-
idators: Prof. Nicolas Bock (University of Lausanne), Prof.
Jean-C´edric Chappelier (EPFL) and Prof. Djamila Sam-
Haroud (EPFL), and the anonymous Amazon Mechanical
Turk workers who participated in our study. The authors ob-
tained approval for the experiment from the ´Ecole Polytech-
nique F´ed´ereal de Lausanne (EPFL) Human Research Ethics
Committee (HREC) in Switzerland. This material is based
upon work supported by the National Science Foundation
Graduate Research Fellowship under Grant No. 1122374.
Any opinion, findings, and conclusions or recommendations
expressed in this material are those of the authors(s) and
do not necessarily reflect the views of the National Science
Foundation
References
[Abeliuk et al. 2015] Abeliuk, A.; Berbeglia, G.; Cebrian,
M.; and Van Hentenryck, P. 2015. The benefits of social
influence in optimized cultural markets. PLoS ONE 10(4).
[Adamic et al. 2008] Adamic, L. A.; Zhang, J.; Bakshy, E.;
and Ackerman, M. S. 2008. Knowledge sharing and Yahoo
Answers: Everyone knows something. In Proceedings of the
International Conference on the World Wide Web (WWW),
1013–1022.
[Anaya 1999] Anaya, G. 1999. College impact on student
learning: Comparing the use of self-reported gains, stan-
dardized test scores, and college grades. Research in Higher
Education 40(5):499–526.
[Askalidis and Stoddard 2013] Askalidis, G., and Stoddard,
G. 2013. A theoretical analysis of crowdsourced content cu-
ration. In Proceedings of the 3rd Workshop on Social Com-
puting and User Generated Content.
[Bikhchandani, Hirshleifer, and Welch 1992] Bikhchandani,
S.; Hirshleifer, D.; and Welch, I. 1992. A theory of fads,
fashion, custom, and cultural change as informational
cascades. Journal of Political Economy 992–1026.
[Chamley 2004] Chamley, C. 2004. Rational Herds: Eco-
nomic Models of Social Learning. Cambridge University
Press.
[Chen et al. 2006] Chen, W.; Zeng, Q.; Wenyin, L.; and Hao,
T. 2006. A user reputation model for a user-interactive ques-
tion answering system. In Proceedings of the Second Inter-
national Conference on Semantics, Knowledge, and Grid.
[Chen 2008] Chen, Y.-F. 2008. Herd behavior in purchasing
books online. Computers in Human Behavior 24(5):1977–
1992.
[Cheng et al. 2014] Cheng, J.; Adamic, L.; Dow, P. A.;
Kleinberg, J. M.; and Leskovec, J. 2014. Can cascades be
self-fulfilling prophecies in an artificial cultural market. So-
cial Psychology Quarterly 71(4):338–355.
[Salganik, Dodds, and Watts 2006] Salganik, M. J.; Dodds,
P. S.; and Watts, D. J. 2006. Experimental study of in-
equality and unpredictability in an artificial cultural market.
Science 311(5762):854–856.
[Schunk 2003] Schunk, D. H. 2003. Self-efficacy for reading
and writing: Influence of modeling, goal setting, and self-
evaluation. Reading & Writing Quarterly 19(2):159–172.
[Sipos, Ghosh, and Joachims 2014] Sipos, R.; Ghosh, A.;
and Joachims, T. 2014. Was this review helpful to you?:
it depends! context and voting patterns in online content. In
Proceedings of the 23rd International Conference on World
Wide Web (WWW).
[Stoddard 2015] Stoddard, G. 2015. Popularity dynamics
and intrinsic quality in Reddit and Hacker News. In AAAI
Conference on Web and Social Media (ICWSM).
[Szabo and Huberman 2010] Szabo, G., and Huberman,
B. A. 2010. Predicting the popularity of online content.
Communications of the ACM 53:184–192.
[van de Rijt et al. 2014] van de Rijt, A.; Kang, S. M.;
Restivo, M.; and Patil, A.
2014. Field experiments of
success-breeds-success dynamics. Proceedings of the Na-
tional Academy of Sciences 111(19):6934–6939.
[Wang, Wang, and Wang 2014] Wang, T.; Wang, D.; and
Wang, F. 2014. Quantifying herding effects in crowd wis-
dom. In Proceedings of the ACM International Conference
on Knowledge Discovery and Data Mining (KDD).
Turk:
Market
and
1995.
1912.
2012.
Skimming
failure in
cherry-picking.
predicted? In Proceedings of the 23rd International Confer-
ence on the World Wide Web (WWW), 925–936. ACM.
[Coetzee et al. 2015] Coetzee, D.; Lim, S.; Fox, A.; Hart-
mann, B.; and Hearst, M. A. 2015. Structuring interactions
for large-scale synchronous peer learning. In Proceedings
of the 18th ACM Conference on Computer-Supported Co-
operative Work and Social Computing (CSCW), 1139–1152.
ACM.
[Dom and Paranjpe 2008] Dom, B., and Paranjpe, D. 2008.
A Bayesian technique for estimating the credibility of ques-
tion answerers. In Proceedings of the Society for Industrial
and Applied Mathematics.
Variabilit`a e mutabilit`a.
[Gini 1912] Gini, C.
Reprinted in Memorie di metodologica statistica (Ed. Pizetti
E, Salvemini, T). Rome: Libreria Eredi Virgilio Veschi 1.
[Gong 2012] Gong, A.
Mechanical
http://compsocsci.blogspot.ch/2012/03/market-failure-
in-mechanical-turk.html.
[Hogg and Lerman 2009] Hogg, T., and Lerman, K. 2009.
In Pro-
Stochastic models of user-contributory web sites.
ceedings of the Third AAAI Conference on Weblogs and So-
cial Media (ICWSM).
[Kelly et al. 2007] Kelly, D.; Wacholder, N.; Rittman, R.;
Sun, Y.; Kantor, P.; Small, S.; and Strzalkowski, T. 2007.
Using interview data to identify evaluation criteria for in-
teractive, analytical question-answering systems. Journal of
the American Society for Information Science and Technol-
ogy 58(8):80–88.
[Kim and Oh 2009] Kim, S., and Oh, S. 2009. User's rele-
vance criteria for evaluating answers in a social Q&A site.
Journal of the American Society for Information Science and
Technology 60:716–727.
[Krumme et al. 2012] Krumme, C.; Cebrian, M.; Pickard,
G.; and Penetland, S. 2012. Quantifying social influence
in an online cultural market. PLoS ONE 7(5).
[Ladha 1995] Ladha, K. K.
Information pooling
through majority-rule voting: Condorcet's jury theorem with
correlated votes. Journal of Economic Behavior & Organi-
zation 26(3):353–372.
[Lerman and Hogg 2014] Lerman, K., and Hogg, T. 2014.
Leveraging position bias to improve peer recommendation.
PLoS One 9(6).
[Lorenz et al. 2011] Lorenz, J.; Rauhut, H.; Schweitzer, F.;
and Helbing, D. 2011. How social influence can undermine
the wisdom of crowd effect. Proceedings of the National
Academy of Sciences 108(22):9020–9025.
[Muchnik, Aral, and Taylor 2013] Muchnik, L.; Aral, S.; and
Taylor, S. J. 2013. Social influence bias: A randomized
experiment. Science 341(6146):647–651.
[Raafat, Chater, and Frith 2009] Raafat, R. M.; Chater, N.;
and Frith, C. 2009. Herding in humans. Trends in Cog-
nitive Sciences 13(10):420–428.
[Salganik and Watts 2008] Salganik, M. J., and Watts, D. J.
2008. Leading the herd astray: An experimental study of
|
1911.09534 | 1 | 1911 | 2019-11-21T15:20:09 | Active Re-identification Attacks on Periodically Released Dynamic Social Graphs | [
"cs.SI"
] | Active re-identification attacks pose a serious threat to privacy-preserving social graph publication. Active attackers create fake accounts to build structural patterns in social graphs which can be used to re-identify legitimate users on published anonymised graphs, even without additional background knowledge. So far, this type of attacks has only been studied in the scenario where the inherently dynamic social graph is published once. In this paper, we present the first active re-identification attack in the more realistic scenario where a dynamic social graph is periodically published. The new attack leverages tempo-structural patterns for strengthening the adversary. Through a comprehensive set of experiments on real-life and synthetic dynamic social graphs, we show that our new attack substantially outperforms the most effective static active attack in the literature by increasing the success probability of re-identification by more than two times and efficiency by almost 10 times. Moreover, unlike the static attack, our new attack is able to remain at the same level of effectiveness and efficiency as the publication process advances. We conduct a study on the factors that may thwart our new attack, which can help design graph anonymising methods with a better balance between privacy and utility. | cs.SI | cs |
Active Re-identification Attacks on Periodically
Released Dynamic Social Graphs
Xihui Chen1, Ema Kepuska2, Sjouke Mauw1,2 and Yunior Ram´ırez-Cruz1
1SnT, 2CSC, University of Luxembourg
6, av. de la Fonte, L-4364 Esch-sur-Alzette, Luxembourg
{xihui.chen, sjouke.mauw, yunior.ramirez}@uni.lu, [email protected]
November 22, 2019
Abstract
Active re-identification attacks pose a serious threat to privacy-preserving social
graph publication. Active attackers create fake accounts to build structural pat-
terns in social graphs which can be used to re-identify legitimate users on published
anonymised graphs, even without additional background knowledge. So far, this type
of attacks has only been studied in the scenario where the inherently dynamic social
graph is published once. In this paper, we present the first active re-identification
attack in the more realistic scenario where a dynamic social graph is periodically
published. The new attack leverages tempo-structural patterns for strengthening the
adversary. Through a comprehensive set of experiments on real-life and synthetic
dynamic social graphs, we show that our new attack substantially outperforms the
most effective static active attack in the literature by increasing the success proba-
bility of re-identification by more than two times and efficiency by almost 10 times.
Moreover, unlike the static attack, our new attack is able to remain at the same level
of effectiveness and efficiency as the publication process advances. We conduct a
study on the factors that may thwart our new attack, which can help design graph
anonymising methods with a better balance between privacy and utility.
Keywords: privacy-preserving social graph publication, re-identification attack, active
adversary, dynamic social networks
1
Introduction
Social graphs have proven to be a valuable data source for conducting sociological studies,
market analyses, and other forms of complex data analysis. This creates a strong incentive
for the establishment of a mutually beneficial relation between analysts and data owners.
For analysts, it is of paramount importance to have access to abundant, reliable social graph
1
data in order to conduct their studies. For data owners, making these data available to third
parties opens a number of additional business opportunities, as well as opportunities for
improving their social perception by contributing to the advancement of research. However,
releasing social network data raises serious privacy concerns, due to the sensitive nature of
much of the information implicitly or explicitly contained in social graphs. Consequently,
the data needs to be properly sanitised before publication.
It has been shown that some forms of sanitisation, e.g. removing users' identities and
personally identifying information from the released data, a process known as pseudonymi-
sation, are insufficient for protecting sensitive information. This is due to the fact that
a majority of users can still be unambiguously re-identified in the pseudonymised graph
by means of simple structural patterns [14, 22, 2, 23]. The re-identification subsequently
facilitates inferring relations between users, group affiliations, etc. A method allowing a
malicious agent, or adversary, to re-identify (a subset of) the users in a sanitised social
graph is called a re-identification attack.
A large number of anonymisation methods have been proposed for publishing sanitised
social graphs that effectively resist re-identification attacks. The largest family of graph
anonymisation methods (e.g. [14, 16, 3, 5, 33, 17, 30, 29, 4, 38, 39, 34, 18, 19]) follows a
common strategy of editing the vertex and/or edge set of the pseudonymised graph in order
to satisfy some formal privacy properties. These privacy properties rely on an adversary
model, which encodes a number of assumptions about the adversary capabilities. In the
context of social graph publication, there are two classes of adversaries. On the one hand,
passive adversaries depend on publicly available information, in case that it can be obtained
from online resources, public records, etc., without interacting with the social network
before publication. On the other hand, active adversaries interact with the network before
the sanitised dataset is released, in order to force the existence of structural patterns.
Then, when the sanistised graph is published, they leverage these patterns for conducting
the re-identification. Active adversaries have been shown to be a serious threat to social
graph publication [2, 20], as they remain plausible even if no public background knowledge
is available. Active attackers have the capability of inserting fake accounts in the social
network, commonly called sybil nodes, and creating connection patterns between these fake
accounts and a set of legitimate users, the victims. After the publication of the sanitised
graph, the attacker uses these unique patterns for re-identifying the victims.
Social networks are inherently dynamic. Moreover, analysts require datasets containing
dynamic social graphs in order to conduct numerous tasks such as community evolution
analysis [6], link prediction [15] and link persistence analysis [25], among others. Despite
the need for properly anonymised dynamic social graphs, the overwhelming majority of
studies on graph anonymisation have focused on the scenario of a social graph being re-
leased only once. The rather small number of studies on dynamic social graph publication
have provided only a partial understanding of the field, as they have exclusively focused on
passive adversary models. Consequently, the manners in which active adversaries can profit
from a dynamic graph publication scenario remain unknown. In this paper, we remedy this
situation by formulating active re-identification attacks in the scenario of dynamic social
graphs. We consider a scenario where the underlying dynamic graph is periodically sampled
2
for snapshots, and sanitised versions of these snapshots are published. We model an active
adversary whose knowledge consists in tempo-structural patterns, instead of exclusively
structural patters as those used by the original (static) active adversary. Moreover, in our
model the adversary knowledge is incremental, as it grows every time a new snapshot is
released, and the adversary has the opportunity to adapt along the publication process.
Under the new model, we devise for the first time a dynamic active re-identification attack
on periodically released dynamic social graphs. The new attack is more effective than
the alternative of executing independent static attacks on different snapshots. Further-
more, it is also considerably more efficient than the previous attacks, because it profits
from temporal patterns to accelerate the search procedures in the basis of several of its
components.
Our contributions. The main contributions of this paper are listed in what follows:
• We formulate, for the first time, active re-identification attacks in the scenario of
periodically released dynamic social graphs.
• Based on the new formulation, we present, to the best of our knowledge, the first dy-
namic active re-identification attack on periodically released dynamic social graphs,
which constructs and leverages tempo-structural patterns for re-identification.
• We conduct a comprehensive set of experiments on real-life and synthetic dynamic
social graphs, which demonstrate that the dynamic active attack is more than two
times more effective than the alternative of repeatedly executing the strongest active
attack reported in the literature for the static scenario [20].
• Our experiments also show that, as the number of published snapshots grows, the dy-
namic active attack runs almost 10 times faster than the static active attack from [20].
• We analyse the factors that affect the effectiveness of our new attack. The conclusions
of this study serve as a starting point for the development of anonymisation methods
for the new scenario.
Structure of the paper. We discuss the related work in Sect. 2, focusing in similarities
and differences with respect to our new proposals. Then, we describe the periodical graph
publication scenario, accounting for active adversaries, in Sect. 3; and we introduce the
new dynamic active attack in Sect. 4. Finally, our experimental evaluation is presented in
Sect. 5 and we give our conclusions in Sect. 6.
2 Related Work
Re-identification attacks are a relevant threat for privacy-preserving social graph publica-
tion methods that preserve a mapping between the real users and a set of pseudonymised
nodes in the sanitised release [14, 16, 3, 5, 33, 17, 30, 29, 4, 38, 39, 34, 18, 19].
3
Depending on the manner in which the attacker obtains the knowledge used for re-
identification, these attacks can be divided into two classes: passive and active attacks.
Passive adversaries collect publicly available knowledge, such as public profiles in other
social networks, and searches the sanitised graph for vertices with an exact or similar
profile. For example, Narayanan and Shmatikov [22] used information from Flickr to re-
identify users in a pseudonymised subgraph of Twitter. A considerable number of passive
attacks have been proposed, e.g. [22, 21, 35, 26, 24, 9, 10, 8]. On the other hand, active
adversaries interact with the real network before publication, and force the existence of
the structural patterns that allow re-identification after release. The earliest examples of
active attacks are the walk-based attack and the cut-based attack, introduced by Backstrom
et al. in [2]. Both attacks insert sybil nodes in the network, and create connection patterns
between the sybil nodes that allow their efficient retrieval in the pseudonymised graph. In
both attacks, the connection patterns between sybil nodes and victims are used as unique
fingerprints allowing re-identification once the sybil subgraph is retrieved. Due to the low
resilience of the walk-based and cut-based attacks, a robust active attack was introduced
by Mauw et al. in [20]. The robust active attack introduces noise tolerant sybil subgraph
retrieval and fingerprint mapping, at the cost of larger computational complexity. The
attack proposed in this paper preserves the noise resiliency of the robust active attack,
but puts a larger emphasis on temporal consistency constraints for reducing the search
space. As a result, for every run of the re-identification, our attack is comparable to the
original walk-based attack in terms of efficiency and to the robust active attack in terms
of resilience against modifications in the graph.
Notice that, by itself, the use of connection fingerprints as adversary knowledge does
not make an attack active. The key feature of an active attack is the fact that the adversary
interacts with the network to force the existence of the fingerprints. For example, Zou et
al. [39] describe an attack that uses as fingerprints the distances of the victims to a set of
hubs. This is a passive attack, since hubs exist in the network without intervention of the
attacker.
The attacks discussed so far assume a single release scenario. A smaller number of
works have discussed re-identification in a dynamic scenario. Some works assume an ad-
versary who can exploit the availability of multiple snapshots, although they only give a
coarse overview of the increased adversary capabilities, without giving details on attack
strategies. Examples of these works are [31], which models a passive adversary that knows
the evolution of the degrees of all vertices; and [39], which models another passive adver-
sary that knows the evolution of a a subgraph around the victims. An example of a full
dynamic de-anonymization method is given in [7]. Although they do not model an active
adversary, the fact that the method relies on the existence of a seed graph makes it po-
tentially extensible with an active first stage for seed re-identification, as done for example
in [27, 28]. Our attack differs from the methods above in the fact that it uses an evolving
set of sybil nodes that dynamically interact with the network and adapt to its evolution.
4
3 Periodical Graph Publication in the Presence of Ac-
tive Adversaries
In this section we describe the scenario where the owner of a social network periodically
publishes sanitised snapshots of the underlying dynamic social graph, accounting for the
presence of active adversaries. We describe this scenario in the form of an attacker-defender
game between the data owner and the active adversary. We first introduce the basic
notation and terminology, and then give an overview of the entire process and a detailed
description of its components.
3.1 Notation and Terminology
We represent a dynamic social graph as a sequence G = (G1, G2, . . . , Gi, . . .), where each
Gi is a static graph called the i-th snapshot of G. Each snapshot of G has the form
Gi = (Vi, Ei), where Vi is the set of vertices (also called nodes indistinctly throughout the
paper) and Ei ⊆ Vi × Vi is the set of edges.
We will use the notations VG and EG for the vertex and edge sets of a graph G. In this
paper, we assume that graphs are simple and undirected. That is, G contains no edges
of the form (v, v) and, for every pair v, w ∈ VG, (v, w) ∈ EG ⇐⇒ (w, v) ∈ EG. The
neighbourhood of a vertex v in a graph G is the set NG(v) = {w ∈ V (v, w) ∈ E}, and
its degree is δG(v) = NG(v). For the sake of simplicity, in the previous notations we drop
the subscript when it is clear from the context and simply write N (v), δ(v), etc.
For a subset of nodes S ⊆ VG, we use (cid:104)S(cid:105)G to represent the subgraph of G induced by
S, i.e. (cid:104)S(cid:105)G = (S, EG ∩ (S × S)). Similarly, the subgraph of G weakly induced by S is
defined as (cid:104)S(cid:105)w
G = (S ∪ NG(S), EG ∩ (S × (S ∪ NG(S)))). For every graph G and every
S ⊆ VG, (cid:104)S(cid:105)G is a subset of (cid:104)S(cid:105)w
G additionally contains the neighbourhood of S
and every edge between elements of S and their neighbours. Also notice that (cid:104)S(cid:105)w
G does
not contain the edges linking pairs of elements of NG(S).
An isomorphism between two graphs G = (V, E) and G(cid:48) = (V (cid:48), E(cid:48)) is a bijective
function ϕ : V → V (cid:48) such that ∀v,w∈V (v, w) ∈ E ⇐⇒ (ϕ(v), ϕ(w)) ∈ E(cid:48). Additionally, we
denote by ϕ(S) the restriction of ϕ to a vertex subset S ⊆ V , that is ϕ(S) = {ϕ(v) v ∈ S}.
G, as (cid:104)S(cid:105)w
3.2 Overview
Fig. 1 depicts the process of periodical graph publication in the presence of an active
adversary. We model this process as a game between two players, the data owner and the
adversary. From a practical perspective, it is implausible for the data owner to release a
snapshot of the dynamic graph every time a small amount of changes occurs, hence the
periodical nature of the publication process. The data owner selects a set of time-stamps
T = {t1, t2, . . . , ti, . . .}, t1 < t2 < . . . < ti < . . ., and incrementally publishes the sequence
G(cid:63) = (G(cid:63)
t1, G(cid:63)
t2, . . . , G(cid:63)
ti
, . . .)
5
Figure 1: Overview of the process of periodical graph publication in the presence of active
adversaries.
of sanitised snapshots of the underlying dynamic social graph. The adversary's goal is
to re-identify, in a subset T (cid:48)
⊆ T of the releases, a (possibly evolving) set of legitimate
users referred to as the victims. To achieve this goal, the active adversary injects an (also
evolving) set of fake accounts, commonly called sybils, in the graph. The sybil accounts
create connections among themselves, and with the victims. The connection patterns
between each victim and some of the sybil nodes is used as a unique fingerprint for that
victim. The likely unique patterns built by the adversary with the aid of the sybil nodes will
enable her to effectively and efficiently re-identify the victims in the sanitised snapshots.
At every re-identification attempt, the adversary first re-identifies the set of sybil nodes,
and then uses the fingerprints to re-identify the victims.
The data owner and the adversary have different partial views of the dynamic social
graph. On the one hand, the data owner knows the entire set of users, both legitimate
users and sybil accounts, but she cannot distinguish them. The data owner also knows
all relations. On the other hand, the adversary knows the identity of her victims and the
structure of the subgraph weakly induced by the set of sybil nodes, but she does not know
the structure of the rest of the network. In this paper we conduct the analysis from the
perspective of an external observer who can view all of the information. For the sake of
simplicity in our analysis, we will differentiate the sequence
G+ = (G+
t1, G+
t2, . . . , G+
ti
, . . .),
which represents the view of the network according to the data owner, which is the real
network, i.e.
the one containing the nodes representing all users, both legitimate and
6
t1t2...ti...Gt1Gt2...Gti...connectupdateconnection...updateconnectionG+t1G+t2G+ti...anonymiseanonymiseanonymise...G?t1G?t2G?ti...re-identifyre-identifyre-identify...sybilsubgraphsybilsubgraphsybilsubgraphcreateupdateupdateφt1:VG?t1→Yt1φt2:VG?t2→Yt2φti:VG?ti→Yti.....................evolveevolveevolveLegit.useracti-vitySybilinjectionRe-identificationPublicationAdversaryDataOwnerAdversarymalicious, from the sequence
G = (Gt1, Gt2, . . . , Gti, . . .),
ti = (Vti ∪ Sti, Eti ∪ E+
which represents the view of the unattacked network, that is the view of the dynamic
subgraph induced in G+ by the nodes representing legitimate users.
In the original formulation of active attacks, a single snapshot of the graph is released,
so all actions executed by the sybil nodes are assumed to occur before the publication. This
is not the case in the scenario of a periodically released dynamic social graph. Here, the
adversary has the opportunity to schedule actions in such a way that the subgraph induced
by the sybil nodes evolves, as well as the set of fingerprints. In turn, that allows her to
use temporal patterns in addition to structural patterns for re-identification. Additionally,
the adversary can target different sets of victims along the publication process and adapt
the induced tempo-structural patters to the evolution of the graph and the additional
knowledge acquired in each re-identification attempt.
In the new scenario, the actions
performed by the adversary and the data owner alternate as follows before, during and
after each time-stamp ti ∈ T .
Before ti: The adversary may remain inactive, or she can modify the set of sybil nodes,
as well the set of sybil-to-sybil and sybil-to-victim edges. The result of these actions is the
graph G+
ti ), where Vti is the current set of legitimate users, Sti is the
current set of sybil nodes, Yti ⊆ Vti is the current set of victims, Eti = EGti ⊆ Vti × Vti is
the set of connections between legitimate users, and E+
ti ⊆ (Sti × Sti)∪ (Sti × Yti) is the set
, weakly induced in G+
of connections created by the sybil accounts. The subgraph (cid:104)Sti(cid:105)w
ti
by the set of sybil nodes, is the sybil subgraph. We refer to the set of modifications of the
sybil subgraph executed before the adversary has conducted any re-identification attempt
as sybil subgraph creation. If the adversary has conducted a re-identification attempt on
earlier snapshots, we refer to the modifications of the sybil subgraph as sybil subgraph
update.
During ti: The data owner applies an anonymisation method to G+
ti to obtain the sanitised
version G(cid:63)
, which is then released. The anonymisation must preserve the consistency of the
ti
pseudonyms. That is, every user must be labelled with the same pseudonym throughout the
sequence of snapshots where it appears. Consistent annotation is of paramount importance
for a number of analysis tasks such as community evolution analysis [6], link prediction [15],
link persistence analysis [25], among others, that require to track users along the sequence
of releases. The data owner anonymises every snapshot exactly once.
After ti: The adversary adds G(cid:63)
to her knowledge. At this point, she can remain inactive,
ti
or she can execute a re-identification attempt on G(cid:63)
. The result of a re-identification
ti
attempt is a mapping φti : VG(cid:63)
ti → Yti determining the pseudonyms assigned to the victims
by the anonymisation method. Here, the adversary can additionally modify the results of
a previous re-identification attempt conducted on some of the preceding releases.
G+
ti
7
3.3 Components of the Process
To discuss in detail the different actions that the data owner or the adversary execute, we
follow the categorisation given in above in terms of the time where each action may occur
for every time-stamp ti. We first discuss sybil subgraph creation and update, which occur
before ti, then graph publication, which occurs at ti, and finally re-identification, which
occurs after ti.
3.3.1 Sybil subgraph creation and update
As we mentioned above, sybil subgraph creation is executed before the adversary has
attempted re-identification for the first time; whereas sybil subgraph update is executed
in the remaining time-steps.
y
G+
ti
Sybil subgraph creation: In the dynamic scenario, the adversary can build the initial
sybil subgraph along several releases. This allows the creation of tempo-structural pat-
terns, incorporating information about the first snapshot where each sybil node appears,
to facilitate the sybil subgraph retrieval stage during re-identification. As in all active
attacks, the patterns created must ensure that, with high probability, (cid:104)Sti(cid:105)w
is unique.
We denote by Fti(y) the fingerprint of a victim y ∈ Yti in terms of Sti. Throughout this
paper we consider that Fti(y) is uniquely determined by the neighbourhood of y in Sti,
. We denote by Fti the set of fingerprints of all victims in G+
ti .
that is Fti(y) = Sti ∩ NG+
Sybil subgraph update: In this step, the adversary can modify the set of sybil nodes, by
adding new sybil nodes or replacing existing ones. The latter action helps to make every
individual sybil node's behaviour appear more normal, which in turn makes it more likely
to succeed in establishing the necessary relations and less likely to be detected by sybil
defences. The adversary can also modify the inter-sybil connections and the fingerprints.
Since sybil subgraph update is executed after at least one re-identification attempt has
been conducted, the adversary can use information from this attempt, such as the level of
uncertainty in the re-identification, to decide the changes to introduce in the sybil subgraph.
Finally, if the number of fingerprints that can be constructed using the new set of sybil
nodes is larger than the previous number of targeted victims, that is 2Sti
− 1 > Yti−1, the
adversary can additionally target new victims, either new users that joined the network in
the last inter-release interval, or previously enrolled users that had not been targeted so
far. In the latter case, even if these victims had not been targeted before, the consistency
of the labelling in the sequence of sanitised snapshots entails that a re-identification in the
ti-th snapshot can be traced back to the previous ones.
3.3.2 Graph publication
As we discussed above, at time step ti, the data owner anonymises G+
ti and publishes
the sanitised version G(cid:63)
. From a general point of view, we treat the anonymisation as
ti
a two-step process. The first step is pseudonymisation, which consists in building the
8
ti → V (cid:48)(cid:63)
ti
, with V (cid:48)(cid:63)
isomorphism ϕti : VG+
for a pseudonym. The pseudonymised graph is denoted as ϕtiG+
are freshly generated.
vertices are kept, and fresh pseudonyms are assigned to new vertices.
= ∅, that replaces every real identity in G+
ti
ti . If i = 1, all pseudonyms
In the remaining cases, the pseudonyms for previously existing
ti ∩ VG+
ti
Releasing the pseudonymised graph has been proven to be insufficient for preventing re-
identification [22, 14, 32, 2, 20]. Thus, the second step of the anonymisation process consists
in applying a perturbation method Φti : ϕtiG+
) to the pseudonymised
graph. Perturbation consists in editing the vertex and/or edge sets of the pseudonymised
graph in such a way that the resulting graph satisfies some privacy guarantee against re-
identification. For the case of active adversaries, the relevant perturbation methods are
the ones based on random vertex/edge flipping and those based on the notions of (k, Γ(cid:96))-
(adjacency) anonymity [32, 18, 19, 20]. Finally, the data owner releases the graph G(cid:63)
ti
obtained as the result of applying pseudonymisation on G+
ti and perturbation on ϕtiG+
ti ,
that is G(cid:63)
ti
ti → (V (cid:63)
= Φti(ϕtiG+
ti × V (cid:63)
, V (cid:63)
ti ).
ti
ti
3.3.3 Re-identification
In the new scenario, re-identification is dynamic, as it occurs along several time-steps,
leveraging the increase of the adversary knowledge after the release of every new snapshot.
Considering the applicable techniques, we differentiate the first re-identification attempt,
which can be executed immediately after the publication of G(cid:63)
, from the remaining at-
ti
tempts, which we refer to as refinements, and can be executed after the release of every
other G(cid:63)
tj
, j > i.
First re-identification attempt: The first re-identification attempt is composed of two
steps: sybil subgraph retrieval and fingerprint matching. From a general point of view, the
procedure consists in the following steps:
1. Sybil subgraph retrieval:
(a) Find in G(cid:63)
ti
a set Xti = {X1, X2, . . . , Xp}, Xj ⊆ VG(cid:63)
, of candidate sybil sets. For
is a candidate sybil subgraph. Every specific
every X ∈ Xti, the graph (cid:104)X(cid:105)w
attack defines the conditions under which a candidate is added to Xti.
G(cid:63)
ti
ti
(b) Filter out elements of Xti that fail to satisfy temporal consistency constraints
. The specific constraints to
with respect to (cid:104)St1(cid:105)w
enforce depend on the instantiation of the attack strategy.
, . . . , (cid:104)Sti−1(cid:105)w
, (cid:104)St2(cid:105)w
G+
t2
G+
t1
ti−1
G+
(c) If Xti = ∅, the attack fails. Otherwise, proceed to fingerprint matching (step 2).
2. Fingerprint matching:
(a) Select one element X ∈ Xti. As in the previous steps, every specific attack
defines how the selection is made.
9
(b) Using X and Fti, find a set of candidate mappings YX = {φ1, φ2, . . . , φq}, where
ti \ Sti → Yti. Every element of YXti
every φj (1 ≤ j ≤ q) has the form φj : VG(cid:63)
represents a possible re-identification of the victims in G(cid:63)
ti
.
(c) Filter out elements of YXti
tency constraints with respect to Ft1,Ft2, . . . ,Fti−1.
that fail to satisfy (attack-specific) temporal consis-
(d) If YX (cid:48)
= ∅, the attack fails. Otherwise, select one element of YX (cid:48)
and give it as
the result of the re-identification. As in the previous steps, every specific attack
defines how the selection is made.
ti
ti
In an actual instantiation of the attack, steps 1.a-c, as well as steps 2.a-d, are not
necessarily executed in that order, nor independently. As we will show in Sects. 4 and 5,
combining temporal consistency constraints with structural similarity allows for higher
effectiveness and considerable speed-ups in several steps.
Re-identification refinement: As we discussed above, the first re-identification attempt
on G(cid:63)
can be executed immediately after the snapshot is published. Then, after the publi-
ti
cation of G(cid:63)
, j > i, the re-identification refinement step allows to improve the adversary's
tj
certainty on the previous re-identification, by executing the following actions:
1. Filter out elements of Xti that fail to satisfy additional temporal consistency con-
straints with respect to (cid:104)Sti(cid:105)w
G+
ti
and (cid:104)Stj(cid:105)w
G+
tj
.
2. Repeat the fingerprint matching step.
only once, waiting for the release of several G(cid:63)
tj1
Note that, in a specific attack, the adversary may choose to run the re-identification
on G(cid:63)
, and combining all
ti
temporal consistency checks of the first attempt and the refinements in a single execution
of step 1.b described above. However, we keep the main re-identification attempt separable
from the refinements considering that in a real-life attack the actual time elapsed between
G(cid:63)
ti
can be considerably large, e.g. several months.
, . . . , G(cid:63)
tjr
and G(cid:63)
tj
, G(cid:63)
tj2
4 A Novel Dynamic Active Attack
In this section we present what is, to the best of our knowledge, the first active attack on
periodically released dynamic social graphs. The novelty of our attack lies in its ability
to exploit the dynamic nature of the social graph being periodically published, and the
fact that the publication process occurs incrementally. Our attack benefits from temporal
information in two fundamental ways. Firstly, we define a number of temporal consistency
constraints, and use them in all stages of the re-identification process. In sybil subgraph
retrieval, consistency constraints allow us to obtain considerably small sets of plausible can-
didates, which increases the likelihood of the attacker selecting the correct one. A similar
situation occurs in fingerprint matching. Moreover, the incremental publication process al-
lows the adversary to refine previous re-identifications by applying new consistency checks
10
based on later releases. In all cases, temporal consistency constraints additionally make
the re-identification significantly fast, especially when compared with comparably noise-
resilient methods reported in the literature for the static publication scenario. The second
manner in which our attack benefits from the dynamicity of the publication process is
by adapting the set of fingerprints in the interval between consecutive re-identification
attempts in such a way that the level of uncertainty in the previous re-identification is
reduced.
In the remainder of this section, we will describe out new attack in detail. We will first
introduce the notions of temporal consistency. Then, we will describe the manner in which
temporal consistency is exploited for dynamic re-identification. Finally, we will describe
how tempo-structural patterns are created and maintained.
4.1 Temporal consistency constraints
As we discussed in Sect. 3.2, the data owner must assign the same pseudonym to each user
throughout the subsequence of snapshots where it appears, to allow for analysis tasks such
as community evolution analysis [6], link prediction [15], link persistence analysis [25], etc.
Since the data owner cannot distinguish between legitimate users (including victims) and
sybil accounts, she will assign time-persistent pseudonyms to all of them. Additionally,
since the adversary receives all sanitised snapshots, she can determine when a pseudonym
was used for the first time, whether it is still in use, and in case it is not, when it was used
for the last time.
t6
t5. After the release of G(cid:63)
t2. Additionally, she inserted s3 before the publication of G(cid:63)
In our attack, the adversary exploits this information in all stages of the re-identification
process. For example, consider the following situation. The set of sybil nodes at time-step
t6 is St6 = {s1, s2, s3, s4}. The adversary inserted s1 and s2 in the interval preceding
the publication of G(cid:63)
t3 and s4
before the publication of G(cid:63)
t6, during the sybil subgraph retrieval
phase of the first re-identification attempt, the adversary needs to determine whether a
set X ⊆ VG(cid:63)
, say X = {v1, v2, v3, v4}, is a valid candidate. Looking at the first snapshot
where each of these pseudonyms was used, the adversary observes that v1 and v3 were first
used in G(cid:63)
t2, so they are feasible matches for s1 and s2, in some order. Likewise, v2 was
first used in G(cid:63)
t5, so it is a feasible match for s4. However, she observes that v4 was first
used in G(cid:63)
t4, unlike any element of St6. From this observation, the adversary knows that
X is not a valid candidate, regardless of how structurally similar (cid:104)X(cid:105)w
are.
The previous example illustrates how temporal consistency constraints are used for
discarding candidate sybil sets. We now formalise the different types of constraints used in
our attack. To that end, we introduce some new notation. The function α+ : ∪ti∈T VG+
ti → T
yields, for every vertex v ∈ ∪ti∈T VG+
, the order of the first snapshot where v exists, that is
ti
G(cid:63)
t6
and (cid:104)St6(cid:105)w
G+
t6
α+(v) = min{{ti ∈ T v ∈ VG+
ti}}.
Analogously, the function α(cid:63) : ∪ti∈T VG(cid:63)
ti → T yields the order of the first snapshot where
11
each pseudonym is used, that is
α(cid:63)(x) = ti ⇐⇒ ∃v∈V
G+
ti
α+(v) = ti ∧ ϕti(v) = x.
Clearly, the adversary knows the values of the function α(cid:63) for all pseudonyms used by
the data owner. Additionally, she knows the values of α+ for all of her sybil nodes. Thus,
the previous functions allow us to define the notion of first-use-as-sybil consistency, which
is used by the sybil subgraph retrieval method.
Definition 1. Let X ⊆ VG(cid:63)
be a set of pseudonyms such that X = Sti and let φ : Sti →
be a mapping from the set of real sybil nodes to the elements of X. We say that X
VG(cid:63)
ti
and Sti satisfy first-use-as-sybil consistency according to φ, denoted as X (cid:39)φ Sti, if and
only if ∀s∈Sti
α+(s) = α(cid:63)(φ(s)).
Note that first-use-as-sybil consistency depends on the order in which the elements of
the candidate set are mapped to the real sybil nodes, which is a requirement of the sybil
subgraph retrieval method.
ti
We define an analogous notion of first use consistency for victims. In this case, the
adversary may or may not know the value of α+.
In our attack, we assume that she
does not, and introduce an additional function to represent the temporal information the
adversary must necessarily have about victims. The function β+ : ∪ti∈T Yti → T yields,
for every v ∈ ∪ti∈T Yti, the order of the snapshot where v was targeted for the first time,
that is
The new function allows us to define the notion of first-time-targetted consistency, which
β+(v) = min{{ti ∈ T v ∈ Yti}}.
is used in the fingerprint matching method.
Definition 2. Let v ∈ VG(cid:63)
be a victim candidate and let y ∈ Yti be a real victim. We
say that v and y satisfy first-time-targetted consistency, denoted as v (cid:39) y, if and only if
α(cid:63)(v) ≤ β+(y).
This temporal consistency notion encodes the rationale that the adversary can ignore
during fingerprint matching those pseudonyms that the data owner used for the first time
after the corresponding victim had been targeted.
ti
Finally, we define the notion of sybil-removal-count consistency, which is used by the
re-identification refinement method to encode the rationale that a sybil set candidate X,
for which no temporal inconsistencies were found during the ti-th snapshot, can be removed
from Xti when the ti+1-th snapshot is released, if the number of sybil nodes removed by the
adversary in the interval between these snapshots does not match the number of elements
of X that cease to exist in G(cid:63)
Definition 3. We say that a set of pseudonyms X ⊆ VG(cid:63)
satisfies sybil-removal-count
consistency with respect to the pair (Sti, Sti+1), which we denote as X (cid:39) (Sti, Sti+1), if and
only if X \ VG(cid:63)
ti+1 = Sti \ Sti+1.
ti+1
.
ti
Defs. 1 to 3 play an important role in the new dynamic re-identification methods in-
troduced as part of the new attack, as we will discuss in what follows.
12
4.2 Dynamic re-identification
In what follows we describe the methods for sybil subgraph retrieval and fingerprint
matching, which are conducted during the first re-identification attempt, as well as the
re-identification refinement method.
In all cases, we pose the emphasis on the manner
in which they use the notions of temporal consistency for maximising effectiveness and
efficiency.
4.2.1 Sybil subgraph retrieval
The sybil subgraph retrieval method is a breath-first search procedure, which shares the
philosophy of analogous methods devised for active attacks on static graphs [2, 20], but
differs from them in the use of temporal consistency constraints for pruning the search
space. To establish the order in which the search space is traversed, our method relies on
the existence of an arbitrary (but fixed) total order ≺ among the set of sybil nodes, which
is enforced by the sybil subgraph creation method and maintained by the sybil subgraph
update method.
Let s1 ≺ s2 ≺ . . . ≺ sSti be the order established on the elements of Sti. The search
procedure first builds a set of cardinality-1 partial candidates
Xti,1 = {{vj1} vj1 ∈ VG(cid:63)
ti}.
(cid:12)(cid:12)(cid:12)δG(cid:63)
(cid:48)
ti,1 by removing from Xti,1 all elements
(cid:12)(cid:12)(cid:12) > θ. The first condition verifies
Then, it obtains the pruned set of candidates X
{vj1} such that α(cid:63)(vj1) (cid:54)= α+(s1), or
that the first-use-as-sybil consistency property {vj1} (cid:39)φ {s1} holds, with φ = {(s1, vj1)}.
The second condition is analogous to the one applied in the noise-tolerant sybil subgraph
retrieval method introduced in [20] as part of the so-called robust active attack. It aims to
exclude from the search tree all candidates X such that ∆((cid:104)X(cid:105)w
) > θ, where ∆
G(cid:63)
ti
is a structural dissimilarity function and θ is a tolerance threshold.
(vj1) − δG+
,(cid:104)Sti(cid:105)w
(s1)
G+
ti
ti
ti
After pruning Xti,1, the method builds the set of cardinality-2 partial candidates
Xti,2 = {{vj1, vj2} {vj1} ∈ Xti,(cid:96), vj2 ∈ VG(cid:63)
ti \ {vj1}}.
Similarly, Xti,2 is pruned by removing all elements {vj1, vj2} such that {vj1, vj2} (cid:54)(cid:39)φ {s1, s2},
with φ = {(s1, vj1), (s2, vj2)}, and ∆((cid:104){vj1, vj2}(cid:105)w
,(cid:104){s1, s2}(cid:105)w
) > θ.
G+
ti
G(cid:63)
ti
In general, for (cid:96) ≤ Sti, the method builds the set of partial candidates
Xti,(cid:96) = {{vj1, . . . , vj(cid:96)} {vj1 . . . , vj(cid:96)−1} ∈ Xti,(cid:96)−1,
vj(cid:96) ∈ VG(cid:63)
ti \ {vj1, . . . , vj(cid:96)−1}}
and obtains the pruned candidate set X
such that
(cid:48)
ti,(cid:96) by removing from Xti,(cid:96) all elements {vj1, . . . , vj(cid:96)}
{vj1, . . . , vj(cid:96)} (cid:54)(cid:39)φ {s1, . . . , s(cid:96)},
13
with φ = {(s1, vj1), . . . , (s(cid:96), vj(cid:96))}, and
∆((cid:104){vj1, . . . , vj(cid:96)}(cid:105)w
G(cid:63)
ti
) > θ.
G+
ti
,(cid:104){s1, . . . , s(cid:96)}(cid:105)w
(cid:96)(cid:88)
(cid:12)(cid:12)(cid:12)δ(cid:48)
(cid:12)(cid:12)(cid:12)
(sk) − δ(cid:48)
G(cid:63)
ti
G+
ti
(vjk)
In our attack, we use the structural dissimilarity measure defined in [20], which makes
∆((cid:104){vj1, . . . , vj(cid:96)}(cid:105)w
k=1
(sk) is is the number of neighbours of sk in G+
,(cid:104){s1, . . . , s(cid:96)}(cid:105)w
) = D +
G+
ti
G(cid:63)
ti
(vjk) is is the number of neighbours of vjk in G(cid:63)
ti
where δ(cid:48)
G+
ti
δ(cid:48)
G(cid:63)
ti
ti that are not in {s1, . . . , s(cid:96)},
that are not in {vj1, . . . , vj(cid:96)}, and
D = {(jk, jk(cid:48)) EG(cid:63)
ti ∩ {(vjk, vjk(cid:48) )} + EG+
ti ∩ {(sk, sk(cid:48))} = 1}
is an efficiently computable estimation of the edge-edit distance between (cid:104){vj1, . . . , vj(cid:96)}(cid:105)G(cid:63)
and (cid:104){s1, . . . , s(cid:96)}(cid:105)G+
Sti candidates, that is
Finally, the sybil subgraph retrieval method gives as output the pruned set of cardinality-
ti
ti
.
Xti = X
(cid:48)
ti,Sti.
In other words, our method gives as output the set of temporally consistent subsets whose
weakly induced subgraphs in G(cid:63)
are structurally similar, within a tolerance threshold θ,
ti
to that of the original set of sybil nodes in G+
ti .
4.2.2 Fingerprint matching
After Xti is obtained, a candidate X = {vj1, vj2, . . . vjSti
} is randomly selected from Xti,
with probability 1Xti, for conducting the fingerprint matching step. Let vj1 ≺ vj2 ≺ . . . ≺
be the order established on the elements of X by the sybil subgraph retrieval method.
vjSti
Our fingerprint matching method is a depth-first search procedure, which gives as
output a set YX = {φ1, φ2, . . . , φq}, where every φ ∈ YX has the form φ : Yti → NG(cid:63)
(X).
Every element of YX maximises the pairwise similarities between the original fingerprints
of the victims and the fingerprints, with respect to X, of the corresponding pseudonymised
vertices.
ti
u = NG(cid:63)
ti
The method first finds all equally best matches between the (real) fingerprint Fj of a
(X) with respect to X,
victim yj ∈ Yti and that of a temporally consistent vertex u ∈ NG(cid:63)
that is F (cid:63)
(u) ∩ X. Then, for every such match, it recursively applies the search
procedure to match the remaining real victims to other temporally consistent candidate vic-
tims. For every victim yj and every candidate match u, the similarity function sim(F (cid:63)
u , Fj)
integrates the verification of the temporal consistency and the structural fingerprint, and
is computed as
ti
sim(F (cid:63)
u , Fj) =
u , Fj)
if u (cid:39) yj
and simc(F (cid:63)
otherwise.
u , Fj) ≥ η
simc(F (cid:63)
0
14
where η is a tolerance threshold allowing to ignore insufficiently similar matches and the
function simc(F (cid:63)
u , Fj) is defined as
Sti(cid:88)
with
µk(F (cid:63)
u , Fj) =
simc(F (cid:63)
u , Fj) =
µk(F (cid:63)
u , Fj)
(cid:26) 1
0
k=1
if vjk ∈ F (cid:63)
otherwise.
u and sk ∈ Fj
Our method is similar to the one introduced in [20] in the fact that it discards match-
ings whose structural similarity is insufficiently high. Moreover, temporal consistency con-
straints allow our method to considerably reduce the number of final candidate mappings.
4.2.3 Re-identification refinement
ti+1
ti \ VG(cid:63)
After the ti+1-th snapshot is released, the adversary obtains additional information that
can improve the re-identification at the ti-th snapshot. In specific, the adversary learns
the set VG(cid:63)
of pseudonyms corresponding to users that ceased to be members
of the social network in the interval between the ti-th and the ti+1-th snapshots. If the
adversary removed some sybil nodes sj1, sj2, . . . , sjr in this interval, then she knows
that {ϕti(sj1), ϕti(sj2), . . . , ϕti(sjr)} ⊆ VG(cid:63)
. This information allows the adversary
to refine the set Xti obtained in the first re-identification attempt on G(cid:63)
. Certainly, a
ti+1 (cid:54)= Sti \ Sti+1 is not a valid match for Sti.
candidate X such that X \ VG(cid:63)
that violate the sybil-removal-count consistency notion, that is
, the adversary refines Xti by removing the candidates
Thus, after the publication of G(cid:63)
ti \ VG(cid:63)
ti+1
ti+1
ti
(cid:8)X X (cid:54)(cid:39) (Sti, Sti+1)(cid:9) ,
(cid:48)
ti
X
= Xti \
and re-runs the fingerprint matching step with X
(cid:48)
ti
.
4.3 Sybil Subgraph Creation and Update
Here we describe how the necessary tempo-structural patterns for dynamic re-identification
are created and maintained. Both the sybil subgraph creation and the sybil subgraph
update stages contribute to this task. Additionally, the sybil subgraph update addresses
other aspects of the dynamic behaviour of the new attack, e.g. targeting new victims.
4.3.1 Sybil subgraph creation
In the dynamic attack, the initial sybil graph is not necessarily created before the first
snapshot is released. Let G(cid:63)
be the first snapshot where the adversary conducts a re-
ti
identification attempt. Then, the sybil sugbraph creation is executed during the entire time
window preceding ti. The adversary initially inserts a small number of sybil nodes, no more
15
(cid:106)
(cid:16)
(cid:17)(cid:107)
log2
VG+
ti
. This makes the sybil subgraph very unlikely to be detected by sybil
than
defences [37, 36, 2, 19, 20], while allowing to create unique fingerprints for a reasonably
large number of potential initial victims. Spreading sybil injection over several snapshots
helps create temporal patterns that reduce the search space during sybil subgraph retrieval.
As sybil nodes are inserted, they are connected to other sybil nodes and to some of the
victims. Inter-sybil edges are created in a manner that has been shown in [2] to make the
sybil subgraph unique with high probability, which helps in accelerating the breath-first
search procedure in the basis of sybil subgraph retrieval. First, an arbitrary (but fixed)
order is established among the sybil nodes. In our case, we simply take the order in which
the sybils are created. Let s1 ≺ s2 ≺ . . . ≺ sSti represent the order established among
the sybils. Then, the edges (s1, s2), (s2, s3), . . . , (sSti−1, sSti) are added to force the
existence of the path s1s2 . . . sSti. Additionally, every other edge (sj, sk), j − k ≥ 2, is
added with probability 0.5. The initial fingerprints of the elements of Yti are randomly
generated by connecting each victim to each sybil node with probability 0.5, checking that
all fingerprints are unique.
4.3.2 Sybil subgraph update
ti−1
and G(cid:63)
ti
Let G(cid:63)
be two consecutive releases occurring after the first snapshot where the
adversary conducted a re-identification attempt (G(cid:63)
itself may have been this snapshot).
In the interval between G(cid:63)
, the adversary updates the sybil subgraph by adding
and/or removing sybil nodes and inter-sybil edges, updating the fingerprints of (a subset of)
the victims, and possibly targeting new victims. The changes made in the sybil subgraph
aim to improve the sybil subgraph retrieval and fingerprint matching steps in future re-
identification attempts. We describe each of these modifications in detail in what follows.
and G(cid:63)
ti
ti−1
ti−1
Adding and replacing sybil nodes
log2
(cid:106)
(cid:16)
(cid:17)(cid:107)
In our attack, the adversary is conservative regarding the number of sybil nodes, balancing
the capacity to target more victims with the need to keep the likelihood of being detected by
sybil defences sufficiently low. Thus, the number of sybil nodes is increased as the number
. If the graph growth
of nodes in the graph grows, but keeping Sti ≤
rate between releases is small, this strategy translates into not increasing the number of
sybils during many consecutive releases. However, this does not mean that new sybil nodes
are not created, since the attack additionally selects a (small) random number of existing
sybil nodes and replaces them for fresh sybil nodes. The purpose of these replacements is
twofold. First, they allow to keep the activity level of each individual sybil node sufficiently
low, and thus make it less distinguishable from legitimate nodes. Secondly, the frequent
modification of the set of sybils helps reduce the search space for sybil subgraph retrieval, by
increasing the number of potential candidates violating the first-use-as-sybil consistency
constraint, and enables the re-identification refinement process to detect more sybil set
candidates violating the sybil-removal-count consistency constraint.
VG(cid:63)
ti−1
16
1, s(cid:48)
ti , and let s(cid:48)
node is replaced. Let S(cid:48) = {s(cid:48)
We now discuss the changes that the adversary does in the set of inter-sybil edges to
handle sybil node addition and replacement. Let Sti−1 = {s1, s2, . . . , sSti−1} be the set
of sybil nodes present in G+
ti−1, and let s1 ≺ s2 ≺ . . . ≺ sSti−1 be the order established
among them. We first consider the case of sybil node addition, where no existing sybil
2, . . . , sq} be the set of new sybil nodes that will be
2 ≺ . . . ≺ sq be the order established on them. A structure
ti the edges
q−1, s(cid:48)
q), which results in extending the path s1s2 . . . sSti−1 into
ti every node (x, y), x ∈ S(cid:48),
1 ≺ s(cid:48)
added to G+
analogous to that of the previous sybil subgraph is enforced by adding to G+
(sSti−1, s(cid:48)
1), (s(cid:48)
1, s(cid:48)
2), . . . , (s(cid:48)
1s(cid:48)
s1s2 . . . sSti−1s(cid:48)
2 . . . sq. Additionally, the adversary adds to G+
y ∈ (Sti−1 ∪ S(cid:48)) \ NG+
Now, we describe the modifications made by the adversary for replacing a sybil node
sj ∈ Sti−1 for a new sybil node s (s /∈ S(cid:48)).
In this case, the adversary adds to G+
ti
the edges (sj−1, s) and (s, sj+1), where sj−1 and sj+1 are the sybil nodes immediately
preceding and succeeding sj according to ≺. The order ≺ is updated accordingly to make
s1 ≺ s2 ≺ . . . ≺ sj−1 ≺ s ≺ sj+1 ≺ . . . ≺ sSi−1. These modifications ensure that the path
s1s2 . . . sSti−1 guaranteed to exist in G+
ti for s1s2 . . . sj−1ssj+1 . . . sSi−1.
Additionally the new sybil node s is connected to every other sybil node with probability
0.5. In our attack, every sybil node removal is part of a replacement, so the number of
sybil nodes never decreases.
ti−1 is replaced in G+
(x), with probability 0.5.
ti
Updating fingerprints of existing victims
After replacing a sybil node s ∈ Sti−1 for a new sybil node s(cid:48)
to G+
s for s(cid:48) does not render any pair of fingerprints identical in G+
ti .
ti the edge (s(cid:48), y) for every y ∈ Yti−1 ∩ NG+
ti−1
∈ Sti\Sti−1, the adversary adds
(s), to guarantee that the replacement of
Finally, if the adversary has conducted a re-identification attempt on G(cid:63)
Additionally, if new sybil nodes were added, the fingerprints of all previously targeted
victims in Yti−1 are modified by creating edges linking them to a subset of the new sybil
nodes. For each new sybil node s ∈ Sti \ Sti−1 and every victim y ∈ Yti−1, the edge (s, y) is
added with probability 0.5.
, she makes
additional changes in the set Fti of fingerprints in G+
ti based on the outcomes of the re-
identification, specifically on the level of uncertainty suffered because of Fti−1. To that
end, she selects a subset Y (cid:48)
of victims whose fingerprints were the least useful during the
re-identification attempt, in the sense that they were the most likely to lead to a larger
number of equally likely options after fingerprint mapping. The adversary modifies the
by randomly flipping one edge of the form (y, s), s ∈ Sti−1,
checking that the new fingerprint does not coincide with a previously existing fingerprint.
is obtained as follows. For every victim yj ∈ Yti−1, let pj : Rj → [0, 1] be
fingerprint of every y ∈ Y (cid:48)
The set Y (cid:48)
ti−1
ti−1
ti−1
ti−1
a probability distribution where
(cid:110)
(cid:111)
Rj =
v ∈ VG(cid:63)
ti−1 ∃X∈Xti−1∃φ∈YX φ(v) = yj
17
is the set of vertices mapped to yj according to some X ∈ Xti−1 and the corresponding YX.
That is, for every element v ∈ Rj, pj(v) represents the probability that v has been mapped
to yj in the previous re-identification attempt according to some sybil subgraph candidate
and some of the resulting fingerprint matchings, and is defined as
where
τj(φ, v) =
pj(v) =
(cid:26) 1
0
(cid:80)
(cid:80)
X∈Xti−1
τj (φ,v)
φ∈YX
YX
Xti−1
if v ∈ dom(φ) and φ(v) = yj
otherwise.
Finally, the set Y (cid:48)
ti−1
is obtained by making
where H(pj) is the entropy of the distribution pj, that is
Y (cid:48)
ti−1
= arg max
yj∈Yti−1 {H(pj)},
(cid:88)
pj(v) log pj(v).
H(pj) = −
v∈Rj
If the maximum entropy value is reached for more than one victim, all of their fingerprints
are modified. We chose to use entropy for obtaining Y (cid:48)
because it is a well established
quantifier of uncertainty.
ti−1
Targeting new victims
(cid:110)
After the fingerprints of existing victims have been updated, the final step of sybil subgraph
update consists in targeting new victims. To that end, the adversary chooses a set of
− Yti−1 − 1
vertices y1, y2, . . . , yr ∈ Vti\Yti−1, with 0 ≤ r ≤ min
and adds them to Yti. The new victims can either be fresh vertices, that is vertices that
first appear in G+
ti , or previously untargeted ones. The fingerprints of the new victims are
created in the same manner as those of the initial victims. That is, for every yj, 1 ≤ j ≤ r,
the vertex (yj, s), s ∈ Sti, is added to G+
ti with probability 0.5, checking that the newly
generated fingerprint is different from those of all previously targeted victims.
ti−1 − Yti−1, 2Sti−1
VG(cid:63)
(cid:111)
5 Experimental Evaluation
In this section, we experimentally evaluate our new dynamic active attack. Our evaluation
has three goals. First, we show that our attack outperforms Mauw et al.'s static robust ac-
tive attack [20] in terms of both effectiveness and efficiency. For simplicity, throughout this
section we will use the acronym D-AA for our attack and S-RAA for the static robust active
attack. Secondly, we determine the factors that affect the performance of our new attack,
18
and evaluate their impact. From this analysis, we derive a number of recommendations
allowing data owners to balance privacy preservation and utility in random perturbation
methods for periodical social graph publication. Due to the scarcity of real-life temporally
labelled social graphs, we run the aforementioned experiments on synthetic dynamic social
graphs. We developed a synthesiser that can be flexibly configured to generate synthetic
dynamic social graphs with specific properties, e.g. the initial number of nodes and the
growth rate. Using this synthesiser, we run each instance of our experiments in a collec-
tion of 100 synthetic datasets, which allows to mitigate the impact of random components
of our attack and the synthesiser itself. To conclude, we replicate some of the previous
experiments on a real-life dataset, to show that some of the findings obtained on synthetic
data remain valid in practical scenarios.
5.1 Experimental Setting
We implemented an evaluation tool based on the model described in Sect. 3. A dynamic
social graph simulator loads a real-life dataset, or uses the synthesiser, to generate the se-
quence G = (Gt1, Gt2, . . . , Gti, . . .) containing only legitimate users. Each snapshot is then
processed by a second module that simulates sybil subgraph creation or update. The out-
put, which is the data owner's view of the social graph, is processed by graph perturbation
module. In this module, we implement a simple perturbation method consisting in the
addition of cumulative noise. Finally, a fourth module simulates the re-identification on
the perturbed graph and computes the success probability of the attack. Sybil subgraph
creation and update, as well as re-identification, are discussed in detail in Sect. 4. We
describe in what follows the implementation of the remaining modules.
5.1.1 Dynamic social graph simulator
Our simulator allows us to conduct experiments on temporally annotated real-life datasets,
as well as synthetic datasets.
In the first case, the simulator extracts from the dataset
the graph snapshots by using a specific handler. The simulator is parameterised with
a sequence of the time-stamps indicating when each snapshot should be taken. Every
snapshot is built by taking all vertices and edges created at a moment earlier or identical
to the corresponding time-stamp and still not eliminated.
As we mentioned, we include in our simulator a synthesiser for generating periodically
released dynamic social graphs, which is based on the Barab´asi-Albert (BA) generative
graph model [1]. We use BA because it preserves the properties of real social graphs, namely
power-law degree distribution [1], shrinking diameter [13], and preferential attachment.
The BA model generates scale-free networks by iteratively adding vertices and creating
connections for the newly added vertices using a preferential attachment scheme. This
means that the newly added vertices are more likely to be connected to previously existing
nodes with larger degrees. The BA model has two parameters: the number of nodes n0 of
a (small) seed graph, and the initial degree Me (Me ≤ n0) of every newly added node. The
initial seed graph can be any graph. In our case we use a complete graph Kn0. Every time a
19
new node v is added to the current version G of the BA graph, Me edges are added between
v and randomly selected vertices in VG. The probability of selecting a vertex w ∈ VG for
creating the new edge (v, w) is
δG(x), as prescribed by preferential attachment.
To generate the graph sequence, the synthesiser takes four parameters as input:
δG(w)
x∈VG
(cid:80)
• The parameter n0 of the BA model.
• The parameter Me of the BA model.
• The number of vertices of the first snapshot nv.
• The growth rate r∆, defined as the proportion of new edges compared to the previous
number.
The parameters nv and r∆ determine when snapshots are taken. The first snapshot is
taken when the number of vertices of the graph generated by the BA model reaches nv,
and every other snapshot is taken when the ratio between the number of new edges and
that of the previous snapshot reaches r∆.
5.1.2 Graph perturbation via cumulative noise addition
To the best of our knowledge, all existing anonymisation methods against active attacks
based on formal privacy properties [18, 19] assume a single release scenario, and are thus
insufficient for handling multiple releases. Proposing formal privacy properties that take
into account the specificities of the multiple release scenario is part of the future work.
In our experiments, we adapted the other known family of perturbation methods, random
noise addition, to the multiple release scenario.
, the noise incrementally added on G(cid:63)
is re-applied on the pseudonymised graph ϕtiG+
, and then fresh noise is added on G(cid:63)
ti
To account for the incrementality of the publication process, the noise is added in a
t1, G(cid:63)
cumulative manner. That is, when releasing G(cid:63)
t2,
ti
. . . , G(cid:63)
ti to obtain an intermediate noisy
ti−1
graph G(cid:63)
that is released.
ti
,
In re-applying the old noise, all noisy edges incident in a vertex v ∈ VG(cid:63)
ti−1 \ Vϕti G+
ti
removed after the release of G(cid:63)
, are forgotten. The fresh noise addition consists in
randomly flipping a number of edges of G(cid:63)
is
ti
, the edge is removed, otherwise it is added. The
uniformly selected and, if (v, w) ∈ E G(cid:63)
cumulative noise addition method has one parameter: the amount of fresh noise to add in
each snapshot, called noise ratio and denoted Ωnoise. It is computed with respect to E G(cid:63)
ti,
the number of edges of the pseudonymised graph after restoring the accumulated noise.
. For every flip, a pair (v, w) ∈ V G(cid:63)
to obtain the graph G(cid:63)
ti
ti × V G(cid:63)
ti
ti−1
ti
5.1.3 Success probability
As in previous works on active attacks for the single release scenario [18, 19, 20], we evaluate
the adversary's success in terms of the probability that she correctly re-identifies all victims,
20
P r(ti)
succ =
X∈Xti
Xti
p
(ti)
X
if Xti (cid:54)= ∅
otherwise
(cid:80)
0
(cid:26) 1YX
0
Figure 2: Effectiveness comparison between S-RAA and D-AA.
which in our scenario is computed by the following formula for the ti-th snapshot:
where
p(ti)
X =
if ∃φ∈YX φ−1 = ϕtiYti
otherwise
and, as discussed in Sect. 3.3, ϕti is the isomorphism applied on G+
nymised graph ϕtiG+
re-identification refinement is executed.
ti . For every snapshot G(cid:63)
ti
ti to obtain the pseudo-
, we compute success probability after the
5.2 Results and Discussion
We begin our discussion with the comparison of D-AA and S-RAA. Then, we proceed to
study the factors that affect the effectiveness of our attack, and characterise their influence.
Finally, we use the real-life dataset Petster [12] to illustrate the effectiveness of our attack
in practice. For the first two sets of results, we use synthetic dynamic graphs generated by
our synthesiser. Table 1 summarises the different configurations used for the generation.
Furthermore, before each release, we select at least 1 and maximum 5 random legitimate
vertices as new victims. For each parameter combination, we generated 100 synthetic
dynamic graphs, and the results shown are the averages over each subcollection.
5.2.1 Comparing D-AA and S-RAA
The goal of this comparison is to show that our dynamic active attack outperforms the
original attack in both effectiveness and efficiency. We use six settings for the dynamic
21
24681012141618snapshot0.00.20.40.60.81.0success probabilityMe=5, nv=200D-RAAS-RAA24681012141618snapshot0.00.20.40.60.81.0success probabilityMe=5, nv=400D-RAAS-RAA24681012141618snapshot0.00.20.40.60.81.0success probabilityMe=5, nv=800D-RAAS-RAA24681012141618snapshot0.00.20.40.60.81.0success probabilityMe=10, nv=200D-RAAS-RAA24681012141618snapshot0.00.20.40.60.81.0success probabilityMe=10, nv=400D-RAAS-RAA24681012141618snapshot0.00.20.40.60.81.0success probabilityMe=10, nv=800D-RAAS-RAASect. n0 Me
5.2.1 30
5.2.2 30
5, 10
5, 10
nv
200, 400,800
2000, 4000, 8000
r∆ Ωnoise(%)
5% 0.5
5% 0.5, 1.0, 1.5, 2.0
Table 1: Combinations of parameters for the simulator.
graph synthesiser. For each value of Me (5 and 10), we set the initial number of vertices
nv at 200, 400 and 800. In all our experiments, sybil subgraph creation spans the first
and second snapshots, and the re-identification is executed for the first time on the second
snapshot.
Effectiveness comparison. In Fig. 2 we show the success probabilities of the two attacks
on graphs with different initial sizes and amounts of changes between consecutive releases
(determined by Me with r∆ fixed as 5%).
We have three major observations from the results. First, we can see that D-AA
significantly outperforms S-RAA in terms of success probability. The improvement becomes
larger when smaller numbers of changes occur between releases. D-AA outperforms S-RAA
by at least twice, even up to three times for the first few snapshots. When graphs grow
slowly (Me = 5), our attack always displays an average success probability larger than 0.5
which S-RAA never reaches. Second, the success probability of the original S-RAA has a
general trend to drop along with time, while D-AA displays a large increase from the first
to the second snapshot, and then remains stable or degrades very slowly. This is the result
of the reduced uncertainty enabled by the temporal consistency constraints. The frequent
modification of the set of sybil nodes allows our attack to offset the noises accumulated
over time and maintain an acceptable success probability even at the later releases. When
Me is set to 10, the success probability remains above 0.5 until the sixth snapshot, even
though noise grows faster in this case. Third, S-RAA is more likely to be influenced by
the randomness of graph structures and noise, as shown by the large fluctuations of the
success probability, while our D-AA displays smaller variance and smoother curves.
Efficiency comparison. Fig. 3 shows the average amount of time consumed by S-RAA
and D-AA in different scenarios. We can see that D-AA takes an almost constant amount
of time at all snapshots, whereas the time consumption of S-RAA grows considerably
along time. This clearly shows that the use of temporal information in dynamic social
graphs helps D-AA to effectively avoid the computation overhead. We highlight the fact
that D-AA runs at least 10 times faster in almost all cases, especially in late snapshots.
An interesting observation is that the running time of S-RAA decreases when Me = 10
and the size of the initial graph is 800. Rather than an improvement, this is in fact the
consequence of the repeated failure of the sybil subgraph retrieval algorithm to find any
candidates. This problem is in turn caused by the small tolerance threshold required by
S-RAA to complete runs in reasonable time.
22
Figure 3: Efficiency comparison between S-RAA and D-AA.
5.2.2 Factors influencing our attack
We intend this analysis to serve as a guide for customising the settings of privacy-preserving
publication methods for dynamic social graphs, in particular for determining the amount
of perturbation needed to balance the privacy requirements and the utility of published
graphs. Since our attack is considerably efficient, we will use for this evaluation dynamic
graphs featuring 2000, 4000 and 8000 initial vertices. In addition, we set large tolerance
thresholds for structural dissimilarity in the sybil subgraph retrieval method, which in-
creases the probability that it finds ϕti(Sti) as a candidate. In our experiment, we set the
threshold θti used at the i-th snapshot to θti = min(1500, 16 + 250× (i− 2)2). Three factors
may possibly impact the effectiveness of re-identification attacks on dynamic graphs: the
amount of noise, the size of graphs and the speed of growth between two releases. As a
result, we analyse three parameters which determine these three factors in our simulator:
Ωnoise, Me and nv. The number of vertices in the initial snapshots nv determines the scale
of the released graphs, while the parameter Me of the BA model controls the number of
new nodes and edges added before the next release. The noise ratio Ωnoise determines the
amount of noise.
Effectiveness. Fig. 4 shows the success probability of our attack when different noise
ratios are applied on dynamic graphs with different initial sizes and growth speeds. First,
we can see that the success probability decreases when more noise is applied. This is
natural as more perturbation makes it more difficult to find the correct sybil sugraph,
either because the sybil graph has been too perturbed to be found as a candidate or because
edge perturbation generates more subgraphs similar to the original sybil subgraph. When
Me = 5 and the noise ratio is set to 0.5%, success probability always remains above 0.5. For
this value of Me, even with Ωnoise at 2.0%, the attack still displays success probability above
0.5 in the first three snapshots. Second, the rate at which success probability decreases
slows down as we increase the value of the noise ratio. The largest drop occurs when
23
24681012141618snapshot01020304050time (s)Me=5, nv=200D-RAAS-RAA24681012141618snapshot01020304050time (s)Me=5, nv=400D-RAAS-RAA24681012141618snapshot01020304050time (s)Me=5, nv=800D-RAAS-RAA24681012141618snapshot01020304050time (s)Me=10, nv=200D-RAAS-RAA24681012141618snapshot01020304050time (s)Me=10, nv=400D-RAAS-RAA24681012141618snapshot01020304050time (s)Me=10, nv=800D-RAAS-RAAFigure 4: Factors influencing the success probability.
Figure 5: Factors influencing the utility of released graphs.
we increase Ωnoise from 0.5 to 1.0. This suggests that keeping increasing the level of
perturbation may not necessarily guarantee a better privacy protection, but just damage
the utility of the released graphs. Third, the sequences of success probability values show a
very small dependence on the initial size of the graphs, with other parameters fixed. Last,
the success probability decreases when dynamic graphs grow faster. From the figure, we
can see that the probability reduces by about 10% when we increase the value of Me from
5 to 10.
Summing up, we observe that the risk of re-identification decreases when more pertur-
bation is applied and when the graphs grow faster, whereas the initial size of the graphs
has a relative small impact on this risk.
Utility. We evaluate the utility of released graphs in terms of three measures: the per-
centage of edge editions, the variation of the average local clustering coefficient, and the
KL-divergence of degree distributions. The first measure quantifies the percentage of edge
flips with respect to the total number of edges. In fact, it quantifies the amount of noise
24
24681012141618snapshot0.00.20.40.60.81.0success probabilityMe=5, nv=200024681012141618snapshot0.00.20.40.60.81.0success probabilityMe=5, nv=400024681012141618snapshot0.00.20.40.60.81.0success probabilityMe=5, nv=800024681012141618snapshot0.00.20.40.60.81.0success probabilityMe=10, nv=200024681012141618snapshot0.00.20.40.60.81.0success probabilityMe=10, nv=400024681012141618snapshot0.00.20.40.60.81.0success probabilityMe=10, nv=8000noise=0.5%noise=1.0%noise=1.5%noise=2.0%24681012141618snapshot0510152025edge difference (%)24681012141618snapshot510152025avg lcc difference (%)24681012141618snapshot1.001.011.021.031.041.051.061.07KL-divergencenoise=0.5%,Me=5noise=1.0%,Me=5noise=1.5%,Me=5noise=2.0%,Me=5noise=0.5%,Me=10noise=1.0%,Me=10noise=1.5%,Me=10noise=2.0%,Me=10accumulated so far. For the ti-snapshot, the percentage of edge editions is computed as
1
EG+
ti {(v, v(cid:48)) ∈ EG+
ti (ϕ(v), ϕ(v(cid:48))) (cid:54)∈ G(cid:63)
ti} ∪ {(v, v(cid:48)) ∈ EG(cid:63)
ti (ϕ−1(v), ϕ−1(v(cid:48))) (cid:54)∈ G+
ti} .
The local clustering coefficient (LCC) of a vertex measures the proportion of pairs of
mutual neighbours of the vertex that are connected by an edge. We calculate the average
to the LCCs of all vertices and take the proportion between the differences of the value of
the original graph and that of the anonymised graph as, that is
avgLcc(G+
ti ) − avgLcc(G(cid:63)
avgLcc(G+
ti )
ti
)
.
where avgLcc(G) is the average local clustering coefficient of graph G. Our last measure
uses the KL-divergence [11] as an indicator of the difference between the degree distribution
of the original graph and that of the perturbed graph.
As all the three measures present almost identical patterns for different values of nv, we
only show the results for nv = 8000. We have two major observations. First, as expected,
the values of all three measures increase as the noise accumulates over time, indicating
that the utility of released graphs deteriorates. Even with Ωnoise set to just 1.0%, at the
tenth snapshot we can have up to 10% of edges flipped and changes in edge density around
15%. At this point, we can say that the utility of released graphs has already been greatly
damaged. Second, when dynamic graphs grow faster, the impact of noise becomes smaller,
as more legitimate edges offset the impact of noisy edges.
Together with the finding that larger growth speed results in smaller success probability,
we can conclude that the social networks that grow fast among releases display a better
balance between re-identification risk and the utility of the released graphs.
5.2.3 Results on a real-life dynamic social graph
We make use of a publicly available graph collected from Petster, a website for pet owners to
communicate [12], to validate to what extent the results reported in the previous subsection
remain valid in a more realistic domain. The Petster dataset is an undirected graph whose
vertices represent the pet owners. The vertices are labelled by their joining date, which
span from January 2004 to December 2012. The graph is incremental, which means no
vertices are removed. It contains 1898 vertices and 16, 750 edges. We take a snapshot every
six months.
We present in Fig. 6(a) the success probability of our D-AA attack on the Petster
dataset when the noise ratio is set to 0.5%, 1.0% and 1.5%, respectively. Compared to the
success probabilities discussed above on simulated graphs, the curves have different shapes
and more fluctuations. This is because, instead of a fixed growth speed (determined by r∆
and Me in our simulator), the real-life graph grows at different speeds in different periods,
as shown in Fig. 6(b). We can see that the number of new vertices varies before each
release. After the first few years of steady growth, Petster gradually lost its popularity,
25
(a) Re-identification risk on Petster.
(b) Numbers of new vertices added be-
fore release.
Figure 6: Evaluation on Petster.
especially with few new vertices added in the last three years. By cross-checking the two
figures, we can see that the success probability changes with the amount of growth before
the corresponding release. It first increases steadily due to the steady growth of the graph
until the fifth snapshot, which suddenly has the largest number of new vertices. Then when
the growth slows down, the success probability also recovers; and when the growth stops
(e.g., from the 12 snapshot), it starts increasing again, even though the noise continues
to accumulate. These observations validate our findings on synthetic graphs, that is, the
speed of growth is the dominating factor that affects the re-identification risk.
6 Conclusions
In this paper, we have presented the first dynamic active re-identification attack on pe-
riodically released social graphs. Unlike preceding attacks, the new attack exploits the
inherent dynamic nature of social graphs by leveraging tempo-structural patterns for re-
identification. Compared to existing (static) active attacks, our new dynamic attack sig-
nificantly improves success probability, by more than two times, and efficiency, by almost
10 times. Through comprehensive experimental evaluation on synthetic data, we analysed
the factors influencing the success probability of our attack, namely the growth rate of
the graph and the amount of noise injected. These findings can subsequently be used
to develop graph anonymisation methods that better balance privacy protection and the
utility of the released graphs. For instance, for a given noise level, the decision to publish
a new snapshot should be determined by taking into account the number of changes that
have occurred from the last release. Similarly, if the time for the next release is given,
the amount of noise should be customised according to the number of changes that have
occurred. Additionally, we evaluated our attack on Petster, a real-life dataset. This evalu-
ation showed that some of the findings obtained on synthetic data remain valid in practical
scenarios.
Acknowledgements: The work reported in this paper received funding from Luxem-
bourg's Fonds National de la Recherche (FNR), via grant C17/IS/11685812 (PrivDA).
26
2468101214snapshot0.00.20.40.60.81.0success probabilitynoise=0.5%noise=1.0%noise=1.5%01234567891011121314151617snapshot050100150200250300350400#new usersReferences
[1] R´eka Albert and Albert-L´aszl´o Barab´asi. Statistical mechanics of complex networks.
Review of Modern Physics, 74:47 -- 97, 2002.
[2] Lars Backstrom, Cynthia Dwork, and Jon M. Kleinberg. Wherefore art thou r3579x?:
anonymized social networks, hidden patterns, and structural steganography. Commu-
nications of the ACM, 54(12):133 -- 141, 2011.
[3] Jordi Casas-Roma, Jordi Herrera-Joancomart´ı, and Vicen¸c Torra. An algorithm for
k-degree anonymity on large networks. In Procs. of the 2013 IEEE/ACM Int'l Conf.
on Advances in Social Networks Analysis and Mining, pages 671 -- 675, 2013.
[4] Jordi Casas-Roma, Jordi Herrera-Joancomart´ı, and Vicen¸c Torra. k-degree anonymity
improving data utility in large networks. Knowledge and Infor-
and edge selection:
mation Systems, 50(2):447 -- 474, 2017.
[5] Sean Chester, Bruce M Kapron, Ganesh Ramesh, Gautam Srivastava, Alex Thomo,
and S Venkatesh. Why waldo befriended the dummy? k-anonymization of social
networks with pseudo-nodes. Social Network Analysis and Mining, 3(3):381 -- 399, 2013.
[6] Narimene Dakiche, Fatima Benbouzid-Si Tayeb, Yahya Slimani, and Karima Be-
natchba. Tracking community evolution in social networks: A survey. Information
Processing & Management, 56(3):1084 -- 1102, 2019.
[7] Xuan Ding, Lan Zhang, Zhiguo Wan, and Ming Gu. De-anonymizing dynamic social
networks. In 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011,
pages 1 -- 6. IEEE, 2011.
[8] Shouling Ji, Weiqing Li, Mudhakar Srivatsa, and Raheem Beyah. Structural data
de-anonymization: Quantification, practice, and implications. In Proceedings of the
2014 ACM SIGSAC Conference on Computer and Communications Security, pages
1040 -- 1053. ACM, 2014.
[9] Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing Selena He, and Raheem Beyah.
In
Structure based data de-anonymization of social networks and mobility traces.
International Conference on Information Security, pages 237 -- 254. Springer, 2014.
[10] Nitish Korula and Silvio Lattanzi. An efficient reconciliation algorithm for social
networks. Proceedings of the VLDB Endowment, 7(5):377 -- 388, 2014.
[11] S. Kullback and R.A. Leibler. On information and sufficiency. The Annals of Mathe-
matical Statistics, 22(1):79 -- 86, 1951.
[12] J´erome Kunegis. KONECT: the koblenz network collection. In Proc. 22nd Interna-
tional World Wide Web Conference (WWW), pages 1343 -- 1350. ACM Press, 2013.
27
[13] Jure Leskovec, Jon M. Kleinberg, and Christos Faloutsos. Graph evolution: Densi-
fication and shrinking diameters. ACM Transactions on Knowledge Discovery from
Data (TKDD), 1(1):2, 2007.
[14] Kun Liu and Evimaria Terzi. Towards identity anonymization on graphs. In Proc.
2008 ACM SIGMOD International Conference on Management of Data (SIGMOD),
pages 93 -- 106. ACM Press, 2008.
[15] Linyuan Lu and Tao Zhou. Link prediction in complex networks: A survey. Physica
A: statistical mechanics and its applications, 390(6):1150 -- 1170, 2011.
[16] Xuesong Lu, Yi Song, and St´ephane Bressan. Fast identity anonymization on graphs.
In Procs. of the Int'l Conf. on Database and Expert Systems Applications, pages 281 --
295, 2012.
[17] Tinghuai Ma, Yuliang Zhang, Jie Cao, Jian Shen, Meili Tang, Yuan Tian, Abdullah
Al-Dhelaan, and Mznah Al-Rodhaan. Kdvem: a k-degree anonymity with vertex and
edge modification algorithm. Computing, 97(12):1165 -- 1184, 2015.
[18] Sjouke Mauw, Yunior Ram´ırez-Cruz, and Rolando Trujillo-Rasua. Anonymising social
graphs in the presence of active attackers. Transactions on Data Privacy, 11(2):169 --
198, 2018.
[19] Sjouke Mauw, Yunior Ram´ırez-Cruz, and Rolando Trujillo-Rasua. Conditional adja-
cency anonymity in social graphs under active attacks. Knowledge and Information
Systems, 61(1):485 -- 511, 2018.
[20] Sjouke Mauw, Yunior Ram´ırez-Cruz, and Rolando Trujillo-Rasua. Robust active at-
tacks on social graphs. Data Mining and Knowledge Discovery, 33(5):1357 -- 1392, 2019.
[21] Arvind Narayanan, Elaine Shi, and Benjamin IP Rubinstein. Link prediction by
In The 2011
de-anonymization: How we won the kaggle social network challenge.
International Joint Conference on Neural Networks, pages 1825 -- 1834. IEEE, 2011.
[22] Arvind Narayanan and Vitaly Shmatikov. De-anonymizing social networks. In Proc.
30th IEEE Symposium on Security and Privacy (S&P), pages 173 -- 187. IEEE Com-
puter Society, 2009.
[23] Shirin Nilizadeh, Apu Kapadia, and Yong-Yeol Ahn. Community-enhanced de-
anonymization of online social networks. In Proc. 2014 ACM SIGSAC Conference on
Computer and Communications Security (CCS), pages 537 -- 548. ACM Press, 2014.
[24] Shirin Nilizadeh, Apu Kapadia, and Yong-Yeol Ahn. Community-enhanced de-
anonymization of online social networks. In Proceedings of the 2014 acm sigsac con-
ference on computer and communications security, pages 537 -- 548. ACM, 2014.
28
[25] Fragkiskos Papadopoulos and Kaj-Kolja Kleineberg. Link persistence and conditional
distances in multiplex networks. Physical Review E, 99(1):012322, 2019.
[26] Pedram Pedarsani, Daniel R Figueiredo, and Matthias Grossglauser. A bayesian
method for matching two similar graphs without seeds. In 2013 51st Annual Allerton
Conference on Communication, Control, and Computing (Allerton), pages 1598 -- 1607.
IEEE, 2013.
[27] Wei Peng, Feng Li, Xukai Zou, and Jie Wu. Seed and grow: An attack against
anonymized social networks.
In Procs. of the 9th Annual IEEE Communications
Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks, pages
587 -- 595, 2012.
[28] Wei Peng, Feng Li, Xukai Zou, and Jie Wu. A two-stage deanonymization attack
against anonymized social networks. IEEE Transactions on Computers, 63(2):290 --
303, 2014.
[29] Fran¸cois Rousseau, Jordi Casas-Roma, and Michalis Vazirgiannis. Community-
preserving anonymization of graphs. Knowledge and Information Systems, 54(2):315 --
343, 2017.
[30] Juli´an Salas and Vicen¸c Torra. Graphic sequences, distances and k-degree anonymity.
Discrete Applied Mathematics, 188:25 -- 31, 2015.
[31] Chih-Hua Tai, Peng-Jui Tseng, S Yu Philip, and Ming-Syan Chen.
Identities
anonymization in dynamic social networks. In 2011 IEEE 11th International Con-
ference on Data Mining, pages 1224 -- 1229. IEEE, 2011.
[32] Rolando Trujillo-Rasua and Ismael Gonz´alez Yero. k-metric antidimension: A privacy
measure for social graphs. Information Sciences, 328:403 -- 417, 2016.
[33] Yazhe Wang, Long Xie, Baihua Zheng, and Ken CK Lee. High utility k-anonymization
for social network publishing. Knowledge and Information Systems, 41(3):697 -- 725,
2014.
[34] Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, and Zhihui Wang. K-symmetry
model for identity anonymization in social networks. In Procs. of the 13th Int'l Conf.
on Extending Database Technology, pages 111 -- 122, 2010.
[35] Lyudmila Yartseva and Matthias Grossglauser. On the performance of percolation
graph matching. In Proceedings of the first ACM conference on Online social networks,
pages 119 -- 130. ACM, 2013.
[36] Haifeng Yu, Phillip B Gibbons, Michael Kaminsky, and Feng Xiao. Sybillimit: A
near-optimal social network defense against sybil attacks. In Procs. of the 2008 IEEE
Symposium on Security and Privacy, pages 3 -- 17, Oakland, CA, USA, 2008.
29
[37] Haifeng Yu, Michael Kaminsky, Phillip B Gibbons, and Abraham Flaxman. Sybil-
guard: defending against sybil attacks via social networks. In Procs. of the 2006 Conf.
on Applications, Technologies, Architectures, and Protocols for Computer Communi-
cations, pages 267 -- 278, Pisa, Italy, 2006.
[38] Bin Zhou and Jian Pei. Preserving privacy in social networks against neighborhood
In Procs. of the 2008 IEEE 24th Int'l Conf. on Data Engineering, pages
attacks.
506 -- 515, Washington, DC, USA, 2008.
[39] Lei Zou, Lei Chen, and M. Tamer Ozsu. K-automorphism: A general framework for
privacy preserving network publication. PVLDB, 2(1):946 -- 957, 2009.
30
|
1204.3860 | 1 | 1204 | 2012-04-17T17:57:58 | Macroscopes: models for collective decision making | [
"cs.SI",
"cs.CC"
] | We introduce a new model of collective decision making, when a global decision needs to be made but the parties only possess partial information, and are unwilling (or unable) to first create a globalcomposite of their local views. Our macroscope model captures two key features of many real-world problems: allotment structure (how access to local information is apportioned between parties, including overlaps between the parties) and the possible presence of meta-information (what each party knows about the allotment structure of the overall problem). Using the framework of communication complexity, we formalize the efficient solution of a macroscope. We present general results about the macroscope model, and also results that abstract the essential computational operations underpinning practical applications, including in financial markets and decentralized sensor networks. We illustrate the computational problem inherent in real-world collective decision making processes using results for specific functions, involving detecting a change in state (constant and step functions), and computing statistical properties (the mean). | cs.SI | cs | PROCEEDINGS, CI 2012
2
1
0
2
r
p
A
7
1
]
I
S
.
s
c
[
1
v
0
6
8
3
.
4
0
2
1
:
v
i
X
r
a
MACROSCOPES: MODELS FOR COLLECTIVE DECISION MAKING
Subramanian Ramamoorthy
School of Informatics
University of Edinburgh
10 Crichton Street, Edinburgh
EH8 9AB, United Kingdom
[email protected]
Andr´as Z. Salamon
School of Informatics
University of Edinburgh
10 Crichton Street, Edinburgh
EH8 9AB, United Kingdom
[email protected]
Rahul Santhanam
School of Informatics
University of Edinburgh
10 Crichton Street, Edinburgh
EH8 9AB, United Kingdom
[email protected]
ABSTRACT
We introduce a new model of collective decision mak-
ing, when a global decision needs to be made but the
parties only possess partial information, and are unwill-
ing (or unable) to first create a global composite of their
local views. Our macroscope model captures two key fea-
tures of many real-world problems: allotment structure
(how access to local information is apportioned between
parties, including overlaps between the parties) and the
possible presence of meta-information (what each party
knows about the allotment structure of the overall prob-
lem). Using the framework of communication complex-
ity, we formalize the efficient solution of a macroscope.
We present general results about the macroscope model,
and also results that abstract the essential computa-
tional operations underpinning practical applications,
including in financial markets and decentralized sensor
networks. We illustrate the computational problem in-
herent in real-world collective decision making processes
using results for specific functions, involving detecting a
change in state (constant and step functions), and com-
puting statistical properties (the mean).
INTRODUCTION
We consider collective decision making processes such as
a market that acts as a central mechanism for coordinat-
ing the actions of autonomous participants. We address
the questions: how does one measure the quality of the
collective decision making process, and how weak can
the central market mechanism be? In many applications,
there is significant interest in decentralizing computation
while still being able to arrive at results that cannot be
computed entirely locally. We use a simple model to cap-
ture the informational complexity of computing global
functions by aggregating results from participants1 who
are endowed with arbitrary allotments of local infor-
mation. This allows us to draw conclusions about the
requirements on allotments and protocols, for efficient
collective information processing. A key aspect of our
model is the specification of meta-information based on
distinguishing perfect information, single-blind arrange-
ments, and double-blind arrangements. Our technical
framework is built on the notions of communication com-
plexity. We assume that participants possess informa-
tion which is not available to other participants; we call
this the private information.
1We use the common English words agent, party, participant,
and player synonymously, ignoring more specific usage.
This work is motivated by several applications.
A rather timely application is found in the domain of
participants in electronic markets. Often, such as in fi-
nancial markets, participating agents would benefit from
an understanding of the global system dynamics (Darley
& Outkin 2007).2 For instance, agents might like to have
signals that indicate the presence of herding, bubbles and
other aggregate phenomena. Typically, the local view of
a single agent does not provide sufficient information to
reliably detect this. Moreover, in such a domain, one is
tightly constrained by what information can be revealed,
incentives to reveal this information, and other aspects
related to privacy in computation.
If we seek efficient
decentralized information processing mechanisms under
these constraints, then we would like to be able to deter-
mine what is or is not possible, employing only a coarse
characterization of resources and endowment of informa-
tion. Recent studies such as in anonymized financial chat
rooms (Lu & Mizrach 2011) provide interesting insights
into the behaviour of such collectives, such as the charac-
terization of equilibria in which a subset of traders profit
from the information of others. This is but one example
of a larger body of economic literature related to phe-
nomena in networked markets (Hurwicz & Reiter 2006).
However, in that literature, it is not typical to investigate
our question of how the allotment structure and com-
munication protocols relate to the efficiency with which
specific types of computation are achieved. For instance,
change detection (Basseville & Nikiforov 1993) is of fun-
damental importance in financial markets -- how weak a
protocol is sufficient to decide a change has occurred?
Recent work on the topic of complexity of financial com-
putations by Arora, Barak, Brunnermeier & Ge (2011)
indicates that this is a fertile direction to pursue.
Similar issues arise in many other application domains,
such as mobile sensor networks and distributed robotics.
Leonard, Paley, Lekien, Sepulchre, Fratantoni & Davis
(2007) describe a mobile sensor network for optimal data
gathering, using a combination of underwater and sur-
face level sensing robots to optimally gather informa-
tion such as chemical and thermal dynamics in a large
2See
http://www.bankofengland.co.uk/publications/
speeches/2009/speech386.pdf for a discussion of
this
issue from the perspective of financial regulation, and
http://www.bis.gov.uk/foresight/our-work/projects/
current-projects/computer-trading for information on
a major study by the UK government, under the Foresight
Project.
PROCEEDINGS, CI 2012
volume of water (typically measured in square miles).
Similar systems have been utilized for tracking oil spills
and algal blooms. A key computational method utilized
by such distributed robotic networks involves distributed
optimization (Bullo, Cort´es & Mart´ınez 2009). The de-
ployment of modules in such a network needs to satisfy
a spatial coverage requirement, described as a cost func-
tion, so that each module plans trajectories to optimize
this criterion. The sensor fusion problem, to determine
a combined estimate of an uncertain parameter, may
also be posed an as optimization problem in the sense
of maximizing information gain. Despite this rigorous
approach, relatively little is known about how to com-
pare different formulations of these optimization prob-
lems -- given that we are interested in a certain type
of global function (say, number of peaks in a chemical
concentration profile or some distributional aspect of the
overall field) using weak local sensing and the ability to
move sensing nodes, how does one compare or otherwise
characterize protocols and other aspects of the problem
formulation?
A line of work that begins to touch upon some of these
questions is that of Ghrist and collaborators. Barysh-
nikov & Ghrist (2009) use tools from algebraic topology
to solve the problem of counting targets using very weak
local information (such as unlabelled counts in a local
neighbourhood). de Silva & Ghrist (2007) present an
approach to detection of holes in coverage through decen-
tralized computation of homology. Here again, the focus
being on aspects of the specific function being computed,
the authors do not address the relationship between the
protocols and problem formulation, and the efficiency of
computation.
Extending the idea of decentralized computation in so-
cial systems, consider the problem faced by a program
committee, such as one that might review this paper. We
seek a decentralized computation of a ranking problem.
Similar ranking problems also occur in executive decision
making such as the hiring decision in academic depart-
ments. The key issue here is that of parsimonious infor-
mation sharing, coupled implicitly or explicitly with the
meta-information problem. These challenges arise due
to limitations on the capacities of the decision makers to
exchange information with each other.
The common theme underlying all of these applications
is the computation of a function based on allotment of
portions of the information to parties who have reason-
able amounts of computational resource but would like
to keep exchange of information limited. We wish to
understand how weak the corresponding protocols can
be, for various types of functions. Major categories of
functions of interest include change detection and rank-
ing. We model change detection by an abstract version
of the key underlying problem, of determining whether
the data forms a constant or a step function. The main
statistical property we consider here is the computation
of the mean.
We are interested in understanding just how much com-
munication must occur to answer various questions of
interest. Therefore,
instead of working with detailed
models for the questions about market behaviour or sen-
sor networks discussed previously, we have deliberately
kept the models we study as simple as possible. This
makes our lower bound results stronger. Determining an
answer to any more realistic question will require even
more information to be exchanged than in these simple
models, as long as the more realistic model includes the
simpler problem at its core. It therefore makes sense in
our setting to study the simplest possible embodiment
of each of the core problems. For the upper bounds, our
results are a first step and will need to be extended to
more realistic models.
MODEL
Our model is based on the notion of communication
complexity (Kushilevitz & Nisan 1997), which has been
highly influential in computer science. A Boolean func-
tion models yes/no decisions, by requiring that the func-
tion take either the value 0 or the value 1. A quantity
with value either 0 or 1 is known as a bit, and quantities
that are drawn from a larger range of values can be ex-
pressed by using multiple bits; a function that is defined
over a domain containing 2n different values is said to
have an n-bit input. Say two players Alice and Bob wish
to compute a Boolean function f on a 2n-bit input, but
Alice only has access to the first n bits and Bob to the
other n bits. Alice and Bob are not computationally
constrained, but they are informationally constrained.
The question now is: how many bits of information do
Alice and Bob need to exchange to compute f on a given
2n-bit input? A protocol for this problem specifies, given
the inputs to the players and the communication so far,
which player is the next to send information, as well
as what information is actually sent. There is a trivial
protocol where Alice merely sends her part of the input
to Bob. Bob now has all the information he needs to
compute f , and he sends back the 1-bit answer to Alice.
The cost of a protocol is the total number of bits that
are exchanged; this simple protocol has a cost of n + 1
for any function. The field of two-party communication
complexity studies, for various functions f of interest,
whether more efficient protocols exist. As an example,
for the Equality function which tests whether Alice and
Bob's inputs are exactly the same, it is known that the
communication upper bound of n + 1 is tight for de-
terministic protocols, but there is an improved protocol
with cost O(log(n)) when the players' messages are al-
lowed to be randomized and it is sufficient for the final
answer to be correct with high probability.
The notion of communication complexity can be general-
ized from the two-party setting to the multi-party setting
(Chandra, Furst & Lipton 1983). Here the number of
players is not limited to two, each player has some infor-
mation about the global input, and they wish to compute
some Boolean function of the global input. There are two
PROCEEDINGS, CI 2012
standard models for how the input is distributed among
the players: the number-in-hand model (NIH) and the
number-on-forehead (NOF) model. Suppose there are k
players and the global input is N bits long. In the NIH
model, there is some fixed partition of the global input
into k parts, and each player gets one of these parts. In
the NOF model, again there is a fixed partition into k
parts, but the i-th player gets all the parts except the
i-th part.
The main motivation for our model is that in many sit-
uations, such as financial markets or sensor networks,
information is distributed among players in a more com-
plex fashion than in the NOH or NIF models. Moreover,
the players might not have control over which pieces of
information they have access to -- the allotment of inputs
to players might be arbitrary, perhaps even adversarial.
As an example, creators of financial instruments may
decide which assets to bundle into pools that are then
offered for sale. Purchasers of such instruments might
wish to check fairness of allocation, without revealing
to each other their precise holdings; or regulators might
wish to check that sellers behaved impartially but with-
out relying on full disclosure.
Yet, the players might still wish to compute some func-
tion of their global input in this less structured setting.
Now different kinds of question arise than in the standard
communication complexity setting. For a given function,
which kinds of allotment structures allow for protocols?
Does the meta-knowledge of what the allotment struc-
ture actually is make a difference to whether there is an
efficient protocol or not? These questions are interesting
even for simple functions which have been thoroughly
investigated in the standard setting.
To be more formal, let f be a function which k play-
ers wish to compute on a global input x of size N bits.
An (N, k) allotment structure is a sequence of k subsets
S1, S2 . . . Sk of [N ] = {1, 2, . . . , N}. An allotment struc-
ture corresponds to an allotment of input bits among
players in the following way: Player i receives all bits xj
for j ∈ Si. Note that unlike in the NOH and NIF mod-
els, this allotment of input bits is completely general --
it might be the case that two players receive the same
set of bits, for example. This is the main novelty of our
approach. Our intention here is to model two kinds of
situations. In the first, the players have little control over
which pieces of information they can access -- they have
to do the best they can, with the available information.
In the second, the allotment is made by a centralized
authority, and it is of interest to study which allotment
would most facilitate the computation in question.
A k-player macroscope on N bits is simply a function f
on N input bits together with an (N, k) allotment struc-
ture. We will abuse notation and sometimes use a macro-
scope to refer to a sequence of functions fN , N = 1 . . .∞,
where each function fN depends on N bits. This will en-
able us to pose and study the question of the asymptotic
efficiency of protocols for macroscopes.
x
x1
x2
x3
x4
...
xN
S1 = {1, 2, N}
S2 = {1, 3, 4, N}
...
Sk = {2, 3, 4}
Figure 1. Example (N, k) allotment structure. We wish to
compute f (x) with a k-player protocol, in two situations.
(Single-blind) Player i knows {S1, . . . , SN} and xj for j ∈ Si.
(Double-blind) Player i only knows xj for j ∈ Si.
The generalized modelling of the allotment of inputs
raises the issue of meta-information -- how much do play-
ers know about the allotment of inputs, and how can
they take advantage of this? In the case of the NIH and
NOF models, the allotment is implicitly known to all
players because it is fixed in advance. However, in our
setting, there are two different kinds of situations -- the
single-blind situation and the double-blind situation. In
a single-blind macroscope, all players know the allotment
structure, however Player i does not know the values of
any input bits apart from the ones whose indices are in
Si. In a double-blind macroscope, the players are more
hampered in that they do not even know the allotment
structure, however they do know the indices of the bits
they receive.
It remains to formally define what a protocol is in our
model. To keep things simple, we focus on simultaneous-
message protocols, where each player broadcasts a se-
quence of bits to all players; this is often presented fig-
uratively as each player writing their bit string on a
universally viewable blackboard. A protocol solves a
macroscope if each player can determine the value of
the function on the global input simply by looking at its
own input bits as well as the information written on the
blackboard. The cost of a protocol for a macroscope is
PROCEEDINGS, CI 2012
then the total length of strings written by the players.
In protocols for single-blind macroscopes, the message
of Player i is a function of the values of bits whose in-
dices are in Si as well as of the allotment structure. For
double-blind macroscopes, the message of Player i is a
function only of the values of bits whose indices are in
Si.
We make a deliberate choice in our modelling to be
highly general in terms of the allotment structure, and to
be specific in terms of the structure of the actual commu-
nication. This is because our main aim is to understand
the impact of the allotment structure on efficiency of
communication. Our model can be extended to allow
more degrees of freedom with regard to the communica-
tion structure. One way in which this can be done is to
allow multiple-round protocols, where players communi-
cate in turns, with the protocol specifying whose turn it
is to communicate. Another is by allowing randomness
-- here each player is assumed to have access to a private
source of randomness, on which its message can depend.
A third way is to restrict communication to take place
between specified pairs of players, i.e., there is an implicit
topology of communication. This third approach is taken
in the field of distributed algorithms (Lynch 1996), where
however input allotment is not modelled in a flexible way.
We are interested in protocols which have communica-
tion as low as possible. This is desirable not just in terms
of efficiency, such as meeting bandwidth constraints, but
also in terms of privacy. In applications such as financial
markets, the players would like to obtain some global
knowledge without revealing their own inputs. Thus,
Player i has more than one reason for not following the
trivial protocol of publishing the values of all bits in Si.
The lower the communication, the less the information
revealed about the values of bits held by individual play-
ers; we will rely on this link between parsimony of com-
munication and the weakness of the coordination mecha-
nism. Privacy requirements are modelled more explicitly
in sub-areas of cryptography such as secure multi-party
computation (Yao 1982, Goldreich 2004). We prefer not
to model these requirements explicitly so as not to com-
plicate our model too much.
We make no assumption about the relationship between
the number of players and the number of bits in the
global input. In an application such as sensor networks,
there might be few players (sensors), each having a large
amount of information, whereas in the financial markets
application, there are typically many players each having
few pieces of information. Our model deals equally well
with both extremes.
A first observation is that to compute a non-trivial func-
tion over the global input, i.e. a function that depends
on all the input bits, the allotment structure must sat-
isfy the covering property -- each index j ∈ [N ] lies in at
least one set Si of the allotment structure. If the cov-
ering property did not hold, consider an index j which
does not belong to the allotment, and an input X such
j
j
), where X f lip
that f is sensitive to X at index j, meaning that f (X) is
different from F (X f lip
is X with the value
of the jth bit flipped. By the non-triviality of f , such
an input X must exist. Clearly any protocol outputs the
same answer for X as for X f lip
since j does not belong to
the allotment, and hence the protocol cannot be correct.
Henceforth, we automatically assume that a macroscope
has the covering property.
j
There are no general necessary conditions on the allot-
ment structure beyond the covering property for compu-
tation of non-trivial functions. But intuitively, the more
"even" the allotment is, in the sense of each bit being
allotted to the same number of players, the easier it is
to compute a symmetric function of the inputs. We de-
fine an even (N, k) allotment structure as an allotment
structure for which there is a number C such that each
index i ∈ [N ] belongs to exactly C distinct subsets Si,
and each subset Si is of the same size. Clearly, for such
an allotment structure, each set Si is of size N C/k.
RESULTS
Our first results address the question of what we can say
in general about the cost of single-blind and double-blind
macroscopes.
Theorem 1. Every single-blind macroscope on N bits
has a protocol with cost N . Moreover, this bound is op-
timal.
Note that the upper bound does not depend on the num-
ber of players. The proof of the upper bound in Theo-
rem 1 takes advantage of the global knowledge the play-
ers have about the allotment structure.
Proof. Consider a protocol in which each input bit
Xi has a player "responsible" for it -- Player j is re-
sponsible for input bit Xi iff i ∈ Sj and i (cid:54)∈ Sk for
k < j. It follows from the covering property that each
input bit has a player responsible for it. It should also
be clear that at most one player is responsible for any
given input bit. The protocol consists of players sending
the values of all the bits they are responsible for. Since
the macroscope is single-blind, each player knows who is
responsible for which input bits. Hence each player can
reconstruct the input from the information sent in the
protocol, and therefore also compute the function on the
input. The cost of the protocol is N , since each bit has
exactly one player responsible for it.
To see that this bound is optimal, consider the macro-
scope consisting of the Parity function3 together with
an (N, N ) allotment structure which allots each input
bit to a distinct player. Suppose there is a protocol for
this macroscope where one of the players does not send
a message. Assume, without loss of generality, that this
player holds the i-th bit. Then the Parity function can-
not depend on the i-th bit, which is a contradiction.
3The Parity function returns 1 if an odd number of the input
bits are 1, and 0 otherwise.
PROCEEDINGS, CI 2012
Theorem 2. Every k-player double-blind macroscope
on N bits has a protocol with cost at most 2N k.
Proof. The protocol giving the upper bound of The-
orem 2 is a simple one. The j-th player sends an N -bit
string specifying its allotment Sj, as well as at most N
bits which specify the values of the bits whose indices are
in the allotment Sj. Once this information is made pub-
lic by each player, the players can each reconstruct the
input and hence compute the function on that input.
We do not know whether the bound in Theorem 2 is
optimal in general, but we believe this to be the case for
protocols that use only one round of communication.
Our primary focus is on studying the complexity of
macroscopes for problems which arise in contexts such as
electronic markets and distributed sensor networks. For
each of these problems, we are interested in issues such as
the optimal cost of solving a macroscope, the differential
cost of meta-information (the reduction in cost when us-
ing a single-blind macroscope rather than a double-blind
macroscope), and for single-blind macroscopes, the de-
pendency of the cost on the allotment structure.
A fundamental problem in the context of electronic mar-
kets is the Constancy problem of detecting whether a
given function is constant or not.4 We model this prob-
lem as a Boolean function on [D]N , which is 1 if all the
inputs are equal, and 0 otherwise. This requires a slight
adaptation of our model to inputs which are D-ary rather
than binary, but this adaptation can be done in a natural
way. We are able to characterize the cost of protocols for
single-blind Constancy macroscopes optimally in terms
of the allotment structure.
Given an (N, k) allotment structure, we define the inter-
section graph of the structure as follows. The graph has
N vertices, and there is an edge between vertex i and
vertex j for i, j ∈ [N ] iff Si ∩ Sj (cid:54)= ∅.
Theorem 3. Every k-player single-blind Constancy
macroscope on N D-ary inputs can be solved with cost
r((cid:100)log(D)(cid:101)) + k, where r is the number of connected
components of the intersection graph of the allotment
structure associated with the macroscope. Moreover, this
bound is optimal to a constant factor.
Note that the bound does not actually depend on N , the
number of inputs!
Proof. Since the macroscope is single-blind, each
player knows the identities of all the other players in the
same connected component in the intersection graph of
the allotment structure. This is because these identities
depend only on the allotment structure and not on the
input.
4Although the actual values may be constantly changing, we
use the abstract Boolean version of this problem to repre-
sent a more significant shift from some statistical notion of
the normal behaviour. For instance, we might ask if the ob-
served deviations from some base value are significant at a
5% confidence level.
The protocol is as follows: For each connected compo-
nent, it is only the player with the smallest index in that
connected component who sends a "long" message of
(cid:100)log(D)(cid:101) bits long, specifying a value in [D] that occurs
in its portion of the input. In addition, each player sends
a 1-bit message saying whether its portion of the input is
constant or not. The players know that Constancy holds
if each 1-bit message encodes "yes", and in addition, the
values in [D] sent in the long messages are all the same.
Indeed, if the function is constant, it is clear that all the
1-bit messages are "yes", and that the values in the long
message are the same. To argue the converse, just notice
that if a fixed player in a connected component of the
intersection graph sees a constant value l ∈ [D], and if
all other players in the connected component see a con-
stant value, it follows that all players in the connected
component see the same constant value l.
We argue that this bound is optimal up to a factor of
2. We will give separate arguments that k bits of com-
munication are required and that r(cid:100)log(D)(cid:101) bits of com-
munication are required. From these separate bounds, it
follows that max(k, r(cid:100)log(D)(cid:101)) ≥ (k + r(cid:100)log(D)(cid:101))/2 bits
of communication are required.
To see that k bits of communication are necessary, con-
sider any allotment structure such that Si \ (∪j(cid:54)=iSj) is
non-empty for each player i. Define a function f : [k] →
[N ] such that f (i) ∈ Si \ ∪j(cid:54)=iSj for each player i. Sup-
pose there is a player i who does not send a message.
Then the protocol gives the same answer on both the all
1's input and the input that is all 1 except at f (i), since
the communication pattern is the same for both of these
inputs. However the Constancy function differs on these
inputs.
Next we show the r(cid:100)log(D)(cid:101) lower bound. Consider
any allotment structure whose intersection graph con-
tains r connected components. Suppose that fewer than
r(cid:100)log(D)(cid:101) bits of communication are sufficient for solv-
ing the macroscope on this allotment structure. Then
there is some connected component C of the intersection
graph such that the corresponding players send less than
log(D) bits of communication in all. This implies that
there are two values v1, v2 ∈ [D] such that the communi-
cation pattern of players in C is exactly the same when
the players in C all receive the input v1 as when they all
receive the input v2. Now consider two inputs -- input x
in which all co-ordinates are the constant v1 and input
y in which all co-ordinates outside C have value v1 and
co-ordinates in C have value v2. The communication
pattern of the protocol is the same for x and y, however
the Constancy function is true for x and false for y. This
is a contradiction.
Thus, for single-blind Constancy macroscopes, the crit-
ical property of the allotment structure is the number
of connected components of the intersection graph. The
fewer the number of connected components, the more
efficiently the macroscope can be solved. We next study
the situation for double-blind macroscopes.
PROCEEDINGS, CI 2012
Theorem 4. Every k-player double-blind Constancy
macroscope on N D-ary inputs can be solved with cost
k(cid:100)log(D + 1)(cid:101). Moreover, there are k-player double-blind
Constancy macroscopes which require cost k(cid:100)log(D)(cid:101).
Proof. The protocol giving the upper bound is sim-
ple. Each player sends a message encoding one of D + 1
possibilities: either the players' portion of the input is
non-constant, or if it is constant, which of the D possible
values it is. The protocol accepts if each message encodes
the same value v ∈ [D].
For the lower bound, since each player is unaware of
players' allotments other than its own, the lower bound
of r(cid:100)log(D)(cid:101) in the proof of Theorem 3 holds with the
maximum possible value of r, namely r = k.
Thus, in the case of the Constancy function, the differ-
ential cost of meta-information can be quite significant,
especially when the intersection graph of the allotment
structure is connected.
Next we consider a formalization of the change detection
problem. The Boolean Step Function (BSF) problem is
defined as follows: a string x ∈ {0, 1}N evaluates to 1 if
there is an index i such that xj = 0 for j ≤ i and xj = 1
for j > i, or to 0 otherwise.
. . .
x1
x2
x3
x4
x5
. . .
xN−1 xN
Figure 2. Boolean step function (BSF).
Possibilities for different structures of allotment lead to a
twofold challenge in a BSF macroscope. First, no party
may see the step, so parties need to share some informa-
tion about the values they see. Second, if several parties
detect a step, they then need to determine whether they
are observing the same step.
. . .
x1
x2
x3
x4
x5
. . .
xN−2 xN−1 xN
Figure 3. A Boolean function that is not a step function.
scope on N bits can solved with cost 2k(cid:100)log(N )(cid:101).
Theorem 5. Every k-player double-blind BSF macro-
Proof. The protocol is as follows: for each i ∈ [k],
Player i sends two indices l(i) and m(i), where l is the
largest index in Si for which xl = 0 and m is the smallest
index in Si for which xm = 1. Given all these messages,
each player can calculate the value of the smallest index
m for which xm = 1 simply by taking the minimum of
m(i) over all players i, as well as the largest index l for
which xl = 0, simply by taking the maximum of l(i) over
all players i. Note that BSF (x) = 0 iff l = m − 1.
We conjecture that the bound of Theorem 5 is tight
for double-blind BSF macroscopes for protocols that
use only one round of communication. For single-blind
macroscopes, however, we can do better.
Theorem 6. Every k-player single-blind BSF macro-
scope on N bits can be solved with cost k(cid:100)log(N )(cid:101) + 2k.
Proof. The protocol witnessing the upper bound is
as follows. Each player sends a message consisting of two
parts. The first part is 2 bits long, and specifies which of
the following is the case: (1) the player's portion of the
input is constant, (2) there is a single transition from 0 to
1 in the player's input, (3) neither (1) nor (2) holds. The
second part is (cid:100)log(N )(cid:101) bits long. The interpretation of
the second part of the message is as follows: if case (1)
holds for the first part, then the second part encodes
which constant (either 0 or 1) the player is given.
If
case (2) holds, then the second part encodes the index
at which a transition occurs, i.e., a number j ∈ [N ] such
that j ∈ Si (assuming that the player in question is
Player i) and such that for all l ∈ Si, l ≤ j =⇒ xj = 0
and l > j =⇒ xj = 1. If case (3) holds, the contents of
the second part of the message are irrelevant.
From the messages, the players can either reconstruct
the input x, if case (1) or (2) holds for each player, or
conclude directly that BSF (x) = 0, if case (3) holds for
any player. From the input x, each player can compute
BSF (x) on its own.
In this case, too, the advantage of using single-blind
macroscopes can be seen, though a matching lower
bound in Theorem 5 is needed to prove this.
Next, we attempt to model the averaging function. Dis-
tributional statistics of different kinds need to be com-
puted in a decentralized way in various contexts such as
sensor networks. To model this, we again depart from
the framework of bit strings as inputs. The input is
now a sequence of real numbers {xi}, xi ∈ [0, 1] for each
1 ≤ i ≤ N . Given a parameter > 0, we study the cost
of protocols for -Averaging macroscopes, where each
player needs to arrive at an -additive approximation
to the average of the numbers xi by using the protocol
to communicate.
Theorem 7. Let > 0 be fixed. Every k-player
single-blind -Averaging macroscope on N inputs can be
solved with cost k(cid:100)log(k/)(cid:101).
Notice again that there is no dependence of the cost on
N , merely on the number of players and the approxima-
tion error.
Proof. We again use critically the meta-information
of players about the allotment structure. Each player
i knows, for each index j ∈ Si, the number Nj of dis-
tinct players receiving input xj. The message sent by
Player i is an /k-additive approximation to the quan-
tity Σj∈Sixj/Nj. Since the quantity is between 0 and
PROCEEDINGS, CI 2012
1, the approximation can be specified using (cid:100)log(k/)(cid:101)
bits. Given the messages of all players, each player can
compute an -approximation to the average simply by
summing all the individual approximation. Since the
individual approximations are /k-additive approxima-
tions, the sum will be an -approximation to the aver-
age.
In the case of Averaging macroscopes, we can show that
the double-blind restriction is a significant one, in that
it leads to a dependence of the cost on the number of
players. The proof uses a dimensionality argument.
Theorem 8. Let > 0 be a parameter. There are
2-player double-blind -Averaging macroscopes on N in-
puts which require cost N log(1/(N )).
Proof. Consider a 2-player double-blind macroscope
for -Averaging, with Player 1 receiving an allotment
S1 ⊆ [N ] and Player 2 receiving an allotment S2 ⊆ [N ].
Our assumption that the allotment structure is covering
implies S1∪S2 = [N ], but neither player knows anything
about the other player's allotment beyond this fact.
We show that a player's message must essentially reveal
its input. Consider Player 1, and let S1 = l. Now
for each i ∈ S1, consider S2,i = [N ] \ {i}.
If Player
1 has allotment S1 and Player 2 has allotment S2,i,
then in a correct protocol, Player 2 eventually knows
an -approximation to Σj∈[N ]xj/N . Since it also knows
all values except xi, this implies that it knows an N -
approximation to xi. Thus an N -approximation to xi
should be extractable from Player 1's message. This
should hold for every i, which means Player 1 must send
at least l log(1/(N )) bits. By a symmetric argument,
Player 2 must send at least (N − l) log(1/(N )) bits,
which means that at least N log(1/(N )) bits are com-
municated in all.
Theorem 8 has the disadvantage that it does not say
much about , which may be large in comparison to
N . However, we believe that a refinement of the proof
which argues about information revealed about subsets
of inputs rather than individual inputs can be used to
establish an improved lower bound.
DISCUSSION
The previous two sections have focused on the details of
a model for collective information processing and prop-
erties of this model. We now take a step back to discuss
why these results are of relevance to the motivating ex-
amples identified in the Introduction.
Consider the problem of agents in financial markets. It
is increasingly the case that, with the emergence of di-
verse communication methods and agents deciding at
time scales ranging from microseconds to days, com-
mon knowledge isn't so commonly available in prac-
tice. This has significant implications for dynamics
(Rubinstein 1989) and much of the modern discus-
sion regarding markets is related to such issues (Arora
et al. 2011). In this setting, there is a need for diagnostic
tools that could provide useful signals -- by computing
global properties, i.e. functions, based on local informa-
tion that can be used subject to limitations on protocols.
For instance, has there been a change from a 'constant'
level in a global sense? Or, is there a significant differ-
ence -- in the form of a step change -- between segments
of a networked market? We illustrate the use of con-
cepts from complexity theory to address abstract ver-
sions of such questions. Indeed, our techniques could be
used to answer further such questions -- about statistical
distributions, ranking queries, etc. A key novelty, even
in comparison to the state of the art in communication
complexity, is that we consider an arbitrary endowment
of inputs and meta-information such as single and double
blind protocols.
An important general direction for future work in this
area would be to extend our analysis to more directly
address the subtleties of the above mentioned dynam-
ics as they occur in applications of interest. Also, we
would like to better understand the relationships be-
tween our model of decentralized computation under in-
formational constraints and previous established models,
such as (Hurwicz & Reiter 2006), which employ different
methods and focus more on temporally extended sequen-
tial protocols such as auctions.
In terms of more specific questions, our model could
be extended in various ways. We have considered the
case of a simple structure of communication, with si-
multaneous messages sent in one round of communica-
tion, and a possibly complex allotment structure of the
inputs. We could allow more sophisticated communi-
cation structure. For example, double-blind protocols
with two rounds of communication can emulate single-
round single-blind protocols with some loss in efficiency,
simply by using the first round to share publicly infor-
mation about the input allotment, and then running the
single-blind protocol in the second round. More gen-
erally, communication might be restricted to occur only
between specific pairs of players. In the context of sensor
networks, for instance, it is natural to model both the
location of information and the structure of communica-
tion as governed by the topology of the ambient space.
Even studying very simple functions such as Constancy
in such general models appears to be interesting.
We emphasize that we are interested in understand-
ing the communication requirements of even very sim-
ple functions in modelling frameworks that render them
non-trivial. This distinguishes our work from the exist-
ing research on communication complexity, where func-
tions such as Constancy and BSF are trivial because
the model of communication is so simple. We are espe-
cially interested in modelling some aspects of collective
information processing, such as information overlap and
meta-information, which have been neglected so far and
which we believe can have a significant impact on the
efficiency of communication. The way we capture these
notions is quite flexible and can be used both to model
PROCEEDINGS, CI 2012
computation of continuous quantities such as Average
and computation of discrete quantities such as Boolean
functions, as we have illustrated with our results.
Bullo, F., Cort´es, J. & Mart´ınez, S. (2009), Distributed
Control of Robotic Networks, Applied Mathematics
Series, Princeton University Press.
Chandra, A. K., Furst, M. L. & Lipton, R. J. (1983),
Multi-party protocols, in 'STOC 1983: Proceedings of
the fifteenth annual ACM symposium on Theory of
computing', ACM, pp. 94 -- 99.
doi:10.1145/800061.808737
Darley, V. & Outkin, A. V. (2007), A NASDAQ market
simulation: insights on a major market from the
science of complex adaptive systems, Vol. 1 of Complex
systems and interdisciplinary science, World Scientific.
de Silva, V. & Ghrist, R. (2007), 'Homological sensor
networks', Notices Amer. Math. Soc. 54(1), 10 -- 17.
Available from: https:
//www1.ams.org/notices/200701/fea-ghrist.pdf
Goldreich, O. (2004), Foundations of Cryptography -
Volume 2, Cambridge University Press.
Hurwicz, L. & Reiter, S. (2006), Designing Economic
Mechanisms, Cambridge University Press.
doi:10.2277/0521836417
Kushilevitz, E. & Nisan, N. (1997), Communication
Complexity, Cambridge University Press.
Leonard, N., Paley, D., Lekien, F., Sepulchre, R.,
Fratantoni, D. & Davis, R. (2007), 'Collective motion,
sensor networks, and ocean sampling', Proceedings of
the IEEE 95(1), 48 -- 74.
doi:10.1109/JPROC.2006.887295
Lu, J. & Mizrach, B. (2011), 'Strategic Interaction in a
Stock Trading Chat Room', SSRN eLibrary . Available
from: http://ssrn.com/paper=1746464
Lynch, N. (1996), Distributed Algorithms, Morgan
Kaufmann.
Rubinstein, A. (1989), 'The electronic mail game:
Strategic behavior under "Almost Common
Knowledge"', American Economic Review
79(3), 385 -- 391. Available from:
http://www.jstor.org/stable/1806851
Yao, A. (1982), Protocols for secure computations, in
'FOCS 1982: Proceedings of 23rd Annual Symposium
on Foundations of Computer Science', IEEE Computer
Society, pp. 160 -- 164. doi:10.1109/SFCS.1982.38
Another direction that we find compelling is modelling
meta-information in a more sophisticated way. As of
now, we have the single-blind model and the double-
blind model. But there are various intermediate notions
that are reasonable to study. For example, each player
might know the number of players and the number of in-
puts but nothing about which inputs are given to which
other players. Or a player might know which other play-
ers also receive the inputs it receives, but nothing about
inputs it does not receive. Or some global property of
the allotment structure, such as that the allotment struc-
ture is even, might be known. Notice that in the case
of Averaging macroscopes, there is an efficient proto-
col whose cost doesn't depend on the number of players
if the allotment structure is even and the size of each
allotment is known. The protocol simply involves the
players summing all their inputs and dividing by a uni-
versal constant. In general, one can ask: assuming that
there are efficient single-blind protocols known, what is
the minimal information about the allotment structure
required to give efficient protocols?
Ranking is an important subject that we have not ad-
dressed in this paper. Some interesting problems can
be captured as ranking macroscopes, and we leave their
study for further work.
We have seen that in some cases more information hin-
ders making a global decision, rather than helping. More
generally, why is allotment structure important? We are
striving to fully understand how the allotment structure
of information affects our ability to efficiently answer
questions that require global information.
ACKNOWLEDGEMENTS
S.R. would like to acknowledge the support of the
UK Engineering and Physical Sciences Research Coun-
cil (grant number EP/H012338/1) and the European
Commission (TOMSY Grant Agreement 270436, un-
der FP7-ICT-2009.2.1 Call 6). A.S. acknowledges the
support of EPSRC via platform grant EP/F028288/1.
R.S. acknowledges the support of EPSRC via grant
EP/H05068X/1.
REFERENCES
Arora, S., Barak, B., Brunnermeier, M. & Ge, R.
(2011), 'Computational complexity and information
asymmetry in financial products', Communications of
the ACM 54(5), 101 -- 107. doi:10.1145/1941487.1941511
Baryshnikov, Y. & Ghrist, R. (2009), 'Target
enumeration via Euler characteristic integrals', SIAM
J. Appl. Math. 70(3), 825 -- 844. doi:10.1137/070687293
Basseville, M. & Nikiforov, I. V. (1993), Detection of
Abrupt Changes - Theory and Application,
Prentice-Hall, Inc.
|
1109.2215 | 2 | 1109 | 2011-11-20T19:21:15 | Finding missing edges and communities in incomplete networks | [
"cs.SI",
"physics.data-an",
"physics.soc-ph"
] | Many algorithms have been proposed for predicting missing edges in networks, but they do not usually take account of which edges are missing. We focus on networks which have missing edges of the form that is likely to occur in real networks, and compare algorithms that find these missing edges. We also investigate the effect of this kind of missing data on community detection algorithms. | cs.SI | cs | Finding missing edges and communities in incomplete
networks
Bowen Yan and Steve Gregory
Department of Computer Science, University of Bristol, Bristol BS8 1UB, England
E-mail: [email protected] +44 117 954 5142
Abstract. Many algorithms have been proposed for predicting missing edges in networks, but
they do not usually take account of which edges are missing. We focus on networks which have
missing edges of the form that is likely to occur in real networks, and compare algorithms that
find these missing edges. We also investigate the effect of this kind of missing data on
community detection algorithms.
1. Introduction
Many complex systems can be described as networks, in which vertices represent individuals, and
edges denote relations between pairs of vertices. Researchers analyse these networks in order to
understand the features and properties of them, but often neglect to consider the correctness and
completeness of the dataset itself. In most cases, they assume that the data are complete and accurate.
Most real-world networks represent the results of investigations and experiments, which are often
incomplete and inaccurate [1]. For example, in a 1996 survey of sexual behaviour, only 59% of
individuals responded to the interview [2].
Missing edges might affect the properties of networks very much. For example, the experimental
results of protein-protein interactions have found different properties by using different methods,
because 80% of the interactions of proteins are unknown [3]. Also, community detection algorithms
might place some vertices in incorrect communities if some edges are missing.
It is not easy to find missing edges in networks because we do not know where they exist. The
properties of networks will be affected in different ways by different types of missing edges. Many
edge prediction methods have been proposed, but they all consider different issues, and are normally
tested only on networks in which edges are missing at random. We believe that it would be beneficial
to know how or why edges are missing.
There are several common reasons for an edge to be missing; for example:
1. Edges may be missing at random [4].
2. Edges may be missing because of a limit on the number of neighbours of a vertex: the
problem of right censoring by vertex degree in social networks [5].
3. Many real-world networks are too large to analyse, so often a sample is extracted from them;
for example, by snowball sampling, where a crawling algorithm performs (e.g.) a breadth-first
search from an initial vertex to collect edges. Since the sample is a subgraph of the whole
network, many edges are missing at the periphery.
4. Edges may be missing when a vertex does not have many neighbours: the cold ends problem
in biological and information networks [6].
In this paper, we define three types of incomplete network based on the first three of the above
forms of missing data, and use them for comparing algorithms that find missing edges. We also
investigate the effect of the same types of missing data on community detection algorithms.
2. Related work
Researchers’ attention has increasingly focused on the evolution of networks. Networks are dynamic
objects which grow and change, so many new vertices and edges appear in an original network over
time. Although the study of missing edges usually focuses on static networks, both problems
concentrate on vertex similarity and the structural properties of networks [7].
Many methods have already been used to predict edges in numerous fields; for example, proximity
measures that are based on network topological features [8]; supervised learning methods [9]; and
relational learning methods [10,11], which consider relational attributes of elements in a relational
dataset. These and others are reviewed in the excellent survey by Lü and Zhou [12]. In our paper, we
restrict our attention to proximity measures in undirected, unweighted, and unipartite networks.
One of the most popular concepts of proximity between two vertices, structural similarity, is based
on the structure information of a network. This concerns the common features that pairs of vertices
have: for example, the more common neighbours two vertices have, the greater the chance that they
include Common neighbours and Jaccard coefficient
know each other. These methods
[8,13,14,15,16,17,18]; or the path information that two vertices share [19,20,21,22,23]. If two vertices
do not have any common neighbours, some extended algorithms can be used to calculate their
similarity [7,24], taking account of the similarity between the neighbours of two vertices. In Ref. [25],
the transferring similarity, which contains all high-order correlations between vertices, has been
proposed.
Also, Kossinets [5] has analysed the effect of missing data on social networks via some statistical
methods. These network-level statistical properties include mean vertex degree, clustering coefficient,
assortativity and average path length. In Ref. [5], Kossinets assumed that the experimental networks
were complete first, and removed some vertices and edges randomly for statistical analysis.
The point that network data are not reliable has also been addressed in [26], who emphasized that it
is easy to mislead the results of the experiments with incorrect data. Costenbader and Valente [27]
have analysed the stability of centrality measures on sampling networks with missing and spurious
data. Borgatti et al. [28] have explored the robustness of centrality measures with missing data. Other
work includes research on sampling networks with missing data [29].
Understanding the reasons for missing data is a significant goal of edge prediction, because the
structure and features of networks depends on the type of missing data. For example, in scale-free
networks, the mean degree is unaffected even if there is a large amount of random missing data, but is
severely affected by the removal of vertices with high degree [30].
3. Methodology
3.1. Types of incomplete network
We simulate three types of missing edges in both artificial networks and real-world networks, each
with a different cause.
With our first type, edges are missing at the boundary. Generally, this problem is caused by
crawling to collect a sample of a network, e.g., by a breadth-first search, so we call it a crawled
network. With the second type, edges are missing at random, e.g., because of the non-response
problem [3,4,5,27], so we name it a random-deletion network. With the third type, edges are missing
by reason of the fixed-choice problem (right-censoring by vertex degree [5,31]). Since this problem
corresponds to limiting the vertex degree, we call it a limited-degree network.
3.2. Testing edge prediction methods
For our edge prediction experiments, we construct incomplete copies of an initial network as follows:
1. Crawled network: We first choose a starting vertex – one of the vertices with the smallest
maximum distance from all other vertices – and then use a breadth-first search from the start
vertex to collect a sampled network containing the required number of edges. Figure 1(a)
shows the famous karate club network [32] while figure 1(b) shows its crawled network with
50% of the original network’s edges. This network includes all edges within distance 2 of the
starting vertex (shown in red) as well as some of the edges within distance 3, so that the total
number of edges is as required.
2. Random-deletion network: An edge is chosen randomly and deleted, repeatedly until the
required number of edges remain.
3. Limited-degree network: At each step, one of the vertices with the maximum degree, v, is
chosen randomly, and one of its edges {u,v} is chosen randomly for deletion, irrespective of
the degree of u.
(a)
(b)
(c)
(d)
(e)
(f)
Figure 1. (a) Karate network. (b) Crawled karate network, showing missing vertices (those present in
the original network but not the crawled network). (c) Induced subnetwork of karate network, showing
missing vertices (those present in the original network but not the subnetwork). (d) Crawled karate
network, showing missing edges (those present in the induced subnetwork but not the crawled
network). (e) Random-deletion karate network, showing missing edges. (f) Limited-degree karate
network, showing missing edges.
3.3. Testing the effect of missing data on community detection algorithms
The above methods of constructing incomplete networks may cause the network to become
disconnected. This is not a problem for our evaluation of edge prediction methods but it would have a
severe impact on the comparison of community detection algorithms, because these generally work
only on connected networks. Therefore, for our community detection experiments in Section 4.2, we
use somewhat different strategies to generate incomplete networks, which ensure that they are all
connected and all contain the same set of vertices as well as the same number of edges.
1. Crawled network: This is constructed in the same way as above (shown in figure 1(b)). To
construct our other incomplete networks, we first construct the subnetwork of the original
network induced by the vertices in our crawled network. Figure 1(c) shows the induced
subnetwork of the karate network, while figure 1(d) shows the difference between this and the
crawled network.
2. Random-deletion network: We start with the induced subnetwork (to ensure comparability
with the crawled network) and randomly delete edges repeatedly until the required number of
edges remain. When choosing an edge to delete, we never choose an edge whose removal
would make the network disconnected. Figure 1(e) shows a random-deletion network derived
from our induced subnetwork.
3. Limited-degree network: Again, we start with the induced subnetwork, and then randomly
choose edges {u,v} such that v has the maximum degree in this network and the deletion of
{u,v} would not make the network disconnected. If we cannot find an appropriate u, then we
choose a v with less than the maximum degree. Figure 1(f) shows a limited-degree network
and the induced subnetwork.
3.4. Network datasets used
We have experimented with three types of network. First, we use artificial random (Erdős-Rényi)
networks [33], because we expect edge prediction methods to be unsuccessful on these.
Second, we use the benchmark networks of Lancichinetti et al. [34]; these are artificial networks
that are claimed to reflect the important aspects of real-world networks. The networks have several
parameters:
1. n is the number of vertices.
2. k is the average degree. kmax is the maximum degree.
3. τ1 is the exponent of the power-law distribution of vertex degrees.
4. τ2 is the exponent of the power-law distribution of community sizes.
5. μ is the mixing parameter: each vertex shares a fraction μ of its edges with vertices in other
communities.
6. cmin is the minimum community size. cmax is the maximum community size.
Finally, some real-world networks have been tested, listed in Table 1.
Name
scientometrics
c. elegans
email
karate
terrorists
grassland species
Table 1. Real-world networks.
Vertices
Type
Ref.
2678
citation
[35]
453
metabolic
[36]
[37]
social
1133
34
social
[32]
62
social
[38]
[39]
food web
75
Edges
10368
2025
5451
78
152
113
4. Experiments
4.1. Edge prediction methods on incomplete networks
In this section we apply a few edge prediction methods to find the “missing” edges in an incomplete
network. We define score(u,v) to be the value of relationship between u and v. The higher the score,
the more likely they are to be neighbours.
v
( ) .
Common neighbours (CN). The number of common neighbours that two vertices have is a basic
idea that suggests a mutual relationship between them. For example, it may be more likely that two
people know each other if they have one or more acquaintances in common in a social network [40].
The function is defined as [8]:
score u v
u
( , )
( )
( )u
( )v
represent the set of neighbours of vertex u and v, respectively.
where
and
Jaccard, Meet/Min, and Geometric. These three coefficients have a similar definition, related to the
probability of triangles in all connected edges of any two vertices [14,16,17,18]. They are defined as
[14]:
u
score u v
u
v
( )
( )
( , )
( ) /
score u v
u
v
u
( ) ,
( ) / min(
( )
( , )
2
score u v
u
v
u
( , )
( )
( )
/ (
( )
v
( ) .
v
( ) ).
v
( ) ).
(2)
(3)
(4)
(1)
Adamic and Adar (AA). Adamic and Adar [13] proposed a similarity measure to define the
similarity between two vertices in terms of the neighbours of the common neighbours of the two
vertices. It is translated into [8]:
1
s
log ( )
score u v
( , )
s
u
v
( )
( )
Resource allocation index (RA). This is a variant of the method of Adamic and Adar, which
assumes that the common neighbours could transmit resources from one vertex to the other one, and is
defined as [15]:
(5)
.
1
s
( )
.
score u v
( , )
s
v
u
( )
( )
Preferential attachment (PA). This shows that the probability of a connection between two arbitrary
vertices is related to the number of neighbours of each vertex. The assumption of this method is that
vertices prefer to connect with other vertices with a large number of neighbours. It is described as
[40,41]:
score u v
( , )
v
( ) .
(6)
(7)
u
( )
Hierarchical structure method (HRG) [42]. This method combines a maximum-likelihood method
with a Markov chain Monte Carlo method to sample the hierarchical structure models with probability
proportional to their likelihood from the given network. This model is a binary tree with n leaves (the
vertices from the given network) and n-1 internal nodes, and a probability pr is associated with each
internal node r. The probability, pr, of the deepest common ancestor of two vertices represents the
probability of a connection between them.
Stochastic block model method (BM) [3]. This method uses the stochastic block model, in which
vertices are placed into communities and a matrix Q includes the probabilities of connections between
communities. Qαβ is the probability of a connection between two vertices that are in community α and
community β. Then, the probability of an edge can be calculated as explained in Ref. [3].
Because the HRG and BM methods have a higher computational complexity than other methods,
we can only evaluate these on some small networks in our experiments reported below.
To determine the accuracy of edge prediction methods, a common measure is the AUC: the area
under the ROC (receiver-operating characteristic) curve [42,43,44]. The interpretation of AUC is the
probability that the score of a randomly-chosen missing edge is higher than that of a randomly-chosen
pair of unconnected vertices.
Figure 2 shows a comparison of edge prediction methods on three incomplete versions of ER
networks. Since ER networks are random networks, which do not have any vertex-to-vertex similarity,
it is impossible to find missing edges by using edge prediction methods based on common neighbours.
In figure 2, these methods have no effect with any type of missing edges. In contrast, the PA method
relies on the number of neighbours of each vertex to find the relation between them. For example, PA
performs worse in crawled networks, because the vertices at the boundary of crawled networks always
have a low degree; in limited-degree networks, we limit vertices which have a high degree, so PA
performs better than other methods on limited-degree networks.
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
1
0.8
0.6
0.4
0.2
C
U
A
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
(a)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(b)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(c)
(d)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(e)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(f)
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
1
0.8
0.6
0.4
0.2
C
U
A
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0.2
0.4
0.6
Fraction of edges observed
0.8
1
0
0
0.2
0.4
0.6
Fraction of edges observed
0.8
1
Figure 2. Performance of edge prediction methods on incomplete ER networks, with average degree
10. (a) Crawled networks, n=100. (b) Random-deletion networks, n=100. (c) Limited-degree
networks, n=100. (d) Crawled networks, n=1000. (e) Random-deletion networks, n=1000. (f)
Limited-degree networks, n=1000.
Figures 3-5 show comparisons of edge prediction methods on three incomplete versions of LFR
networks (named LFR1, LFR2, and LFR3, respectively), using these parameters:
1. n = 100, k = 5, kmax = 15, τ1 = 2, τ2 = 1, µ = 0.3, cmin = 10, cmax = 20.
2. n = 1000, k = 10, kmax = 25, τ1 = 2, τ2 = 1, µ = 0.3, cmin = 10, cmax = 20.
3. n = 1000, k = 10, kmax = 25, τ1 = 2, τ2 = 1, µ = 0.3, cmin = 20, cmax = 40.
The results of CN, AA, and RA are similar, because they are all based on common neighbours.
They perform best on LFR2 networks because these have a higher clustering coefficient than LFR1
and LFR3 (see Table 2). Jaccard, Meet/Min, and Geometric also consider common neighbours, but are
affected by other conditions. For example, Jaccard performs best in limited-degree networks because
the degrees of many vertices are similar, especially when there are more missing edges. Jaccard is not
appropriate when there is a missing edge between a high-degree vertex and a low-degree one.
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
1
0.8
0.6
0.4
0.2
C
U
A
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
(a)
0.2
0.6
0.4
Fraction of edges observed
0.8
1
(b)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(c)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
Figure 3. Performance of edge prediction methods on incomplete LFR networks: n=100, k=5,
kmax=15, τ1=2, τ2=1, µ=0.3, cmin=10, cmax=20. (a) Crawled networks. (b) Random-deletion networks.
(c) Limited-degree networks.
Table 2. Clustering coefficient of LFR networks and real-world networks.
Clustering coefficient
Network
LFR1
0.1460
0.2915
LFR2
0.1394
LFR3
0.2557
karate
terrorists
0.3609
0.1741
grassland species
0.1663
email
0.0993
scientometrics
c. elegans
0.1244
PA performs well in limited-degree networks, and is not affected by the community size and the
clustering coefficient, because PA is appropriate to the mechanism of limited-degree networks. On the
contrary, vertices at the periphery usually have a low degree in crawled networks, and it is impossible
to know whether the endvertices of missing edges in the crawled and random-deletion networks have
high degree.
The HRG and BM methods are better than other edge prediction methods in random-deletion
networks, but they do not perform well in crawled networks. In limited-degree networks, these two
methods perform similarly to other edge prediction methods.
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
1
0.8
0.6
0.4
0.2
C
U
A
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
(a)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(b)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(c)
0.2
0.6
0.4
Fraction of edges observed
0.8
1
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
1
0.8
0.6
0.4
0.2
C
U
A
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
(a)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(b)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(c)
0.2
0.6
0.4
Fraction of edges observed
0.8
1
Figure 5. Performance of edge prediction
methods on
incomplete LFR networks:
n=1000, k=10, kmax=25, τ1=2, τ2=1, µ=0.3,
cmin=20, cmax=40. (a) Crawled networks. (b)
Random-deletion networks. (c) Limited-degree
networks.
Figure 4. Performance of edge prediction
methods on incomplete LFR networks: n=1000,
k=10, kmax=25, τ1=2, τ2=1, µ=0.3, cmin=10,
cmax=20.
(a)
Crawled
networks.
(b)
Random-deletion networks. (c) Limited-degree
networks.
Figure 6 shows comparisons of edge prediction methods on three incomplete versions of small
real-world networks. Basically, BM and HRG work better than other methods in random-deletion and
limited-degree networks. HRG performs well in all types of incomplete networks if the original
network is a hierarchical structure (see figures 6(g)-6(i)). PA performs well in limited-degree networks,
and sometimes it is even close to or better than BM. CN, RA and AA perform better than BM and
HRG in crawled networks if the original network has a high clustering coefficient (see “terrorists” in
table 2).
Figure 7 shows comparisons of edge prediction methods on three incomplete versions of larger
real-world networks; these are too large for BM and HRG to process in a reasonable time. The results
of RA, AA and CN are similar, and they are better than other prediction methods in crawled and
random-deletion networks. PA performs well on limited-degree networks.
In general, BM and HRG perform better than other methods in random-deletion and limited-degree
networks. However, they are too slow to apply to large networks. In addition to these two methods,
CN, RA and AA perform well, while PA usually works well in limited-degree networks. All methods
do better on limited-degree networks than on crawled and random-deletion networks.
1
0.8
0.6
0.4
0.2
C
U
A
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
0.2
0.6
0.4
Fraction of edges observed
0.8
1
(f)
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
0.2
(g)
0.4
0.6
Fraction of edges observed
0.8
1
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(h)
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(i)
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
1
0.8
0.6
0.4
0.2
C
U
A
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
CN
AA
RA
Jaccard
MeetMin
Geom etric
PA
HRG
BM
1
0.8
0.6
0.4
0.2
C
U
A
0
0
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
HRG
BM
1
0.8
0.6
0.4
0.2
C
U
A
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
(a)
0.2
0.6
0.4
Fraction of edges observed
0.8
1
(b)
CN
AA
RA
Jaccard
MeetMin
Geom etric
PA
HRG
BM
0.8
1
0.2
0.6
0.4
Fraction of edges observed
0.2
0.6
0.4
Fraction of edges observed
0.8
1
(c)
0.2
0.6
0.4
Fraction of edges observed
0.8
1
(d)
(e)
CN
AA
RA
Jaccard
MeetMin
Geom etric
PA
HRG
BM
0.8
1
0.2
0.6
0.4
Fraction of edges observed
Figure 6. Performance of edge prediction methods on incomplete small real networks. (a) Crawled
karate network. (b) Random-deletion karate network. (c) Limited-degree karate network. (d) Crawled
terrorists network. (e) Random-deletion terrorists network. (f) Limited-degree terrorists network. (g)
Crawled grassland species network. (h) Random-deletion grassland species network.
(i)
Limited-degree grassland species network.
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
1
0.8
0.6
0.4
0.2
C
U
A
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
(a)
0.2
0.6
0.4
Fraction of edges observed
0.8
1
(b)
0.2
0.6
0.4
Fraction of edges observed
0.8
1
(c)
CN
AA
RA
Jaccard
MeetMin
Geom etric
PA
0.2
0.6
0.4
Fraction of edges observed
0.8
1
(d)
1
0.8
0.6
0.4
0.2
C
U
A
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
0
0
1
C
U
A
0.8
0.6
0.4
0.2
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
CN
AA
RA
Jaccard
MeetMin
Geometric
PA
0.2
0.6
0.4
Fraction of edges observed
0.8
1
0
0
(e)
(f)
CN
AA
RA
Jaccard
MeetMin
Geom etric
PA
0.2
0.6
0.4
Fraction of edges observed
0.8
1
(g)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(h)
0.2
0.4
0.6
Fraction of edges observed
0.8
1
(i)
0.2
0.6
0.4
Fraction of edges observed
0.8
1
Figure 7. Performance of edge prediction methods on incomplete large real networks. (a) Crawled
email network. (b) Random-deletion email network. (c) Limited-degree email network. (d) Crawled
scientometrics network.
(e) Random-deletion scientometrics network.
(f) Limited-degree
scientometrics network. (g) Crawled c. elegans network. (h) Random-deletion c. elegans network. (i)
Limited-degree c. elegans network.
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
0
0.5
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
0
0.5
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
0
0.5
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
(a)
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
(d)
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
0.6
0.7
Fraction of edges observed
0.8
0.9
0
0.5
0.6
0.7
Fraction of edges observed
0.8
0.9
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
(b)
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
(e)
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
0.6
0.7
Fraction of edges observed
0.8
0.9
0
0.5
0.6
0.7
Fraction of edges observed
0.8
0.9
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
(c)
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
(f)
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
0.6
0.7
Fraction of edges observed
0.8
0.9
0
0.5
0.6
0.7
Fraction of edges observed
0.8
0.9
Figure 8. Performance of community detection algorithms on various types of incomplete LFR
networks. (a) COPRA. (b) CliqueMod. (c) CNM. (d) Walktrap. (e) Wakita and Tsurumi. (f) Louvain
method.
4.2. The effect of missing data on community detection algorithms
We now investigate the effect of missing data on community detection algorithms: COPRA [45],
CliqueMod [46], CNM [47], Wakita and Tsurumi [48], Walktrap [49], and the Louvain method [50]. In
this part, we construct the incomplete networks on the induced subnetworks to keep them connected,
as explained in Section 3.3, and we compare all of them, including the induced subnetworks, with the
original networks. For artificial networks, we use the normalized mutual information (NMI) measure
[51] to compare the known partition with the partition found by each algorithm. For real-world
networks, since we do not know the real community structure, we use two community detection
algorithms (COPRA and the Louvain method), which do not require to be told the number of
communities. We run these two algorithms on the original network first, to obtain a partition, and
choose the one with the maximum modularity as the “real” partition. Then, we compare the partition
obtained by each algorithm for all incomplete networks with that “real” partition.
Figure 8 shows the results of different community detection algorithms on the induced subnetworks
and on three incomplete versions of LFR networks (parameters n=1000, k=20, kmax=50, τ1=2, τ2=1,
=0.1, cmin=50, cmax=100; the results are averaged over 100 random networks with the same
parameters). All of the results of the induced subnetworks are better than those of the incomplete
networks. We can also see that the results for crawled networks are usually worse than for other
incomplete networks. To understand the reason for this, we calculated the number of removed
intercommunity edges, intracommunity edges, and the remaining intercommunity edges in these
incomplete networks (see table 3). This shows that random-deletion and limited-degree networks
usually lose more intercommunity edges and fewer intracommunity edges than crawled networks. This
explains why results are worst for crawled networks. For the other incomplete networks, communities
can be found well even when there are many missing edges.
Finally, we examine three real networks: email, scientometrics and c. elegans. Figure 9 shows the
performance of COPRA and the Louvain method on induced networks and the three incomplete
networks, compared with the original networks. The results are broadly similar to those of artificial
networks: the results of random-deleteion and limited-degree networks are better than those of crawled
networks.
Table 3. Number of intracommunity and intercommunity edges removed in incomplete networks.
# of other
%
Type of
# of
# of
inter
removed
removed
observed
missing edge
edges
intra
inter
edges
edges
edges
85
866
99
852
868
83
158
1767
199
1726
199
1726
2730
298
319
2709
312
2716
504
3400
487
3417
3415
489
744
4111
788
4067
4067
788
Crawled
Random-deletion
Limited-degree
Crawled
Random-deletion
Limited-degree
Crawled
Random-deletion
Limited-degree
Crawled
Random-deletion
Limited-degree
Crawled
Random-deletion
Limited-degree
90%
90%
90%
80%
80%
80%
70%
70%
70%
60%
60%
60%
50%
50%
50%
915
901
917
842
801
801
702
681
688
496
513
511
256
212
212
5. Conclusions
Most edge prediction methods have not been evaluated on different types of networks and different
forms of missing data. We have found that the performance of these methods is strongly affected by
both factors. In particular, we have found that one algorithm, PA, performs well on limited-degree
incomplete networks, whereas it has obtained poor results on random-deletion networks in previous
research. BM and HRG perform better than other methods on random-deletion and limited-degree
networks, even though they are not suitable for large networks. CN, RA, and AA work well in crawled
and random-deletion networks. Therefore, to deal with the limited-degree problem in reality, we could
choose the PA method, or BM and HRG for small networks. CN, RA, and AA are still good methods
for finding other types of missing edges.
We have also investigated the effect of missing data on community detection algorithms. The
results show that community detection algorithms perform surprisingly well in the presence of missing
edges. The performance depends on the type of missing edges and is worst for crawled networks,
probably because of the number of intercommunity edges missing in this type of incomplete network.
Acknowledgements
We are grateful to Roger Guimerà for sending us the code for the BM method, and we would like to
thank the anonymous referees for their useful comments and valuable suggestions.
References
Sprinzak E, Sattath S and Margalit H 2003 How reliable are experimental protein-protein
[1]
interaction data? J. Mol. Biol 327 919
[2] Liljeros F, Edling C R, Amaral L A N, Stanley H E and Aaberg Y 2001 The web of human
sexual contacts Nature 411 907
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
0
0.5
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
0
0.5
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
0
0.5
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
0.6
0.7
Fraction of edges observed
0.8
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
0.6
0.7
Fraction of edges observed
0.8
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
(a)
(b)
(c)
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
(d)
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
0.9
0
0.5
0.6
0.7
Fraction of edges observed
0.8
0.9
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
(e)
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
0.9
0
0.5
0.6
0.7
Fraction of edges observed
0.8
0.9
Induced subnetwork
Craw led network
Random -deletion network
Lim ited-degree network
(f)
1
0.8
0.6
0.4
0.2
n
o
i
t
a
m
r
o
f
n
i
l
a
u
t
u
m
d
e
z
i
l
a
m
r
o
N
0.6
0.7
Fraction of edges observed
0.8
0.9
0
0.5
0.6
0.7
Fraction of edges observed
0.8
0.9
Figure 9. Performance of COPRA and the Louvain method on various types of incomplete real
networks. (a) Louvain method on incomplete email network. (b) Louvain method on incomplete
scientometrics network. (c) Louvain method on incomplete c. elegans network. (d) COPRA on
incomplete email network. (e) COPRA on incomplete scientometrics network. (f) COPRA on
incomplete c. elegans network.
[3] Guimerà R and Sales-Pardo M 2009 Missing and spurious interactions and the reconstruction of
complex networks Proc. Natl. Acad. Sci. USA 106 22073
[4] Allison P D 2001 Missing Data (Thousand Oaks, CA: Sage Publications)
[5] Kossinets G 2006 Effect of missing data in social networks Soc. Netw. 28 247
[6] Zhu Y-X, Lü L, Zhang Q-M and Zhou T 2011 Uncovering missing links with cold ends arXiv:
1104.0395
[7] Leicht E A, Holme P and Newman M E J 2006 Vertex similarity in networks Phys. Rev. E 73
026120
[8] Liben-Nowell D and Kleinberg J 2007 The link-prediction problem for social networks J. Am.
Soc. Inform. Sci. Technol. 58 1019
[9] Hasan M A, Chaoji V, Salem S and Zaki M 2006 Link prediction using supervised learning
Proc. Workshop on Link Analysis (Counterterrorism and Security with SIAM Data Mining Conf.,
Bethesda, MD)
[10] Popescul A and Ungar L H 2003 Statistical relational learning for link prediction Proc. IJCAI03
Workshop on Learning Statistical Models from Relational Data p 81
[11] Taskar B, Wong M-F, Abbeel P and Koller D 2003 Link prediction in relational data Proc.
Neural Information Processing Systems Conf. p 659
[12] Lü L and Zhou T 2011 Link prediction in complex networks: a survey Physica A 390 1150
[13] Adamic L A and Adar E 2003 Friends and neighbours on the web Soc. Netw. 25 211
[14] Goldberg D S and Roth F P 2003 Assessing experimentally derived interactions in a small world
Proc. Natl. Acad. Sci. USA 100 4372
[15] Zhou T, Lü L and Zhang Y 2009 Predicting missing links via local information Eur. Phys. J. B
71 623
[16] Ravasz E, Somera A L, Mongru D A, Oltvai Z N and Barabási A L 2002 Hierarchical
organization of modularity in metabolic networks Science 297 1551
[17] Jaccard P 1912 The distribution of flora in the alpine zone New Phytologist 11 37
[18] Ihmels J, Friedlander G, Bergmann S, Sarig O, Ziv Y and Barkai N 2002 Revealing modular
organization in the yeast transcriptional network Nature Genet. 31 370
[19] Katz L 1953 A new status index derived from sociometric analysis Psychometrika 18 39
[20] Gobel F and Jagers A A 1974 Stoch. Proc. Appl. 2 311
[21] Jeh G and Widom J 2002 SimRank: a measure of structural-context similarity Proc. ACM
SIGKDD Int. Conf. on Knowledge Discovery and Data Mining p 538
[22] Lü L, Jin C-H and Zhou T 2009 Similarity index based on local paths for link prediction of
complex networks Phys. Rev. E 80 046122
[23] Fouss F, Pirotte A, Renders J-M and Saerens M 2007 Random-walk computation of similarities
between nodes of a graph with application to collaborative recommendation IEEE Trans. Knowl.
Data Eng. 19 355
[24] Borgatti S P and Everett M G 1993 Two algorithms for computing regular equivalence Soc.
Netw. 15 361
[25] Sun D, Zhou T, Liu Z-G, Liu R-R, Jia C-X and Wang B-H 2009 Information filtering based on
transferring similarity Phys. Rev. E 80 017101
[26] Marsden P V 1990 Network data and measurement Annu. Rev. Sociol. 16 435
[27] Costenbader E and Valente T W 2003 The stability of centrality measures when networks are
sampled Soc. Netw. 25 283
[28] Borgatti S P, Carley K M and Krackhardt D 2006 On the robustness centrality measure under
conditions of imperfect data Soc. Netw. 28 124
[29] Gile K and Handcock M S 2006 Model-based assessment of the impact of missing data on
inference for networks Working Paper No 66 (Center for Statistics and the Social Sciences,
University of Washington)
[30] Albert R, Jeong H and Barabási A L 2000 Error and attack tolerance of complex networks
Nature 406 378
[31] Holland P W and Leinhard S 1973 Structural implications of measurement error in sociometry J.
Math. Sociol. 3 85
[32] Zachary W W 1977 An information flow model for conflict and fission in small groups J.
Anthropol. Res. 33 452
[33] Erdös P and Rényi A 1959 On random graphs I. Publ. Math. 6 290
[34] Lancichinetti A, Fortunato S and Radicchi F 2008 Benchmark graphs for testing community
detection algorithms Phys. Rev. E 78 046110
[35] Pajek, Network from Pajek datasets http://vlado.fmf.uni-lj.si/pub/networks/data/
[36] Jeong H, Tombor B, Albert R, Oltvai Z and Barabási A L 2000 The large-scale organization of
metabolic networks Nature 407 651
[37] Guimera R, Danon L, Diaz-Guilera A, Giralt F and Arenas A 2003 Self-similar community
structure in a network of human interactions Phys. Rev. E 68 065103
[38] Krebs V 2002 Mapping networks of terrorist cells Connections 24 43
[39] Dawah H A, Hawkins B A and Claridge M F 1995 Structure of the parasitoid communities of
grass-feeding chalcid wasps J. Anim. Ecol. 64 708
[40] Newman M E J 2001 Clustering and preferential attachment in growing networks Phys. Rev. E
64 025102
[41] Barabasi A L, Jeong H, Neda Z, Ravase E, Schubert A and Vicsek T 2002 Evolution of the
social network of scientific collaboration Physica A 311 590
[42] Clauset A, Moore C and Newman M E J 2008 Hierarchical structure and the prediction of
missing links in networks Nature 453 98
[43] Fawcett T 2006 An introducation to ROC analysis Pattern Recognit. Lett. 27 861
[44] Hanley J A and McNeil B J 1982 The meaning and use of the area under a receiver operating
characteristic (ROC) curve Radiology 143 29
[45] Gregory S 2010 Finding overlapping communities in networks by label propagation New J.
Phys. 12 103018
[46] Yan B and Gregory S 2009 Detecting communities in networks by merging cliques, Proc. IEEE
Int. Conf. on Intelligent Computing and Intelligent Systems p 832
[47] Clauset A, Newman M E J and Moore C 2004 Finding community structure in very large
networks Phys. Rev. E 70 066111
[48] Wakita K and Tsurumi T 2007 Finding community structure in a megascale social networking
service, Proc. IADIS Intl Conf. on WWW/Internet 2007 p 153
[49] Pons P and Latapy M 2006 Computing communities in large networks using random walks J.
Graph Algorithms Appl. 10 191
[50] Blondel V D, Guillaume J L, Lambiotte R and Lefebvre E 2008 Fast unfolding of community
hierarchies in large networks J. Stat. Mech. P10008
[51] Lancichinetti A, Fortunato S and Kertész J 2009 Detecting the overlapping and hierarchical
community structure of complex networks New J. Phys. 11 033015
|
1408.1542 | 4 | 1408 | 2015-05-25T02:28:39 | Measuring and Optimizing Cultural Markets | [
"cs.SI",
"physics.soc-ph"
] | Social influence has been shown to create significant unpredictability in cultural markets, providing one potential explanation why experts routinely fail at predicting commercial success of cultural products. To counteract the difficulty of making accurate predictions, "measure and react" strategies have been advocated but finding a concrete strategy that scales for very large markets has remained elusive so far. Here we propose a "measure and optimize" strategy based on an optimization policy that uses product quality, appeal, and social influence to maximize expected profits in the market at each decision point. Our computational experiments show that our policy leverages social influence to produce significant performance benefits for the market, while our theoretical analysis proves that our policy outperforms in expectation any policy not displaying social information. Our results contrast with earlier work which focused on showing the unpredictability and inequalities created by social influence. Not only do we show for the first time that dynamically showing consumers positive social information under our policy increases the expected performance of the seller in cultural markets. We also show that, in reasonable settings, our policy does not introduce significant unpredictability and identifies "blockbusters". Overall, these results shed new light on the nature of social influence and how it can be leveraged for the benefits of the market. | cs.SI | cs | Measuring and Optimizing Cultural Markets
A. Abeliuk1
G. Berbeglia2
M. Cebrian1
P. Van Hentenryck3
June 14, 2021
1 The University of Melbourne and National ICT Australia.
2 Melbourne Business School (The University of Melbourne) and National ICT Australia.
3 The Australian National University and National ICT Australia.
Corresponding author: Pascal Van Hentenryck ([email protected])
Abstract
Social influence has been shown to create significant unpredictability in cultural
markets, providing one potential explanation why experts routinely fail at predicting
commercial success of cultural products. To counteract the difficulty of making ac-
curate predictions, "measure and react" strategies have been advocated but finding a
concrete strategy that scales for very large markets has remained elusive so far.
Here we propose a "measure and optimize" strategy based on an optimization policy
that uses product quality, appeal, and social influence to maximize expected profits in
the market at each decision point. Our computational experiments show that our policy
leverages social influence to produce significant performance benefits for the market,
while our theoretical analysis proves that our policy outperforms in expectation any
policy not displaying social information.
Our results contrast with earlier work which focused on showing the unpredictabil-
ity and inequalities created by social influence. Not only do we show for the first time
that dynamically showing consumers positive social information under our policy in-
creases the expected performance of the seller in cultural markets. We also show that,
in reasonable settings, our policy does not introduce significant unpredictability and
identifies "blockbusters".
Overall, these results shed new light on the nature of social influence and how it
can be leveraged for the benefits of the market.
5
1
0
2
y
a
M
5
2
]
I
S
.
s
c
[
4
v
2
4
5
1
.
8
0
4
1
:
v
i
X
r
a
1
1
Introduction
Prediction in cultural markets is a wicked problem: On the one hand, experts routinely fail
at predicting commercial success for items such as movies, books, and songs [1, 2, 3, 7, 14]
while, on the other hand, hit products are generally considered qualitatively superior to
the less successful ones [24]. If those hit products are of superior quality, why can't experts
detect them a priori? As Duncan Watts puts it, in cultural markets "everything is obvious
... once you know the answer," as experts find it extremely hard to benefit from their
specific knowledge [4].
In their seminal paper [17], Salganik, Dodds, and Watts offer a satisfactory explanation
for this paradox: The impact of social influence on the behavior of individuals (word-of-
mouth), a process a priori invisible to experts, may distort the quality perceived by the
customers, making quality and popularity out of sync and expert predictions less reliable.
To investigate this hypothesis experimentally, they created an artificial music market called
the MusicLab. Participants in the MusicLab were presented a list of unknown songs from
unknown bands, each song being described by its name and band. The participants were
divided into two groups exposed to two different experimental conditions: The independent
condition and the social influence condition. In the first group (independent condition),
participants were provided with no additional information about the songs. Each partic-
ipant would decide which song to listen to from a random list. After listening to a song,
the participant had the opportunity to download it. In the second group (social influence
condition), each participant was provided with an additional information: The number of
times the song was downloaded by earlier participants. Moreover, these participants were
presented with a list ordered by the number of downloads. Additionally, to investigate
the impact of social influence, participants in the second group were distributed in eight
"worlds" evolving completely independently. In particular, participants in one world had
no visibility about the downloads and the rankings in the other worlds.
The MusicLab provides an experimental testbed of measuring the unpredictability
of cultural markets. By observing the evolution of different words given the same initial
conditions, the MusicLab provides unique insights on the impact of social influence and
the resulting unpredictability. In particular, Salganik et al suggested that social influence
contributes to both unpredictability and inequality of success, with follow-up experiments
confirming these initial findings [19, 18, 13, 23] (see also [6] for a perspective on the Mu-
sicLab paper). These experimental results received further theoretical support by the
development of a generative model that reproduces the experimental data [10]. The Musi-
cLab model, which is presented below, teased out the role of the quality and appeal of the
songs and position bias in the unpredictability and inequality of the experimental market.
Together these results painted a bleak scenario for cultural markets. From the stand-
point of the market, e.g., producers and consumers of cultural products, this is an inefficient
situation [21, 22, 8]: Fewer cultural products are consumed overall and some high-quality
products may go unnoticed, while lower-quality ones are oversold. It is thus an important
2
open question to determine whether this situation can be remedied and how. In [24], Watts
advocates the use of "measure and react" strategies to address the difficulty in making cor-
rect predictions: "Rather than predicting how people will behave and attempting to design
ways to make customers behave in a particular way [...] we can instead measure directly how
they respond to a whole range of possibilities and react accordingly" [24]. The MusicLab
provides a unique setting to validate the benefits of a "measure and react" strategy.
This paper presents a "measure and optimize" (M&O) algorithm, that is a "measure
and react" algorithm which maximizes expected downloads at each decision point. In the
MusicLab, the only degree of freedom is the playlist presented to an incoming participant.
Each ranking policy for the playlist produces a "measure and react" algorithm. The original
MusicLab experiments presented one such policy: To rank the songs by number of down-
loads. Our "measure and optimize" algorithm in contrast uses a performance ranking that
maximizes the expected downloads globally for the incoming participant, exploiting the
quality and appeal of each song, the position visibilities in the playlist, and social influence.
The performance ranking is based on two insights.
1. It uses the generative MusicLab model that describes the probability of sampling a
song given its quality, appeal, position in the playlist, and the downloads of all songs
at some point in time.
2. It solves the resulting global optimization problem in strongly polynomial time by a
reduction to the Linear Fractional Assignment Problem, meaning that the algorithm
scales to large instances and avoid exploring the n! possible rankings.
In addition, since the quality of the songs is not known a priori, our M&O algorithm learns
them over time, using an often overlooked insight by Salganik et al.
[17]: The fact that
the popularity of a song in the independent condition is a natural measure of its quality,
capturing both its intrinsic "value" and the preferences of the participants.
The M&O algorithm was evaluated on a simulated version of the MusicLab based on
the model proposed in [10]; It was compared to the download ranking policy used in the
original MusicLab experiments [17] and a random ranking policy. These ranking policies
were evaluated both under the social influence and independent conditions.
Regarding efficiency, the computational results contain two important highlights:
1. The M&O algorithm produces a significant increase in expected downloads compared
to other tested policies.
2. The M&O algorithm leverages both position bias and social influence to maximize
downloads, providing substantial gains compared to ranking policies under the inde-
pendent condition.
These performance results are robust, not an artifact of distributions and parameters used
in experimental setting. Indeed, our theoretical results show that a performance-ranking
3
policy always benefits from social influence and outperforms all policies not using social
influence in expectation. The performance results also shed light on recent results that
demonstrated the benefits of position bias in the absence of social influence [11]. Our
computational results show that a performance-ranking policy can leverage both social
influence and position visibility and that the improvements in expected downloads are
cumulative.
Regarding unpredictability, our results are also illuminating. They highlight that the
performance-ranking policy often identifies "blockbusters", which are the primary sources
of the increased market efficiency. This provides a sharp contrast to the download rank-
ing, which cannot identify these blockbusters reliably. Moreover, even in that worst-case
scenario, our computational results show that the performance ranking brings significant
benefits over the download ranking.
Finally, it is important to emphasize that the performance-ranking policy is general-
purpose and can be applied to a variety of cultural markets, including books and movies,
where product appeal, position visibility, and social influence can be optimized jointly.
2 Results
We first describe the MusicLab model proposed in [10], the experimental setting, and a
presentation of the various ranking policies. We then show how to estimate the qualities of
the songs. We then report the core computational results about the performance and
unpredictability of the various ranking policies. We finally prove that social influence
always helps the performance ranking in maximizing the expected downloads. As a result,
the performance ranking under social influence outperforms all ranking policies under the
independent condition.
2.1 The MusicLab Model
The descriptive model for the MusicLab [10] is based on the data collected during the
actual experiments and is accurate enough to reproduce the conclusions in [17] through
simulation. The model is defined in terms of a market composed of n songs. Each song
i ∈ {1, . . . , n} is characterized by two values:
1. Its appeal Ai which represents the inherent preference of listening to song i based only
on its name and its band;
2. Its quality qi which represents the conditional probability of downloading song i given
that it was sampled.
The MusicLab experiments present each participant with a playlist π, i.e., a permutation
of {1, . . . , n}. Each position p in the playlist is characterized by its visibility vp which is
the inherent probability of sampling a song in position p. Since the playlist π is a bijection
4
from the positions to the songs, its inverse is well-defined and is called a ranking. Rankings
are denoted by the letter σ in the following, πi denotes the song in position i of the playlist
π, and σi denotes the position of song i in the ranking σ. Hence vσi denotes the visibility
of the position of song i. The model specifies the probability of listening to song i at time
k given a playlist σ as
(cid:80)n
pi,k(σ) =
vσi(αAi + Di,k)
j=1 vσj (αAj + Dj,k)
,
where Di,k is the number of downloads of song i at time k and α > 0 is a scaling factor
which is the same for all songs. Observe that the probability of sampling a song depends
on its position in the playlist, its appeal, and the number of downloads at time k. As an
experiment proceeds, the number of downloads dominates the appeal of the song at a rate
dictated by α.
When simulating the independent condition, the download counts Di,k in the probability
pi,k(σ) becomes zero and hence the probability of listening to song i only depends on the
appeals and visibilities of the songs. We obtain a probability
(cid:80)n
vσiAi
j=1 vσj Aj
pi(σ) =
2.2 The Experimental Setting
The experimental setting in this paper uses an agent-based simulation to emulate the Mu-
sicLab. Each simulation consists of N iterations and, at each iteration k,
1. the simulator randomly selects a song i according to the probability distribution
specified by the pj.k's.
2. the simulator randomly determines, with probability qi, whether selected song i is
downloaded; If the song is downloaded, then the simulator increases the download
counts of song i, i.e., Di,k+1 = Di,k + 1.
The "measure and react" algorithms studied in this paper monitors the above process (e.g.,
to estimate song quality). Every r iterations, the algorithms compute a new playlist σ using
one of the ranking policies described below. For instance, in the social influence condition
of the original MusicLab experiments, the policy ranks the songs in decreasing order of
download counts. The parameter r ≥ 1 is called the refresh rate.
The experimental setting tries to be close to the MusicLab experiments and considers
50 songs and simulations with 20,000 steps. The songs are displayed in a single column.
The analysis in [10] indicated that participants are more likely to sample songs higher in
the playlist. More precisely, the visibility decreases with the playlist position, except for
a slight increase at the bottom positions. Figure 2.1 depicts the visibility profile based on
these guidelines, which is used in all computational experiments in this paper.
5
Figure 2.1: The visibility vp (y-axis) of position p in the playlist (x-axis) where p = 1 is the
top position and p = 50 is the bottom position of the playlist which is displayed in a single
column.
Figure 2.2: The Quality qi (blue) and Appeal Ai (red) of Song i in the two settings. In the
first setting, the quality and the appeal for the songs were chosen independently according
to a Gaussian distribution normalized to fit between 0 and 1. The second setting explores
an extreme case where the quality is negatively correlated with the appeal.
The paper also uses two settings for the quality and appeal of each song, which are
depicted in Figure 2.2:
1. In the first setting, the quality and the appeal for the songs were chosen independently
according to a Gaussian distribution normalized to fit between 0 and 1.
2. The second setting explores an extreme case where the quality is negatively correlated
with the appeal.
The experimental results were obtained by running W = 400 simulations.
2.3 The Ranking Policies
This section reviews a number of ranking policies used to influence the participants. Each
policy updates the order of the songs in the playlist and thus defines a different "measure
and react" algorithm that uses the policy to present a novel playlist after each refresh.
6
The first policy is called the download ranking [17]: At iteration k, it simply orders
the songs by the number of downloads Di,k and assigns the positions 1..n in that order to
obtain the σd
k. Note that downloads do not necessarily reflect the inherent quality of the
songs, since they depend on how many times the songs were listened to.
The second policy is the performance ranking which maximizes the expected number
of downloads at each iteration, exploiting all the available information globally, i.e., the
appeal, the visibility, the downloads, and the quality of the songs.
Definition 2.1. The performance ranking σ∗
k at iteration k is defined as
n(cid:88)
i=1
σ∗
k = arg max
σ∈Sn
pi,k(σ) · qi.
The performance ranking uses the probability pi,k(σ) of sampling song i at iteration k given
ranking σ, as well as the quality qi of song i. Obviously, in practical situations, the song
qualities are unknown. However, as mentioned in the introduction, Salganik et al.
[17]
argue that the popularity of a song (at least in the independent condition) can be used as
a measure of its quality. Hence, the quality qi in the above expression can be replaced by
its approximation qi,k at iteration k as discussed later in the paper.
It is not obvious a priori how to compute the performance ranking: In the worst case,
there are n! rankings to explore. Fortunately, the performance ranking can be computed
efficiently (in strongly polynomial time) through a reduction to the Linear Fractional As-
signment Problem.
Theorem 2.2. The performance ranking can be computed in strongly polynomial time.
Proof. We show that the performance ranking problem can be polynomially reduced to the
Linear Fractional Assignment Problem (LFAP). The LFAP, which we state below, is known
to be solvable in polynomial time in the strong sense [20, 9].
A LFAP input is a bipartite graph G = (V1, V2, E) where V1 = V2 = n, and a cost
cij and a weight dij > 0 for each edge (i, j) ∈ E. The LFAP amounts to finding a perfect
matching M minimizing
(cid:80)
(cid:80)
(i,j)∈M cij
(i,j)∈M dij
.
−(cid:80)
(cid:80)
To find the performance ranking, it suffices to solve the LFAP problem defined over a
bipartite graph where V1 represents the songs, V2 represents the positions, ci,j = −vj(αAi +
Di)qi and dij = vj(αAi + Di). This LFAP instance determines a perfect matching M
such that
is minimized. The result follows since this is a polynomial
reduction.
In the following, we use D-rank and P-rank to denote the "measure and react" algo-
rithms using the download and performance rankings respectively. We also annotate the
(i,j)∈M vj (αAi+Di)qi
(i,j)∈M vj (αAi+Di)
7
algorithms with either SI or IN to denote whether they are used under the social influ-
ence or the independent condition. For instance, P-rank(SI) denotes the algorithm with
the performance ranking under the social influence condition, while P-rank(IN) denotes
the algorithm with the performance ranking under the independent condition. We also
use rand-rank to denote the algorithm that simply presents a random playlist at each
iteration. Our proposed M&O algorithm is P-rank(SI).
Under the independent condition, the optimization problem is the same at each iter-
ation as the probability pi(σ) does not change over time. Since the performance ranking
maximizes the expected downloads at each iteration, it dominates all other "measure and
react" algorithms under the independent condition.
Proposition 2.3 (Optimality of Performance Ranking). Given specified songs appeal and
quality, P-rank(IN) is the optimal "measure and react" algorithm under the independent
condition.
2.4 Recovering the Songs Quality
This section describes how to recover songs quality in the MusicLab. It shows that "mea-
sure and react" algorithms quickly recover the real quality of the songs.
As mentioned several times already, Salganik et al.
[17] stated that the popularity of
a song in the independent condition is a natural measure of its quality and captures both
its intrinsic "value" and the preferences of the participants. To approximate the quality of
a song, it suffices to sample the participants. This can be simulated by using a Bernoulli
sampling based on real quality of the songs. The predicted quality qi of song i is obtained
by running m independent Bernoulli trials with probability qi of success, i.e.,
qi =
k
m
,
where k is the number of successes over the m trials. The law of large numbers states that
the prediction accuracy increases with the sampling size. For a large enough sampling size,
qi has a mean of qi and a variance of qi(1−qi). This variance has the desirable property that
the quality of a song with a more 'extreme' quality (i.e., a good or a bad song) is recovered
faster than those with average quality. In addition, "measure and react" algorithms merge
additional information about downloads into the prediction as the experiment proceeds: At
step k, the approximate quality of song i is given by
qi,k =
qi,0 · m + Di,k
m + Si,k
,
where m is the initial sample size and Si,k the number of samplings of song i up to step k.
Figure 2.3 presents experimental results about the accuracy of the quality approximation
for different rankings, assuming an initial sampling set of size 10. More precisely, the figure
8
for the top 10 quality songs. The figure reports the average squared difference(cid:80)n
Figure 2.3: Average Squared Difference of Inferred Quality over Time for Different Rankings
(qi,k−qi)2
between the song quality and their predictions for the various ranking policies under the
social influence and the independent conditions.
i=1
n
reports the average squared difference
n(cid:88)
(qi,k − qi)2
i=1
n
between the song quality and their predictions for the various ranking policies under the
social influence and the independent conditions. In all cases, the results indicate that the
songs quality is recovered quickly and accurately. Observe that the performance ranking
recovers the song quality faster than the other rankings, both in the social influence and in
the independent conditions.
2.5 Expected Performance
This section studies the expected performance of the various rankings under the social
influence and the independent conditions. The performance ranking uses the quality ap-
proximation presented in the last section (instead of the "true" quality). Figures 2.4 and
2.5 depict the average number of downloads for the various rankings given the quality and
appeal data depicted in Figure 2.2.
The experimental results highlight three significant findings:
1. The performance ranking provides substantial gains in expected downloads compared
to the download ranking and the random ranking policies, both in the social influence
and the independent conditions.
9
Figure 2.4: The Number of Downloads over Time for the Various Rankings (Independent
Gaussian Setting). The x-axis represents the number of song samplings and the y-axis
represents the average number of downloads over all experiments. The left figure depicts the
results for the social influence condition and the right figure for the independent condition.
2. The benefits of the performance ranking are particularly striking under the social
influence condition. Social influence creates a Matthew effect [16] for the number of
expected downloads.
3. The gain of the performance ranking is also more significant on the worst-case sce-
nario, where the song appeal is negatively correlated with the song quality. The
expected number of downloads is lower in this worst-case scenario, but the shapes
of the curves are in fact remarkably similar in the social influence and independent
conditions.
In summary, the performance ranking produces significant improvements in expected down-
loads over the download ranking, which also dominate the random ranking. The benefits
come both from position bias and social influence which provide cumulative improvements.
2.6 Market Unpredictability
Figure 2.6 depicts the unpredictability results using the measure proposed in [17]. The
unpredictability ui of song i is defined as the average difference in market share for that
song between all pairs of realizations, i.e.,
ui =
mi,w − mi,w(cid:48)/
(cid:18)W
(cid:19)
,
2
W(cid:88)
W(cid:88)
w=1
w(cid:48)=w+1
10
Figure 2.5: The Number of Downloads over Time for the Various Rankings (Negative
Correlation Setting). The x-axis represents the number of song samplings and the y-axis
represents the average number of downloads over all experiments. The left figure depicts the
results for the social influence condition and the right figure for the independent condition.
where mi,w is the market share of song i in world w, i.e.,
n(cid:88)
k=1
mi,j = Dj
i,N /
Dj
i,N
where Dw
dictability measure is the average of this measure over all n songs, i.e.,
i,t is the number of downloads of song i at step t in world w. The overall unpre-
n(cid:88)
U =
ui/n.
The figure highlights two interesting results.
j=1
1. Exploiting social influence does not necessarily create an unpredictable market. In
the first setting, the performance ranking introduces only negligible unpredictability
in the market. This obviously contrasts with the download ranking, which introduces
significant unpredictability.
2. An unpredictable market is not necessarily an inefficient market. In the second setting,
the performance ranking exploits social influence to provide significant improvements
in downloads although, as a side-effect, it creates more unpredictability. Subsequent
results will explain the source of this unpredictability.
11
(cid:80)W
Figure 2.6: The Unpredictability of the Rankings for the Unpredictability Measure of [17].
The measure of unpredictability ui for song i is defined as the average difference in mar-
k=j+1 mi,j −
ket share for that song between all pairs of realizations, i.e., ui = (cid:80)W
mi,k/(cid:0)W
measure is the average of this measure over all n songs, i.e., U = (cid:80)n
(cid:1), where mi,j is the market share of song i in world j. The overall unpredictability
j=1
2
j=1 ui/n.. The left
figure depicts the results for the first setting, while the right figure depicts the results for
the second setting.
2.7 Downloads Versus Quality
Figures 2.7 and 2.8 report the correlation between number of downloads of a song (y-axis)
and its true quality (x-axis) for each of the rankings. More precisely, the figures show the
distributions of the downloads of every song over the simulations. The songs are ranked
in increasing quality on the x-axis and there are 400 dots for each song, representing the
number of downloads in each of the experiments. As a result, the figures give a clear visual
representation of what happens in the MusicLab for the various rankings, including how
the downloads are distributed and the sources of unpredictability.
The results are particularly interesting. In the first setting depicted in Figure 2.7, P-
rank(SI) clearly isolates the best song, which has an order of magnitude more downloads
than other songs. When comparing with P-rank(SI) and P-rank(IN), we observe that the
additional market efficiency produced by P-rank(SI) primarily comes from the downloads
of this best song. In contrast, the download ranking has a lot more unpredictability and
has significant download counts for many other songs, even for some with considerably less
quality. The variance of downloads for the best song is substantial, indicating that there
are simulations in which this best song has very few downloads. This never happens with
the performance ranking.
The results in Figure 2.8 highlight the source of unpredictability in the performance
ranking. These results are for the second setting where the appeal is negatively correlated
with the quality. The results indicate that the performance ranking is not capable of isolat-
ing the best song in this setting. There are significant downloads of the next high-quality
songs however. This also contrasts with the download ranking where lower-quality songs
12
Figure 2.7: The Distribution of Downloads Versus the True Song Qualities (First Setting).
The songs on the x-axis are ranked by increasing quality from left to right. Each dot is the
number of downloads of a song in an experiment.
can have substantial downloads. It is interesting to point out that the unpredictability of
the performance ranking in this setting comes from songs which are not easy to distinguish:
These songs have very similar values for quality and appeal.
These results shed interesting light on social influence. First, the download ranking
clearly shows that social influence can transform average songs into "hits". However, this
behavior is entirely eliminated by the performance ranking in the first setting: The per-
formance ranking clearly leverages social influence to isolate the "blockbuster". The second
setting highlights a case where even the performance ranking cannot recover the best song.
This setting is of course a worst-case scenario: A terrific product with a poor appeal. How-
ever, the performance ranking still leverages social influence to promote high-quality songs:
Social influence under the performance ranking is much less likely to turn an average song
into a "hit" compared to the download ranking.
13
Figure 2.8: The Distribution of Downloads Versus the True Song Qualities (Second Setting).
The songs on the x-axis are ranked by increasing quality from left to right. Each dot is the
number of downloads of a song in an experiment.
2.8 The Benefits of Social Influence
We now prove that social influence always increases the number of expected downloads of
the performance ranking. We show that this is true regardless of the number of songs, their
appeal and quality, and the visibility values. The proof assumes that the quality of the
songs has been recovered, i.e., we use qi instead of qi,k. Also, for simplifying the notations,
we use ai = αAi + Di,t and assume without loss of generality that v1 ≥ ··· ≥ vn > 0.
We are interested in showing that the expected number of downloads increases over time
for the performance ranking under the social influence condition. In state t, the probability
that song i is downloaded for ranking σ is
vσiaiqi(cid:80) vσiai
.
14
Hence, the expected number of downloads at time t for ranking σ is defined as
(cid:80)
(cid:80)
E[Dσ
t ] =
i vσiaiqi
i vσiai
.
Under the social influence condition, the number of expected downloads over time can be
considered as a Markov chain where state t + 1 only depends on state t. Therefore the
expected number of downloads at time t + 1 conditional to time t if ranking σ and σ(cid:48) are
used at time t and t + 1 respectively is
(cid:32)
(cid:88)
j
vσj ajqj(cid:80) vσiai
·
E[Dσ,σ(cid:48)
t+1 ] =
(cid:80)
(cid:80)
(cid:80)
(cid:80)
i(cid:54)=j vσ(cid:48)
i
aiqi + vσ(cid:48)
ai + vσ(cid:48)
j
j
(aj + 1)qj
(aj + 1)
i(cid:54)=j vσ(cid:48)
i
+ (1 − E[Dσ
t ]) · E[Dσ
t ].
Consider the performance ranking now. At step t, the performance ranking finds a permu-
tation σ∗ ∈ Sn such that
E[Dσ∗
t
] =
i
i vσ∗
i vσ∗
aiqi
ai
i
= max
σ
i vσiaiqi
i vσiai
.
(2.1)
By optimality of the performance ranking at each step, we have that
(2.2)
where σ∗∗ is the performance ranking at step t + 1. Hence, to show that social influence is
always beneficial to the performance ranking, it suffices to show that
t+1
E[Dσ∗,σ∗∗
] ≥ E[Dσ∗,σ∗
t+1 ]
E[Dσ∗,σ∗
t+1 ] ≥ E[Dσ∗
t
].
The proof is simpler when reasoning about the playlist obtained by the performance ranking.
At step t, the performance ranking finds a playlist π∗ ∈ Sn such that
(cid:33)
(cid:80)
(cid:80)
By (2.3), π∗ satisfies(cid:88)
p
p
Consider the function
f (λ) = max
π
(cid:80)
(cid:80)
(cid:88)
p vpaπ∗
p qπ∗
p
p vpaπ∗
p
= E[Dσ∗
t
]
(cid:88)
(cid:16)
p
(cid:16)
(cid:17)
vpaπ∗
p
p − λ
qπ∗
.
(cid:88)
p
vpaπ∗
p qπ∗
p − E[Dσ∗
t
]
vpaπ∗
p =
vpaπ∗
p
p − E[Dσ∗
qπ∗
t
(2.3)
(cid:17)
]
= 0.
(2.4)
Function f is concave and strictly decreasing and hence its unique zero is the optimal value
E[Dσ∗
]. Furthermore, the optimality condition for π in function f can be characterized by
a " rearrangement inequality" which states that the maximum is reached if and only if
t
(cid:0)qπ∗
1
− λ(cid:1) ≥ ··· ≥ aπ∗
n
(cid:0)qπ∗
n − λ(cid:1)
aπ∗
1
∀λ ∈ R.
(2.5)
We are now in position to state our key theoretical result.
15
Theorem 1. The expected downloads are nondecreasing over time when the performance
ranking is used to select the playlist.
Proof. By Equation 2.2, it suffices to show that
E[Dσ∗,σ∗
t+1 ] ≥ E[Dσ∗
t
].
Let a = a1,··· , an represent the current state at time t. For ease of notation, we rename
the songs so that σ∗
i = i. We also drop the ranking superscript σ∗ from the download
notation. Denote the optimal expected number of downloads at time t as
Then, the expected number of downloads in time t + 1 conditional to time t is
(cid:80)
(cid:80)
E[Dt] =
i viaiqi
i viai
= λ∗.
i(cid:54)=j viaiqi + vj(aj + 1)qj
i(cid:54)=j viai + vj(aj + 1)
1 −
+
(cid:33)
(cid:19)
(cid:18)
1 −
+
(cid:19)
·
(cid:80)
(cid:80)
i viaiqi
i viai
(cid:18)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
i viaiqi
i viai
(cid:19)
· λ∗.
j vjajqj
i viai
i viaiqi + vjqj
i viai + vj
E[Dt+1] ≥ E[Dt]
(cid:19)
(cid:18)
1 −
+
(cid:19)
(cid:80)
(cid:80)
j vjajqj
i viai
· λ∗ ≥ λ∗.
i viaiqi + vjqj
i viai + vj
(2.6)
(2.7)
E[Dt+1] =
Proving
(cid:88)
j
=
·
(cid:32)
(cid:80)
(cid:80)
vjajqj(cid:80) viai
(cid:80)
(cid:18) vjajqj(cid:80) viai
(cid:88)
(cid:80)
·
j
(cid:88)
j
·
(cid:80)
(cid:80)
(cid:18) vjajqj(cid:80) viai
1(cid:80)
(cid:88)
(cid:0)qπ∗
i viai
aπ∗
j
1
1
(cid:88)
(cid:34)
j
amounts to showing that
which reduces to proving
or, equivalently,
(cid:34)
(cid:80)
v2
j ajqj
i viai + vj
(cid:35)
(qj − λ∗)
≥ 0
(cid:35)
≥ 0.
(qj − λ∗)
v2
j ajqj
i viai + vj
(cid:80)
− λ∗(cid:1) ≥ ··· ≥ aπ∗
n
(cid:0)qπ∗
n − λ∗(cid:1) .
16
By the rearrangement inequality (2.5), the performance ranking at step t produces a playlist
π satisfying
Therefore, if ai (qi − λ∗) ≥ aj (qj − λ∗), then vi ≥ vj for any i, j ∈ N. Hence, the perfor-
mance rank allocates all songs with a negative term after the songs with a positive term.
Define P1 = {i ∈ N (qi − λ∗) ≥ 0} and P2 = {i ∈ N (qi − λ∗) < 0}. It follows that vi ≥ vj
for all i ∈ P1, j ∈ P2. Inequality (2.7) can be rewritten as follows:
(cid:20) vjajqjvj
(cid:80)
i viai + vj
(cid:88)
j∈P1
(cid:21)
(cid:20) vjajqjvj
(cid:80)
i viai + vj
(cid:88)
j∈P2
(qj − λ∗)
+
(cid:21)
(qj − λ∗)
≥ 0.
By definition of P1 and P2, the terms in the left summation are positive and the terms in
the right summation are negative. Additionally, for any c > 0,
vi
c + vi
≥ vj
c + vj
⇔ (c + vj)vi ≥ (c + vi)vj ⇔ cvi ≥ cvj ⇔ vi ≥ vj
Hence, since v1 ≥ v2 ≥ . . . ≥ vn,
v1(cid:80)
i viai + v1
v2(cid:80)
i viai + v2
≥
≥ . . . ≥
vn(cid:80)
i viai + vn
.
Let v = mini∈P1 vi the smallest visibility assigned to an item in P1. By the rearrangement
inequality (2.5), v ≥ maxi∈P2 vi. Similarly, let q = mini∈P1 qi. By definiton of P1 and P2,
q ≥ maxi∈P2 qi. These observations leads to the following inequality:
(cid:20) vjajqjvj
(cid:80)
(cid:88)
(cid:88)
vq(cid:80)
j∈P1
i viai + v
i viai + vj
≥
j∈P1
=
vq(cid:80)
n(cid:88)
i viai + v
By Equation 2.4,
[ajvj (qj − λ∗)] +
[ajvj (qj − λ∗)]
(cid:21)
(qj − λ∗)
(qj − λ∗)
+
j∈P2
(cid:20) vjajqjvj
(cid:88)
(cid:80)
(cid:88)
vq(cid:80)
i viai + vj
i viai + v
j∈P2
[ajvj (qj − λ∗)] .
(cid:21)
n(cid:88)
j=1
[ajvj (qj − λ∗)] = 0
and the result follows.
j=1
Corollary 2. In expectation, the P-ranking policy under social influence achieves more
downloads than the any ranking policy under the independent condition.
This corollary follows directly from the fact that the expected downloads at each step do
not change under the independent condition regardless of the ranking policy in use.
17
3 Discussion
This paper presented a "measure and optimize" algorithm for the MusicLab which com-
putes, at each refresh step, an optimal ranking of the songs, given the appeal, estimated
quality, current download counts, and position visibility. This performance ranking, which
maximizes the expected number of downloads, can be computed in strongly polynomial
time, making the M&O algorithm highly scalable. Our experimental results reveal two key
findings:
1. The M&O algorithm leverages social influence to bring significant benefits in expected
downloads.
2. Social influence and position bias both bring improvements in expected downloads
and their effects are cumulative.
Our theoretical results formally validate the first finding and prove that the performance
ranking under social influence always achieves more expected downloads than any ranking
policy under the independent condition.
Our results shed an interesting and novel light about social influence and the unpre-
dictability it creates in cultural markets. The unpredictability coming from social influence
is often presented as an undesirable property of cultural markets. However, as our exper-
imental and theoretical results show, social influence, when used properly, is guaranteed to
help in maximizing the efficiency of the market. So, unless predictability is a goal per se,
social influence should be seen as an asset for optimizing cultural markets.
Our results also show that, in reasonable settings and with a performance ranking, the
unpredictability created by the use of social influence is small. Moreover, the performance
ranking identifies "blockbusters" and these "blockbusters" are the primary reason for the
increased efficiency of the market. There are conditions in the MusicLab where the best
song is not recovered and does not have the most downloads. This happens when the
best song has a "bad" appeal and is dominated by another song. Assume, for instance,
that we have only two songs and q1 > q2.
If v1A1q1 < v2A2q2 (v1 > v2), the added
visibility is not able to overcome the bad appeal: Song 1, despite its better quality, will
be dominated by song 2. Note however that these situations can be predicted, since these
dominance relationships can be identified. Equally important, social influence still helps in
these settings compared to policies not using it.
The unpredictability when using the performance ranking comes from songs that are
indistinguishable, i.e., Aiqi ≈ Ajqj.
In this case, social influence may favor one of the
songs depending on how the process unfolds. It is interesting to point out once again that
these situations can be identified a priori. Together with the dominance relationships, these
equivalence relationships helps us identify the sources of unpredictability, i.e., which songs
may emerge in the MusicLab. Moreover, it is conceivable that we can also control this
unpredictability to ensure fairness and reduce inequalities. This is a topic we are currently
investigating.
18
Our experiments have also shown that, contrary to the download ranking, the per-
formance ranking does not transform average songs into "hits". In reasonable settings, it
always identifies the "blockbusters" while, in a worst-case scenario where song appeal is neg-
atively correlated with song quality, it still promotes high-quality songs. There is a certain
robustness in the performance ranking which is not present in the download ranking.
A key insight from this research is the need to leverage social influence carefully. The
download ranking uses social influence twice: Directly through the download counts and
indirectly through the ranking. The experimental results indicate that the resulting al-
gorithm puts too much emphasis on download counts, which are not necessarily a good
indication of quality due to the sampling process. In contrast, the performance ranking
balances appeal, quality, and social influence.
Observe that, in the generative model of the MusicLab, the perceived quality of a
song is not affected by social influence: Only the probability of listening to the song is. Our
results continue to hold when the perceived quality of a song is affected by social influence
[12, 5, 15], e.g., when the perceived quality of song i is improved by i ≥ 0, when song i is
downloaded. Similarly, the results generalize to the case where the sampling probability is
given by
(cid:80)n
pi,k(σ) =
vσi(αAi + f (Di,k))
j=1 vσj (αAj + f (Dj,k))
,
where function f is positive nondecreasing.
We hope that these results will revive the debate about the consequences of social
influence. Our results show that social influence is beneficial for the efficiency of the market
and that much of its induced unpredictability can be controlled. It appears that a key issue
is to continue building our understanding of the nature of social influence and to determine
how best to use it and for which purposes: Efficiency, predictability, fairness, ...
Acknowledgments
We would like to thank Franco Berbeglia for some key contributions to the proofs and
Lorenzo Coviello for a very detailed reading of the first draft of this paper. NICTA is
funded by the Australian Government as represented by the Department of Broadband,
Communications and the Digital Economy and the Australian Research Council through
the ICT Centre of Excellence program.
References
[1] William T Bielby and Denise D Bielby. All hits are flukes: Institutionalized deci-
sion making and the rhetoric of network prime-time program development. American
Journal of Sociology, 99(5):1287 -- 1313, 1994.
19
[2] Richard E Caves. Creative industries: Contracts between art and commerce. Num-
ber 20. Harvard University Press, 2000.
[3] Arthur De Vany. Hollywood Economics: How Extreme Uncertainty Shames the Film
Industry. Routledge, 2011.
[4] Jehoshua Eliashberg and Steven M Shugan. Film critics: Influencers or predictors?
Journal of Marketing, 61(2), 1997.
[5] Simon Farrell. Social influence benefits the wisdom of individuals in the crowd. Pro-
ceedings of the National Academy of Sciences, 108(36):E625 -- E625, 2011.
[6] Peter Hedström. Experimental macro sociology: Predicting the next best seller. Sci-
ence, 311(5762):786 -- 787, 2006.
[7] Paul M Hirsch. Processing fads and fashions: An organization-set analysis of cultural
industry systems. American journal of sociology, pages 639 -- 659, 1972.
[8] Michael C Jensen. Some anomalous evidence regarding market efficiency. Journal of
financial economics, 6(2):95 -- 101, 1978.
[9] Santosh N Kabadi and Abraham P Punnen. A strongly polynomial simplex method for
the linear fractional assignment problem. Operations Research Letters, 36(4):402 -- 407,
2008.
[10] Coco Krumme, Manuel Cebrian, Galen Pickard, and Sandy Pentland. Quantifying
social influence in an online cultural market. PloS one, 7(5):e33785, 2012.
[11] Kristina Lerman and Tad Hogg. Leveraging position bias to improve peer recommen-
dation. PLOS ONE, 9(6):1 -- 8, 2014.
[12] Jan Lorenz, Heiko Rauhut, Frank Schweitzer, and Dirk Helbing. How social influence
can undermine the wisdom of crowd effect. Proceedings of the National Academy of
Sciences, 108(22):9020 -- 9025, 2011.
[13] Lev Muchnik, Sinan Aral, and Sean J. Taylor. Social influence bias: A randomized
experiment. Science, 341(6146):647 -- 651, 2013.
[14] Richard A Peterson and David G Berger. Entrepreneurship in organizations: Evidence
from the popular music industry. Administrative Science Quarterly, 16(1), 1971.
[15] Heiko Rauhut, Jan Lorenz, Frank Schweitzer, and Dirk Helbing. Reply to farrell:
Improved individual estimation success can imply collective tunnel vision. Proceedings
of the National Academy of Sciences, 108(36):E626 -- E626, 2011.
[16] Daniel Rigney. The Matthew Effect. Columbia University Press, 2010.
20
[17] Matthew J Salganik, Peter Sheridan Dodds, and Duncan J Watts. Experimental
science,
study of inequality and unpredictability in an artificial cultural market.
311(5762):854 -- 856, 2006.
[18] Matthew J Salganik and Duncan J Watts. Leading the herd astray: An experimental
study of self-fulfilling prophecies in an artificial cultural market. Social Psychology
Quarterly, 71(4):338 -- 355, 2008.
[19] Matthew J Salganik and Duncan J Watts. Web-based experiments for the study of
collective social dynamics in cultural markets. Topics in Cognitive Science, 1(3):439 --
468, 2009.
[20] Maiko Shigeno, Yasufumi Saruwatari, and Tomomi Matsui. An algorithm for fractional
assignment problems. Discrete Applied Mathematics, 56(2):333 -- 343, 1995.
[21] Robert J Shiller. Market volatility. MIT press, 1992.
[22] Andrei Shleifer. Inefficient markets: An introduction to behavioral finance. Oxford
university press, 2000.
[23] Arnout van de Rijt, Soong Moon Kang, Michael Restivo, and Akshay Patil. Field
experiments of success-breeds-success dynamics. Proceedings of the National Academy
of Sciences, 111(19):6934 -- 6939, 2014.
[24] Duncan J Watts. Everything Is Obvious: How Common Sense Fails Us. Random
House LLC, 2012.
21
|
1702.01807 | 2 | 1702 | 2018-05-30T19:06:49 | How well can machine learning predict demographics of social media users? | [
"cs.SI",
"cs.CY"
] | The wide use of social media sites and other digital technologies have resulted in an unprecedented availability of digital data that are being used to study human behavior across research domains. Although unsolicited opinions and sentiments are available on these platforms, demographic details are usually missing. Demographic information is pertinent in fields such as demography and public health, where significant differences can exist across sex, racial and socioeconomic groups. In an attempt to address this shortcoming, a number of academic studies have proposed methods for inferring the demographics of social media users using details such as names, usernames, and network characteristics. Gender is the easiest trait to accurately infer, with measures of accuracy higher than 90 percent in some studies. Race, ethnicity and age tend to be more challenging to predict for a variety of reasons including the novelty of social media to certain age groups and a lack of significant deviations in user details across racial and ethnic groups. Although the endeavor to predict user demographics is plagued with ethical questions regarding privacy and data ownership, knowing the demographics in a data sample can aid in addressing issues of bias and population representation, so that existing societal inequalities are not exacerbated. | cs.SI | cs | 1
How well can machine learning predict demographics of social media users?
Nina Cesare ([email protected]),1 Christan Grant ([email protected]),2 Quynh Nguyen
([email protected]),3 Hedwig Lee ([email protected]),4 Elaine O. Nsoesie
([email protected])1*
Institute for Health Metrics and Evaluation, University of Washington, Seattle, WA 98121, USA
1.
2. School of Computer Science, University of Oklahoma, Norman, OK 73019, USA
3. Department of Epidemiology and Biostatistics, University of Maryland College Park, MD 20742, USA
4. Department of Sociology, Washington University, St. Louis, MO 63130, USA
*Corresponding author
ABSTRACT
The wide use of social media sites and other digital technologies have resulted in an
unprecedented availability of digital data that are being used to study human behavior across
research domains. Although unsolicited opinions and sentiments are available on these
platforms, demographic details are usually missing. Demographic information is pertinent in
fields such as demography and public health, where significant differences can exist across sex,
racial and socioeconomic groups. In an attempt to address this shortcoming, a number of
academic studies have proposed methods for inferring the demographics of social media users
using details such as names, usernames, and network characteristics. Gender is the easiest trait to
accurately infer, with measures of accuracy higher than 90% in some studies. Race, ethnicity and
age tend to be more challenging to predict for a variety of reasons including the novelty of social
media to certain age groups and a lack of significant deviations in user details across
racial/ethnic groups. Although the endeavor to predict user' demographics is plagued with
ethical questions regarding privacy and data ownership, knowing the demographics in a data
sample can aid in addressing issues of bias and population representation, so that existing
societal inequalities are not exacerbated.
Keywords: social media; Twitter; blogs; demographics; population representation
2
INTRODUCTION
Social media platforms offer (near) real-time unsolicited information on users' thoughts, feelings
and experiences, allowing researchers to track attitudes and behaviors as they emerge and over
time. The individual and population scale of these data enables the study of the flow of
information through complex networks that are difficult to assess using traditional means of data
collection [1]. These data are also usually low-cost compared to traditional modes of data
collection, such as surveys.
Researchers have used these data to study social processes across a wide domain, ranging from
economics to public health. For example, posts on Facebook and Twitter have been used in real-
time tracking of public opinion on political events and social issues [2–7]. In public health, these
data have been used to study attitudes toward tobacco use [8–11], vaccinations [12, 13], sleep
disorders [14], mental health [15, 16], patient-perceived quality of care in hospitals [17], food
deserts [18], foodborne illness [19–22], trends in physical activity, weight loss, and diet [23–25],
and the dynamics of infectious diseases (such as, influenza and dengue) [26–32].
Studies have also highlighted potential limitations and biases of using these data for public health
[29, 33, 34]. One such limitation is a lack of demographic detail in many digital data sources
which limits their applicability for research and practice in fields such as demography and public
health, where it is pertinent. For example, demographic information can enable the study of
health disparities between populations from different racial or ethnic backgrounds, sex, age and
socioeconomic status to ensure that the use of these data in public health practice does not
increase existing health inequalities. Knowledge of demographics can also allow for procedures
to reweight the data to help adjust for over- and under-representation from certain groups. This
lack of demographic details has led to the proposal of a range of methods for inferring the
demographics of social media users based on their profile, postings, and network information.
Studies typically assume that a user's color preference, name, username, network characteristics,
language usage and other attributes can reveal demographic traits such as, age, gender and race
or ethnicity. While targeted advertising and recommender systems on the Internet suggest that
advanced demographic prediction methods exist, the massive troves of data used in these
processes are usually not available to academicians.
3
Here, we perform a comprehensive review on the performance of approaches proposed to detect
the gender, age, race and ethnicity of social media and blog users in the academic literature. We
characterize trends in the literature, discuss how the methods and metadata used in these studies
could impact predictions, and identify open areas for development.
Selection and Evaluation of Studies
We conducted an initial literature search in November 2016 and updated the search in November
2017. We queried combinations of the following term groups: "demographic, gender, age, or
race", "prediction, classification, or machine learning" and "social media, Twitter or blogs". We
searched three databases – Engineering Village, Microsoft Academic, and the ACM Digital
Archives – since preliminary results indicated most of the papers were published in computer
science conference proceedings. We supplemented these searches with findings from Google
Scholar, which provides access to a broad scope of academic literature, including conference
proceedings and pre-prints.
In total, we identified 160 potentially relevant articles based on their titles and summaries or
abstracts. We focused on articles that aimed to infer or predict the demographics of social media
and blog users from information provided within that context. We therefore excluded studies that
predict demographic attributes based on other sources of digital data, such as browsing history or
mobile phone messages. Additional exclusion criteria were applied to arrive at 91 articles fitting
the focus of this review (see Figure 1). We discuss the methods, group and present studies based
on the demographic trait predicted.
4
Figure 1: Literature identification and selection. We selected 160 potentially relevant articles
based on title and abstract from three academic databases and Google scholar. After excluding
irrelevant studies, we arrived at 91 articles that proposed methods for inferring the age, race,
ethnicity or gender of social media users.
RESULTS
Summary of Methods Used in Prediction
The methods presented in the selected manuscripts included machine learning approaches, raw
and adjusted data matching approaches, and human and automated facial recognition tools.
Seventy-five (82.4%) studies used supervised machine learning approaches, while two studies
used unsupervised learning. The most common machine learning methods considered included,
support vector machines [35–56], naïve Bayes [57–62], variants of the winnow algorithm [63–
66], k-nearest neighbors [37, 67, 68], naïve Bayes decision tree hybrid [69, 70], gradient boosted
decision trees [71, 72], neural networks [73–75], random forests [76], entropy models [51, 61,
77], and standard and regularized linear, logistic or log-linear regression [78–92]. These methods
were applied to data from various platforms (see Figure 2), with an overwhelming focus on
Twitter (n=57, 62.6%), likely due to the availability and wide use of Twitter data for research.
5
Five (5.5%) studies inferred demographics based on facial evaluations from either paid human
evaluators or facial recognition algorithms. The remaining 11 (12.1%) studies used raw or
adjusted data matching, meaning they directly linked user data to information from sources such
as the United States Census Bureau, or estimated the probability of belonging to particular
demographic categories given a combination of known demographic information (e.g., prior data
on the popularity of first names over time) and information from users' profiles.
Figure 2: Literature by year. Early predictions of user demographics focused on Blogs.
However, research predicting the traits of Twitter users is most common.
In addition, the measures used to assess the performance of the proposed algorithms included,
accuracy [(true positives + true negative)/total population], precision (also known as positive
predictive value = true positives/predicted positive condition), recall (also known as sensitivity=
[true positive/(true positives + false negatives)], F1-score (the harmonic mean of the precision
and recall), and area under the curve (AUC) (plot representing sensitivity/specificity pairs
corresponding to different decision thresholds; is a measure of how well a parameter can
distinguish between two diagnostic categories). Specifically, 62 (87.3%), 37 (84.1%) and 12
(60.0%) of the gender, age and race/ethnicity prediction approaches respectively, reported
6
findings using a specific performance metric. Accuracy was the most commonly reported metric;
reported in 74.6%, 47.7%, and 35.0% of studies on gender, age and race/ethnicity prediction
studies respectively. The distribution of accuracy by trait is shown in Figure 3. Studies
predicting gender had the highest median accuracy, with some studies reaching scores higher
than 0.90. Although all studies on age prediction that report accuracy used the same
methodological approach, the accuracy fell across a broad range (0.43, 0.95). In contrast, the
prediction accuracy for race/ethnicity fell within a narrower range and had a median value of
approximately 0.81.
Figure 3: Distribution of Predicted Accuracy by Trait. Methods predicting gender perform
best. The median accuracy of methods used in inferring age is similar to that of gender, but the
distribution varies widely. In contrast, the range of accuracies observed in the prediction of race
and ethnicity is narrower.
Predicting Gender
Seventy-one (78.0%) studies focused on gender prediction [35, 37–40, 42–45, 47–49, 51–53, 57–
70, 73, 74, 77–86, 91, 93–121]. Of these, 54.9% employed user postings, 25.3% used
information from user profiles (such as, profile colors), and the remainder used a combination of
postings, network and profile information.
7
Most studies proposing classification methods focused on linguistic patterns in names and posted
text. Studies that employed users' names either linked first names to offline survey data or used
these data to build models designed to improve predictive algorithms that incorporate other
characteristics. Although some sites (e.g., Twitter) do not require users to provide a valid first
and last name in their profile, this technique may still capture a large sample of users. For
example, Mislove et al. [108] found that 64.2% of Twitter users elect to include a first name in
their profile. However, approximately 71.8% of these Twitter users were male.
The performance metrics were consistently above 0.50. Of the studies that used accuracy (n=53,
74.6%) as the measure of evaluation, the average accuracy was 0.83 (range 0.65 to 0.99). Studies
that reported precision also had high values, with an average of 0.84 (range 0.58 to 0.98).
Reported F1-scores were also high, with an average value of 0.84 (range 0.68 to 0.98). We
excluded the values reported by Miller et al. [59] because they reported results for females but
not males. Overall, most of the proposed algorithms could reliably predict the gender of social
media users.
Bamman et al. [101] suggest that gender is heavily embedded within individuals' identities. It
may be equally embedded within social media users' online personas to the extent that
unsupervised clustering techniques can differentiate between users with distinct gender
identities. For example, Alowibdi et al. [69] found that profile colors alone can be effectively
used to infer the gender of Twitter users'. They predicted the gender of Twitter users with 71.4%
accuracy using only five quantized colors (i.e., compression via the reduction in the number of
colors) from users' profile fields.
Another reason why gender lends itself well to profile-based prediction techniques is because a
person's name can be a strong predictor of gender. For instance, Liu and Ruths [42] found that
adding names data to a text-dependent gender prediction improved the accuracy of their method
from 0.83 to 0.87. Both Fernandez et al. [74] and Karimi et al. [113] suggested inferring gender
by combining user names with results from facial recognition software applied to profile photos.
Mueller and Stumme [44] and Vicente et al. [105] found that even if a name is not directly
8
identifiable, it can either be cleaned in a way that renders the true name linkable with official
census data (for example, converting "Hi I'm Kaylaaaaa" to "Kayla"), or it may contain
extractable features that are gender dependent (e.g. a name that ends in a vowel is more likely to
imply a female user than a male user). Furthermore, Cesare et al. [122] also developed a
weighted ensemble model that used word and character n-grams from user names [65], the
linguistic structure of names [44], and direct matches between user names and U.S. Social
Security Administration (SSA) data to obtain an accuracy of 0.83, precision of 0.82, recall of
0.85, and F1-score of 0.84.
Studies that solely used profile metadata or combined it with users' posts had higher accuracies
than those that solely use information from users' postings. This suggests that simple, subtle cues
embedded within users' profiles can be used to accurately detect gender. In addition, studies that
used non-algorithmic methods (i.e. simple or adjusted data matching) also performed
comparably well as studies that used machine learning algorithms (i.e., average accuracy of 0.81
and 0.82 for data matching and machine learning, respectively)
Predicting Age
We identified 44 (48.4%) studies that predicted age [35, 37, 49, 52, 53, 56, 58, 62–64, 73, 75, 76,
78–80, 83, 85, 87, 89–98, 104, 106, 110, 111, 117, 118, 120, 123–130]. The proposed algorithms
were overwhelmingly text-dependent. These studies used text features and supervised learning
methods to predict exact numeric age, age category (adolescent/adult/senior) and life stage (e.g.,
student, employed, retired). Most studies capped predicted age between 30 and 40, perhaps due
to the fact that social media users tend to be younger. The reported average F1-scores of studies
that capped predicted age in the 40s was comparable to that of studies that capped predicted age
in the 30s (F1=0.74 and F1=0.71, respectively).
Several studies suggested that profile photos may also be used to assess age. McCormick et al.
[110] found that human coders are highly reliable when assessing a user's age range. When
shown 1,000 Twitter user profile images, at least two out of three workers on Amazon's
Mechanical Turk could identify the numeric age range of 96.6% and the life stage of 97.9% of
users. An and Weber [93] used Face++, a free facial recognition service that can estimate a
9
user's age within a 10-year span and observed that 49% of the 346,050 Twitter users in their
dataset had a detectable face, which is low. When comparing the predicted age of the user and
the age extracted from their profile description, they found that 25% of the predictions were
within a three-year difference and 75% of predictions were within an 11-year difference of the
user's extracted age. However, these studies did not compare estimates to ground truth data (i.e.,
true demographic information about the users sampled). Rather, estimates were compared to
population values or data not drawn from the population studied. Further work is needed to
assess the reliability, and best applications of facial recognition by human and automated coders.
Simple approaches – such as identifying mentions of age within a user's profile or matching first
names to trends in popularity over times – could be useful but not widely employed within
existing literature beyond the development of a training dataset. For the former, the available
data might be limited to teenagers or milestone years, and the latter may provide reliable
predictions for popular names only.
The reported high accuracy observed in age prediction suggests that clues from users' postings -
such as, the sociolinguistic indicators or topics discussed - provide valuable information about
the age of the user. The accuracy and F1-scores of age prediction studies that relied exclusively
on information from users' postings were slightly higher than those of studies that combined data
from users' postings with profile or network information (accuracy=0.76, 0.72, respectively; F1-
score=0.80, 0.74, respectively). Thus, using additional data besides profiles posts did not
significantly improve prediction of age.
These studies indicate that age prediction is more difficult with additional categories. In general,
the performance of prediction algorithms decreased as the number of predicted categories
increased. The average F1-scores of studies that predicted binary age categories (e.g. under/over
20 years old), three age categories (e.g. under 20, 20-40, above 40), and four age categories (e.g.
10-19, 20-29, 30-39, 40+) were 0.91, 0.73 and 0.71, respectively. The few studies that predicted
numeric age, reported an average correlation of 0.73. While prediction of numeric age is
challenging, it is most beneficial since the results can be binned into different categories as
needed.
10
Predicting Race and Ethnicity
Twenty (21.9%) of the selected studies addressed the prediction of race or ethnicity [48, 49, 54,
71, 72, 78, 79, 82, 85, 86, 91, 93, 107–111, 126, 131, 132]. The earliest studies were from 2010,
compared to 2006 for age and gender, likely due to the challenge of predicting this demographic
trait. Thirteen of these studies reported an average accuracy of 0.82 and twelve studies reported
an average F1-score of 0.70. Eight studies did not report a performance metric.
Nine (45.0%) race/ethnicity prediction studies solely relied on users' postings or combined
users' postings with profile and network metadata to infer race. The performance of these studies
suggests that posted text provides valuable insight into the race or ethnicity of the user, but that
performance improves considerably when these data are analyzed with the added context of
profile or network metadata. The average accuracy and F1-scores of text-only methods was 0.76
and 0.51, respectively, while the average accuracy and F1-scores of methods that combined text
with additional metadata was 0.81 and 0.73, respectively.
Six studies solely used profile metadata to predict race. In McCormick et al. [110], human
analysts labeled race based on profile photos. At least two out of three human coders agreed on
the race of 95.5% of 1,000 user photos. Chen et al. [49] applied n-grams and Linear Discriminant
Analysis (LDA) to data on Twitter users' neighbors' descriptions to predict race with 78.8%
accuracy (F1=0.75).
Additionally, last name was a common feature used in studies that employed profile data alone
or in conjunction with other metadata. Longley et al. [111] used the Onomap system – an online
index of names linked to geographic information developed by Mateos and colleagues [133] – to
infer the ethnicity of Twitter users in London. Similarly, Hofstra et al. [107] used last names to
determine whether Dutch Facebook users were Dutch, Moroccan or Caribbean. Neither Longley
et al. [111] or Hofstra et al. [107], however, reported performance metrics given ground truth
data. Rao et al. [109] illustrated that last names provide valuable information that can be used
solely or in conjunction with user postings to predict the ethnicity of Nigerian Facebook users
with an accuracy of approximately 0.81. Similar to the use of first names for age prediction,
ethnicity is commonly tied to last name making it traceable and useful for prediction.
11
Similarly, Chang et al. [131] and Mislove et al. [108] applied a method for inferring the race of
U.S. Twitter users based on last names and the aggregate racial distribution of the population
from which the user is drawn. However, they failed to assess their prediction against individual
ground truth data. Additional work is needed to rigorously assess the potential of this prediction
technique.
DISCUSSION
We performed a comprehensive review of studies that propose methods for inferring the age,
race, ethnicity and gender of social media and blog users. We examined trends in the literature
by trait and assessed the performance of the proposed methods.
We note that gender was the easiest trait to infer using a variety of methods and features. In
contrast, in the prediction of age, methods that relied on data from users' postings reported
higher accuracies than methods that did not use data from users' postings or combined these data
with other features. Also, the performance of age prediction algorithms generally decreased as
the number of categories predicted increased. However, trends in the literature suggest that
multi-category or numeric age predictions may improve as more advanced algorithms are used.
Likewise, in the prediction of race, user postings provided valuable information about the user
but is best if considered in conjunction with other user metadata. Also, similar to the use of first
names as a gender prediction feature, last name appears to be a strong predictor of user ethnicity.
The improvement in race and ethnicity prediction based on additional data from users' networks
and posting could be attributed to within-network segregation by race or ethnicity.
Measures of Performance
Several of the studies included in this review did not evaluate prediction performance. Nine
gender prediction approaches reviewed provided no performance metrics, and all of these used
profile metadata to generate predictive features. Similarly, only one of the seven age prediction
approaches and none of the six race/ethnicity prediction approaches that relied only on profile
metadata reported performance metrics. Furthermore, of the studies reporting a performance
metric, most used accuracy. However, accuracy is not always a good measure of performance,
12
particularly for studies with a class imbalance because the model may be over-trained to
recognize the majority group, and the overall accuracy may be excessively weighted by
classification performance specific to this group [134, 135]. To assess how well these prediction
methods are performing, accuracy needs to be reported alongside other measures of performance
such as, precision, recall, F1-score, or AUC.
Data Limitations
While further work is needed to explore the potential value of profile-based prediction features
(such as, user description and user names), findings from this review suggest that users' postings
contain valuable information for predicting users' age and race/ethnicity. This has important
implications for the scalability of this work. While sites such as Twitter and Instagram allow
researchers to collect information via public Application Programming Interfaces (APIs), these
applications are typically rate limited and may limit the scalability of a particular method [69].
For instance, when gathering timelines, the Twitter API can only make 900 calls per 15-minute
window. After reaching a rate limit, the API requires 15 minutes to reset. Although these rate
limits may not be a problem when gathering data for several thousand users, gathering data on
hundreds of thousands or millions of users would be time consuming. For researchers studying
time-sensitive topics – such as infectious disease outbreaks – this delay may be prohibitive.
Furthermore, collecting, storing and processing hundreds of tweets or ties per user for very large
samples is computationally intensive and may not be accessible to applied researchers with
limited resources.
Further, several studies did not use individual ground truth data in the evaluation of their
methods. The manner in which the test and training data used are collected may impact the
results of proposed prediction methods. The studies evaluated engaged in a variety of techniques
for measuring users' 'true' age, race and gender. Some relied on self-reported information
contained within the user's postings – for instance, by collecting recent tweets in which a user
mentions their current age [76], states that it is their birthday [56, 92, 96], or describes their
racial or ethnic identity [54, 72]. Some studies use hand-coded evaluations of users' profiles
and/or other online presences [85, 87, 89] to assess demographics, and some use facial
recognition software such as Face++ [115] or crowdsourcing platforms such as Amazon's
13
Mechanical Turk [78] to generate ground truth measures. While some studies (e.g., Bergsma and
colleagues [48]) address the effect of differently collected training datasets, further work is
needed to assess these potential biases. Ground truth data on social media and blog users, while
difficult to obtain, is important for assessing the validity of a proposed approach.
Ethical Considerations
We acknowledge that detection of user demographics poses unique ethical questions for
researchers. First, users who provide data for the development and application of classification
methods are not treated as "human subjects" in a traditional sense. According to the Belmont
Report and Common Rule, social researchers are supposed to exercise justice (i.e., ensuring fair
distribution of benefits and risks of research, as well as fair selection of research subjects),
beneficence (i.e., an obligation to maximize benefits and minimize harm toward research
subjects) and informed consent (i.e., disclosure of objectives and possible consequences of the
research toward the subject and society at large)[136]. However, implementing procedures such
as informed consent is difficult when working with tens or hundreds of thousands of
respondents. Additionally, standards regarding data ownership and publishing typically dictate
how researchers may use data from digital sources. Further work is need to determine how to
preserve human subjects research standards when working with large, digitally generated
datasets [137–139].
Ethical concerns regarding the automatic detection of user characteristics extend beyond the
individual. The term 'group privacy' refers to demographic de-anonymization, or the placement
of users within specific demographic categories [140–142]. While ethical standards regarding
the protection of research subjects typically assume that individual protection leads to group
protection [142], research suggests that disclosed affiliation with a particular demographic group
may lead to unfair targeting by marketing agencies, political campaigns, and more. For instance,
Zwitter [140] notes that political campaigns have used bot accounts to target and engage in
fabricated grassroots debates with Twitter users who fit the demographic profile of a particular
party's constituency – a practice sometimes referred to as "astroturfing". Researchers seeking to
predict user demographics not explicitly shared through their profiles should be aware of the
14
risks that disclosure of group status may generate prior to using this inferred data for analysis or
intervention.
CONCLUSIONS
We found that gender is heavily embedded within users' online presence, and that features
extracted from users' profiles – such as first names – may be used to accurately predict this trait.
Other demographic traits such as, age and race/ethnicity are more challenging to predict.
Furthermore, there is a need to assess approaches relying exclusively on profile metadata with
the same rigor as approaches that use information from networks or users' postings. Future work
in this area should be mindful of the scalability of proposed methods, as well as the implications
of these methods for individual and group privacy.
ACKNOWLDGEMENTS
This work was funded by the Robert Wood Johnson Foundation (grant #73362).
REFERENCES
1. Prier KW, Smith MS, Giraud-Carrier C, Hanson CL (2011) Identifying health-related topics
on twitter. In: International Conference on Social Computing, Behavioral-Cultural
Modeling, and Prediction. Springer, pp 18–25
2. Wang W, Rothschild D, Goel S, Gelman A (2015) Forecasting elections with non-
representative polls. Int J Forecast 31:980–991 . doi: 10.1016/j.ijforecast.2014.06.001
3. O'Connor B, Balasubramanyan R, Routledge BR, Smith NA (2010) From tweets to polls:
Linking text sentiment to public opinion time series. ICWSM 11:1–2
4. McCombs M (2014) Setting the Agenda: Mass Media and Public Opinion. John Wiley & Sons
5. Anstead N, O'Loughlin B (2015) Social Media Analysis and Public Opinion: The 2010 UK
General Election. J Comput-Mediat Commun 20:204–220 . doi: 10.1111/jcc4.12102
6. Ruths D, Pfeffer J (2014) Social media for large studies of behavior. Science 346:1063–1064
. doi: 10.1126/science.346.6213.1063
7. Rossini PGC, Hemsley J, Tanupabrungsun S, et al (2017) Social Media, U.S. Presidential
Campaigns, and Public Opinion Polls: Disentangling Effects. In: Proceedings of the 8th
International Conference on Social Media & Society. ACM, New York, NY, USA, pp 56:1–
56:5
15
8. Duke JC, Hansen H, Kim AE, et al (2014) The use of social media by state tobacco control
programs to promote smoking cessation: a cross-sectional study. J Med Internet Res 16:e169
. doi: 10.2196/jmir.3430
9. Huang J, Kornfield R, Szczypka G, Emery SL (2014) A cross-sectional examination of
. doi:
marketing of electronic cigarettes on Twitter. Tob Control 23:iii26–iii30
10.1136/tobaccocontrol-2014-051551
10. Myslín M, Zhu S-H, Chapman W, Conway M (2013) Using Twitter to Examine Smoking
Behavior and Perceptions of Emerging Tobacco Products. J Med Internet Res 15:e174 . doi:
10.2196/jmir.2534
11. Prochaska JJ, Pechmann C, Kim R, Leonhardt JM (2011) Twitter=quitter? An analysis of
. doi:
social networks. Tob Control
Twitter quit
smoking
10.1136/tc.2010.042507
tc.2010.042507
12. Bahk CY, Cumming M, Paushter L, et al (2016) Publicly Available Online Tool Facilitates
Real-Time Monitoring Of Vaccine Conversations And Sentiments. Health Aff (Millwood)
35:341–347 . doi: 10.1377/hlthaff.2015.1092
13. Salathé M, Khandelwal S (2011) Assessing Vaccination Sentiments with Online Social Media:
Implications for Infectious Disease Dynamics and Control. PLOS Comput Biol 7:e1002199
. doi: 10.1371/journal.pcbi.1002199
14. McIver DJ, Hawkins JB, Chunara R, et al (2015) Characterizing Sleep Issues Using Twitter. J
Med Internet Res 17:e140 . doi: 10.2196/jmir.4476
15. De Choudhury M, Counts S, Horvitz E (2013) Predicting postpartum changes in emotion and
behavior via social media. In: Proceedings of the SIGCHI Conference on Human Factors in
Computing Systems. ACM, pp 3267–3276
16. Sueki H (2015) The association of suicide-related Twitter use with suicidal behaviour: A cross-
sectional study of young internet users in Japan. J Affect Disord 170:155–160 . doi:
10.1016/j.jad.2014.08.047
17. Hawkins JB, Brownstein JS, Tuli G, et al (2016) Measuring patient-perceived quality of care
in US hospitals using Twitter. BMJ Qual Saf 25:404–413 . doi: 10.1136/bmjqs-2015-
004309
18. De Choudhury M, Sharma S, Kiciman E (2016) Characterizing Dietary Choices, Nutrition,
and Language in Food Deserts via Social Media. In: Proceedings of the 19th ACM
Conference on Computer-Supported Cooperative Work & Social Computing. ACM Press,
San Francisco, California, pp 1155–1168
19. Harris JK, Mansour R, Choucair B, et al (2014) Health Department Use of Social Media to
Identify Foodborne Illness - Chicago, Illinois, 2013–2014. Center for Disease Control
16
20. Nsoesie EO, Kluberg SA, Brownstein JS (2014) Online reports of foodborne illness capture
foods implicated in official foodborne outbreak reports. Prev Med 67:264–269 . doi:
10.1016/j.ypmed.2014.08.003
21. Harrison C, Jorder M, Stern H, et al (2014) Using online reviews by restaurant patrons to
identify unreported cases of foodborne illness-New York City, 2012–2013. MMWR
63:441–445
22. Harris JK, Hawkins JB, Nguyen L, et al (2017) Using Twitter to Identify and Respond to Food
Poisoning: The Food Safety STL Project. J Public Health Manag Pract JPHMP 23:577–580
. doi: 10.1097/PHH.0000000000000516
23. Nguyen QC, Li D, Meng H-W, et al (2016) Building a National Neighborhood Dataset From
Geotagged Twitter Data for Indicators of Happiness, Diet, and Physical Activity. JMIR
Public Health Surveill 2:e158 . doi: 10.2196/publichealth.5869
24. Pagoto S, Schneider KL, Evans M, et al (2014) Tweeting it off: characteristics of adults who
tweet about a weight loss attempt. J Am Med Inform Assoc 21:1032–1037 . doi:
10.1136/amiajnl-2014-002652
25. Griffin GP, Jiao J (2015) Where does bicycling for health happen? Analysing volunteered
geographic information through place and plexus. J Transp Health 2:238–247 . doi:
10.1016/j.jth.2014.12.001
26. Corley CD, Cook DJ, Mikler AR, Singh KP (2010) Text and Structural Data Mining of
Influenza Mentions in Web and Social Media. Int J Environ Res Public Health 7:596–615 .
doi: 10.3390/ijerph7020596
27. Gomide J, Veloso A, Meira W Jr, et al (2011) Dengue Surveillance Based on a Computational
Model of Spatio-temporal Locality of Twitter. In: Proceedings of the 3rd International Web
Science Conference. ACM, New York, NY, USA, pp 3:1–3:8
28. Nsoesie EO, Brownstein JS (2015) Computational Approaches to Influenza Surveillance:
Beyond Timeliness. Cell Host Microbe 17:275–278 . doi: 10.1016/j.chom.2015.02.004
29. Nsoesie EO, Flor L, Hawkins J, et al (2016) Social Media as a Sentinel for Disease
Surveillance: What Does Sociodemographic Status Have to Do with It? PLOS Curr
Outbreaks. doi: 10.1371/currents.outbreaks.cc09a42586e16dc7dd62813b7ee5d6b6
30. Salathé M, Freifeld CC, Mekaru SR, et al (2013) Influenza A (H7N9) and the Importance of
Digital Epidemiology. N Engl J Med 369:401–404 . doi: 10.1056/NEJMp1307752
31. Chew C, Eysenbach G (2010) Pandemics in the Age of Twitter: Content Analysis of Tweets
doi:
2009 H1N1 Outbreak.
PLOS ONE
during
10.1371/journal.pone.0014118
the
5:e14118
.
17
32. Santillana M, Nguyen AT, Dredze M, et al (2015) Combining Search, Social Media, and
Traditional Data Sources to Improve Influenza Surveillance. PLOS Comput Biol
11:e1004513 . doi: 10.1371/journal.pcbi.1004513
33. Scarpino SV, Scott JG, Eggo R, et al (2016) Data Blindspots: High-Tech Disease Surveillance
Misses the Poor. Online J Public Health Inform 8: . doi: 10.5210/ojphi.v8i1.6451
34. Henly S, Tuli G, Kluberg SA, et al (2017) Disparities in digital reporting of illness: A
. doi:
assessment. Prev Med 101:18–22
socioeconomic
demographic
10.1016/j.ypmed.2017.05.009
and
35. Asoh, Hideki, Ikeda, Kazushi, Ono, Chihiro (2012) A Fast and Simple Method for Profiling a
Population of Twitter Users. In: The Third International Workshop on Mining Ubiquitous
and Social Environment. Bristol, UK, pp 19–26
36. Al Zamal F, Liu W, Ruths D Homophily and Latent Attribute Inference: Inferring Latent
Attributes of Twitter Users from Neighbors. In: Proceedings of the Sixth International
AAAI Conference on Weblogs and Social Media. Dublin, Ireland, pp 387–390
37. Santosh K, Joshi A, Gupta M, Varma V (2014) Exploiting Wikipedia Categorization for
Predicting Age and Gender of Blog Authors. In: Proceedings of the 2014 Conference on
Empirical Methods in Natural Language Processing. Aalborg, Denmark
38. Benton A, Raman A, Dredze M (2016) Learning Multiview Embeddings of Twitter Users. In:
Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics.
ACM, Berlin, Germany, pp 14–19
39. You Q, Bhatia S, Sun T, Luo J (2014) The Eyes of the Beholder: Gender prediction using
images posted in online social networks. In: 2014 IEEE International Conference on Data
Mining Workshop (ICDMW). IEEE, Shenzhen, China, pp 1026–1030
40. Nowson S, Oberlander J (2006) The Identity of Bloggers: Openness and Gender in Personal
Weblogs. In: AAAI spring symposium: Computational approaches to analyzing weblogs.
Palo Alto, CA, pp 163–167
41. Fink C, Kopecky J, Morawski M Inferring Gender from the Content of Tweets: A Region
Specific Example. In: Proceedings of the Six International Conference on Weblogs and
Social Media. pp 459–463
42. Liu W, Ruths D Using first names as features for gender inference in Twitter
43. Ludu PS (2014) Inferring gender of a Twitter user using celebrities it follows. ArXiv Prepr
ArXiv14056667
44. Mueller J, Stumme G (2016) Gender Inference using Statistical Name Characteristics in
Twitter. In: Proceedings of the The 3rd Multidisciplinary International Social Networks
Conference on SocialInformatics. ACM Press, Albany, NY, pp 1–8
18
45. Mukherjee A, Liu B (2010) Improving Gender Classification of Blog Authors. In: Proceedings
of the 2010 Conference on Empirical Methods in Natural Language Processing. Association
for Computational Linguistics, Stroudsburg, PA, USA, pp 207–217
46. Rao D, Yarowsky D, Shreevats A, Gupta M (2010) Classifying Latent User Attributes in
Twitter. In: Proceedings of the 2nd international workshop on Search and mining user-
generated contents. ACM, Toronto, Canada, pp 37–44
47. Zhang C, Zhang P (2010) Predicting gender from blog posts. Technical Report. University of
Massachusetts Amherst, USA
48. Bergsma S, Dredze M, Van Durme B, et al (2013) Broadly Improving User Classification via
Communication-Based Name and Location Clustering on Twitter. In: HLT-NAACL.
Atlanta, Georgia, pp 1010–1019
49. Chen X, Wang Y, Agichtein E, Wang F (2015) A comparative study of demographic attribute
inference in twitter. In: Proceedings of the Ninth International AAAI Conference on Web
and Social Media. Palo Alto, CA, pp 590–593
50. Bhatnagar VS, Sanket NJ, Barathi SK "Honey, We Shrunk the Weights" Gender Prediction
using Twitter Feeds and Profile Images
51. Kokkos A, Tzouramanis T (2014) A robust gender inference model for online social networks
and its application to LinkedIn and Twitter. First Monday 19: . doi: 10.5210/fm.v19i9.5216
52. Yatam SS, Reddy TR (2014) Author profiling: Predicting gender and age from blogs, reviews
& social media. Int J Eng Res Technol 3:631–633
53. Rao D, Yarowsky D (2010) Detecting Latent User Properties in Social Media. In: Proceedings
of the NIPS MLSN Workshop. Citeseer
54. Xu S, Markson C, Costello KL, et al (2016) Leveraging Social Media to Promote Public Health
Knowledge: Example of Cancer Awareness via Twitter. JMIR Public Health Surveill 2: .
doi: 10.2196/publichealth.5205
55. Siswanto E, Khodra ML (2013) Predicting latent attributes of Twitter user by employing
lexical features. In: 2013 International Conference on Information Technology and
Electrical Engineering (ICITEE). Krabi, Thailand, pp 176–180
56. Tuli, Gaurav (2015) Modeling and Twitter-based Surveillance of Smoking Contagion.
Dissertation, Virginia Polytechnic Institute and State University
57. Yan X, Yan L (2006) Gender Classification of Weblog Authors. In: Proceedings of the AAAI
Spring Symposia on Computational Approaches. AAAI, Palo Alto, CA, pp 27–29
58. Rustagi M, Prasath RR, Goswami S, Sarkar S (2009) Learning Age and Gender of Blogger
from Stylistic Variation. In: Pattern Recognition and Machine Intelligence. Springer, Berlin,
Heidelberg, pp 205–212
19
59. Miller Z, Dickinson B, Hu W (2012) Gender Prediction on Twitter Using Stream Algorithms
. doi:
Intell Sci 02:143–148
with N-Gram Character Features.
10.4236/ijis.2012.224019
Int
J
60. Wang P, Gao M, Sinnott RO (2016) Enhanced Gender Identification through Social Media
Analytics on the Cloud. In: 2016 IEEE 18th International Conference on High Performance
Computing and Communications; IEEE 14th International Conference on Smart City; IEEE
2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS). pp
1426–1433
61. Mukherjee S, Bala PK (2017) Gender classification of microblog text based on authorial style.
Inf Syst E-Bus Manag 15:117–138 . doi: 10.1007/s10257-016-0312-0
62. Goswami S, Sarkar S, Rustagi M (2009) Stylometric analysis of bloggers' age and gender. In:
Proceedings of the Third International ICWSM Conference
63. Argamon S, Koppel M, Pennebaker JW, Schler J (2007) Mining the Blogosphere: Age, gender
and the varieties of self-expression. First Monday 12:
64. Schler J, Koppel M, Argamon S, Pennebaker JW (2005) Effects of Age and Gender on
Blogging. In: AAAI spring symposium: Computational approaches to analyzing weblogs.
Palo Alto, CA, pp 199–205
65. Burger JD, Henderson J, Kim G, Zarrella G (2011) Discriminating gender on Twitter. In:
Proceedings of the Conference on Empirical Methods in Natural Language Processing.
Association for Computational Linguistics, pp 1301–1309
66. Deitrick W, Miller Z, Valyou B, et al (2012) Gender Identification on Twitter Using the
Modified Balanced Winnow. Commun Netw 04:189–195 . doi: 10.4236/cn.2012.43023
67. Cheung M, She J (2017) An Analytic System for User Gender Identification Through User
Shared Images. ACM Trans Multimed Comput Commun Appl 13:30:1–30:20 . doi:
10.1145/3095077
68. Chen J, Xiao T, Sheng J, Teredesai A (2017) Gender prediction on a real life blog data set
using LSI and KNN. In: 2017 IEEE 7th Annual Computing and Communication Workshop
and Conference (CCWC). pp 1–6
69. Alowibdi JS, Buy UA, Yu P (2013) Language independent gender classification on Twitter.
In: Procedings of the IEEE/ACM International Conference onAdvances in Social Networks
Analysis and Mining (ASONAM). IEEE, Calgary, Canada, pp 739–743
70. Alowibdi JS, Buy UA, Yu P (2013) Empirical Evaluation of Profile Characteristics for Gender
Classification on Twitter. In: 2013 12th International Conference on Machine Learning and
Applications. pp 365–369
20
71. Pennacchiotti M, Popescu A-M (2011) A Machine Learning Approach to Twitter User
Classification. In: Proceedings of the Fifth International AAAI Conference on Weblogs and
Social Media. Menlo Park, CA, pp 281–288
72. Pennacchiotti M, Popescu A-M (2011) Democrats, Republicans and Starbucks Aficionados:
User Classification in Twitter. In: Proceedings of the 17th ACM SIGKDD international
conference on Knowledge discovery and data mining. ACM, San Diego, CA, pp 430–438
73. Kim SM, Xu Q, Qu L, et al (2017) Demographic Inference on Twitter using Recursive Neural
Networks. In: Proceedings of the 55th Annual Meeting of the Association for Computational
Linguistics (Short Papers). Association for Computational Linguistics, Quebec, Canada, pp
471–477
74. Fernández D, Moctezuma D, Siordia OS (2016) Features combination for gender recognition
on Twitter users. In: 2016 IEEE International Autumn Meeting on Power, Electronics and
Computing (ROPEC). pp 1–6
75. Guimarães RG, Rosa RL, Gaetano DD, et al (2017) Age Groups Classification in Social
doi:
IEEE Access
Network Using Deep Learning.
10.1109/ACCESS.2017.2706674
5:10805–10816
.
76. Simaki V, Mporas I, Megalooikonomou V (2016) Age Identification of Twitter Users:
Classification Methods and Sociolinguistic Analysis. In: Proceedings of the 17th
International Conference on Intelligent Text Processing and Computational Linguistics
(CICLing). Montreal, Canada
77. Filippova K (2012) User demographics and language in an implicit social network. In:
Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language
Processing and Computational Natural Language Learning. Association for Computational
Linguistics, Stroudsburg, PA, pp 1478–1488
78. Volkova S, Bachrach Y, Armstrong M, Sharma V (2015) Inferring Latent User Properties from
Texts Published in Social Media. In: Proceedings of the Twenty-Ninth AAAI Conference
on Artificial Intelligence. Austin, TX, pp 4296–4297
79. Kosinski M, Stillwell D, Graepel T (2013) Private traits and attributes are predictable from
. doi:
digital records of human behavior. Proc Natl Acad Sci 110:5802–5805
10.1073/pnas.1218772110
80. Sap, Maarten, Eichstaedt, Johannes, Kern, Margaret L., et al (2014) Developing Age and
Gender Predictive Lexica over Social Media. In: Proceedings of the 2014 Conference on
Empirical Methods in Natural Language Processing (EMNLP). Doha, Quatar, pp 1146–
1151
81. Reddy S, Marina del Rey CA (2016) Obfuscating gender in social media writing. In:
Proceedings of the 1st Workshop on Natural Language Processing and Computational
Social Science. Austin, TX, pp 17–26
21
82. Montasser O, Kifer D (2017) Predicting Demographics of High-Resolution Geographies with
Geotagged Tweets. In: Proceedings of the Thirty-First AAAI Conference on Artificial
Intelligence. AAAI Press, Vancouver, Canada, pp 1460–1466
83. Volkova S, Bachrach Y, Durme BV (2016) Mining User Interests to Predict Perceived Psycho-
Demographic Traits on Twitter. In: IEEE Second International Conference on Big Data
Computing Service and Applications. IEEE, pp 36–43
84. Otterbacher J (2010) Inferring gender of movie reviewers: exploiting writing style, content
and metadata. In: Proceedings of the 19th ACM international conference on Information
and knowledge management. ACM, pp 369–378
85. Culotta A, Kumar NR, Cutler J (2015) Predicting the Demographics of Twitter Users from
Website Traffic Data. In: Proceedings of the Twenty-Ninth AAAI Conference on Artificial
Intelligence. AAAI, Austin, Texas, pp 72–78
86. Culotta A, Kumar NR, Cutler J (2016) Predicting Twitter User Demographics using Distant
Supervision from Website Traffic Data. J Artif Intell ResJAIR 55:389–408
87. Nguyen D-P, Gravel R, Trieschnigg RB, Meder T (2013) " How old do you think I am?" A
study of language and age in Twitter. In: Proceedings of the Seventh International AAAI
Conference on Weblogs and Social Media. Palo Alto, CA, pp 439–448
88. Rosenthal S, McKeown K (2011) Age Prediction in Blogs: A Study of Style, Content, and
Online Behavior in Pre- and Post-social Media Generations. In: Proceedings of the 49th
Annual Meeting of the Association for Computational Linguistics: Human Language
Technologies - Volume 1. Association for Computational Linguistics, Stroudsburg, PA,
USA, pp 763–772
89. Nguyen D, Gravel R, Trieschnigg D, Meder T (2013) TweetGenie: automatic age prediction
from tweets. ACM SIGWEB Newsl 1–6 . doi: 10.1145/2528272.2528276
90. Nguyen D, Smith NA, Rosé CP (2011) Author age prediction from text using linear regression.
In: Proceedings of the 5th ACL-HLT Workshop on Language Technology for Cultural
Heritage, Social Sciences, and Humanities. Association for Computational Linguistics,
Stroudsburg, PA, pp 115–123
91. Barberá P (2016) Less is more? How demographic sample weights can improve public opinion
estimates based on Twitter data. Working Paper for NYU
92. Morgan-Lopez AA, Kim AE, Chew RF, Ruddle P (2017) Predicting age groups of Twitter
users based on language and metadata features. PLOS ONE 12:e0183537 . doi:
10.1371/journal.pone.0183537
93. An J, Weber I (2016) # greysanatomy vs.# yankees: Demographics and Hashtag Use on
Twitter. ArXiv Prepr ArXiv160301973
22
94. Al Zamal F, Liu W, Ruths D (2012) Homophily and Latent Attribute Inference: Inferring
Latent Attributes of Twitter Users from Neighbors. ICWSM 270:
95. Argamon S, Koppel M, Pennebaker JW, Schler J (2009) Automatically Profiling the Author
of an Anonymous Text. ACM Commun 52:119–123 . doi: 10.1145/1461928.1461959
96. Beretta V, Maccagnola D, Cribbin T, Messina E (2015) An Interactive Method for Inferring
Demographic Attributes in Twitter. In: Proceedings of the 26th ACM Conference on
Hypertext & Social Media. ACM Press, Guzelyurt, Northern Cyprus, pp 113–122
97. Ikeda D, Takamura H, Okumura M (2008) Semi-Supervised Learning for Blog Classification.
In: Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence. Chicago,
Illinois, pp 1156–1161
98. Zagheni E, Garimella VRK, Weber I, State B (2014) Inferring international and internal
migration patterns from Twitter data. In: roceedings of the 23rd International Conference
on World Wide Web Pages. ACM Press, Seoul, Korea, pp 439–444
99. Sloan L, Morgan J, Housley W, et al (2013) Knowing the Tweeters: Deriving sociologically
relevant demographics from Twitter. Sociol Res Online 18: doi 10.5153/sro.3001
100. Smith J (2014) Gender prediction in social media. ArXiv Prepr ArXiv14072147
101. Bamman D, Eisenstein J, Schnoebelen T (2014) Gender Identity and Lexical Variation in
Social Media. J Socioling 18:135–160
102. Fink C, Kopecky J, Morawski M (2017) Inferring Gender from the Content of Tweets: A
Region Specific Example. In: Proceedings of the Six International Conference on Weblogs
and Social Media. pp 459–463
103. Mandel B, Culotta A, Boulahanis J, et al (2012) A demographic Analysis of Online
Sentiment During Hurricaine Irene. In: NAACL-HLT. Association for Computational
Linguistics, Montreal, Canada, pp 27–36
104. Rao D, Yarowsky D, Shreevats A, Gupta M (2010) Classifying latent user attributes in
twitter. In: Proceedings of the 2nd international workshop on Search and mining user-
generated contents. ACM, pp 37–44
105. Vicente M, Batista F, Carvalho JP (2015) Twitter gender classification using user
unstructured information. In: 2015 IEEE International Conference on Fuzzy Systems
(FUZZ-IEEE). IEEE, Istanbul, Turkey, pp 1–7
106. Wang Y, Xiao Y, Ma C, Xiao Z (2016) Improving Users' Demographic Prediction via the
Videos They Talk about. In: Proc. of the Conference on Empirical Methods in Natural
Language Processing (EMNLP16). Austin, TX, pp 1359–1368
23
107. Hofstra B, Corten R, van Tubergen F, Ellison NB (2017) Sources of Segregation in Social
Networks: A Novel Approach Using Facebook. Am Sociol Rev 0003122417705656 . doi:
10.1177/0003122417705656
108. Mislove A, Lehmann S, Ahn Y-Y, et al (2011) Understanding the Demographics of Twitter
Users. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social
Media. Menlo Park, CA, pp 554–557
109. Rao D, Paul MJ, Fink C, et al (2011) Hierarchical Bayesian Models for Latent Attribute
Detection in Social Media. In: In Proceedings of the Fifth International Conference on
Weblogs and Social Media. ACM, Menlo Park, CA, pp 598–601
110. McCormick TH, Lee H, Cesare N, et al (2015) Using Twitter for Demographic and Social
Science Research: Tools for Data Collection and Processing. Sociol Methods Res. doi:
10.1177/0049124115605339
111. Longley PA, Adnan M, Lansley G (2015) The geotemporal demographics of Twitter usage.
Environ Plan A 47:465–484 . doi: 10.1068/a130122p
112. Hosseini M, Tammimy Z (2016) Recognizing users gender in social media using linguistic
features. Comput Hum Behav 56:192–197 . doi: 10.1016/j.chb.2015.11.049
113. Karimi F, Wagner C, Lemmerich F, et al (2016) Inferring Gender from Names on the Web:
A Comparative Evaluation of Gender Detection Methods. ArXiv160304322 Cs 53–54 . doi:
10.1145/2872518.2889385
114. Grbovic M, Radosavljevic, Vladan, Djuric (2015) Leveraging Blogging Activity on Tumblr
to Infer Demographics and Interests of Users for Advertising Purposes. In: Proceedings of
the 6th Workshop on Making Sense of Microposts. ACM, New York, NY
115. Merler M, Cao L, Smith JR (2015) You are what you tweet...pic! gender prediction based
on semantic analysis of social media images. In: 2015 IEEE International Conference on
Multimedia and Expo (ICME). pp 1–6
116. Ludu PS (2015) Inferring Latent Attributes of an Indian Twitter User Using Celebrities and
Class Influencers. In: Proceedings of the 1st ACM Workshop on Social Media World
Sensors. ACM, New York, NY, USA, pp 9–15
117. Zhong Y, Yuan NJ, Zhong W, et al (2015) You Are Where You Go: Inferring Demographic
Attributes from Location Check-ins. ACM Press, pp 295–304
118. Vijayaraghavan P, Vosoughi S, Roy D (2017) Twitter Demographic Classification Using
Deep Multi-modal Multi-task Learning. Association for Computational Linguistics, pp
478–483
119. Bhatnagar VS, Sanket NJ, Barathi SK (2016) "Honey, We Shrunk the Weights" Gender
Prediction using Twitter Feeds and Profile Images
24
120. Claude F, Konow R, Ladra S (2016) Fast Compressed-based Strategies for Author Profiling
of Social Media Texts. In: Proceedings of the 4th Spanish Conference on Information
Retrieval. ACM, New York, NY, USA, pp 14:1–14:6
121. Zhang Y, Dang Y, Chen H (2011) Gender Classification for Web Forums. IEEE Trans Syst
Man Cybern - Part Syst Hum 41:668–677 . doi: 10.1109/TSMCA.2010.2093886
122. Cesare N, Grant C, Hawkins JB, et al (2017) Demographics in Social Media Data for Public
Health Research: Does it matter? ArXiv Prepr ArXiv171011048
123. Rosenthal S, McKeown K (2011) Age prediction in blogs: A study of style, content, and
online behavior in pre-and post-social media generations. In: Proceedings of the 49th
Annual Meeting of the Association for Computational Linguistics: Human Language
Technologies-Volume 1. Association for Computational Linguistics, Stroudsburg, PA, pp
763–772
124. Sloan L, Morgan J, Burnap P, Williams M (2015) Who Tweets? Deriving the Demographic
Characteristics of Age, Occupation and Social Class from Twitter User Meta-Data. PLOS
ONE 10:e0115545 . doi: 10.1371/journal.pone.0115545
125. Nguyen T, Phung D, Adams B, Venkatesh S (2011) Prediction of Age, Sentiment, and
Connectivity from Social Media Text. In: Web Information System Engineering – WISE
2011. Springer Berlin Heidelberg, Sydney, Australia, pp 227–240
126. Oktay H, Firat A, Ertem Z (2014) Demographic breakdown of twitter users: An analysis
based on names. Acad Sci Eng 1–12
127. Chen J, Li S, Dai B, Zhou G (2016) Active Learning for Age Regression in Social Media.
In: China National Conference on Chinese Computational Linguistics. Springer, pp 351–
362
128. Chamberlain BP, Humby C, Deisenroth MP (2016) Probabilistic Inference of Twitter Users'
Age based on What They Follow. ArXiv Prepr ArXiv160104621
129. Wang C, Xiao B, Li X, et al (2013) Predicting Users' Age Range in Micro-blog Network.
In: Proceedings of the International Conference on Web Information Systems Engineering
(WISE 2013. Nanjing, China, pp 516–521
130. Zheng L, Yang K, Yu Y, Jin P (2013) Predicting Age Range of Users over Microblog
Dataset. Int J Database Theory Appl 6:85–94 . doi: 10.14257/ijdta.2013.6.6.08
131. Chang J, Rosenn I, Backstrom L, Marlow C (2010) ePluribus: Ethnicity on Social Networks.
In: Procedinngs of the Fourth International Conference on Weblogs and Social Media.
Washington DC, pp 18–25
132. Mohammady, Ehsan, Culotta, Aron (2014) Using County Demographics to Infer Attributes
of Twitter Users. Baltimore, Maryland, pp 7–16
25
133. Mateos P, Longley PA, O'Sullivan D (2011) Ethnicity and Population Structure in Personal
Naming Networks. PLOS ONE 6:e22943 . doi: 10.1371/journal.pone.0022943
134. Brownlee J (2014) Classification Accuracy is Not Enough: More Performance Measures
You Can Use. In: Mach. Learn. Mastery. http://machinelearningmastery.com/classification-
accuracy-is-not-enough-more-performance-measures-you-can-use/. Accessed 28 Jan 2017
135. Han J, Pei J, Kamber M (2011) Data Mining: Concepts and Techniques. Elsevier
136. (2009) Federal Policy for the Protection of Human Subjects ('Common Rule. In: HHS.gov.
https://www.hhs.gov/ohrp/regulations-and-policy/regulations/common-rule/index.html.
Accessed 26 Nov 2017
137. boyd danah, Crawford K (2012) Critical Questions for Big Data. Inf Commun Soc 15:662–
679 . doi: 10.1080/1369118X.2012.678878
138. Rivers CM, Lewis BL (2014) Ethical research standards in a world of big data.
F1000Research. doi: 10.12688/f1000research.3-38.v2
139. Vayena E, Salathé M, Madoff LC, Brownstein JS (2015) Ethical Challenges of Big Data in
Public Health. PLOS Comput Biol 11:e1003904 . doi: 10.1371/journal.pcbi.1003904
140. Zwitter A (2014) Big Data ethics. Big Data Soc 1:2053951714559253
10.1177/2053951714559253
. doi:
141. Ohm P (2012) Broken Promises of Privacy: Responding to the Surprising Failure of
Anonymization. UCLA Law Rev 57:1701–1777
142. Floridi L (2014) Open Data, Data Protection, and Group Privacy. Philos Technol 27:1–3 .
doi: 10.1007/s13347-014-0157-8
|
1902.10307 | 1 | 1902 | 2019-02-27T02:14:42 | Deep Adversarial Network Alignment | [
"cs.SI",
"cs.LG"
] | Network alignment, in general, seeks to discover the hidden underlying correspondence between nodes across two (or more) networks when given their network structure. However, most existing network alignment methods have added assumptions of additional constraints to guide the alignment, such as having a set of seed node-node correspondences across the networks or the existence of side-information. Instead, we seek to develop a general network alignment algorithm that makes no additional assumptions. Recently, network embedding has proven effective in many network analysis tasks, but embeddings of different networks are not aligned. Thus, we present our Deep Adversarial Network Alignment (DANA) framework that first uses deep adversarial learning to discover complex mappings for aligning the embedding distributions of the two networks. Then, using our learned mapping functions, DANA performs an efficient nearest neighbor node alignment. We perform experiments on real world datasets to show the effectiveness of our framework for first aligning the graph embedding distributions and then discovering node alignments that outperform existing methods. | cs.SI | cs | Deep Adversarial Network Alignment
Tyler Derr1 , Hamid Karimi1 , Xiaorui Liu1 , Jiejun Xu2 , Jiliang Tang1
1 Data Science and Engineering Lab, Michigan State University 2HRL Laboratories
{derrtyle, karimiha, xiaorui}@msu.edu, [email protected], [email protected]
9
1
0
2
b
e
F
7
2
]
I
S
.
s
c
[
1
v
7
0
3
0
1
.
2
0
9
1
:
v
i
X
r
a
Abstract
Network alignment, in general, seeks to discover
the hidden underlying correspondence between
nodes across two (or more) networks when given
their network structure. However, most existing
network alignment methods have added assump-
tions of additional constraints to guide the align-
ment, such as having a set of seed node-node cor-
respondences across the networks or the existence
of side-information. Instead, we seek to develop a
general network alignment algorithm that makes no
additional assumptions. Recently, network embed-
ding has proven effective in many network analysis
tasks, but embeddings of different networks are not
aligned. Thus, we present our Deep Adversarial
Network Alignment (DANA) framework that first
uses deep adversarial learning to discover complex
mappings for aligning the embedding distributions
of the two networks. Then, using our learned map-
ping functions, DANA performs an efficient nearest
neighbor node alignment. We perform experiments
on real world datasets to show the effectiveness of
our framework for first aligning the graph embed-
ding distributions and then discovering node align-
ments that outperform existing methods.
1 Introduction
In today's world, networks are arising almost everywhere
from social to biological networks. This has caused an in-
creased attention in the domain of network analysis. How-
ever, most efforts have primarily focused on single network
problems such as link prediction [Liben-Nowell and Klein-
berg, 2007] and community detection [Fortunato, 2010], but
many problems inherently are only defined when having mul-
tiple networks, such as the network alignment problem. In
general, network alignment aims to discover a set of node
pairs across two (or more) networks that we assume inher-
ently have a correspondence between their nodes. The ma-
jority of existing network alignment algorithms assume ad-
ditional constraints to guide the alignment process such as
a one-to-one mapping between the two networks [Zhang
and Philip, 2015], some seed node-node correspondences
(i.e., supervised) [Mu et al., 2016], sparsity in the possible
alignments [Bayati et al., 2013], and the existence of side-
information (e.g., node/edge attributes) [Zhang and Tong,
2016]. However, inherently these constraints limit the appli-
cations of these methods as in many cases these constraints
are not available due to many reasons such as data privacy.
Thus, this leaves the desire for an advanced algorithm that is
both unsupervised and assuming no side-information, which
brings in tremendous challenges.
In these formulations,
Without additional constraints, one key challenge to build
network alignment algorithms is the vast number of possi-
ble permutations of the node orderings to align nodes from
one network to another [Heimann et al., 2018].
Previ-
ous works have focused on utilizing the adjacency matrix,
or more recently, also leveraging spectral graph theory and
the Laplacian matrix representations [Nassar et al., 2018;
Hayhoe et al., 2018].
the main
idea is to discover the optimal permutation to map one net-
work's matrix representation to that of the other with mini-
mal variation between them. Various metrics have been de-
fined to measure the similarity between these matrices dur-
ing the optimization process [Guzzi and Milenkovi´c, 2017;
Aflalo et al., 2015]. Inherently the use of the adjacency ma-
trix is not scalable. Recently though, the field of network
embedding, which in general seeks to discover a low dimen-
sional representation of the nodes in a network, has seen
amazingly fast development with advanced methods provid-
ing huge improvement over purely spectral based methods
for single network tasks [Grover and Leskovec, 2016]. This
is primarily due to the condensed, space efficient, and even
richer low dimensional representations for the nodes of a net-
work. However, these network embedding methods are op-
timized separately for different graphs. In other words, em-
beddings of nodes from two networks are not aligned. Thus,
directly applying network embedding to advance network
alignment still is immensely challenging.
Meanwhile,
there have been adversarial based meth-
ods [Goodfellow et al., 2014; Isola et al., 2017; Yu et al.,
2017; Wang et al., 2017] that harness the power of deep learn-
ing for solving a variety of unsupervised problems by using
a minimax game between a generator and a discriminator.
In these adversarial based methods, the generator is trained
to attempt at "fooling" the discriminator that it is generating
"real" (and not "generated") examples while the discrimina-
tor is also trained to get better at differentiating between the
"real" and "generated" examples. This process allows for an
unsupervised way of learning a generator that can generate
examples that seemingly come from the same distribution of
the real data. These adversarial techniques have shown to
be useful in a plethora of domains including computer vi-
sion [Isola et al., 2017], natural language processing [Yu et
al., 2017], and recommendation [Wang et al., 2017].
On the one hand, network embedding algorithms have been
proven to be effective in learning representations for nodes,
but embeddings for two networks are learned separately,
which are not aligned. On the other hand, adversarial tech-
niques are powerful in learning real data distributions. Thus,
in this work, we propose to harness the power of network em-
bedding and adversarial techniques to tackle the challenging
network alignment problem without additional constraints or
knowledge outside of the network structure. The rationale is
that we can align the node representations of two networks
by taking advantage of adversarial techniques. More specif-
ically, the proposed novel Deep Adversarial Network Align-
ment (DANA) framework is composed of two stages -- one
graph distribution alignment stage and one node alignment
stage. In the graph distribution alignment stage, we utilize
deep neural networks in an adversarial framework that is able
to learn a highly complex mapping from one network's em-
bedding space to that of the other such that the mapped em-
bedding approximates the data distribution of the other net-
work's original embedding. In the node alignment stage, we
align individual nodes from two networks by using the map-
ping functions learned from the graph distribution alignment
stage. Our main contributions are as follows:
• We propose a novel unsupervised Deep Adversarial Net-
work Alignment (DANA) framework that utilizes the
power of both network embedding and adversarial train-
ing techniques to align the embedding distributions and
then perform an efficient node alignment thereafter;
• We provide an unsupervised heuristic to perform model
selection for DANA, which also simultaneously shows
the effectiveness of aligning the embedding distribu-
tions; and
• Experimental results on various datasets show the supe-
riority of DANA against numerous advanced baselines.
2 Problem Definition
In this section, we introduce the basic notations and problem
definition. First, we let N 1 = (V 1,E 1) and N 2 = (V 2,E 2)
} and
be two undirected networks with V 1 = {v1
} being sets of n1 and n2 vertices, and
V 2 = {v2
edge sets E 1 and E 2 for networks N 1 and N 2, respectively.
Now, with the aforementioned notations, we formally de-
fine the network alignment problem we want to study in this
work as follows:
2, . . . v2
n2
2, . . . v1
n1
1, v1
1, v2
Given two networks N 1 and N 2, and under the assump-
tion that there is an underlying correspondence between the
vertices V 1 and V 2, we seek to discover a set A of vertex
alignment pairs defined as:
A = {(v1, v2) v2 ∈ V 2,∀v1 ∈ V 1}
(1)
Figure 1: An illustration of our graph distribution alignment.
where for each vertex v1 in N 1 we predict a single corre-
sponding vertex v2 in N 2, such that together these pairwise
node alignments follows a global network alignment.
Actually we will solve this problem bidirectionally to align
the nodes of N 1 to N 2 and vice versa. Furthermore, we stress
that in our unsupervised setting, we do not have any known
node-node labeled correspondences nor any side-information
(such as node/edge attributes). Instead, our proposed frame-
work only requires the network structures, but could be ex-
tended to embrace such additional information (later dis-
cussed as future work).
3 Deep Adversarial Network Alignment
Framework
In this section we introduce our proposed framework, Deep
Adversarial Network Alignment (DANA), for the network
alignment problem discussed in Section 2. First, we will pro-
vide an overview of how the framework is utilized to solve
the network alignment problem by first aligning the embed-
ding distributions and then aligning the nodes. Next, we will
discuss in detail both of these key stages of our proposed
framework. Thereafter we summarize with an algorithmic
overview of our framework and also provide an analysis on
the complexity of DANA.
As previously mentioned, network embedding algorithms
have been proven to effectively learn node representations,
but embeddings for separate networks are not aligned. Thus,
we first obtain node embeddings and then use an adversarial
based method to correctly learn a complex (and even non-
linear) mapping to simultaneously align the two networks
embedding distributions. In this way the mapped embedding
from the first network approximately follows the distribution
of the other. Then, once the distributions have been aligned
the second stage uses an efficient nearest neighbor search to
match/align the individual nodes by using the mapping func-
tions obtained through the adversarial learning.
3.1 Adversarial Graph Distribution Alignment
In this section, we introduce the first stage of DANA, namely
the distribution alignment whose model is illustrated in Fig-
ure 1.
this model aligns two graphs N 1
In a nutshell,
GraphEmbeddingN1G1 2G2 1RealGeneratedN2GraphEmbeddingCycle Consistency RealGeneratedD2RealGeneratedD1RealGeneratedX1X2and N 2 bidirectionally using two connected adversarial net-
works. The reason for connecting them is to ensure no "col-
lapse" [Zhu et al., 2017] and utilize transitivity [Zhou et al.,
2016] to regularize and prevent random alignments of the dis-
tributions which could be possible due to using complex (and
even non-linear) mappings between them.
In Figure 1, we can observe that when given two net-
works N 1 and N 2 the first step is to obtain graph embed-
dings for each of these networks. This can be obtained us-
ing one of the plethora of available methodologies, such as
node2vec [Grover and Leskovec, 2016]. Then, our goal is to
i}V 1
find a mapping between node embeddings X1 = {x1
j}V 2
for N 1 and X2 = {x2
j=1 for N 2 whose distributions are
denoted as x1 ∼ pemb(x1) and x2 ∼ pemb(x2), respec-
tively (since we are ultimately looking to align the two graph
distributions). As demonstrated in Figure 1, the model con-
tains two generators G1→2 mapping X1 → X2 and G2→1
mapping X2 → X1. Moreover, the discriminator D1 dis-
tinguishes between real embeddings of graph N 1 and those
generated from the real embedding of N 2 through G2→1 (i.e.,
{x1} and {G2→1(x2)}, respectively). Likewise, the discrim-
inator D2 distinguishes between real embeddings of N 1 and
those generated through G1→2 from the real embedding of
N 2.
Both bidirectional mappings are optimized via applying
adversarial losses [Goodfellow et al., 2014]. More precisely,
the loss function associated with aligning graph N 1 to N 2
(i.e., the mapping G1→2 : X1 → X2) is as follows:
i=1
min
G1→2
max
D2
L1→2
adv (G1→2, D2, X1, X2)
= Ex2∼pemb(x2)[log D2(x2)]
+ Ex1∼pemb(x1)[log (1 − D2(G1→2(x1)))]
(2)
where the generator G1→2 is trying to mimic the embedding
distribution of N 2 by generating embeddings G1→2(x1) (by
minimizing Eq. (2)) while simultaneously the discriminator
D2 is attempting to differentiate between x2 and G1→2(x1)
(by maximizing Eq. (2)). Similarly, the loss function of align-
ing graph N 2 to N 1 (i.e., G2→1 : X2 → X1) is as follows:
(3)
L2→1
adv (G2→1, D1, X1, X2)
= Ex1∼pemb(x1)[log D1(x1)]
+ Ex2∼pemb(x2)[log (1 − D1(G2→1(x2)))]
min
G2→1
max
D1
where in this situation the minimax game is instead between
G2→1 and D1.
By separately optimizing the loss functions in Eq. (2) and
Eq. (3) (i.e., of learning the mappings G1→2 and G2→1), we
might expect to learn an alignment between the embeddings
of N 1 to N 2, and vice versa. However, in practice, during
the training each of the separate models can map one real em-
bedding distribution to some random embeddings in the target
domain (or even collapse). More specifically, especially when
non-linearity is used in the generators, the mapping G1→2
can project embeddings of graph N 1 to some random points
in the embedding space of N 2, that although might have a
similar distribution, might also have completely distorted the
Figure 2: An illustration of our node alignment from N 1 to N 2.
proximity information between neighboring nodes that was
originally preserved in X1. In other domains, such as word-
to-word translation, adversarial techniques resorted to using
only a single directional linear mapping [Lample et al., 2018]
that could avoid these problems, but limited the complexity
and power of non-linearity in their translation/alignment.
To prevent these problems and still potentially use the
power of a non-linear generator mapping function for net-
work alignment, we introduce the cycle consistency loss sim-
ilar to [Zhu et al., 2017], which had been used for image-to-
image translation. More specifically, for a node embedding
x1 of node v1 ∈ V 1, the learned generators G1→2 and G2→1
should be able to recover and bring x1 back to the embedding
space of N 1 as follows:
x1 → G1→2(x1) → G2→1(G1→2(x1)) ≈ x1
(4)
and similarly for being able to recover the embeddings of
N 2. Intuitively, if forcing these cyclic mappings, then this
would help to prevent both the "collapse" and random align-
ment problem previously mentioned. Hence, we incorporate
the following cycle-reconstruction loss into our objective:
min
Lcyc(G1→2, G2→1, X1, X2)
(cid:104)G2→1(G1→2(x1)) − x11
(cid:105)
(cid:105)
(cid:104)G1→2(G2→1(x2)) − x21
G2→1,G1→2
= Ex1∈pemb(x1)
+ Ex2∈pemb(x2)
(5)
This leads to the graph level embedding distribution align-
(6)
max
D1,D2
adv (G2→1, D1, X1, X2)
ment to optimize the following overall loss function:
L(G1→2, G2→1, D1, D2, X1, X2)
min
G1→2,G2→1
= L1→2
adv (G1→2, D2, X1, X2) + L2→1
+ λLcyc(G1→2, G2→1, X1, X2)
where λ is a hyper-parameter controlling the balance between
ensuring a close aligning of the graph level embedding distri-
butions and the cycle consistency loss.
3.2 Nearest Neighbor Node Alignment
The second stage of DANA is to efficiently discover the node
alignments, which are based on using the discovered complex
mapping functions (i.e., the generators) from the first stage of
DANA. In this subsection, we will discuss the efficient near-
est neighbor greedy node alignment method from N 1 to N 2,
where we can then similarly perform N 2 to N 1.
As seen in Figure 2, the first step is to take the node em-
beddings X1 and map them to the embedding space of N 2
through the use of the trained generator G1→2. Next these
G1 2X1G1 2 (X1)X2projected node embeddings of N 1 are paired with their near-
est neighbor from N 2 based on Euclidean distance. To per-
form the nearest neighbor search, we utilize a k-d tree, which
is a data structure used for performing a fast and efficient
search. [Abbasifard et al., 2014].
3.3 Algorithmic Overview and Complexity Analysis
Here we discuss an algorithmic overview of DANA along
with the computational complexity. Algorithm 1 summarizes
the entire framework including the major steps -- namely ob-
taining network embeddings (line 2), training the unsuper-
vised adversarial based graph distribution alignment (lines 4-
11), and performing nearest neighbor node alignment (lines
13-15). Next we discuss some details and the complexity of
DANA. Note that we denote nmax = max(n1, n2), and sim-
ilarly define nmin, where n1 = V 1 and n2 = V 2.
First, we obtain the embeddings for networks N 1 and N 2.
In this work, we utilize a network embedding method (more
specifically node2vec [Grover and Leskovec, 2016]) whose
complexity is O(n1) and O(n2) for networks N 1 and N 2,
respectively, resulting in overall O(nmax). Note that DANA
could use attributed embedding methods to incorporate side-
information, but we leave this as future work.
Next, we train the adversarial based graph distribution
alignment. Suppose that the algorithm is run for some con-
stant number of epochs, K, where each epoch iterates through
all the nodes (for both graphs) by randomly creating mini-
batches that perform the forward step, backpropagating error
and also updating the parameters using stochastic gradient
descent (SGD). Note that this depends on the architectures
for the generators and discriminators. However, as later dis-
cussed in Section 4, if we use small reasonable constant size
hidden layers, then the computation is also constant for each
mini-batch. Thus, due to the fact we run K epochs, the com-
plexity of the graph distribution alignment is O(nmax).
As seen in Algorithm 1 (lines 13-15), for the final step
we actually perform the node alignment bidirectionally and
select the one that has the lower average nearest neighbor
distance. First, we build the k-d tree based on the embed-
dings X2, which takes O(n2log(n2)) and then we need to
search for the nearest neighbor for all v1 ∈ V 1 using their
mapped representation G1→2(x1). The search in the worse
case for each x1 is O(n2), but O(log(n2)) in the average
case. Thus, since we perform this search for all nodes in V 1,
the total expected time is O(n2log(n2) + n1log(n2)) for the
alignment of N 1 onto N 2. Then we similarly do the align-
ment of N 2 onto N 1, resulting in the total expected time
O(nmaxlog(nmax)). This leads to the sub-quadratic total
time complexity of DANA to be O(nmaxlog(nmax)) when
ignoring the linear/constant terms.
4 Experiments
To evaluate the effectiveness of the proposed Deep Adver-
sarial Network Alignment framework, we conduct a set of
experiments for aligning real world networks. Through the
conducted experiments, we seek to answer the following two
questions: (1) Can DANA align network embeddings? and
(2) How effective is DANA at accurately discovering the true
underlying node alignment?
Algorithm 1: Deep Adversarial Network Alignment.
Input: N 1 = (V 1,E 1),N 2 = (V 2,E 2)
Output: A
1 # Utilize a Graph Embedding Method:
2 Obtain X1 and X2 from N 1 and N 2, respectively
3 # Perform Graph Distribution Alignment
4 Randomly initialize the neural network parameters (θ)
5 while Not max iterations do
6
Select a random mini-batch
B = {(x1, x2)x1 ∈ X1, x2 ∈ X2}
foreach (x1, x2) ∈ B do
7
8
Feed forward to obtain G1→2(x1), G1→2(x2),
D2(G1→2(x1)), D1(G2→1(x2)), D1(x1), D2(x2),
G2→1(G1→2(x1)), and G1→2(G2→1(x2))
end
Update parameters θ in Eq. 6 using SGD
9
10
11 end
12 # Perform Node Alignment
13 Construct A1: closest x2 ∈ k-d tree(X2) ∀x1 ∈ G1→2(X1)
14 Construct A2: closest x1 ∈ k-d tree(X1) ∀x2 ∈ G2→1(X2)
15 Set A to A1 or A2 based on mean nearest neighbor distance
4.1 Experimental Setup
Here we will discuss the datasets and how we utilize them for
our experiments, the architecture details for DANA, our pro-
posed unsupervised heuristic for model selection, and base-
line methods.
Datasets with Ground Truth Correspondence
The first two datasets we collected are Bitcoin-Alpha1 and
Bitcoin-OTC2. These networks are online marketplaces that
allow users to buy and sell things using Bitcoins. Users cre-
ate positive (or negative) links to those they trust (or distrust).
Furthermore, most users have provided their unique Bitcoin
fingerprints, thus allowing us to determine a ground-truth
mapping of users across networks, which we use to evaluate
the alignments. Note that we construct two undirected dataset
variants, the first being networks that only include positive
links (i.e., BitcoinA and BitcoinO), and the second that also
include the negative links (i.e., BitcoinAn and BitcoinOn).
Some basic statistics can be found in Table 1.
Datasets with Pseudo-Ground Truth Correspondence
Here we collected real world datasets, namely CollegeMsg3,
Hamsterster4, and Blogs4. We present the basic undirected
network statistics in Table 1. Note that we have chosen these
datasets to be used in a synthetic network alignment setting
(although themselves are real world networks), where we will
let N2 to be the original dataset, while constructing a per-
muted version as N1 and simultaneously adding some noise
in the set {5,10,20}% to N1 at random to evaluate the perfor-
mance and robustness of DANA.
1http://www.btcalpha.com
2http://www.bitcoin-otc.com
3http://snap.stanford.edu/data/
4http://konect.uni-koblenz.de/
V 1
V 2
E 1
E 2
V 1 ∩ V 2
E 1 ∩ E 2
BitcoinA
BitcoinO
(pos)
3682
3819
3591
25952
28321
24066
BitcoinAn
BitcoinOn
(pos&neg)
3783
3914
3682
28288
30691
26004
CollegeMsg Hamsterster Blogs
1899
-
-
13754
-
-
2426
-
-
16613
-
-
1224
-
-
16718
-
-
Table 1: Dataset Statistics.
DANA Architecture
First, for the graph embeddings, we utilize node2vec [Grover
and Leskovec, 2016] to obtain node embeddings of size 64.
We note that both the generator and discriminator for DANA
can be constructed in various ways. For the discriminator,
based on knowledge from other domains when using adver-
sarial based frameworks, we use a two layer fully connected
network with 512 hidden units and Leaky ReLU (Rectified
Linear Unit) [Maas et al., 2013]. For the generators, we at-
tempted using both a linear and non-linear single layer map-
ping (i.e., two possible variants). For the adversarial learn-
ing, we varied λ in {1, 10, 100}, since λ = 10 was recom-
mended in [Zhu et al., 2017]. We let η ∈ {1, 5, 25} denote
the number of times we update the generators before updat-
ing the discriminators during the alternative updating and use
the ADAM optimizer [Kingma and Ba, 2014].
In the above we mentioned three hyperparameters that we
would need to choose between, thus, we propose to use the
unsupervised heuristic of how well DANA aligns the distri-
butions as a metric to select the best parameters. We assume
the better the embedding distributions match, the better the
performance in aligning the individual nodes. Note that this
does not utilize the ground-truth alignments, but rather sim-
ply measures the average distance each mapped node is to
the nearest neighbor in the other embedded space.
Baselines
Here we introduce the set of baselines we will compare
against our proposed Deep Adversarial Network Alignment
(DANA) method. Isorank [Singh et al., 2008]/FINAL [Zhang
and Tong, 2016] is a network alignment algorithm that was
designed specifically for protein-protein interaction network
alignments and we note that FINAL is an attributed network
alignment methods that is equivalent to IsoRank when hav-
ing no edge/node attributes [Zhang and Tong, 2016]. Eige-
nAlignLR [Nassar et al., 2018] is a low rank extension of the
EigenAlign [Feizi et al., 2016] spectral based network align-
ment method. REGAL [Heimann et al., 2018] constructs
their own network embedding (while REGAL-s2v [Heimann
et al., 2018] instead uses struc2vec [Ribeiro et al., 2017]) and
then uses a nearest neighbor search for node alignments. We
also include two sparse network alignment methods, namely
SparseIsoRank [Bayati et al., 2013] (a sparse network align-
ment variation of IsoRank [Singh et al., 2008]) and NetAl-
ignBP [Bayati et al., 2013] (which uses belief propagation
to construct the alignment), where both use information for
limiting the scope of possible alignments.
We note that SparseIsoRank and NetAlignBP both assume
Figure 3: Answering question (1) where (a) shows the average near-
est neighbor distance heuristic with the accuracy for BitcoinAn and
BitcoinOn, and (b) visualizes the graph distribution alignment.
additional information to suggest to their methods which
node alignments are possible, but our problem setting does
not have such additional information. Therefore we heuris-
tically provide them information from the network structure.
More specifically, node degree similarity from N 1 and N 2
is used to provide each node in the two networks a subset
of possible nodes to pair with (as also done in [Heimann et
al., 2018]). Here we try using log2(V) and 0.01 × V for
the the set size containing the most similar nodes in terms of
absolute difference in degree. We note that for all methods
we use the default settings provided by the authors, but RE-
GAL was unable to run on networks of different sizes, thus
we only report their performance for the CollegeMsg, Blogs,
and Hamsterster datasets.
4.2 Experimental Results
Here we present the results of our experiments in network
alignment with both our known ground truth and pseudo-
ground truth datasets. Although there are multiple ways
of evaluating the performance of network alignment meth-
ods [Douglas et al., 2018], we report the accuracy, which is
by far the most commonly used.
In Figure 3(a), we have plotted the mean nearest neighbor
distances against the accuracy while taking snapshots dur-
ing DANA's optimization of the adversarial graph distribu-
tion alignment of the BitcoinAn and BitcoinOn datasets. We
can observe that as DANA better aligns the two distributions
(i.e., lower mean nearest neighbor distance) the accuracy is
also improving. In Figure 3(a), the star represents the least
mean nearest neighbor distance and we can observe it nearly
has the best accuracy. We observe the same trend across all
hyper-parameter settings and thus our unsupervised heuristic
of using the lowest mean nearest neighbor distance for model
selection works quite well in practice. To further show the
effectiveness of DANA in aligning the graph embedding dis-
tributions, we show a visualization using principle component
analysis (PCA) [Jolliffe, 2011] in Figure 3(b) where "Start"
refers to the initial random alignment and "End" shows the
final graph distribution alignment that DANA adversarially
learns. Therefore, based on Figure 3, we can conclude an an-
swer for our first question, that DANA can indeed learn to
effectively align the embeddings of two networks.
In Table 2, we ran DANA and the baselines (except for
G1 2(X1) to X2G2 1(X2) to X1StartEndX2G1 2(X1)(a)(b)AccuracyMethods
N 1: BitcoinA
N 2: BitcoinO
N 1: BitcoinAn
N 2: BitcoinOn
SparseIsoRank
NetAlignBP
IsoRank/FINAL
EigenAlignLR
REGAL-s2v
DANA
0.046
0.157
0.041
0.015
0.124
0.542
0.047
0.141
0.040
0.016
0.089
0.511
Table 2: Performance comparison with accuracy for aligning the two
variations of the Bitcoin datasets.
REGAL, since their implementation could not handle net-
works having different sizes) on the Bitcoin datasets. The
first observation is that the EigenAlignLR, SparseIsoRank,
and Isorank/FIANL all have significantly less performance
than NetAlignBP, REGAL-s2v, and DANA. It would seem
that NetAlignBP is able to effectively use the pseudo side-
information (based on node degree similarity) we provided.
Also, REGAL-s2v (which uses struc2vec embeddings) is
able to out perform EigenAlignLR (which is spectral based).
However, we also note the comparison of REGAL-s2v, which
directly performs a node alignment on embeddings from
struc2vec, against DANA, which uses adversarial learning
to correctly align network embeddings before performing the
node alignment. We can clearly see that DANA significantly
out performs REGAL-s2v and all other baseline methods.
Next, in Figure 4, we present the results for the pseudo-
ground truth datasets where we have performed the network
alignment experiments for the CollegeMsg, Hamsterster, and
Blogs datasets. In these experiments we first permuted the
nodes of the original network and then removed a portion of
the edges (i.e., level of noise) and attempted to align back to
the original network. We can observe that similar to the two
Bitcoin experiments, DANA is able to outperform all exist-
ing baseline methods for all three datasets across all levels of
noise. We also observe that as more edges are removed, it
becomes harder to align back to the original network where
all the baselines almost completely fail to align at 20%, but
yet DANA is able to still maintain a reasonable alignment.
It can also be seen that DANA and REGAL (also REGAL-
s2v in many cases) outperform the other methods, which sug-
gests again that embedding based approaches are superior.
However, as previously mentioned, REGAL-s2v does not
perform any alignment of the embeddings before perform-
ing the node alignment, and REGAL performs a similarity-
based embedding alignment through a shallow matrix factor-
ization method, but neither harness deep learning or adversar-
ial training. Furthermore, while EigenAlignLR uses spectral
based embeddings, DANA is able to harness more advanced
network embedding methods, while leading to better perfor-
mance across all levels of noise. This seems natural due to
the fact that current network embedding methods have shown
superiority over the classical spectral embeddings for a vari-
ety of network analysis tasks [Grover and Leskovec, 2016].
Thus, based on these experiments we have answered the sec-
ond question, DANA is indeed effective at aligning the cor-
responding nodes across networks, which is due to the fact it
harnesses the power of deep adversarial learning to correctly
align the embeddings of two networks.
Figure 4: Results on the three datasets with pseudo-ground truth
when varying the level of noise (i.e., percent of edges removed).
5 Related Work
Network alignment is a fundamental network analysis task
having many real world applications in user-identity link-
age [Liu et al., 2013], computer vision [Conte et al., 2004],
and bioinformatics [Singh et al., 2008]. Classical network
alignment methodologies typically were based around opti-
mizing a permutation matrix to align the matrix representa-
tions. However, some methods have introduced relaxations
such as convex or finding a doubly stochastic matrix instead
of finding a permutation matrix [Aflalo et al., 2015].
Another set of related network alignment problems are
those that are supervised. Some representative examples also
learn network embeddings, but use known node-node pairs
to align in a shared embedding space [Tan et al., 2014].
Also, there is the sparse network alignment problem [Bay-
ati et al., 2013] where the general alignment problem is sim-
plified to restrict the possible alignments between nodes. In
other words, a bipartite graph is constructed from the two net-
works being aligned, but rather than having V 1×V 2 num-
ber of possible matching pairs, they instead have a limited set
to prevent certain pairs, which could be from domain specific
knowledge or network structure. Some other specialized for-
mulations can be found for heterogeneous networks [Kong et
al., 2013] and attributed graphs [Zhang and Tong, 2016].
6 Conclusion
In this work, we proposed our Deep Adversarial Network
Alignment (DANA) framework to solve the general network
alignment problem when only provided the network struc-
ture and assuming no additional constraints. More specifi-
cally, DANA harnesses the power of adversarial learning to
align the graph embedding distributions and then thereafter
performs an efficient nearest neighbor node alignment. Fur-
thermore, we present an unsupervised heuristic to perform
model selection for DANA. Finally extensive experiments
were performed to show the effectiveness of both main stages
of DANA, while also proving DANA to be superior in per-
formance against existing network alignment methods. Our
future work consists of first extending DANA to embrace ad-
ditional constraints to aid in performing alignments, such as
node/edge attributes or assuming a seed set of known node-
node aligned pairs.
(a) CollegeMsg(b) Hamsterster(c) BlogsReferences
[Abbasifard et al., 2014] Mohammad Reza Abbasifard, Bi-
jan Ghahremani, and Hassan Naderi. Article: A survey
on nearest neighbor search methods. IJCA, 2014.
[Aflalo et al., 2015] Yonathan Aflalo, Alexander Bronstein,
and Ron Kimmel. On convex relaxation of graph isomor-
phism. PNAS, 2015.
[Bayati et al., 2013] Mohsen Bayati, David F Gleich, Amin
Saberi, and Ying Wang. Message-passing algorithms for
sparse network alignment. TKDD, 2013.
[Conte et al., 2004] Donatello Conte, Pasquale Foggia,
Carlo Sansone, and Mario Vento. Thirty years of graph
matching in pattern recognition. IJPRAI, 2004.
[Douglas et al., 2018] Joel Douglas, Ben Zimmerman,
Alexei Kopylov, Jiejun Xu, Daniel Sussman, , and Vince
Lyzinski. Metrics for evaluating network alignment.
In
GTA3 at WSDM, 2018.
[Feizi et al., 2016] Soheil Feizi, Gerald Quon, Mariana
Recamonde-Mendoza, Muriel M´edard, Manolis Kellis,
and Ali Jadbabaie. Spectral alignment of networks. arXiv
preprint arXiv:1602.04181, 2016.
[Fortunato, 2010] Santo Fortunato. Community detection in
graphs. Physics Reports, 2010.
[Goodfellow et al., 2014] Ian Goodfellow,
Jean Pouget-
Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley,
Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Gen-
erative adversarial nets. In NIPS. 2014.
and
[Grover and Leskovec, 2016] Aditya Grover
Jure
Node2vec: Scalable feature learning for
Leskovec.
networks. SIGKDD, 2016.
[Guzzi and Milenkovi´c, 2017] Pietro Hiram Guzzi and Ti-
jana Milenkovi´c. Survey of local and global biological
network alignment: the need to reconcile the two sides of
the same coin. Briefings in bioinformatics, 2017.
[Hayhoe et al., 2018] Mikhail Hayhoe, Francisco Barreras,
Hamed Hassani, and Victor M Preciado. Spectre: Seedless
network alignment via spectral centralities. arXiv preprint
arXiv:1811.01056, 2018.
[Heimann et al., 2018] Mark Heimann, Haoming Shen, Tara
Safavi, and Danai Koutra. Regal: Representation learning-
based graph alignment. In CIKM, 2018.
[Isola et al., 2017] P. Isola, J. Zhu, T. Zhou, and A. A. Efros.
Image-to-image translation with conditional adversarial
networks. In CVPR, 2017.
[Jolliffe, 2011] Ian Jolliffe. Principal component analysis. In
International encyclopedia of statistical science. 2011.
[Kingma and Ba, 2014] Diederik P Kingma and Jimmy Ba.
arXiv
Adam: A method for stochastic optimization.
preprint arXiv:1412.6980, 2014.
[Kong et al., 2013] Xiangnan Kong,
Jiawei Zhang, and
Philip S. Yu. Inferring anchor links across multiple het-
erogeneous social networks. In CIKM, 2013.
[Lample et al., 2018] Guillaume Lample, Alexis Conneau,
Marc'Aurelio Ranzato, Ludovic Denoyer, and Herv´e
J´egou. Word translation without parallel data. In ICLR,
2018.
[Liben-Nowell and Kleinberg, 2007] David Liben-Nowell
and Jon Kleinberg. The link-prediction problem for social
networks. JAIST, 2007.
[Liu et al., 2013] Jing Liu, Fan Zhang, Xinying Song,
Young-In Song, Chin-Yew Lin, and Hsiao-Wuen Hon.
What's in a name?: An unsupervised approach to link
users across communities. WSDM, 2013.
[Maas et al., 2013] Andrew L Maas, Awni Y Hannun, and
Andrew Y Ng. Rectifier nonlinearities improve neural net-
work acoustic models. In DLASLP at ICML, 2013.
[Mu et al., 2016] Xin Mu, Feida Zhu, Ee-Peng Lim, Jing
Xiao, Jianzong Wang, and Zhi-Hua Zhou. User identity
linkage by latent user space modelling. In SIGKDD, 2016.
[Nassar et al., 2018] Huda Nassar, Nate Veldt, Shahin Mo-
hammadi, Ananth Grama, and David F. Gleich. Low rank
spectral network alignment. WWW, 2018.
[Ribeiro et al., 2017] Leonardo F.R. Ribeiro, Pedro H.P.
Saverese, and Daniel R. Figueiredo. Struc2vec: Learning
node representations from structural identity. SIGKDD,
2017.
[Singh et al., 2008] Rohit Singh, Jinbo Xu, and Bonnie
Berger. Global alignment of multiple protein interaction
networks with application to functional orthology detec-
tion. PNAS, 2008.
[Tan et al., 2014] Shulong Tan, Ziyu Guan, Deng Cai,
Xuzhen Qin, Jiajun Bu, and Chun Chen. Mapping users
across networks by manifold alignment on hypergraph.
AAAI, 2014.
[Wang et al., 2017] Jun Wang, Lantao Yu, Weinan Zhang,
Yu Gong, Yinghui Xu, Benyou Wang, Peng Zhang, and
Dell Zhang. Irgan: A minimax game for unifying gener-
ative and discriminative information retrieval models. SI-
GIR, 2017.
[Yu et al., 2017] Lantao Yu, Weinan Zhang, Jun Wang, and
Yong Yu. Seqgan: Sequence generative adversarial nets
with policy gradient. AAAI, 2017.
[Zhang and Philip, 2015] Jiawei Zhang and S Yu Philip.
In
Multiple anonymized social networks alignment.
ICDM, 2015.
[Zhou et al., 2016] Tinghui Zhou,
[Zhang and Tong, 2016] Si Zhang and Hanghang Tong. Fi-
nal: Fast attributed network alignment. In SIGKDD, 2016.
Philipp Krahenbuhl,
Mathieu Aubry, Qixing Huang, and Alexei A Efros.
Learning dense correspondence via 3d-guided cycle
consistency. In CVPR, 2016.
[Zhu et al., 2017] Jun-Yan Zhu, Taesung Park, Phillip Isola,
and Alexei A Efros. Unpaired image-to-image transla-
tion using cycle-consistent adversarial networks. In ICCV,
2017.
|
1608.06007 | 2 | 1608 | 2016-12-28T02:17:22 | Distributed Probabilistic Bisection Search using Social Learning | [
"cs.SI",
"cs.LG",
"cs.MA"
] | We present a novel distributed probabilistic bisection algorithm using social learning with application to target localization. Each agent in the network first constructs a query about the target based on its local information and obtains a noisy response. Agents then perform a Bayesian update of their beliefs followed by an averaging of the log beliefs over local neighborhoods. This two stage algorithm consisting of repeated querying and averaging runs until convergence. We derive bounds on the rate of convergence of the beliefs at the correct target location. Numerical simulations show that our method outperforms current state of the art methods. | cs.SI | cs | DISTRIBUTED PROBABILISTIC BISECTION SEARCH USING SOCIAL LEARNING
Athanasios Tsiligkaridis
Theodoros Tsiligkaridis
Boston University, ECE Dept.
8 St. Mary's St., Boston, MA, USA
[email protected]
MIT Lincoln Laboratory
244 Wood St., Lexington, MA, USA
[email protected]
6
1
0
2
c
e
D
8
2
]
I
S
.
s
c
[
2
v
7
0
0
6
0
.
8
0
6
1
:
v
i
X
r
a
ABSTRACT
We present a novel distributed probabilistic bisection algo-
rithm using social learning with application to target local-
ization. Each agent in the network first constructs a query
about the target based on its local information and obtains a
noisy response. Agents then perform a Bayesian update of
their beliefs followed by an averaging of the log beliefs over
local neighborhoods. This two stage algorithm consisting of
repeated querying and averaging runs until convergence. We
derive bounds on the rate of convergence of the beliefs at the
correct target location. Numerical simulations show that our
method outperforms current state of the art methods.
Index Terms -- Probabilistic bisection, consensus, decen-
tralized estimation, convergence rate, belief sharing
1. INTRODUCTION
We consider the problem of distributed bisection search us-
ing a network of agents. This problem has applications to
stochastic root finding [1], distributed group testing [2], ob-
ject tracking using cameras [3], and human-aided localization
[4]. The agents are connected through a topology and sequen-
tially search for the unknown target X ∗. Each agent forms a
query Zi,t = I(X ∗ ∈ Si,t) for some subset Si,t ⊂ X based
on its local information about the target location and obtains
a noisy response, Yi,t+1, which it uses to update its belief.
After this stage, the agents average their log-beliefs with their
neighbors. As this process is repeated after several iterations,
the agents converge to the correct consensus.
Prior work on distributed signal processing includes the
consensus literature [5, 6]. Extensions to consensus-plus-
innovations algorithms with applications to detection and es-
timation problems include nodes making noisy observations
and implementing a consensus method to spread information
around the network. Several such works on distributed es-
timation include that of [7, 8] which show that distributed
estimators are consistent and asymptotically normal. Addi-
tionally, [9, 10] studied the problem of distributed detection
and proved convergence rates on the rate of learning the
correct hypothesis.
The adaptive querying and Bayesian updating are known
in the literature as the Probabilistic Bisection Algorithm
(PBA). The PBA was first introduced by Horstein [11]. The
PBA was shown to be optimal in an information-theoretic
sense in the work by Jedynak, et al.
[12], and the conver-
gence rate of the single-agent PBA was shown to be exponen-
tial in Waeber, et al, [13]. The PBA was generalized in [4]
to multiple agents using a centralized controller strategy, and
in [14, 15] using a decentralized algorithm based on belief
consensus. In [4, 14, 15], the convergence analysis showed
that all agents reach consensus to the true target.
The contribution of this paper is to propose and analyze
a distributed bisection algorithm using a social learning ap-
proach. First, we first derive a social learning algorithm (in-
spired by the work of Lalitha, et al, [9]). Second, we derive an
asymptotic performance bound that characterizes the rate of
learning in terms of the social influence of nodes on the net-
work and the error probability of each agent. Finally, we show
using simulations, that our proposed algorithm outperforms
the case of no collaboration and improves the distributed bi-
section search algorithm presented in Tsiligkaridis, et al, [14].
2. PROBLEM FORMULATION
For concreteness, we focus on the one-dimensional case, i.e,
X = [0, 1]. In this case, the query sets Si,t take the form
of an interval [0, Xi,t], where Xi,t are the query points. The
response to the query Zi,t = I(X ∗ ∈ Si,t) is modeled as a
binary symmetric channel [12, 4, 14] and is given by:
Yi,t+1 =(Zi,t
w.p. 1 − ǫi
1 − Zi,t w.p. ǫi
In this paper, the error probabilities are constant. In [4], a
more general model was considered where the error probabil-
ity increased as the target localization error decreased.
corresponding CDF as Fi,t(x) = R x
We define pi,t(x) as the posterior distribution on the tar-
get space X = [0, 1] for agent i at time t. We also denote the
0 pi,t(u)du. The poste-
rior distributions at time t are measurable with respect to the
noisy responses {Yi,τ +1}τ ≤t up to time t. The proposed so-
cial learning algorithm consists of two stages (see Algorithm
1). In the first stage, agents perform a probabilistic bisection
and update their beliefs using the noisy response. In the sec-
ond stage, the log-beliefs are averaged among local neighbors
to spread information around the network.
The observation probability mass function used in the first
stage is given by:
li(x, yi,t+1) = f (i)
1 (y)I(x ≤ Xi,t) + f (i)
0 (y)I(x > Xi,t)
(1)
1 (y).
where f (i)
1
1 (y) = (1−ǫi)I(y=1)ǫI(y=0)
i
, f (i)
0 (y) = 1−f (i)
In the second stage, we assume that the social interaction
matrix A is a stochastic matrix corresponding to a strongly
connected, aperiodic graph G = (N , E). Here, N represents
the nodes of the network and E is the set of edges. An edge
(i, j) ∈ E exists iff Ai,j > 0.
Algorithm 1 Distributed Probabilistic Bisection Algorithm
1: Input: G = (N , E), A = {Ai,j}, {ǫi}
2: Output: { Xi,t : i ∈ N }
3: Initialize pi,0(·) to be positive everywhere.
4: repeat
5:
Stage 1: For each agent i ∈ N :
6:
7:
8:
9:
Bisect posterior density to obtain query point Xi,t =
F −1
i,t ( 1
Belief update:
2 ), and obtain noisy response yi,t+1 ∈ {0, 1}.
pi,t(x) = pi,t(x) · 2li(x, yi,t+1)
(2)
Stage 2: For each agent i ∈ N :
Average log-beliefs:
the binary symmetric channel [16].
Proof. Consider the case for a fixed node i. From Algorithm
1, we may rewrite (3) as:
log2 pi,t+1(x) =Xj
Ai,j log2 pj,t(x)
0
2PN
− log2(cid:18)Z 1
j=1 Ai,j log2 pj,t(x)dx(cid:19)
}
{z
Ai,j pj,t(x)dx
Dt
N
= log2
Xj=1
Ai,j = 0
Using Jensen's inequality, we have:
Dt ≤ log2
Z 1
0
N
Xj=1
Since Dt ≤ 0, it follows that:
log2 pi,t+1(x) ≥
N
Xj=1
Ai,j log2 pj,t(x)
(5)
Evaluating the above inequality at x = X ∗ and using
Equation (2) along with lj(X ∗, yj,t+1) = P (yj,t+1zj,t):
log2 pi,t+1(X ∗) ≥
N
Xj=1
Ai,j log2 pj,t(X ∗) +
N
Xj=1
Ai,j log2(2P (yj,t+1zj,t))
(6)
By using new variables: qi,t
def
= log2(2P (yi,t+1zi,t)), Equation (6) becomes:
def
= log2(pi,t(X ∗)) and
wj,t
pi,t+1(x) = QN
R 1
0 QN
j=1 pj,t(x)Ai,j
j=1 pj,t(x)Ai,j dx
10: until convergence
(3)
qi,t+1 ≥
N
Xj=1
Ai,jqj,t +
N
Xj=1
Using induction, it follows that:
Ai,jwj,t
(7)
3. PERFORMANCE ANALYSIS
In this section, we derive a lower bound on the posterior dis-
tribution pi,t(x) at the target X ∗. Our result shows that for
large t, we have pi,t(X ∗) ≥ 2tK for all agents i ∈ N .
Theorem 1. Assume that A corresponds to an irreducible,
aperiodic Markov chain, and pi,0(X ∗) > 0 for all i. Then,
the following asymptotic result holds:
lim inf
t→∞
log2 pi,t(X ∗)
t
≥
N
Xi=1
viC(ǫi) = K
(4)
where v is the normalized left eigenvector of A which corre-
sponds to the unit eigenvalue 2 and C(ǫi) is the capacity of
1We remark that the normalizing factor here R 1
0 pi,t(x)li(x, yi,t+1)dx
is equal to 1/2 [14].
2This is also known as the stationary distribution of the Markov chain.
qi,t ≥
t
Xτ =1
N
Xj=1
Aτ
i,jwj,t−τ +
N
Xj=1
At
i,jqj,0
(8)
Dividing both sides by t and taking the limit, it follows
that:
lim inf
t→∞
qi,t
t
≥ lim
t→∞
1
t
t
Xτ =1
N
Xj=1
Aτ
i,j wj,t−τ + lim
t→∞
1
t
N
Xj=1
At
i,jqj,0
(9)
Using 0 < pj,0(X ∗) < ∞ and At
in Equation (9) vanishes and we have:
i,j ≤ 1, the second term
lim inf
t→∞
qi,t
t
≥ lim
t→∞
1
t
t
Xτ =1
N
Xj=1
Aτ
i,j wj,t−τ =: Ki
(10)
Next, we evaluate the rate exponent Ki using the con-
vergence to a stationary distribution v for aperiodic Markov
chains. Specifically, using Theorem 7 in Sec. 2.7 from [17]:
lim
t→∞
At
i,j = vj
for any two nodes (i, j). Thus, for any arbitrarily small δ > 0,
i,j − vj ≤ δ for all t ≥ T .
there exists T = T (δ) such that At
Splitting the sum in (10):
Ki = lim
t→∞" 1
t
N
Xj=1
T −1
Xτ =1
Aτ
i,jwj,t−τ +
1
t
N
Xj=1
t
Xτ =T
Aτ
i,jwj,t−τ#
(11)
The first term in Equation (11) is negligible since it can be
upper bounded by limt→∞
τ =1 wj,t−τ . Since
wj,t−τ ≤ max{ log2(2(1 − ǫj)), log2(2ǫj)} = Bj,
1
t (T − 1)B = 0,
limt→∞
j=1 Bj = B. The second term in Equation (11)
j=1PT −1
τ =1 wj,t−τ ≤ limt→∞
j=1PT −1
t PN
1
1
dominates and is given by:
t PN
where PN
Ki = lim
t→∞
1
t
N
Xj=1
t
Xτ =T
[Aτ
i,j − vj ]wj,t−τ + lim
t→∞
1
t
N
Xj=1
t
Xτ =T
vjwj,t−τ
(12)
The first term in Equation (12) is negligible since:
lim
t→∞
1
t
≤ lim
t→∞
N
t
Xτ =T
Xj=1
Xj=1
Xτ =T
δ
t
N
t
Aτ
i,j − vj wj,t−τ
wj,t−τ ≤ lim
t→∞
δ
t
t
Xτ =T
N
Xj=1
Bj = δB
(13)
The second term in Equation (12) dominates and using the
LLN:
Ki =
=
N
Xj=1
Xj=1
N
vj" lim
t→∞
1
t
t
wj,t−τ#
Xτ =T
Xj=1
N
vj E[wj,t−τ ] =
vjC(ǫj) =: K
(14)
The proof is complete.
In Theorem 1, we derived a lower bound on the rate of
learning of each agent for the distributed bisection algorithm
(Algorithm 1). Since the rate exponent, Ki, is independent of
the agent index, i, the lower bound is the same for all agents
and depends on the channel capacities and the eigenvector
centrality, v [9]. The higher the value of vi, the larger the
contribution that node i has on the network learning rate, K.
Qt−1
Using an analogous method, we can analyze Equation
(2) for the case of no inter-agent collaboration. In this case,
A = IN , and using Equations (2) and (3), pi,t+1(X ∗) =
pi,t(X ∗) = pi,t(X ∗) + 2P (yi,t+1zi,t). Unrolling the
preceding equation over t steps, we see that pi,t(x) =
j=0 2P (yi,j+1zi,j). By taking the logarithm of both sides,
dividing by t, and applying the LLN, the convergence rate
= C(ǫi).
of the agent beliefs becomes: limt→∞
For the case of a homogeneous network, i.e.
ǫi = ǫ, ∀i,
our distributed algorithm asymptotically learns faster than
when agents do not collaborate. In general, the rate exponent
of Theorem 1 is a linear combination of agents' capacities
weighed by the eigenvector centrality. This bound is expected
to be maximized by placing nodes with low error probability
in central locations in networks where they can have a strong
social influence on other nodes.
log2 pi,t(x)
t
4. SIMULATIONS
To validate and strengthen the preceding performance analy-
sis, simulations are performed that show the proposed method
achieves better performance than the belief consensus ap-
proach of [14] and the case of no inter-agent collaboration.
We note that the computational complexity of our proposed
algorithm is on the same order as that of [14] as both al-
gorithms consist of a Bayesian bisection update and a local
averaging operation.
We randomly generate an irreducible N × N adjacency
matrix, modeling a random geometric graph [18] (see Figure
1).
In this setup, N = 20 and 18 agents have high error
probabilities (ǫi = 0.40) while the remaining 2 have low error
probabilities (ǫi = 0.05). The low error agents are the ones
with the highest two vi's, so they can positively affect the
high error nodes around them. Figure 1 displays the 2 low
error nodes and their connections in blue along with the other
nodes and their connections in black.
N PN
Figure 2 shows the average network Mean Squared Error
i=1( Xi,t − X ∗)2, and the worst-
(MSE), M SEavg(t) = 1
case network MSE, M SEmax(t) = maxi( Xi,t − X ∗)2, aver-
aged over 150 Monte Carlo trials. Our proposed method out-
performs the belief consensus approach of [14] and the case
of no collaboration. Regarding the average MSE, all three
methods converge to the consensus but our proposed method
does so much quicker than the other methods. In terms of
worst case MSE, our proposed method remains robust while
that of [14] converges slower and the method with no collab-
oration has not converged after 75 time steps. From this, we
see that the proposed method performs very well even in the
worst case and that inter-agent collaboration is advantageous
in our target localization task.
In addition to the MSE, we also plot log2 p4,t(X ∗) for
both the proposed method and that of no collaboration. The
log2 p4,t(X ∗) time series represent a base-2 logarithm of
at least as large as the lower bound K =PN
agent 4's belief, an agent with a high error probability. We
analytically showed that for the case of no collaboration, a
graph of the log2 pi,t(x∗) vs. t would be a line with slope
K = C(ǫi) that would serve as an exact bound; with our pro-
posed method, the same graph should be a line with the slope
j=1 vjC(ǫi) (14).
The analysis results are affirmed by the simulation results in
Figure 3. Here, the dotted lines represent the two preced-
ing bounds and the solid lines represent the calculations of
log2 p4,t(X ∗) for each iteration. The solid red line represents
the no collaboration method and it lines up with the exact
bound displayed in the dotted red line. The solid blue line
represents our proposed method and its slope exceeds that
displayed by the lower bound with the dotted blue line. The
simulations verify our analysis and show that the beliefs gen-
erated by our proposed method concentrate fast on the true
target location.
With our distributed algorithm, it is important to note
that we improve the network-wide performance (average and
worst case) with a small penalty in performance in the case
of no collaboration for the lowest error agent.
5. CONCLUSION
In this paper, we proposed a new distributed probabilistic
bisection algorithm for target localization and derived a lower
bound on the rate of convergence. Through analysis and sim-
ulation, we show that our proposed method attains superior
performance to other state of the art methods in terms of rate
of convergence and MSE. For future work, we can pursue an
analysis of the MSE convergence rate.
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Fig. 1. Geometric random graph. The blue nodes are the low error agents
and those in red are the high error agents.
0.15
0.1
0.05
g
v
a
E
S
M
0
0
0.4
0.3
0.2
0.1
0
0
x
a
m
E
S
M
No Collaboration
With Collaboration: Tsiligkaridis et al [2015]
With Collaboration: Proposed
10
20
30
40
Iterations
50
60
70
No Collaboration
With Collaboration: Tsiligkaridis et al [2015]
With Collaboration: Proposed
10
20
30
40
Iterations
50
60
70
Fig. 2. Average (top) and worst-case (bottom) MSE performance for our
proposed social learning algorithm, the belief consensus approach of [14],
and the case of no collaboration.
)
*
X
(
t
,
4
p
2
g
o
l
12
10
8
6
4
2
0
0
Bound - No Collaboration
Lower Bound - With Collaboration
log
(X*) - No Collaboration
(X*) - With Collaboration
4,t
p
2
log
p
2
4,t
10
20
30
40
50
60
70
Iterations
Fig. 3. Concentration of beliefs as a function of iteration. The belief of the
high error node, agent 4, of our proposed method concentrates to the target
location with a slope of 0.32 as opposed to the no collaboration case with the
slope 0.03 for the same node. Our method provides 10× improvement over
the case of no collaboration regarding the worst case scenario.
[12] B. Jedynak, P. I. Frazier, and R. Sznitman, "Twenty
Questions with noise: Bayes optimal policies for en-
tropy loss," Journal of Applied Probability, vol. 49, pp.
114 -- 136, 2012.
[13] R. Waeber, P. I. Frazier, and S. G. Henderson, "Bisec-
tion Search with Noisy Responses," Journal of Control
Optimization, vol. 53, no. 3, pp. 2261 -- 2279, 2013.
[14] T. Tsiligkaridis, B. M. Sadler, and A. O. Hero III, "On
Decentralized Estimation with Active Queries," IEEE
Transactions on Signal Processing, vol. 63, no. 10, pp.
2610 -- 2622, May 2015.
[15] T. Tsiligkaridis,
"Asynchronous Decentralized Algo-
rithms for the Noisy 20 Questions Problem," in Pro-
ceedings of the IEEE International Symposium on In-
formation Theory (ISIT), Barcelona, Spain, July 2016.
[16] T. D. Cover and J. A. Thomas, Elements of Information
Theory, Wiley, New York, NY, USA, 2006.
[17] P. G. Hoel, S. C. Port, and C. J. Stone,
Introduction
to Stochastic Processes, Houghton Mifflin Company,
Boston, MA, USA, 1972.
[18] P. Gupta and P. R. Kumar, "The Capacity of Wireless
Networks," IEEE Transactions on Information Theory,
vol. 46, no. 2, pp. 388 -- 404, March 2000.
6. REFERENCES
[1] R. Waeber, P. I. Frazier, and S. G. Henderson,
"A
Bayesian Approach to Stochastic Root Finding," in Pro-
ceedings of the Winter Simulation Conference, Phoenix,
AZ, December 2011.
[2] W. Han, P. Rajan, P. I. Frazier, and B. M. Jedynak,
"Probabilistic Group Testing Under Sum Observations:
A Parallelizable 2-Approximation for Entropy Loss,"
IEEE Transactions on Information Theory, to appear,
2016.
[3] R. Sznitman and B. Jedynak, "Active Testing for Face
Detection and Localization," IEEE Transactions on Pat-
tern Analysis and Machine Intelligence, vol. 32, no. 10,
pp. 1914 -- 1920, 2010.
[4] T. Tsiligkaridis, B. M. Sadler, and A. O. Hero III, "Col-
laborative 20 Questions for Target Localization," IEEE
Transactions on Information Theory, vol. 60, no. 4, pp.
2233 -- 2352, April 2014.
[5] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, "Ran-
domized Gossip Algorithms," IEEE Transactions on In-
formation Theory, vol. 52, no. 6, pp. 2508 -- 2530, June
2006.
[6] A. Dimakis, S. Kar, J. M. F. Moura, M. G. Rabbat, and
A. Scaglione, "Gossip Algorithms for Distributed Sig-
nal Processing," Proceedings of the IEEE, vol. 98, no.
11, pp. 1847 -- 1864, November 2010.
[7] S. Kar and J. M. F. Moura, "Convergence Rate Analy-
sis of Distributed Gossip (Linear Parameter) Estimation:
Fundamental Limits and Tradeoffs," IEEE Journal of
Selected Topics in Signal Processing, vol. 5, no. 4, pp.
674 -- 690, August 2011.
[8] S. Kar, J. M. F. Moura, and K. Ramanan, "Distributed
Parameter Estimation in Sensor Networks: Nonlinear
Observation Models and Imperfect Communication,"
IEEE Transactions on Information Theory, vol. 58, no.
6, pp. 3575 -- 3605, June 2012.
[9] A. Lalitha, T. Javidi, and A. Sarwate, "Social Learn-
ing and Distributed Hypothesis Testing," ArXiv e-prints,
Oct. 2014.
[10] A. Nedic, A. Olshevsky, and C. A. Uribe, "Nonasymp-
totic Convergence Rates for Cooperative Learning over
Time-Varying Directed Graphs," in Proceedings of the
American Control Conference (ACC), Chicago, IL, July
2015.
[11] M. Horstein, "Sequential Transmission Using Noiseless
Feedback," IEEE Transactions on Information Theory,
vol. 9, no. 3, pp. 136 -- 143, July 1963.
|
1510.05198 | 4 | 1510 | 2017-05-11T20:47:13 | Learning multi-faceted representations of individuals from heterogeneous evidence using neural networks | [
"cs.SI",
"cs.CL"
] | Inferring latent attributes of people online is an important social computing task, but requires integrating the many heterogeneous sources of information available on the web. We propose learning individual representations of people using neural nets to integrate rich linguistic and network evidence gathered from social media. The algorithm is able to combine diverse cues, such as the text a person writes, their attributes (e.g. gender, employer, education, location) and social relations to other people. We show that by integrating both textual and network evidence, these representations offer improved performance at four important tasks in social media inference on Twitter: predicting (1) gender, (2) occupation, (3) location, and (4) friendships for users. Our approach scales to large datasets and the learned representations can be used as general features in and have the potential to benefit a large number of downstream tasks including link prediction, community detection, or probabilistic reasoning over social networks. | cs.SI | cs | Learning Multi-faceted Representations of Individuals from
Heterogeneous Evidence using Neural Networks
Jiwei Li, Alan Ritter and Dan Jurafsky
Stanford University, Stanford, CA, USA
Ohio State University, OH, USA
jiweil,[email protected],[email protected]
7
1
0
2
y
a
M
1
1
]
I
S
.
s
c
[
4
v
8
9
1
5
0
.
0
1
5
1
:
v
i
X
r
a
Abstract
Inferring latent attributes of people on-
line is an important social computing task,
but requires integrating the many hetero-
geneous sources of information available
on the web. We propose learning individ-
ual representations of people using neural
nets to integrate rich linguistic and network
evidence gathered from social media. The
algorithm is able to combine diverse cues,
such as the text a person writes, their at-
tributes (e.g. gender, employer, education,
location) and social relations to other peo-
ple. We show that by integrating both tex-
tual and network evidence, these represen-
tations offer improved performance at four
important tasks in social media inference
on Twitter: predicting (1) gender, (2) occu-
pation, (3) location, and (4) friendships for
users. Our approach scales to large datasets
and the learned representations can be used
as general features in and have the potential
to benefit a large number of downstream
tasks including link prediction, community
detection, or probabilistic reasoning over
social networks.
Introduction
1
The recent rise of online social media presents an
unprecedented opportunity for computational so-
cial science: user generated texts provide insight
about user's attributes such as employment, educa-
tion or gender. At the same time the social network
structure sheds light on complex real-world rela-
tionships between preferences and attributes. For
instance people sharing similar attributes such as
employment background or hobbies have a higher
chance of becoming friends. User modeling based
Figure 1: Illustration for the proposed method that learns
latent representations for users, attributes and user-generated
texts based on social network information.
on information presented in social networks is an
important goal, both for applications such as prod-
uct recommendation, targeted online advertising,
friend recommendation and for helping social sci-
entists and political analysts gain insights into pub-
lic opinions and user behaviors.
Nevertheless, much important information on
social networks exists in unstructured data formats.
Important social insights are locked away, entan-
gled within a heterogenous combination of social
signals (Sun et al., 2009) - including text, networks,
attributes, relations, preferences, etc. While recent
models have attempted to link one or two aspects of
the evidence, how to develop a scalable framework
that incorporates massive, diverse social signals
including user generated texts, tens of thousands
of user attributes and network structure in an inte-
grated way, remains an open problem.
In this paper, we propose a general deep learn-
ing framework for jointly analyzing user networks,
generated context and attributes. We map users, at-
tributes, and user-generated content to latent vector
Friend(User1,User2)Friend(User2,User3)Friend(User3,User1)Friend(User4,User5)Texts:12435Hereinclass,atHarvardUniversity!612345UserNetworkStructureLike(User1,StarTrek)LivesIn(User2,Boston)StudyAt(User3,Harvard)StudyAt(User6,Harvard)16StarTrek2Boston3Harvard6UserAttributeLinkageStarTrekHarvardBoston4representations, which are learned in a scalable way
from social network data. Figure 1 gives a brief
overview of the mechanism of the proposed model:
users are represented by similar vectors if they are
friends, share similar attributes or write similar con-
tent. Attributes are similarly clustered if associated
with similar users.1 In summary, we incorporate
diverse social signals in a unified framework, al-
lowing user embeddings to be jointly optimized
using neural networks trained on vast quantities of
rich social and linguistic context.
Based on these learned representations, our ap-
proach provides with a general paradigm on a wide
range of predictive tasks concerning individual
users as well as group behavior: user attribute in-
ference (e.g., the city the user lives in), personal
interest prediction (e.g, whether a user will like a
particular movie), and probabilistic logical reason-
ing over the social network graph. For example,
our models infer that:
• Men in California are 6.8 times more likely to
take an engineering occupation than women
in California.
• Users who work in the IT industry2 are 2.5
times more likely to like iPhones than users
working in Legal Occupations.
Our methods also have the potential to seamlessly
integrate rich textual context into many social net-
work analysis tasks including: link prediction, com-
munity detection, and so on, and the learned user
representations can be used as important input fea-
tures for downstream machine learning models, just
as how word embeddings are used in the field of
natural language processing. The major contribu-
tions of this paper can be summarized as follows:
• We propose new ways for integrating hetero-
geneous cues about people's relations or at-
tributes into a single latent representation.
• We present inference algorithms for solving
social media inference tasks related to both
individual and group behaviors based on the
learned user representations.
• Cues that we take advantage of may be noisy
and sometimes absent but by combining them
via global inference, we can learn latent facts
about people.
We evaluate the proposed model on four diverse
tasks: friend-relation prediction, gender identifica-
1This core idea is similar to collaborative filtering (Kautz
et al., 1997).
2This information comes from the Standard Occupational
Classification (SOC), as will be described later.
tion, occupation identification and user geolocation
prediction. Experimental results demonstrate im-
proved predictions by our model by incorporating
diverse evidence from many sources of social sig-
nals.
2 Social Representation Learning
Our goal is to learn latent representations from the
following three types of online information: (1)
user-generated texts (2) friend networks (3) rela-
tions and attributes.
2.1 Modeling Text
User generated texts reflect a user's interests, back-
grounds, personalities, etc. We thus propose learn-
ing user representations based on the text a user
generates.
We represent each user v by a K-dimensional
vector ev. Suppose that S denotes a sequence of
tokens S = {w1, w2, ..., wNS} generated by the
current user v. Each word w ∈ S is associated
with a K-dimensional vector ew. Let C(w) denote
the list of neighboring words for token w. w is
generated based on not only a general language
model shared across all users (namely, a model that
predicts w given C(w)), but the representation ev
of the current user :
P (wC(w), v) = p(weC)
eC =
1
Cw + 1 [
(cid:88)
w(cid:48)∈C(w)
ew(cid:48) + ev]
(1)
From Eq.1, we are predicting the current word
given the combination of its neighbors' embed-
dings and the current user embedding. This is akin
to the CBOW model (Mikolov et al., 2013) with the
only difference that the user embedding is added
into contexts. Such an idea also resembles the para-
graph vector model (Le and Mikolov, 2014) and
the multimodal language model (Kiros et al., 2014)
.
We use negative sampling, in which we ran-
domly generate negative words w∗. Let Lw denote
a binary variable indicating whether the current
word w is generated by the current user. The loss
function using negative sampling is given by:
Loss(text) = log p(Lw = 1v)+
(cid:88)
log p(Lw = 0v)
w∗
Word prediction errors are backpropogated to
user embeddings, pushing the representations of
users who generate similar texts to be similar.
2.2 Modeling User Networks
By the homophily effect,
individuals who are
friends on social networks tend to share common
characteristics. We therefore to encourage users
who are friends have similar representations.
We propose using a strategy similar to skip-gram
models, in which we consider users who are friends
on social networks analogous to neighboring words,
the representations of which we wis to be similar.
On the other hand, we want embeddings of indi-
viduals who are not friends to be distant, just as
words that do not co-appear in context. A similar
idea of transforming social graph to vector space
embeddings has been explored in the recent deep-
walk model (Perozzi et al., 2014) and Line (Tang
et al., 2015).
Suppose we have two users v and v(cid:48). The proba-
bility that the two users are and are not friends are
respectively given by:
log p(L(v, v(cid:48)) = 1) = log
log p(L(v, v(cid:48)) = 0) = log
1
1 + exp(−ev · ev(cid:48))
1 + exp(ev · ev(cid:48))
1
(2)
From Eq 2, we can see that the model favors the
cases where the dot product of friends' embeddings
is large, equivalent to their embeddings being simi-
lar. Again, we use negative sampling for optimiza-
tion. For two users v and v(cid:48) who are friends, we
sample N random users v∗, and we assume friend-
ship does not hold between them. The objective
function is therefore given by:
Similar scoring functions have been applied in a
variety of work for relation extraction (Socher et al.,
2013; Chang et al., 2014). Again we turn to neg-
ative sampling for optimization. The system ran-
domly samples none-referred-to entities and maxi-
mizes the difference between the observed relation
tuples and randomly sampled ones. Through the
model described above, users who share similar
attributes will have similar representations. At the
same time, entities that are shared by similar users
would also have similar representations and thus
occupy close positions in the vector space.
2.3 Training
The global learning objective is a linear combina-
tion of the objectives from the three categories de-
scribed above. User embeddings are shared across
these categories, and each part can communicate
with the rest: a user who publishes content about
a particular city (text modeling) can have similar
embeddings to those who live in that city (rela-
tion/attribution modeling); friends (graph model-
ing) of a basketball fan (relation/attribution model-
ing) are more likely to be basketball fans as well.
The final objective function is given as follows:
L(Θ) =Loss(text) + λ1Loss(graph)
+ λ2Loss(relation/attribute)
Θ = arg min
Θ(cid:48)
L(Θ(cid:48))
where λ1 and λ2 denote weights for different
constituents. We use Stochastic gradient decent
(Zhang, 2004) to update the parameters.
(cid:88)
v∗
Loss(graph)
= log p(L(v, v(cid:48)) = 1) +
log p(L(v, v∗) = 0)
Θt := Θt−1 − α
∂L
∂Θ
2.2.1 Modeling Relations and Attributes
Intuitively, users who share similar attributes
should also have similar representations and oc-
cupy similar position in the vector space. Suppose
that a specific relation r holds between a user v
and an entity m. We represent each user and en-
tity by a K-dimensional vector and a relation by a
K × K matrix. For any tuple (r, v, m), we map it
to a scalar within the range of [0,1], indicating the
likelihood of relation r holding between user v and
entity m:
log p(L(r, v, m) = 1)
= log
1
1 + exp(−eT
vi · Ri · em)
The system jointly learns user embeddings, word
embeddings, entity embeddings and relation matri-
ces.
Inference on Social Networks
3
In this section, we describe how to take as input
a learned user embedding for different inference
tasks on social media. We divide inference tasks
on social networks into two major categories: infer-
ence for individual behaviors and group behaviors.
The former focuses on inferring attributes of a spe-
cific user such as whether a user likes a specific
entity or whether a specific relation holds between
two users, while the latter focuses on inference over
a group of users, e.g., what is the probability of a
new yorker being a fan of Knicks.
3.1 User Attribute Inference
Given user representation evi, we wish to infer the
label for a specific attribute of a specific user. The
label can be whether a user likes an entity in a
binary classification task, or the state that a user
lives in a multi-class classification task.
Suppose that we want to predict an attribute la-
bel (denoted by tv ∈ [1, L]) for a user v. We
assume that information for this attribute is em-
bedded in user representations and therefore, and
build another neural model to expose this informa-
tion. Specifically, the model takes as input user
embedding ev and outputs the attribute label using
a softmax function as follows:
h = tanh(W · ev)
Sl = Ul · h
p(tvi = l) =
(cid:80)
exp(Sl)
l(cid:48)∈[1,L] exp(Sl(cid:48))
Parameters to learn include W and U. User rep-
resentations are kept fixed during training. The
model is optimized using AdaGrad (Zeiler, 2012).
3.2 User Relation Inference
User Relation Inference specifies whether a par-
ticular relationship holds between two users (e.g.,
whether the two users are friends). It takes em-
beddings for both users as inputs. Given a user vi
(associated with embedding evi) and a user vj (as-
sociated with embedding evj ), we wish to predict
the index of relationship label t(vi, vj) ∈ [1, L]
that holds between the two users. A neural network
prediction model is trained that takes as input the
embeddings of the two users. The model considers
the distances and angle between the two user em-
beddings. Similar strategies can be found in many
existing works, e.g., (Tai et al., 2015).
Non-linear composition is first applied to both
user representations:
hv1 = tanh(Wa · ev1)
hv2 = tanh(Wb · ev2)
Next the distance and angle between hv1 and hv2
are computed:
h+ = hv1 ⊗ hv2
h× = hv1 − hv2
The multiplicative measure h× is the elementwise
comparison of the signs of the input representations.
Finally a softmax function is used to decide the
label:
h = tanh(W × · h× + W + · h+ + W1 · hv1 + W2 · hv2)
p[t(vi, vj) = l] = softmax(U · h)
Inference of Group Behavior
Again, parameters involved are learned using
stochastic gradient decent with AdaGrad (Zeiler,
2012).
3.3
We now return to the example described in Section
1, in which we wish to estimate the probability of a
male located in California (Cal for short) having an
engineering occupation. Given a list of users, their
representations, and gold-standard labels, we first
separately train the following neural classifiers:
• whether
user
P(gender(evi)=male)
user
P(LiveIn(evi)=Cal)
• whether
a
a
is
a male,
i.e.,
lives
in Cal,
i.e.,
• whether a user takes an engineering occupa-
tion,
i.e., P(Job(evi)=engineering)
Next we estimate the general embedding (denoted
by eG) for the group of people that satisfy these
premises, namely, they are males and live in Cali-
fornia at the same time. This can be transformed to
the following optimization problem with eG being
the parameters to learn: 3
eG = arg max
e
log P (gender(e) = male)
− log P (LiveIn(e) = Cal)
(3)
Eq.3 can be thought of as an optimization prob-
lem to find a optimal value of eG. This problem
can be solved using SGD. The obtained optimal
eG is used to represent that group embedding for
users who satisfy the premises (e..g, males and
living in Cal). eG is then used as inputs to clas-
sifier P (Job(eG)) = engineering) which returns
probability of taking an engineering job.
More formally, given a list of conditions {ai} ∈
A, we want to the compute the probability that
another list of conditions (denoted by B = {bj})
hold, in which bj can be a user being an engineer.
This probability is denoted by p(BA). The al-
gorithm to compute p(BA) for group behavior
inference is summarized in Figure 2.
3Note that we assume propositions are independent, so in
the example above, being a male and living in California are
independent from each other. We leave relaxing this indepen-
dence assumption to future work.
• For ai ∈ A, bj ∈ B,
train separate classifiers
P (aie), P (bje) based on user representations e and
labeled datasets.
• Estimate group representation eG by solving the follow-
ing optimization problem using SGD:
(cid:89)
ai∈A
P (aie)
eG = arg max
• Infer the probability :
P (BA) =
e
(cid:89)
bj∈B
p(bje(group))
Figure 2: Algorithm for group behavior inference.
4 Dataset Construction
Existing commonly used social prediction datasets
(e.g., BlogCatalog and Flickr (Tang and Liu,
2009a), YouTube (Tang and Liu, 2009b)) are de-
signed with a specific task in mind: classifying
whether social links exist between pairs of users.
They contain little text or user-attribute informa-
tion, and are therefore not well suited to evaluate
our proposed model.
Social networks such as Facebook or LinkedIn
that support structured profiles would be ideal for
the purpose of this work. Unfortunately, they are
publicly inaccessible. We advert to Twitter. One
downside of relying on Twitter data is that gold-
standard information is not immediately available.
Evaluation presented in this paper therefore comes
with the flaw that it relies on downstream informa-
tion extraction algorithms or rule-based heuristics
for the attainment of "gold standards". Though not
perfect as "gold-standards" extraction algorithm
can be errorful, such a type of evaluation comes
with the advantage that it can be done automatically
to compare lots of different systems for develop-
ment or tuning in relatively large scale. Meanwhile
the way that our dataset is constructed gives impor-
tant insights about how the proposed framework
can be applied when some structured data is miss-
ing4 and how we can address these challenges by
directly from unstructured text, making this system
applicable to a much wider scenario.
4Facebook and LinkedIn do come with the ideal property
of supporting structured user profiles but hardly anyone fills
these out.
4.1 User Generated Texts and Graph
Networks
We randomly sample a set of Twitter users, discard-
ing non-English tweets and users with less than
100 tweets. For each user, we crawl their published
tweets and following / follower network using the
publicly available Twitter API. This results in a
dataset of 75 million tweets.
4.2 User Attributes
Unlike social networking websites such as Face-
book, Google+ and LinkedIn, Twitter does not sup-
port structured user profile attributes such as gender,
education and employer. We now briefly describe
how we enrich our dataset with user attributes (loca-
tion, education, gender) and user relations (friend,
spouse). Note that, the goal of this section is to
construct a relatively comprehensive dataset for the
propose of model evaluation rather than developing
user attribute extraction algorithms.
4.2.1 Location
We first associate one of the 50 US states with each
user. In this paper, we employ a rule-based ap-
proach for user-location identification.5. We select
all geo-tagged tweets from a specific user, and say
an location e corresponds to the location of the
current user i if it satisfies the following criteria,
designed to ensure high-precision: (1) user i pub-
lished more than 10 tweets from location e . (2)
user i published from location e in at least three dif-
ferent months of a year. We only consider locations
within the United States and entities are matched to
state names via Google Geocoding. In the end, we
are able to extract locations for 1.1% of the users
from our dataset.
4.2.2 Education/Job
We combine two strategies to harvest gold-standard
labels for users' occupation and educational in-
formation. We use The Standard Occupational
Classification (SOC)6 to obtain a list of occupa-
tions, a approach similar to Preot¸iuc-Pietro et al.
5 While there has been a significant work on geolocation
inference, (e.g., (Cheng et al., 2010; Conover et al., 2013;
Davis Jr et al., 2011; Onnela et al., 2011; Sadilek et al., 2012)),
the primary goals of this work are to develop user representa-
tions based on heterogenous social signals. We therefore take
a simple high-precision, low-recall approach to identifying
user locations.
6http://www.ons.gov.uk/ons/
guide-method/classifications/
current-standard-classifications/
soc2010/index.html
(2015); Preotiuc-Pietro et al. (2015). 7 A user is
assigned an occupation if one of the keywords from
the lookup table is identified in his/her profile. 12%
percent of users' occupations are identified using
this strategy.
4.2.3 Gender
Following a similar strategy as was described for
location and occupation, we take implement a sim-
ple high-precision approach for obtaining gold-
standard user gender information. We leverage the
national Social Security Gender Database (SSGD)8
to identify users' gender based on their first names.
SSGD contains first-name records annotated for
gender for every US birth since 1880 A.D9. Using
this database we assign gender to 78% of users in
our dataset.
5 Experiments
We now turn to experiments on using global infer-
ence to augment individual local detectors to infer
user's attributes, relations and preferences. All ex-
periments are based on datasets described in the
previous sections. We performed 3 iterations of
stochastic gradient descent training over the col-
lected dataset to learn embeddings. For each task,
we separate the dataset into 80% for training 10%
development and 10% for testing.
For comparison purposes, neutral models that
take into account only part of the training signals
presented naturally constitute baselines. We also
implement feature-based SVM models as baselines
for the purpose of demonstrating strength of neu-
ral models. For neural models, we set the latent
dimensionality K to 500. Pre-trained word vectors
7 SOC is a UK government system developed by the Office
of National Statistics that groups jobs into 23 major categories
(for example: or Engineering Occupations or Legal Occupa-
tions), each of which is associated with a set of specific job
titles (e.g., mechanical engineer and pediatrist for Professional
Occupations). We construct a lookup table from job occu-
pations to SOC and apply a rule-based mapping strategy to
retrieve a users' occupation information based on the free-text
user description field from their Twitter profile. Note that
this approach introduces some bias: users with high-profile
occupations are more likely to self-disclose their occupations
than users with less prestigious occupations.
8http://www.ssa.gov/oact/babynames/
names.zip
9Again, we note the large amount of related work on pre-
dicting gender of social media users (e.g., (Burger et al., 2011;
Ciot et al., 2013; Pennacchiotti and Popescu, 2011; Tang et al.,
2011).) studying whether high level tweet features (e.g., link,
mention, hashtag frequency) can help in the absence of highly-
predictive user name information. As mentioned before, we
do not adopted machine learning algorithms for attribute ex-
traction.
Model
All
Only Network
Network+Attribute
Network+Text
Accuracy
0.257
0.179
0.198
0.231
Table 1: Accuracy for different models on friend relationship
prediction from social representations.
are used based on the word2vec package.10 Em-
beddings are trained on a Twitter dataset consisting
of roughly 1 billion tokens.
graph structure and user attributes.
5.1 Friend-Relation (Graph Link) Prediction
Twitter supports two types of following patterns,
FOLLOWING and FOLLOWED. We consider two
users as friends if they both follow each other. The
friendship relation is extracted straightforwardly
from the Twitter network. Models and baselines
we employ include:
• All: The proposed model that considers text,
• Only Network: A simplified version of the pro-
posed model that only used the social graph
structure to learn user representations a Note
that by making this simplification, the model
is similar to DeepWalk (Perozzi et al., 2014)
with the exception that we adopt negative sam-
pling rather than hierarchical softmax.
• Network+Attribute: Neural models that con-
sider social graph and relation/entity informa-
tion.
• Network+text: Neural models that consider
social graph and text information.
Performance for each model is shown in Table
1. As can be seen, taking into account different
types of social signals yields progressive perfor-
mance improvement: Graph+Attribute performs
better than only graph, and All, which consider
all different types of social signals is better than
Graph+Attribute .
5.2 User Attributes: Job Occupation
We present experimental results for job classifica-
tion based on user-level representations. Evalua-
tion is performed on the subset of users whose job
labels are identified by the rule-based approach de-
scribed in the previous section. Our models are
trained to classify the top-frequent 10 categories of
job occupations
Again, all denotes the model that utilizes all
types of information. Baselines we consider in-
10https://code.google.com/p/word2vec/
Model
All
Only Network
SVM-text
Network+Text
Accuracy
0.402
0.259
0.330
0.389
Table 2: Accuracy for different models on 9-class job occupa-
tion prediction from social representations.
Model
All
Attribute+Text
Only Network
Only Text
SVM-text
Accuracy
0.840
0.575
0.804
0.785
0.828
Table 3: Accuracy for different models on 9-class job occupa-
tion prediction from social representations.
clude:
• Text-SVM: We use SVM-Light package to
train a unigram classifier that only considers
text-level information.
• Only Network: A simplified version of the pro-
posed model that trains user embedding based
on network graph and occupation information.
• Network+Text: Embeddings are trained from
user-generated texts and network information.
Experimental results are illustrated in Table 2.
As can be seen, user generated content offers infor-
mative evidence about job occupation. We also ob-
serve that considering network information yields
significant performance improvement due to the
homophily effect, which has been spotted in earlier
work (Li et al., 2014b). Again, the best performing
model is the one that considers all sorts of evidence.
5.3 User Attribute: Gender
We evaluate gender based on a dataset of 10,000
users (half male, half female). The subset is drawn
from the users whose gold standard gender la-
bels are assigned by the social-security system
described in the previous section. Baselines we
employ include: SVM-Text, in which a SVM binary
classification model is trained on unigram features;
Only-Text, in which user representations are learned
only from texts; Only-Network, in which user repre-
sentations are only learned from social graphs; and
Text+Relation, in which representations are learned
from text evidence and relation/entity information.
The proposed neural model achieves an accuracy
value of 0.840. which is very close to the best per-
formance that we are aware of described in Ciot
et al. (2013), which achieves an accuracy of 0.85-
0.86 on a different dataset. However, unlike in Ciot
et al. (2013), the proposed model does not require
Model
All
Only Network
Only Text
Network+Text
Attribute+Text
Accuracy
0.152
0.118
0.074
0.120.
0.089
Table 4: Accuracy for different models location prediction
from social representations.
massive efforts in feature engineering, which in-
volves collecting a wide variety of manual features
such as entities mentioned, links, wide range of
writing style features, psycho-lingsuitic features,
etc. This demonstrates the flexibility and scalabil-
ity of deep learning models to utilize and integrate
different types of social signals on inference tasks
over social networks,
User-generated contexts offer significant evi-
dence for gender. Again, we observe that lever-
aging all sorts of social evidence leads to the best
performance.
Experimental results are shown in Figure 3. As
can be seen, network information does significantly
help the task of gender identification, only achiev-
ing slightly better performance than random guess.
Such an argument is reinforced by the fact that
Text+Relation yield almost the same performance
as model all, which takes Text+ Relation+ network
information.
5.4 User Attribute: Location
The last task we consider is location identification.
Experiments are conducted on users whose loca-
tions have been identified using the rule-based ap-
proach described in the previous section. The task
can be thought of as a 50-class classification prob-
lem and the goal is to pick one from the 50 states
(with random-guess accuracy being 0.02). We em-
ploy baselines similar to earlier sections: only-text,
only network, text+attribute and text+network.
Results are presented in Table 3: both text
and network evidence provide informative evident
about where a user lives, leading to better perfor-
mances. Again, the best performance is obtained
when all types of social signals are jointly consid-
ered
5.5 Examples for Group Behavior Inference
Given the trained classifiers (and additionally
trained LIKE-DISLIKE classifiers with details
shown in the Appendix), we are able to perform
group behavior inference. Due to the lack gold
standard labeled dataset, we did not perform evalu-
ations, but rather list a couple of examples to give
readers a general sense of the proposed paradigm:
• P(isMale⇒isEngineer)=3.5×
P(isFemale⇒isEngineer)
• P(isMale,LiveInCalifornia⇒isEngineer)=
.
P(isFemale,LiveInCalifornia⇒isEngineer)
6.8×·
• P(LiveInColorado⇒LikeOmelet)=
1.4×P(LiveInCalifornia⇒LikeOmelet)
.
.
• P(LiveInTexas⇒LikeBarbecue)=
1.7×P(LiveInCalifornia⇒LikeBarbecue)
6 Related Work
Much work has been devoted to automatic user at-
tribute inference given social signals. For example,
(Rao et al., 2010; Ciot et al., 2013; Conover et al.,
2011; Sadilek et al., 2012; Hovy et al., 2015) fo-
cus on how to infer individual user attributes such
as age, gender, political polarity, locations, occu-
pation, educational information (e.g., major, year
of matriculation) given user-generated contents or
network information.
Taking advantage of large scale user informa-
tion, recent research has begun exploring logical
reasoning over the social network (e.g., what's the
probability that a New York City resident is a fan
of the New York Knicks). Some work (Li et al.,
2014c; Wang et al., 2013) relies on logic reason-
ing paradigms such as Markov Logic Networks
(MLNs) (Richardson and Domingos, 2006).
Social network inference usually takes advan-
tage of the fundamental propoety of homophily
(McPherson et al., 2001), which states that people
sharing similar attributes have a higher chance of
becoming friends11, and conversely friends (or cou-
ples, or people living in the same location) tend to
share more attributes. Such properties have been
harnessed for applications like community detec-
tion (Yang et al., 2013) and user-link prediction
(Perozzi et al., 2014; Tang and Liu, 2009a).
The proposed framework also focuses on at-
tribute inference, which can be reframed as rela-
tion identification problems, i.e., whether a relation
holds between a user and an entity. This work is
thus related to a great deal of recent researches on
relation inference (e.g., (Guu et al., 2015; Wang
et al., 2014; Riedel et al., 2013)).
11Summarized by the proverb "birds of a feather flock to-
gether" (Al Zamal et al., 2012).
Our work is inspired by classic work on spectral
learning for graphs e.g., (Kunegis and Lommatzsch,
2009; Estrada, 2001) and on recent research (Per-
ozzi et al., 2014; Tang et al., 2015) that learn em-
bedded representations for a graph's vertices. Our
model extends this work by modeling not only user-
user network graphs, but also incorporating diverse
social signals including unstructured text, user at-
tributes, and relations, enabling more sophisticated
inferences and offering an integrated model of ho-
mophily in social relations.
7 Conclusions
We have presented a deep learning framework for
learning social representations, inferring the latent
attributes of people online. Our model offers a new
way to jointly integrate noisy heterogeneous cues
from people's text, social relations, or attributes
into a single latent representation. The representa-
tion supports an inference algorithm that can solve
social media inference tasks related to both individ-
ual and group behavior, and can scale to the large
datasets necessary to provide practical solutions to
inferring huge numbers of latent facts about people.
Our model has the ability to incorporate various
kinds of information, and it increases in perfor-
mance as more sources of evidence are added. We
demonstrate benefits on a range of social media
inference tasks, including predicting user gender,
occupation, location and friendship relations.
Our user embeddings naturally capture the no-
tion of homophily-users who are friends, have
similar attributes, or write similar text are repre-
sented by similar vectors. These representations
could benefit a wide range of downstream appli-
cations, such as friend recommendation, targeted
online advertising, and further applications in the
computational social sciences. Due to limited pub-
licly accessible datasets, we only conduct our ex-
periments on Twitter. However, our algorithms
hold potentials to yield more benefits by combin-
ing different attributes from online social media,
such as Facebook, Twitter, LinkedIn, Flickr12,
References
Apoorv Agarwal, Boyi Xie, Ilia Vovsha, Owen Ram-
bow, and Rebecca Passonneau. 2011. Sentiment
12Images can be similarly represented as vector representa-
tions obtained from CovNet (Krizhevsky et al., 2012), which
can be immediately incorporated into the proposed framework.
analysis of twitter data. In Proceedings of the Work-
shop on Languages in Social Media. Association for
Computational Linguistics, pages 30–38.
Eugene Agichtein and Luis Gravano. 2000. Snowball:
Extracting relations from large plain-text collections.
In Proceedings of the fifth ACM conference on Digi-
tal libraries. ACM, pages 85–94.
Faiyaz Al Zamal, Wendy Liu, and Derek Ruths. 2012.
Homophily and latent attribute inference: Inferring
latent attributes of twitter users from neighbors. In
ICWSM.
John D Burger, John Henderson, George Kim, and
Guido Zarrella. 2011. Discriminating gender on
twitter. In Proceedings of the Conference on Empiri-
cal Methods in Natural Language Processing. Asso-
ciation for Computational Linguistics, pages 1301–
1309.
Kai-Wei Chang, Wen-tau Yih, Bishan Yang, and
Christopher Meek. 2014. Typed tensor decomposi-
tion of knowledge bases for relation extraction. In
Proceedings of the 2014 Conference on Empirical
Methods in Natural Language Processing (EMNLP).
pages 1568–1579.
Zhiyuan Cheng, James Caverlee, and Kyumin Lee.
2010. You are where you tweet: a content-based
approach to geo-locating twitter users. In Proceed-
ings of the 19th ACM international conference on In-
formation and knowledge management. ACM, pages
759–768.
Yejin Choi, Claire Cardie, Ellen Riloff, and Siddharth
Patwardhan. 2005. Identifying sources of opinions
with conditional random fields and extraction pat-
terns. In Proceedings of the conference on Human
Language Technology and Empirical Methods in
Natural Language Processing. Association for Com-
putational Linguistics, pages 355–362.
Morgane Ciot, Morgan Sonderegger, and Derek Ruths.
2013. Gender inference of twitter users in non-
english contexts. In EMNLP. pages 1136–1145.
Ronan Collobert and Jason Weston. 2008. A unified
architecture for natural language processing: Deep
In Pro-
neural networks with multitask learning.
ceedings of the 25th international conference on Ma-
chine learning. ACM, pages 160–167.
Mark Craven, Johan Kumlien, et al. 1999. Construct-
ing biological knowledge bases by extracting infor-
In ISMB. volume 1999,
mation from text sources.
pages 77–86.
Dmitry Davidov, Ari Rappoport, and Moshe Koppel.
Fully unsupervised discovery of concept-
2007.
specific relationships by web mining .
Clodoveu A Davis
Jr, Gisele L Pappa, Diogo
Renn´o Rocha de Oliveira, and Filipe de L Arcanjo.
2011.
Inferring the location of twitter messages
based on user relationships. Transactions in GIS
15(6):735–751.
Ernesto Estrada. 2001. Generalization of topological
indices. Chemical physics letters 336(3):248–252.
Michelle Girvan and Mark EJ Newman. 2002. Com-
munity structure in social and biological networks.
Proceedings of the national academy of sciences
99(12):7821–7826.
Alec Go, Richa Bhayani, and Lei Huang. 2009. Twit-
ter sentiment classification using distant supervision.
CS224N Project Report, Stanford pages 1–12.
Kelvin Guu, John Miller, and Percy Liang. 2015.
Traversing knowledge graphs in vector space. arXiv
preprint arXiv:1506.01094 .
Raphael Hoffmann, Congle Zhang, Xiao Ling, Luke
Zettlemoyer, and Daniel S Weld. 2011. Knowledge-
based weak supervision for information extraction
of overlapping relations. In Proceedings of the 49th
Annual Meeting of the Association for Computa-
tional Linguistics: Human Language Technologies-
Volume 1. Association for Computational Linguis-
tics, pages 541–550.
Dirk Hovy, Anders Johannsen, and Anders Søgaard.
2015. User review sites as a resource for large-scale
sociolinguistic studies. In Proceedings of the 24th
International Conference on World Wide Web.
Sean P Igo and Ellen Riloff. 2009. Corpus-based se-
mantic lexicon induction with web-based corrobora-
tion. In Proceedings of the Workshop on Unsuper-
vised and Minimally Supervised Learning of Lexical
Semantics. Association for Computational Linguis-
tics, pages 18–26.
Thorsten Joachims. 1999. Making large scale svm
learning practical .
Michael Conover, Jacob Ratkiewicz, Matthew Fran-
cisco, Bruno Gonc¸alves, Filippo Menczer, and
Alessandro Flammini. 2011. Political polarization
on twitter. In ICWSM.
Henry Kautz, Bart Selman, and Mehul Shah. 1997.
Referral web: combining social networks and col-
laborative filtering. Communications of the ACM
40(3):63–65.
Michael D Conover, Clayton Davis, Emilio Ferrara,
Karissa McKelvey, Filippo Menczer, and Alessan-
dro Flammini. 2013. The geospatial characteristics
of a social movement communication network. PloS
one 8(3):e55957.
Soo-Min Kim and Eduard Hovy. 2006. Extracting
opinions, opinion holders, and topics expressed in
online news media text. In Proceedings of the Work-
shop on Sentiment and Subjectivity in Text. Associa-
tion for Computational Linguistics, pages 1–8.
Angelika Kimmig, Stephen Bach, Matthias Broecheler,
Bert Huang, and Lise Getoor. 2012. A short intro-
duction to probabilistic soft logic. In Proceedings of
the NIPS Workshop on Probabilistic Programming:
Foundations and Applications. pages 1–4.
Ryan Kiros, Ruslan Salakhutdinov, and Rich Zemel.
2014. Multimodal neural language models. In Pro-
ceedings of the 31st International Conference on
Machine Learning (ICML-14). pages 595–603.
Efthymios Kouloumpis, Theresa Wilson, and Johanna
Moore. 2011. Twitter sentiment analysis: The good
the bad and the omg! ICWSM 11:538–541.
Zornitsa Kozareva and Eduard Hovy. 2010a. Learn-
ing arguments and supertypes of semantic relations
In Proceedings of the
using recursive patterns.
48th Annual Meeting of the Association for Compu-
tational Linguistics. Association for Computational
Linguistics, pages 1482–1491.
Zornitsa Kozareva and Eduard Hovy. 2010b. Not
all seeds are equal: Measuring the quality of text
In Human Language Technologies:
mining seeds.
The 2010 Annual Conference of the North American
Chapter of the Association for Computational Lin-
guistics. Association for Computational Linguistics,
pages 618–626.
Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hin-
ton. 2012.
Imagenet classification with deep con-
volutional neural networks. In Advances in neural
information processing systems. pages 1097–1105.
J´erome Kunegis and Andreas Lommatzsch. 2009.
Learning spectral graph transformations for link pre-
In Proceedings of the 26th Annual Inter-
diction.
national Conference on Machine Learning. ACM,
pages 561–568.
John Lafferty, Andrew McCallum, and Fernando CN
Pereira. 2001. Conditional random fields: Prob-
abilistic models for segmenting and labeling se-
quence data .
Quoc V Le and Tomas Mikolov. 2014. Distributed
representations of sentences and documents. arXiv
preprint arXiv:1405.4053 .
Jiwei Li, Alan Ritter, Claire Cardie, and Eduard Hovy.
2014a. Major life event extraction from twitter
based on congratulations/condolences speech acts.
In Proceedings of Empirical Methods in Natural
Language Processing.
Jiwei Li, Alan Ritter, and Eduard Hovy. 2014b.
Weakly supervised user profile extraction from twit-
ter. ACL.
Jiwei Li, Alan Ritter, and Dan Jurafsky. 2014c.
In-
ferring user preferences by probabilistic logical
arXiv preprint
reasoning over social networks.
arXiv:1411.2679 .
Miller McPherson, Lynn Smith-Lovin, and James M
Cook. 2001. Birds of a feather: Homophily in social
networks. Annual review of sociology pages 415–
444.
Tomas Mikolov, Kai Chen, Greg Corrado, and Jef-
Efficient estimation of word
arXiv preprint
frey Dean. 2013.
representations in vector space.
arXiv:1301.3781 .
Mike Mintz, Steven Bills, Rion Snow, and Dan Juraf-
sky. 2009. Distant supervision for relation extrac-
In Proceedings of the
tion without labeled data.
Joint Conference of the 47th Annual Meeting of the
ACL and the 4th International Joint Conference on
Natural Language Processing of the AFNLP: Vol-
ume 2-Volume 2. Association for Computational Lin-
guistics, pages 1003–1011.
Jukka-Pekka Onnela, Samuel Arbesman, Marta C
Gonz´alez, Albert-L´aszl´o Barab´asi, and Nicholas A
Christakis. 2011. Geographic constraints on social
network groups. PLoS one 6(4):e16939.
Olutobi Owoputi, Brendan O'Connor, Chris Dyer,
Kevin Gimpel, Nathan Schneider, and Noah A
Improved part-of-speech tagging for
Smith. 2013.
online conversational text with word clusters.
In
HLT-NAACL. pages 380–390.
Alexander Pak and Patrick Paroubek. 2010. Twitter as
a corpus for sentiment analysis and opinion mining.
In LREC.
Marco Pennacchiotti and Ana-Maria Popescu. 2011. A
machine learning approach to twitter user classifica-
tion. ICWSM 11:281–288.
Bryan Perozzi, Rami Al-Rfou, and Steven Skiena.
2014. Deepwalk: Online learning of social represen-
tations. In Proceedings of the 20th ACM SIGKDD
international conference on Knowledge discovery
and data mining. ACM, pages 701–710.
Daniel Preotiuc-Pietro, Vasileios Lampos, and Niko-
laos Aletras. 2015. An analysis of the user occupa-
tional class through twitter content .
Daniel Preot¸iuc-Pietro, Svitlana Volkova, Vasileios
Lampos, Yoram Bachrach, and Nikolaos Aletras.
2015.
Studying user income through language,
behaviour and affect in social media. PloS one
10(9):e0138717.
Delip Rao and David Yarowsky. 2010. Detecting latent
user properties in social media. In Proc. of the NIPS
MLSN Workshop.
Delip Rao, David Yarowsky, Abhishek Shreevats, and
Manaswi Gupta. 2010. Classifying latent user at-
In Proceedings of the 2nd in-
tributes in twitter.
ternational workshop on Search and mining user-
generated contents. ACM, pages 37–44.
Matthew Richardson and Pedro Domingos. 2006.
Markov logic networks. Machine learning 62(1-
2):107–136.
Sebastian Riedel, Limin Yao, Andrew McCallum, and
Benjamin M Marlin. 2013. Relation extraction with
matrix factorization and universal schemas .
Ellen Riloff, Rosie Jones, et al. 1999. Learning dictio-
naries for information extraction by multi-level boot-
strapping. In AAAI/IAAI. pages 474–479.
Alan Ritter, Luke Zettlemoyer, Mausam, and Oren Et-
zioni. 2013. Modeling missing data in distant super-
vision for information extraction. TACL 1:367–378.
Tim Rocktaschel, Sameer Singh, and Sebastian Riedel.
2015. Injecting logical background knowledge into
embeddings for relation extraction. In Proceedings
of the 2015 Human Language Technology Confer-
ence of the North American Chapter of the Associ-
ation of Computational Linguistics.
Adam Sadilek, Henry Kautz, and Jeffrey P Bigham.
2012. Finding your friends and following them to
where you are. In Proceedings of the fifth ACM inter-
national conference on Web search and data mining.
ACM, pages 723–732.
Hassan Saif, Yulan He, and Harith Alani. 2012. Seman-
In The Semantic
tic sentiment analysis of twitter.
Web–ISWC 2012, Springer, pages 508–524.
Richard Socher, Danqi Chen, Christopher D Manning,
and Andrew Ng. 2013. Reasoning with neural ten-
sor networks for knowledge base completion.
In
Advances in Neural Information Processing Systems.
pages 926–934.
Robert Speer, Catherine Havasi, and Henry Lieberman.
2008. Analogyspace: Reducing the dimensionality
In AAAI. volume 8,
of common sense knowledge.
pages 548–553.
Yizhou Sun, Yintao Yu, and Jiawei Han. 2009.
Ranking-based clustering of heterogeneous informa-
tion networks with star network schema. In Proceed-
ings of the 15th ACM SIGKDD international con-
ference on Knowledge discovery and data mining.
ACM, pages 797–806.
Kai Sheng Tai, Richard Socher, and Christopher D
Manning. 2015. Improved semantic representations
from tree-structured long short-term memory net-
works. arXiv preprint arXiv:1503.00075 .
Cong Tang, Keith Ross, Nitesh Saxena, and Ruichuan
Chen. 2011. Whats in a name: A study of
names, gender inference, and gender behavior in
facebook. In Database Systems for Adanced Appli-
cations, Springer, pages 344–356.
Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun
Yan, and Qiaozhu Mei. 2015. Line: Large-scale in-
In Proceedings of
formation network embedding.
the 24th International Conference on World Wide
Web. International World Wide Web Conferences
Steering Committee, pages 1067–1077.
Lei Tang and Huan Liu. 2009a. Relational learning via
latent social dimensions. In Proceedings of the 15th
ACM SIGKDD international conference on Knowl-
edge discovery and data mining. ACM, pages 817–
826.
Lei Tang and Huan Liu. 2009b. Scalable learning of
collective behavior based on sparse social dimen-
sions. In Proceedings of the 18th ACM conference
on Information and knowledge management. ACM,
pages 1107–1116.
Sebastian Thrun. 1996. Is learning the n-th thing any
easier than learning the first? Advances in neural
information processing systems pages 640–646.
Svitlana Volkova, Glen Coppersmith, and Benjamin
Inferring user political prefer-
Van Durme. 2014.
ences from streaming communications. In ACL.
William Yang Wang, Kathryn Mazaitis, and William W
Cohen. 2013.
Programming with personalized
pagerank: a locally groundable first-order proba-
bilistic logic. In Proceedings of the 22nd ACM in-
ternational conference on Conference on informa-
tion & knowledge management. ACM, pages 2129–
2138.
William Yang Wang and Diyi Yang. ???? Thats so an-
noying!!!: A lexical and frame-semantic embedding
based data augmentation approach to automatic cat-
egorization of annoying behaviors using# petpeeve
tweets .
Zhen Wang, Jianwen Zhang, Jianlin Feng, and Zheng
Chen. 2014. Knowledge graph embedding by trans-
lating on hyperplanes. In Proceedings of the Twenty-
Eighth AAAI Conference on Artificial Intelligence.
Citeseer, pages 1112–1119.
Janyce Wiebe, Theresa Wilson, and Claire Cardie.
2005. Annotating expressions of opinions and emo-
tions in language. Language resources and evalua-
tion 39(2-3):165–210.
Bishan Yang and Claire Cardie. 2013.
Joint infer-
ence for fine-grained opinion extraction. In ACL (1).
pages 1640–1649.
Jaewon Yang and Jure Leskovec. 2013. Overlapping
community detection at scale: a nonnegative matrix
factorization approach. In Proceedings of the sixth
ACM international conference on Web search and
data mining. ACM, pages 587–596.
Jaewon Yang, Julian McAuley, and Jure Leskovec.
2013. Community detection in networks with node
In Data Mining (ICDM), 2013 IEEE
attributes.
13th international conference on. IEEE, pages 1151–
1156.
Matthew D Zeiler. 2012. Adadelta: An adaptive learn-
ing rate method. arXiv preprint arXiv:1212.5701 .
Tong Zhang. 2004. Solving large scale linear predic-
tion problems using stochastic gradient descent al-
gorithms. In Proceedings of the twenty-first interna-
tional conference on Machine learning. ACM, page
116.
Jiayu Zhou, Jianhui Chen, and Jieping Ye. 2011. Mal-
sar: Multi-task learning via structural regularization.
Arizona State University .
Appendix
Predicting Preference: Likes or Dislikes:
Here we describe how we extract user pref-
erences, namely, LIKE(USR,ENTITY) and DIS-
LIKE(USR,ENTITY).
Similar to a wide range of work on sentiment
analysis (e.g., (Choi et al., 2005; Kim and Hovy,
2006; Yang and Cardie, 2013; Agarwal et al., 2011;
Kouloumpis et al., 2011; Wang and Yang; Pak and
Paroubek, 2010; Saif et al., 2012)), our goal is to
identify sentiment and extract the target and object
that express the sentiment. Manually collecting
training data is problematic because (1) tweets talk-
ing about what the user LIKES/DISLIKES are very
sparsely distributed among the massive number of
topics people discuss on Twitter and (2) tweets ex-
pressing what the user LIKES exist in a great variety
of scenarios and forms.
To deal with data sparsity issues, we collect train-
ing data by combining semi-supervised informa-
tion harvesting techniques (Davidov et al., 2007;
Kozareva and Hovy, 2010a,b; Li et al., 2014a) and
the concept of distant supervision (Craven et al.,
1999; Go et al., 2009; Mintz et al., 2009):
information
Semi-supervised
harvesting:
We employ a seed-based information-extraction
method: the model recursively uses seed examples
to extract patterns, which are then used to harvest
new examples, which are further used as new
seeds to train new patterns. We begin with pattern
seeds including "I
like/love/enjoy (entity)",
"I
hate/dislike (entity)", "(I think) (entity)
is good/ terrific/ cool/ awesome/ fantastic", "(I
think) (entity) is bad/terrible/awful suck/sucks".
Entities extracted here should be nouns, which
is determined by a Twitter-tuned POS package
(Owoputi et al., 2013).
ation, we train 3 machine learning classifiers:
Based on the harvested examples from each iter-
• A tweet-level SVM classifier (tweet-model 1)
to distinguish between tweets that intend to
express like/dislike properties and tweets for
all other purposes.
to distinguish between like and dislike13.
• A tweet-level SVM classifier (tweet-model 2)
• A token-level CRF sequence model (entity-
model) to identify entities that are the target
of the users like/dislike.
The SVM classifiers are trained using the
SVMlight package (Joachims, 1999) with the fol-
lowing features: unigrams, bigrams, part-of-speech
tags and dictionary-derived features based on a sub-
jectivity lexicon (Wiebe et al., 2005).
The CRF model (Lafferty et al., 2001) is trained
using the CRF++ package14 using the follow-
ing features: unigrams, part-of-speech tags, NER
tags, capitalization, word shape and context words
within a window of 3 words
The trained SVM and CRF models are used to
harvest more examples, which are further used to
train updated models.
Distant Supervision: The main idea of distant
supervision is to obtain labeled data by drawing on
some external sort of evidence. The evidence may
come from a database15 or common-sense knowl-
edge16. In this work, we assume that if a relation
LIKE(USR, ENTITY) holds for a specific user, then
many of their published tweets mentioning the EN-
TITY also express the LIKE relationship and are
therefore treated as positive training data. Since
semi-supervised approaches heavily rely on seed
quality (Kozareva and Hovy, 2010b) and the pat-
terns derived by the recursive framework may be
strongly influenced by the starting seeds, adding in
examples from distant supervision helps increase
the diversity of positive training examples.
An overview of the proposed algorithm showing
how the semi-supervised approach is combined
with distant supervision is illustrated in Figure 3.
Stopping Condition: To decide the optimum
number of steps for the algorithm to stop, we man-
ually labeled a dataset which contains 200 positive
tweets (100 like and 100 dislike) with entities. se-
lected from the original raw tweet dataset rather
than the automatically harvested data. The dataset
contains 800 negative tweets . For each iteration of
data harvesting, we evaluate the performance of the
13We also investigated a 3-class classifier for like, dislike
and not-related, but found the performance constantly under-
performs using separate classifiers.
14https://code.google.com/p/crfpp/
15For example, if datasets says relation ISCAPITAL holds
between Britain and London, then all sentences with mention
of "Britain" and "London" are treated as expressing ISCAPI-
TAL relation (Mintz et al., 2009; Ritter et al., 2013).
16Tweets with happy emoticons such as :-) : ) are of positive
sentiment (Go et al., 2009).
Begin
Train tweet classification model (SVM) and entity
labeling model (CRF) based on positive/negative
data harvested from starting seeds.
While stopping condition not satisfied:
1. Run classification model and labeling model on raw
tweets. Add newly harvested positive tweets and entities
to the positive dataset.
2. For any user usr and entity entity,
if relation
LIKE(USR,ENTITY) holds, add all posts published by
usr mentioning entity to positive training data.
End
Figure 3: Algorithm for training data harvesting for extraction
user LIKE/DISLIKE preferences.
classification models and labeling model on this
human-labeled dataset, which can be viewed as a
development set for parameter tuning. Results are
reported in Table 5. As can be seen, the precision
score decreases as the algorithm iterates, but the
recall rises. The best F1 score is obtained at the
end of the third round of iteration.
iteration 1
iteration 2
iteration 3
iteration 4
tweet-model 1
tweet-model 2
entity label
tweet-model 1
tweet-model 2
entity label
tweet-model 1
tweet-model 2
entity label
tweet-model 1
tweet-model 2
entity label
Pre
0.86
0.87
0.83
0.78
0.83
0.79
0.76
0.87
0.77
0.72
0.82
0.74
Rec
0.40
0.84
0.40
0.57
0.86
0.60
0.72
0.86
0.72
0.74
0.82
0.70
F1
0.55
0.85
0.54
0.66
0.84
0.68
0.74
0.86
0.74
0.73
0.82
0.72
Table 5: Performance on the manually-labeled devset at differ-
ent iterations of data harvesting.
For evaluation, data harvesting without distant
supervision (denoted by NO-DISTANT) naturally
constitutes a baseline. Another baseline (denoted
by one-step-crf) trains a one-step CRF model,
which directly decides whether a specific token cor-
responds to a LIKE/DISLIKE entity rather than mak-
ing tweet-level decision first. Both (NO-DISTANT)
and ONE-STEP-CRF rely on the recursive frame-
work and tune the number of iterations on the afore-
mentioned gold standards. Test set consists of 100
like/dislike property related tweets (50 like and 50
dislike) with entity labels, which are then matched
with 400 negative tweets. The last baseline we
employ is a rule-based extraction approach using
the seed patterns. We report the best performance
model on the end-to-end entity extraction precision
and recall.
Model
semi+distant
no-distant
one-step (CRF)
rule
Pre
0.73
0.70
0.67
0.80
Rec
0.64
0.65
0.64
0.30
F1
0.682
0.674
0.655
0.436
Table 6: Performances of different models on extraction of
user preferences (like/dislike) toward entities.
From Table 6, we observe performance improve-
ments introduced by combining user-entity infor-
mation with distant supervision. Modeling tweet-
level and entity-level information yields better per-
formance than moldeing them in a unified model
(ONE-STEP-CRF).
We apply the model trained in this subsection
to our tweet corpora. We filter out entities that ap-
pear less than 20 times, resulting in roughly 40,000
different entities17.
17Consecutive entities with same type of NER labels are
merged.
|
1601.00139 | 1 | 1601 | 2016-01-02T05:23:48 | Group Centrality for Semantic Networks: a SWOT analysis featuring Random Walks | [
"cs.SI"
] | Group centrality is an extension of the classical notion of centrality for individuals, to make it applicable to sets of them. We perform a SWOT (strengths, weaknesses, opportunities and threats) analysis of the use of group centrality in semantic networks, for different centrality notions: degree, closeness, betweenness, giving prominence to random walks. Among our main results stand out the relevance and NP-hardness of the problem of finding the most central set in a semantic network for an specific centrality measure. | cs.SI | cs |
Group Centrality for Semantic Networks:
a SWOT analysis featuring Random Walks
Camilo Garrido, Ricardo Mora, and Claudio Gutierrez
Department of Computer Science, Universidad de Chile, Chile
{cgarrido,rmora,cgutierr}@dcc.uchile.cl
Abstract. Group centrality is an extension of the classical notion of
centrality for individuals, to make it applicable to sets of them. We per-
form a SWOT (strengths, weaknesses, opportunities and threats) anal-
ysis of the use of group centrality in semantic networks, for different
centrality notions: degree, closeness, betweenness, giving prominence to
random walks. Among our main results stand out the relevance and NP-
hardness of the problem of finding the most central set in a semantic
network for an specific centrality measure.
1
Introduction
The notion of centrality in graphs has been thoroughly studied since it was in-
troduced for social networks, being also applied in other contexts ranging from
physics to information retrieval [11], but as Freeman writes for social networks
[6], “there is certainly no unanimity on exactly what centrality is or on its con-
ceptual foundations, and there is very little agreement on the proper procedure
for its measurement.” Over the years, a great variety of measures of centrality
have been proposed, most of them pointing to the problem of finding the most
“central” (regarding the notion and/or the measure) node in a network [18].
Most of classic work on centrality studies what we could call “individual”
centrality: what is the most central node in a network for a certain measure.
This idea can be extended to a group: Given an integer k > 1, what is the
most central set S of nodes, of size k? This is known as group centrality and
was introduced by Everett and Borgatti [5] for social networks in order to make
individual measures of centrality work with groups of elements.
In this paper we study the application of the idea of group centrality to
semantic networks. To the best of our knowledge, this link has not been explored
before. It can help to shed light on the idea of a “most significative” group of
concepts in a semantic network, which in the age of big (semantic) data, seems
to be indispensable to make sense of notions like summary, table of contents,
compendium, etc. on huge semantic network datasets.
Our goal in this paper is to show the robustness of this application, develop its
properties, and present its opportunities, scope and possibilities and limitations.
We perform the study based on some classical centrality measures like de-
gree, closeness and betweenness [6].1 We present in more detail random walk
centrality which is a measure based on the notion of hitting time (informally:
the expected length of a random walk). This idea has been used with success
in modeling semantic relatedness. The intuition is that the “jump” from one
concept to another is better modeled through random walks rather than using
deterministic movements. This approach has been explored in human memory
[2], lexical relations [8] and Wikipedia corpus [13].
hooves
frog
antlers
mammal
hair
deer
animal
dog
bat
blood
robin
bird
livingthing
antlers
deer
dog
chicken
hooves
hair
animal
frog
chicken
leaves
tree
mammal
bird
livingthing
blood
feathers
cottonwood
tree
bat
red
robin
red
rose
feathers
flower
plant
color
daisy
green
cottonwood
leaves
color
plant
green
flower
rose
daisy
{ livingthing } – { mammal }
{ red, livingthing } – {mammal, plant }
k = 1
k = 2
k = 3
k = 4 { plant, red, animal, livingthing } – { mammal, plant, bird, tree }
{ bird, plant, animal } – { mammal, plant, bird }
Fig. 1: Networks built by novices (left) and experts (right) over the same set of
25 concepts. In the table, for each k it is shown the most central set of k concepts
of the novice (left) and the expert (right) networks.
Let us consider the examples shown in Fig. 1. Schvaneveldt and social sci-
entists [15] made a study of the process of construction of semantic networks.
They chose 25 natural concepts and devised a method to allow communities to
establish semantic relationships among them. The networks were built using two
different communities: on the left by novices (psychology students) and on the
right by domain experts (biologists). What are the most central concepts here?
First, let us point that the four centrality measures mentioned previously, show
remarkable similarity in their outputs (these measures do not consider labels,
only the structure of the graph). On the novices’ network, the four measures
1 Degree centrality selects the node with higher degree; closeness indicates the node
that minimizes the distance from all other nodes in the network to it; Betweenness
selects the node over which pass the higher number of shortest paths between each
pair of nodes. We will define them formally in Section 3.
indicate “livingthing”. As for the biologists’ network they indicate “mammal”.2
Also, the four of them behaved remarkable similar when searching for central
groups of different sizes, as shown in Fig. 1.
What do these examples tell? First of all, they give insights on the possi-
ble relevance and use that group centrality could have for semantic networks.
The contribution of this paper is a study of the assumptions that lie under this
optimistically/naive hypothesis, that is, an analysis of the strengths and oppor-
tunities and weaknesses and obstacles (known as SWOT analysis) of applying
this idea to semantic networks. (In the related work section we will go over the
work that has been done on ranking semantic networks, that touches some facets
of this problem).
The concrete contributions of this paper are:
1. Complexity analysis. We show that for the four previously mentioned cen-
trality measures, the problem of finding a set with optimal centrality score
is NP-hard (and its associated decision problem is NP-complete).
2. We present a small-scale study of samples of semantic networks –because
of the hardness of the computations and the difficulties to get a human
evaluation of what is “central” in a huge network, a challenge by itself– to
show tendencies and illustrate the potential and robustness of the idea of
group centrality.
3. We develop the notion of random-walk centrality, and prove several theoret-
ical properties for it. In particular, we show that testing random-walk group
centrality can be done in polynomial time.
The paper is organized as follows. In Section 2 we present the main arguments
of the SWOT analysis and related work on the subject. In Section 3 we show
the study of samples of some real semantic networks. In section 4 we include the
proofs and support for the theoretical arguments and in section 5 we present the
conclusions.
2 Group Centrality in Social Networks
Let us begin by stating formally the notions to be studied.
Basic graph notions. An undirected and simple graph is a pair G = (V, E) where
E ⊆ [V ]2, and [V ]2 is the set of all 2-elements subsets from V . The elements of
V are the vertices of G, and the ones from E are its edges. When necessary, we
will use the notation V (G) and E(G) for those sets. From now on, an element
{u, v} ∈ E will be denoted simply by uv.
A vertex u is said to be a neighbor of another vertex v, when uv ∈ E. Note
that the definition of E implies that v is also a neighbor of u. The set of neighbors
of v will be denoted by NG(v). The degree of v, dG(v) is the size of NG(v).
2 In the experiments, the biologists were asked separately to tell the most represen-
tative concept in the list, and they chose “mammal”.
A graph Pn =(cid:0){v0, v1, ..., vn},{v0v1, v1v2, ..., vn−1vn}(cid:1) with n ≥ 0, where all
vi are distinct is called a path, and the number of edges in it is its length. A cycle
is a special type of path such that v0 = vn. A path Pn in G, with n ≥ 1 such
that v0 = u and vn = v, is called a u-v path. Also G is said to be connected if
for all distinct u, v ∈ V a u-v path exists in G. A connected component of G is
a maximally connected subgraph H.
length of the shortest u-v path in G. For S ⊆ V , d(u, S) := minv∈S d(u, v).
The distance between u and v (cid:0)denoted by dG(u, v) or just d(u, v)(cid:1) is the
In what follows, all our graphs will considered to be simple, undirected and
connected.
Group Centrality The centrality measures that we study were designed to work
with single vertices [6] rather than groups of them, thus we use their natural
extension to sets as proposed in [5].
Let G = (V, E) be a graph and S ⊂ V . We denote by Cj(S) for j ∈ {d, c, bc}
the group centrality according to the centrality measure Cj.
Group degree centrality Cd(S) counts the number of vertices not in S that
are connected to some vertex in S. Multiple ties to the same vertex are counted
only once. Group closeness Cc(S) studies the value of the sum of the distances
from S to all vertices not in it. Note that for group degree, the higher the value
of Cd(S), the more central the set is. Whereas for group closeness the reciprocate
holds. Formally, they are defined as follows:
Cd(S) =
{v ∈ V \ S, N (v) ∩ S (cid:54)= φ}
V \ S
,
Cc(S) =
v∈V \S d(v, S)
V \ S
.
(cid:80)
(cid:88)
u<v
u,v /∈S
Group betweenness centrality Cbc(S) indicates the proportion of geodesics
connecting pairs of vertices (that are not in S), that pass through S
Cbc(S) =
2BC(S)
V \ S(V \ S − 1)
, with BC(S) =
σuv(S)
σuv
,
where σuv is the total number of shortest paths from u to v and σuv(S) is the
number of those paths that pass through S. As for group degree, the higher the
value of Cbc, the better.
2.1 Random Walk Centrality
Random Walks The next definitions come from the work of Lov´asz in random
walk theory [10]. Let G = (V, E) be a graph such that V = n and E = m,
where n, m ∈ N. Formally, a random walk is a sequence of vertices obtained as
follows: it starts at a vertex v0, and if at the t-th step it is at a vertex vt = u, it
moves to a neighbor v of u with probability puv = 1/d(u).
Let S ⊆ V . The hitting time for a set H(u, S) is the expected number of
steps that a random walk starting at vertex u takes to reach some vertex in S
for the first time. When S = {v} is a singleton, we will simply write H(u, v).
One of the issues that all three measures of group centrality (presented on
2.1) have in common, is that they only take into consideration shortest paths
between pairs of vertices. A semantic network represents relations between con-
cepts, motivated by an specific context. Should that context change, new and
more direct connections may arise. In that regard, as much connections as pos-
sible should be taken into consideration, which is precisely what random walk
centrality attempts to do.
Definition 1 (Random Walk Centrality). The random walk centrality of
S ⊂ V is
(cid:80)
v∈V \S H(v, S)
V \ S
h(cid:46)(S) =
.
Essentially random walk centrality is a variation of closeness that takes into
consideration all ways to reach S from a vertex v, rather than only through the
shortest path. As for group closeness, the lower the value of h(cid:46)(S), the more
central the set is.
2.2 The arguments for the SWOT analysis
Let us state them in general terms the arguments of the SWOT analysis.
Obstacles: weaknesses and threats. First of all, the problem is computationally
hard; we prove that for all four measures considered it is NP-hard:
Theorem 2. The problem of finding an optimal solution S of size k, is an NP-
hard problem for each of the four group centrality measures studied in this paper
(that is, for C ∈ {Cd, Cc, Cbc, h(cid:46)}) .
This theorem points to the difficulties of applying the notion to big data (and
in this paper for experimenting with it) and gives a first program of research on
this problem: to develop good approximate algorithms for it.
Second, there is a difficulty associated to experimenting with big data due to
the lack of good benchmarks and semantically “marked” data, that is, networks
for which we have a clear agreement on what are their most central concepts at
different granularities (i.e. the size of an optimum candidate). This is a challenge
by itself (the scope of human physical abilities) and that is the reason why we
use small (human-scale) datasets in this paper.
Third, the quality of data. It turns out that the output of the centrality and
group centrality methods depends heavily on the “quality” of the network: in
other words, in how well it represents the semantics we are looking for. The ex-
amples we discussed on section 1 are prime cases of excellent semantic networks
(in fact, developed by psychologists based on systematic experimentation). Un-
fortunately, the semantic networks that we see in real life (for example RDF
data) are usually not as good. We will show through several sample datasets
that many of our current most popular semantic data representations (e.g. RDF
graphs) have a bias as they are mostly constructed in ad-hoc manners (union
of pieces of information scattered from different sources; without the goal of
completeness, etc).3
Strengths and Opportunities. First, the notion of group centrality seems to be
worth exploring in the quest for developing summaries, small representations or
give insight about the meaning and contents of big semantic network datasets.
We show samples of different types of networks, including stable RDF datasets
like DBpedia. The results were in all cases encouraging.
Second, the notion seems to be robust and become more stable as the size
of the optimum candidate k increases. There are indications from the sample
data we worked out and partial theoretical results (Proposition 7), that in the
long term, all measures behave in the same way as k converges to V /2 (that
is, there exists a set that is optimum for all four measures). From this we have
a second line of research: to develop concluding analytical and real data studies
that can support this conjecture.
Third, the notion of random walk shows in general less variance than other
measures, i.e. gives more “unique” solutions for k > 0. This virtue and the fact
that this measure systematically gives solutions that have elements in common
with those obtained through the use of other measures, are good signals of its
significance. If we link this observation to the fact that its theoretical basis
(the notion of random walk) has been successfully used in semantic networks
(see Related Work section) there is good ground to make it a candidate for
systematic study at the theoretical and experimental level.
2.3 Related Work
Random Walks and Semantic Networks. The motivation to address random walk
centrality comes from works that have used the notion of random walks and re-
lated it with semantics. The work of Abbott et al. [2] compares the functioning
of the human mind when searching for memories with a random walk in a se-
mantic network, as both present a similar behavior. They conclude that these
results can help clarify the possible mechanisms that could account for PageR-
ank predicting the prominence of words in semantic memory. Yeh et al. [13]
use random walks to determine the semantic relatedness of two elements. In
particular, they use a personalized PageRank algorithm with a custom teleport
vector. They conclude that random walk combined with personalized PageRank
is a feasible and potentially fruitful mean of computing semantic relatedness for
words and texts. Hughes et al. [8] introduce a new measure of lexical relatedness
based on the divergence of the stationary distributions computed using random
3 We are well aware of the complexities of determining in a network of concepts which
one is more relevant. This relies on the underlying semantics of the notions involved,
on the domain from which they are taken from, on the goals that the people that
built the network had, and finally, on the quality of the network itself. Probably due
to all of the above, today we do not have standard, nor good benchmark data for
these tasks.
walks over graphs extracted from WordNet. All these works have been valuable
sources of inspiration for our method.
Relevance and quality ranking in the Semantic Web. As our motivation of
studying group centrality points to its use in the area of relevance in Semantic
data, below we discuss some related work made on it. Graves et al.[7] propose
a graph-theoretic measure called noc-order for ranking nodes in RDF graphs.
They base their ranking in a variation of closeness centrality, which measures
how costly is to reach all the nodes in the graph from one specific vertex. Note
that this idea does not use the concept of expected length (via random walks).
Zhang et al. [14] address the problem of summarizing RDF graphs using an
RDF sentence as the atomic unit. They focus in ranking the RDF sentences to
get a summary of the ontology and base their method in centrality measures
such as degree-, eigenvector-, or betweenness-centrality. Cheng et al. [3] address
the problem of ranking features of an entity in a semantic graph. Their method
relies on centrality notions enhanced with the information captured by labels.
The topics of these works is related to our work, though we focus in finding
central elements in the graph as a whole, while they do it in summarizing en-
tities/ontologies; also they do not present a conceptual notion of key elements,
rely only on experimental evaluations and do not address group centrality. Ding
et al. [4] address ranking of semantic objects on the Web. They concentrate on
documents, terms and RDF graphs as a whole. For terms, they use popularity
measures essentially based on use and population, weighted by some parameters
of the dataset (occurrences, etc.). Supekar et al. [12] address the problem of
quality of ontologies. They characterize ontological features to calculate a score
in order to determine the quality of the ontology. They characterize features like
how well the ontology reflects the domain of interest, correctness of the ontology
with respect to the domain of discourse, how easy the ontology is to understand
or the depth and width of the ontology. These last two papers deal with ranking
of ontologies as such, but do not address the problem of finding a set of relevant
concepts/nodes in RDF graphs, nor present any conceptual framework to define
them.
3 Group Centrality on Semantic Network Data
We are interested on knowing what the group centrality approach applied to
semantic networks has to offer. In order to do this, we apply group degree,
closeness, betweenness, and random walk centrality notions to semantic networks
data and study their behavior. As was stated on section 2, we restrict our analysis
to small networks for two reasons: finding a set with optimal value for an specific
centrality measure is NP-hard; and small networks (human scale) allow to get
an insight about which concepts these group centralities select and how those
selections differ from each other.
3.1 Datasets
Networks of natural concepts [15]. This is the dataset we presented in the
introduction. There we showed two networks built, respectively, by a group of
undergraduate psychology and by graduate biologist. Additionally, we show here
two other networks. A group of students from introductory psychology courses
were asked to rate the degree of relatedness of all pairwise combinations of 25
natural concepts. Using this information the authors constructed two networks,
according to two different thresholds of concept relatedness.
Perception: semantic network of common sense [16]. This network stores
knowledge about what things look and feel like. It has about 9, 000 manually
annotated relations between 4, 000 mundane concepts, e.g, cat, house, snow, etc.
DBpedia Categories [1]. This dataset covers all the Wikipedia article cate-
gories and how they are related using the SKOS vocabulary. The network covers
1, 130, 342 categories with 2, 308, 585 relations between them.
Roget’s Thesaurus This is a widely used English-language thesaurus that
contains more than 15, 000 words. This network was been used in works studying
semantic similarity and sense disambiguation, among others.
For each of the last 3 networks we extracted samples of 40 nodes using
random-walk sampling according to Leskovec and Faloutsos [?] until 40 different
nodes were visited and then we extracted the induced subgraph. Here we show
two such samples for each dataset.
{11}
closeness
degree
{11}
{4, 11}
{4, 11, 13} , {0, 11,
n
1
{2, 13} , {4, 11}
2
{0, 11, 13} , {4, 11,
3
4 {2, 4, 11, 13} , ... (23) {2, 4, 11, 13} , ... (5)]
{0, 11, 13}
{2, 4, 11, 13}
Table 1: Solutions for group centrality on Proximity Semantic Network 1.
{4, 11, 13}
{2, 4, 11, 13}
{11}
{4, 11}
{11}
{4, 11}
13} , ... (9)
13} , ... (4)
random-walk
betweenness
degree
{11}
{0, 11}
n
1
2
3
4 {2, 4, 13, 21} , ... (16)
closeness
{11}
{2, 11} , ... (2)
{2, 13, 21}
{2, 4, 13, 21}
{2, 13, 21} , ... (8)
{2, 13, 21}
{2, 4, 13, 21}
Table 2: Solutions for group centrality on Proximity Semantic Network 2.
{2, 11, 13, 21}
{2, 11, 13}
betweenness
{11}
{2, 11}
random-walk
{11}
{2, 11}
closeness
{6}
betweenness
{6} , {17}
degree
{0, 6}
{0, 6} , {10, 17}
{3, 13, 17} , {3, 10,
n
1
2
3
4 {0, 6, 10, 17} , ... (18) {0, 6, 10, 17} , ... (6)
Table 3: Solutions for group centrality on Proximity Semantic Network con-
structed by non-biologist students.
{3, 10, 17}
{0, 6, 10, 17}
{0, 13, 17}
{0, 6, 10, 17}
17}, ... (10)
{3, 10, 17}
{6}
{0, 6}
{17}
{0, 6}
random-walk
n
1
2
3 {3, 12, 19}, {3, 12, 21} {3, 12, 21}, {3, 12, 22}
closeness
{12}
{3, 12}
degree
{12}
{3, 12}
4
{3, 12, 19, 23}
{3, 12, 22}, {3, 12, 23}
{3, 12, 22}
{3, 12, 15, 19}, {3, 12, 15, 21} {3, 5, 12, 22}
Table 4: Solutions for group centrality on Proximity Semantic Network con-
structed by biologist students.
{3, 12, 19}, {3, 12, 21}
{3, 12, 19, 23}
{3, 12, 23}
betweenness
{12}
{3, 12}
random-walk
{12}
{3, 12}
degree
{4} , {20}
{4, 20}
n
1
2
{4, 18, 20}
3
4 {4, 6, 18, 20} , {0, 4, 6, 20} {0, 4, 6, 20} {4, 6, 7, 20} {4, 6, 18, 20}
Table 5: Solutions for group centrality on DBpedia sample 1.
closeness
{4, 20}
{0, 4, 20}
{20}
{4, 20}
{4, 7, 20}
{4, 6, 20} , {6, 7, 20}
random-walk
{4, 20}
betweenness
{4}
{4}
degree
{13}
n
1
2 {0, 13} , {1, 13} , ... (2)
3
4
{0, 1, 13} , ... (4)
{0, 1, 3, 13} , ... (1)
betweenness random-walk
closeness
{13}
{12, 13}
{1, 13}
{0, 1, 13}
{0, 1, 13}
{0, 1, 3, 13} {0, 1, 3, 13} {0, 1, 3, 13}
{13}
{0, 13}
{0, 1, 13}
{13}
Table 6: Solutions for group centrality on DBpedia sample 2.
degree
{25}
{14, 25}
n
1
2
3
4 {0, 4, 14, 25} , ... (10)
{4, 14, 25} , ... (5)
closeness
{14}
{5, 14} , {7, 13} , {7, 14} , {8, 13}
{4, 14, 25} , ... (4)
{1, 4, 14, 25} , ... (2)
betweenness
random-walk
{14}
{14, 25}
{4, 14, 25}
{13}
{6, 14}
{0, 6, 14}
{4, 12, 14, 25} {0, 4, 14, 25}
Table 7: Solutions for group centrality on Perception sample 1.
closeness
{29} , ... (1)
degree
{2, 29}
n
1
2
3
4 {2, 8, 29, 39} , ... (2) {2, 26, 29, 39} , ... (1) {2, 8, 10, 29} {2, 26, 29, 39}
Table 8: Solutions for group centrality on Perception sample 2.
{1}
{1, 2}
{1, 2, 8}
{0, 15, 32} , ... (7)
{2, 8, 29} , ... (3)
{29, 39}
{2, 8, 39}
{0, 15} , ... (1)
random-walk
betweenness
{29}
{15}
degree
{10}
{10, 25}
n
1
2
3
4 {10, 17, 25, 39} , ... (87) {10, 17, 25, 39} , ... (87) {10, 17, 25, 35} {10, 17, 25, 39}
Table 9: Solutions for group centrality on Roget’s Thesaurus sample 1.
closeness
{10, 25}
{10, 25, 39}
{10, 25, 35}
{10, 25, 39}
{10, 25, 39}
{25, 35}
{10, 25}
random-walk
betweenness
{35}
{10}
{35}
3.2 Discussion of results
For each semantic network, and each centrality measure, we computed the op-
timal solutions of size 1, 2, 3, and 4. The results are presented in Tables 1 to
degree
{11}
{11, 14}
{37}
{37}
n
1
2
3
4 {11, 14, 29, 37} , ... (440) {11, 14, 29, 37} , ... (440) {11, 14, 26, 37} {11, 14, 29, 37}
Table 10: Solutions for group centrality on Roget’s Thesaurus sample 2.
{11, 14, 29} , ... (6)
{1, 14, 29} , ... (6)
{37}
closeness
{14, 26}
{14, 26}
{11, 14, 29}
{26, 37}
{11, 26, 37}
betweenness
random-walk
10. It is important to note that in some cases there were multiple candidates for
optimal solution, but we only include at most two of them4 (if there are more
than two solutions, there is a mark “... (n)” where n is the number of extra
solutions) .
From the results obtained, we can advance two main observations:
Robustness of group centrality. It is noticeable that in the samples the optimal
solutions for all centrality measures become similar as the size k of the set
increases. Indeed, for groups of size 1, it can observed that there are networks
for which the solution is different, depending on the centrality notion applied
(e.g. Table 13). On the other hand, for groups of size 4, it can be observed that
in most networks there is a common set of nodes selected by all four different
measures used.
Non-ambiguity of group random-walk. As stated previously, for a given size k,
more than one optimal solution may exist for group centrality. Moreover, from
the results it can be inferred that as k increases, so does the number of optimal
candidates for certain particular measures. For example, Table 11 shows that
degree and closeness centrality have 24 (resp. 6) optimal solutions of size 4. There
is even an extreme case in Table 23, where degree and closeness have more than
400 different optimal group solutions. In a small sample of 40 nodes this variance
does not help achieve the proposed goal. However, betweenness centrality seems
to behave in general better in this matter (there is some dispersion, e.g. Table
14, but it is small). Random-walk centrality, on the other hand, is consistently
better in this regard. In our sample selections, it is the only notion for which
there is systematically a unique optimal solution for any size, and for all the
networks.
4 Theoretical aspects of Group Centrality
As we saw in previous sections, group centrality offers interesting new insights
on semantic networks. In this section we study the notion from a theoretical
point of view, focusing in the complexity of computing it.
4.1 Complexity of Group Centrality
Let us define formally the problem of computing the most central set of nodes
in a network under different centrality measures.
4 The complete results, graphs and labels of the networks can be found in the ap-
pendix.
Definition 3 (Optimumset). Given a graph G = (V, E), a positive integer k
and a function C : P(V ) → R, define optimumset(G, k, C) as the problem of
finding a set S ⊂ V , of size k such that
S ∈ arg min
U⊂V ;U=k
C(S).
For a real number α > 0, optimumset(G, k, C, α) will denote the corresponding
decision problem: find if there exists a set S ⊂ V , of size k such that C(S) = α.
Theorem 2. optimumset(G, k, C, α) is NP-complete for all four group central-
ity measures studied in this paper (that is, for C ∈ {Cd, Cc, Cbc, h(cid:46)}).
Proof. First note that it is not difficult to prove that Cd, Cc and Cbc are all com-
putable in polynomial time. Same for h(cid:46) but we will leave that demonstration
for later (see proposition 4). Thus the corresponding problems are all in NP.
Now, consider α = 1 and let Sd, Sc, Sbc and Sh(cid:46) be solutions of the corre-
sponding decision problems.
Note that Cc(Sc) = 1 (resp. Cd(Sd) = 1) if and only if Sc (resp. Sd) is a
dominating set of cardinality k in G. That is, the problem of finding a dominating
set of cardinality k in G is polynomial time reducible to optimumset(G, k, α, Cc)
and optimumset(G, k, α, Cd).
Indeed, Cc(Sc) = 1 if and only if d(v, Sc) = 1,∀v /∈ Sc, which happens if
and only if every vertex v /∈ Sc has at least one neighbor on Sc (which is also a
necessary and sufficient condition for Cd(Sd) = 1). That is, Sc (and also Sd) is
a dominating set.
On the other hand, Cbc(Sbc) = 1 (resp. Ch(cid:46) (Sh(cid:46) ) = 1) if and only if Sbc
(resp. Sh(cid:46) ) is a vertex cover of G of size k. That is, the problem of finding a vertex
cover of G of size k is polynomial time reducible to optimumset(G, k, α, Ch(cid:46) )
and optimumset(G, k, α, Cbc).
Indeed, Cbc(Sbc) = 1 if and only if σuv(Sbc) = σuv,∀u, v /∈ Sbc with u < v,
which occurs if and only if for every pair ∀u, v /∈ Sbc with u < v, all shortest
paths that connect u and v have some vertex in Sbc. This is equivalent to having
N (v) ⊆ Sbc for all v ∈ Sbc. That is, Sbc is a vertex cover of G.
Finally, Ch(cid:46) (Sh(cid:46)) = 1 if and only if h(v, Sh(cid:46)) = 1,∀v /∈ Sh(cid:46) , but h(v, Sh(cid:46)) =
1 occurs if and only if N (v) ⊂ S,∀v /∈ Sh(cid:46) . That is, Sh(cid:46) is a vertex cover of G.(cid:117)(cid:116)
4.2 Properties of Random Walk Centrality
the transition probabilities for puv = ω(uv)/ω(u), with ω(u) =(cid:80)
Given a graph G = (V, E), we can generalize the notion of random walk to the
case where there is a weight function ω : E → R on the edges of G, by changing
w∈N (u) ω(uw)
(thus the case ω ≡ 1 gives the original definition of random walk).
Note that the sequence of random vertices (vt : t = 0, 1, ...) is a Markov
chain. Let Pt will denote the distribution of vt: Pt(v) = P(vt = v). The vertex
v0 may be fixed, but may also be drawn from an initial distribution P0. This
easily proved that the distribution π(v) := ω(v)/(cid:80)
initial distribution is said to be stationary if P1 = P0 (which will imply that
Pt = P0 ∀t ≥ 0, because of the construction of the random walk). It can be
v∈V ω(w) is stationary for
every graph G and weight function ω. From now on π will be referred simply as
the stationary distribution (it is not difficult to prove that this distribution is
unique, which makes this reference valid).
Proposition 4. Given G = (V, E), a weight function ω : E → R, a subset
S ⊂ V and v ∈ V , then h(v, S) and h(cid:46)(S) can be computed in polynomial time.
For the proof, first we need the following result
Lemma 5. For a graph G = (V, E), a weight function ω and S ⊆ V define GS
as the following weighted graph:
V (GS) = (V \ S) ∪ {vS}
E(GS) = {e ∈ E/e ∩ S = φ} ∪ {e = uvS/u ∈ V, NG(u) ∩ S (cid:54)= φ}
and ωS : E(GS) −→ N defined as: ωS(uv) = ω(uv) if uv ∩ S = ∅. Otherwise,
i.e. if v = vS, then ωS(uv) = (cid:80)
ω(uw).
Then for u ∈ V \ S we have that HG(u, S) = HGS (u, vS).
w∈NG(u)∩S
Proof. For a vertex w ∈ V \ S, let Tw,S and Tw,vS be two random variables
that count the number of steps that a random walk (on G and GS respectively)
starting at vertex w takes in order to reach some vertex of S and vS (respectively)
for the first time. We will prove that Tu,S and Tu,vS have the same distribution.
Let us proceed by induction on the possible values of Tu,S and Tu,vS .
If n = 1 then
(cid:80)
P(Tu,S = 1) =
w∈NG(u)∩S
ω(u)
=
ωS(uvS)
ωS(u)
= P(Tu,vS = 1).
ω(uw)
Let n > 1 and assume that the property holds for n − 1. Then
ω(uw)
ω(u)
ω(uw)
ω(u)
P(Tw,S = n − 1)
P(Tw,vS = n − 1)
P(Tu,S = n) =
=
=
=
w∈V \S
(cid:88)
(cid:88)
(cid:88)
(cid:88)
w∈V \S
w∈V (GS )\vS
w∈V (GS )\vS
ω(uw)
ω(u)
(Tw,vS = n − 1)
ωS(uw)
ωS(u)
P(Tw,vS = n − 1) = P(Tu,vS = n).
Using this we have that HG(u, S) = E(Tu,S) = E(Tu,vS ) = HGS (u, vS).
(cid:117)(cid:116)
Proof (of proposition 5). Let P be the probability transition matrix associated
to a random walk on G, and the function ω. That is, Pij = ω(ij)
ω(i) . Define P∞ as
.
π(1) π(2) . . . π(n)
...
...
π(1) π(2) . . . π(n)
. . .
...
P∞ =
where π is the stationary distribution. Define also Z := (I − (P − P∞))−1 and
let H be the hitting time matrix of G, that is, Hij = HG(i, j). Then it can be
proved as stated in [17] that for i, j ∈ V
HG(i, j) =
Zjj − Zij
π(j)
.
(1)
Therefore, by combining equation (1) and lemma 5 we can compute h(v, S)
(cid:117)(cid:116)
by inverting a suitable matrix Z, which can be made in polynomial time.
Lemma 6. There is a parameterized family of graphs for which Random walk
centrality behaves systematically differently than degree, closeness and between-
ness group centrality.
Proof. Consider {Gm
n }, with n, m ∈ Z+ and n << m a family of graphs con-
structed as follows (see Fig. 2): for i ∈ {1, ..., m − 1}, K i
n is a subgraph of Gm
n
that is a n-clique and that is connected to v through an unique vertex ki
n. On
n of height 1 and size n with root tn
the other hand, T i
i the
only vertex in T i
n . Suppose we want to find a set
n , m + 1, C) for C ∈ {Cd, Cc, Cbc, h(cid:46)}. It is not
S that solves optimumset(Gm
difficult to prove that for group closeness and betweenness centrality the sets
n } are solutions. For group degree
SK = {v, k1
n, ..., km
n } for any 1 ≤ j ≤ m
centrality ¯SK = {tj
are possible solutions. However, one could argue the difference in connectivity
between sets SK and ST should be accounted for. Indeed, for random walk cen-
(cid:117)(cid:116)
trality, Sk (a more connected version of St) is the only solution.
n } and ST = {v, t1
n, k1
n that is neighbor of v in Gm
n } and ¯ST = {kj
n is a subtree of Gm
n, t1
n, ..., tm
n, ..., km
n, ..., tm
The following bound shows an interesting relation between random walk
centrality, degree and closeness
Proposition 7. There exists a real constant c > 0 such that for S ⊂ V
(cid:88)
v∈V \S
≤ cV \ S3.
d(u, S)
d(v)
(cid:88)
u∈V \S
h(cid:46)(S) ≤
1
V \ S
Proof. Define ∂(S) := {v ∈ S : ∃u ∈ V \ S, uv ∈ E}. Define the subgraph GS
of G as follows: V (GS) := (V \ S) ∪ ∂(S) and E(GS) := {uv ∈ E : u, v ∈
V (GS) ∧ u ∈ V \ S}.
First note that for any pair of vertices u ∈ V \ S and v ∈ ∂(S)
HG(u, S) = HGS (u, ∂(S)) ≤ HGS (u, v).
K 1
n
K 2
n
. . .
Km−1
n
Km
n
v
. . .
T 1
n
T 2
n
T m−1
n
T m
n
Fig. 2: Which set of size m + 1 is more central? SK or ST ?
The equality follows from the fact that the subgraph traversed and the target
hit in both expressions are the same, and the inequality holds because the target
of the expression on the right is more difficult to hit, thus needs more walking
around.
Using this, we have that
(cid:80)
(cid:80)
h(cid:46)(S) =
u∈V \S HG(u, S)
V \ S
≤
u∈V \S HGS (u, vu)
V \ S
,
with each vu ∈ ∂(S) chosen such that dGS (u, vu) = dG(u, S).
pair of vertices u, v ∈ V (L), HL(u, v) ≤ 2E(L)dL(u, v), we have that
On the other hand, by using the known fact that for any graph L and any
(cid:80)
u∈V \S 2E(GS)dGS (u, vu)
(cid:80)
u∈V \S HGS (u, v)
V \ S
≤
≤
1
V \ S
V \ S
(cid:88)
u∈V \S
dG(u, S)
(cid:88)
. (cid:117)(cid:116)
dG(v)
v∈V \S
5 Conclusions
We perform a SWOT analysis of the application of the notion of group centrality
to semantic networks, putting a particular focus on random walk group central-
ity. The challenges faced were mainly of two types. First, the ambiguity of the
very notion of the “most central” concept in a semantic network; and second,
the size of the networks.
In spite of these obstacles (that we discussed in the paper), we hope we
presented enough evidence that this topic deserves to be explored and researched.
We approached these obstacles by working with small samples and advancing
theoretical results. Besides stating the problem at the formal level, we proved
that the problem of computing group centrality is NP-hard, and showed that
random walk centrality comes up as a good candidate for capturing the notion
of centrality on semantic networks.
The above opens at least two lines of research on this topic: First, to find good
approximation algorithms to compute group centrality particularly for random
walk centrality. Second, the task of building a good benchmark of big seman-
tic networks together with their candidate sets to match the most important
concepts in the network.
References
1. DBpedia. http://www.dbpedia.org.
2. J. Abbott, J. Austerweil, T. Griffiths. Human memory search as a random walk
in a semantic network. Adv. Neur. Inf. Proc. Syst. 25, 3050-58, 2012.
3. G. Cheng, Th. Tran, Y. Qu. RELIN: Relatedness and Informativeness-based Cen-
trality for Entity Summarization. ISWC 2011, Springer 2011.
4. L. Ding, R. Pan, T. Finin, A. Joshi, Y. Peng, P. Kolari. Finding and ranking
knowledge on the semantic web. In ISWC 2005, 156–170. Springer, 2005.
5. M. G. Everett, S. P. Borgatti. The centrality of groups and classes. Journal of
Mathematical Sociology. 23(3): 181-201.
6. L. C. Freeman. Centrality in Social Networks. Conceptual Clarification. Social
Networks, 1 (1978/79) 215-239.
7. A. Graves, S. Adali. A method to rank nodes in an rdf graph. 7th. ISWC, 2008.
8. T. Hughes, D. Ramage. Lexical semantic relatedness with random graph walks.
2007 J. Conf. on Emp. Meth. in NLP and Comp. Nat. Lang. Learning, 581-589.
9. Jure Leskovec and Christos Faloutsos. Sampling from large graphs. Proc. 12th
ACM KDD ’06, pages 631–636.
10. L. Lov´asz Random Walks on Graphs; A Survey. Bolyai Soc., Math. Studies 2,
1993, pp. 1-46.
11. Mark EJ Newman. The structure and function of complex networks. SIAM review,
45(2):167–256, 2003.
12. K. Supekar, Ch. Patel, Y. Lee. Characterizing quality of knowledge on semantic
web. AAAI Florida AI Research Symp. (FLAIRS-2004), 17–19, 2004.
13. E. Yeh, D. Ramage, Ch. D. Manning, E. Agirre, A. Soroa. Wikiwalk: random walks
on wikipedia for semantic relatedness. 2009 Workshop on Graph-based Meth. for
NLP, 41–49, Stroudsburg, PA, USA, 2009.
14. X. Zhang, G. Cheng, Y. Qu. Ontology summarization based on rdf sentence graph.
16th Intl. Conf. on World Wide Web, 707–716. ACM, 2007.
15. R. Schvaneveldt, F. Durso, and D. Dearholt. Network structures in proximity data.
The psychology of learning and motivation, 1989, pages 249–284.
16. T. De Smedt, F. De Bleser, V. Van Asch, L. Nijs, W. Daelemans. Gravital: natural
language processing for computer graphics. Creativity and the Agile Mind: A Multi-
Disciplinary Study of a Multi-Faceted Phenomenon, 2013, pages 81
17. Howard Levinson An Eigenvalue Representation for Random Walk Hitting Times
and its Application to the Rook Graph.
18. S. Wasserman, K. Faust. Social Netowrk Analysis: Methods and Applications
(Structural Analysis in the Social Sciences). Cambridge Univ. Press, 1994.
A Appendix
Fig. 3: Proximity Semantic Network 1.
Proximity Semantic Network 1 Labels:
– 0.- animal
– 1.- antlers
– 2.- bat
– 3.- bird
– 4.- blood
– 5.- chicken
– 6.- color
– 7.- cottonwood
– 8.- daisy
– 9.- deer
– 10.- dog
– 11.- feathers
– 12.- flower
– 13.- frog
– 14.- green
– 15.- hair
– 16.- hooves
– 17.- leaves
– 18.- livingthing
– 19.- mammal
– 20.- plant
– 21.- red
– 22.- robin
– 23.- rose
– 24.- tree
degree
{11}
{4, 11}
n
1
{2, 13} , {4, 11}
2
{0, 11, 13} , {4, 11,
3
4 {2, 4, 11, 13} , ... (23) {2, 4, 11, 13} , ... (5)]
{4, 11, 13} , {0, 11,
13} , ... (9)
13} , ... (4)
closeness
{11}
betweenness
{11}
{4, 11}
{4, 11, 13}
{2, 4, 11, 13}
random-walk
{11}
{4, 11}
{0, 11, 13}
{2, 4, 11, 13}
Table 11: Solutions for group centrality on Proximity Semantic Network 1.
Fig. 4: Proximity Semantic Network 2.
Proximity Semantic Network 2 Labels:
– 0.- animal
– 1.- antlers
– 2.- bat
– 3.- bird
– 4.- blood
– 5.- chicken
– 6.- color
– 7.- cottonwood
– 8.- daisy
– 9.- deer
– 10.- dog
– 11.- feathers
– 12.- flower
– 13.- frog
– 14.- green
– 15.- hair
– 16.- hooves
– 17.- leaves
– 18.- livingthing
– 19.- mammal
– 20.- plant
– 21.- red
– 22.- robin
– 23.- rose
– 24.- tree
degree
{11}
{0, 11}
closeness
{11}
n
1
2
3
4 {2, 4, 13, 21} , ... (16)
Table 12: Solutions for group centrality on Proximity Semantic Network 2.
{2, 11} , ... (2)
{2, 13, 21}
{2, 4, 13, 21}
{2, 13, 21}
{2, 4, 13, 21}
{2, 11, 13}
{2, 11, 13, 21}
{2, 13, 21} , ... (8)
betweenness
{11}
{2, 11}
random-walk
{11}
{2, 11}
Fig. 5: Proximity network built by non-specialists.
Proximity network built by non-specialists labels:
– 0.- animal
– 1.- antlers
– 2.- bat
– 3.- bird
– 4.- blood
– 5.- chicken
– 6.- color
– 7.- cottonwood
– 8.- daisy
– 9.- deer
– 10.- dog
– 11.- feathers
– 12.- flower
– 13.- frog
– 14.- green
– 15.- hair
– 16.- hooves
– 17.- leaves
– 18.- livingthing
– 19.- mammal
– 20.- plant
– 21.- red
– 22.- robin
– 23.- rose
– 24.- tree
closeness
{6}
{3, 13, 17} , {3, 10,
17}, ... (10)
{6} , {17}
degree
{0, 6}
n
1
2
3
4 {0, 6, 10, 17} , ... (18) {0, 6, 10, 17} , ... (6)
Table 13: Solutions for group centrality on Proximity Semantic Network con-
structed by non-biologist students.
{3, 10, 17}
{0, 6, 10, 17}
{0, 13, 17}
{0, 6, 10, 17}
{0, 6} , {10, 17}
{3, 10, 17}
betweenness
{17}
{0, 6}
random-walk
{6}
{0, 6}
Fig. 6: Proximity network built by biologists.
Proximity network built by biologists labels:
– 0.- animal
– 1.- antlers
– 2.- bat
– 3.- bird
– 4.- blood
– 5.- chicken
– 6.- color
– 7.- cottonwood
– 8.- daisy
– 9.- deer
– 10.- dog
– 11.- feathers
– 12.- flower
– 13.- frog
– 14.- green
– 15.- hair
– 16.- hooves
– 17.- leaves
– 18.- livingthing
– 19.- mammal
– 20.- plant
– 21.- red
– 22.- robin
– 23.- rose
– 24.- tree
n
1
2
3 {3, 12, 19}, {3, 12, 21} {3, 12, 21}, {3, 12, 22}
closeness
{12}
{3, 12}
degree
{12}
{3, 12}
betweenness
{12}
{3, 12}
random-walk
{12}
{3, 12}
4
{3, 12, 19, 23}
{3, 12, 22}, {3, 12, 23}
{3, 12, 22}
{3, 12, 15, 19}, {3, 12, 15, 21} {3, 5, 12, 22}
Table 14: Solutions for group centrality on Proximity Semantic Network con-
structed by biologist students.
{3, 12, 19}, {3, 12, 21}
{3, 12, 19, 23}
{3, 12, 23}
Fig. 7: Sample 1 from Perception Network.
Sample 1 from Perception network labels:
– 0.- Akzidenz-Grotesk
– 1.- Christmas
– 2.- December
– 3.- Frutiger
– 4.- Helvetica
– 5.- Orient Express
– 6.- Trade Gothic
– 7.- amusement park
– 8.- carousel
– 9.- chameleon
– 10.- colorful
– 11.- consciousness
– 12.- deep
– 13.- diverse
– 14.- exotic
– 15.- grotesque
– 16.- heat
– 17.- hot
– 18.- interesting
– 19.- locomotive
– 20.- loud
– 21.- merry-go-round
– 22.- mill
– 23.- miracle
– 24.- mirror
– 25.- mysterious
– 26.- narrow
– 27.- repetitive
– 28.- roller coaster
– 29.- sans
– 30.- sans serif
– 31.- season
– 32.- sensational
– 33.- steam
– 34.- summer
– 35.- telescope
– 36.- turkey
– 37.- uniform
– 38.- waltz
– 39.- winter
degree
{25}
{14, 25}
n
1
2
3
4 {0, 4, 14, 25} , ... (10)
{4, 14, 25} , ... (5)
closeness
{14}
{5, 14} , {7, 13} , {7, 14} , {8, 13}
{4, 14, 25} , ... (4)
{1, 4, 14, 25} , ... (2)
{14}
{14, 25}
{4, 14, 25}
{13}
{6, 14}
{0, 6, 14}
betweenness
random-walk
{4, 12, 14, 25} {0, 4, 14, 25}
Table 15: Solutions for group centrality on Perception sample 1.
Fig. 8: Sample 2 from Perception Network.
Sample 2 from Perception network labels:
– 0.- New Age
– 1.- anger
– 2.- astrology
– 3.- baby
– 4.- bad
– 5.- calm
– 6.- cathedral
– 7.- child
– 8.- cirrus
– 9.- cold
– 10.- comedy
– 11.- competition
– 12.- dangerous
– 13.- dark
– 14.- deep
– 15.- evolution
– 16.- food
– 17.- fuzzy
– 18.- gene
– 19.- joke
– 20.- kid
– 21.- laugh
– 22.- light
– 23.- loiter
– 24.- negative
– 25.- old
– 26.- ominous
– 27.- park
– 28.- pillar
– 29.- playground
– 30.- reproduction
– 31.- safe
– 32.- shop
– 33.- silent
– 34.- sleep
– 35.- sly
– 36.- supermarket
– 37.- territory
– 38.- valley
– 39.- wicked
{29} , ... (1)
degree
{2, 29}
n
1
2
3
4 {2, 8, 29, 39} , ... (2) {2, 26, 29, 39} , ... (1) {2, 8, 10, 29} {2, 26, 29, 39}
Table 16: Solutions for group centrality on Perception sample 2.
{1}
{1, 2}
{1, 2, 8}
{0, 15, 32} , ... (7)
{2, 8, 29} , ... (3)
betweenness
random-walk
{29}
{29, 39}
{2, 8, 39}
closeness
{15}
{0, 15} , ... (1)
Sample 3 from Perception network labels:
– 0.- Duomo di Milano
– 1.- Middle Ages
– 2.- Milan Cathedral
– 3.- arch
– 4.- black
– 5.- boot
– 6.- calm
– 7.- cathedral
– 8.- dark
– 9.- grassland
– 10.- horse
– 11.- landscape
– 12.- marble
– 13.- mosque
– 14.- pillar
– 15.- prairie
– 16.- smooth
– 17.- soldier
– 18.- stallion
– 19.- veldt
Fig. 9: Sample 3 from Perception Network.
degree
{11}
{4, 11}
n
1
2
3 {0, 11, 13} , {4, 11, 13} , ... (9) {0, 11, 13} , {4, 11, 13} , ... (4) {4, 11, 13}
4
{2, 4, 11, 13} , ... (23)
Table 17: Solutions for group centrality on Perception sample 3.
{2, 4, 11, 13} , ... (5)
{2, 13} , {4, 11}
closeness
{11}
betweenness
random-walk
{11}
{4, 11}
{11}
{4, 11}
{0, 11, 13}
{2, 4, 11, 13} {2, 4, 11, 13}
Fig. 10: Sample 1 from DBpedia Categories network.
Sample 1 from DBpedia Categories network labels:
– 0.- 1996 films
– 1.- 1990s films
– 2.- 2000s in animation
– 3.- Decades in animation
– 4.- 1990s in animation
– 5.- 1910s in animation
– 6.- 1990s animated films
– 7.- Years in animation
– 8.- 1964 anime
– 9.- 1965 anime
– 10.- 1969 anime
– 11.- 1990 anime
– 12.- 1990 in animation
– 13.- 1993 anime
– 14.- 1993 in animation
– 15.- 1994 anime
– 16.- 1994 in animation
– 17.- 1996 anime
– 18.- 1996 in animation
– 19.- 1998 in animation
– 20.- Anime films by year
– 21.- 1990 anime films
– 22.- 1990s anime films
– 23.- 1996 anime films
– 24.- 1981 anime films
– 25.- 1960s anime films
– 26.- 1998 animated films
– 27.- 1996 animated films
– 28.- 1994 animated films
– 29.- 1993 animated films
– 30.- 1990 animated films
– 31.- 1965 anime films
– 32.- 1969 anime films
– 33.- 1945 anime films
– 34.- 1945 anime
– 35.- 1990s American animated films
– 36.- 1990s animated short films
– 37.- Tamil films of 1996
– 38.- 1964 anime films
– 39.- 1990s computer-animated films
degree
{4} , {20}
{4, 20}
n
1
2
{4, 18, 20}
3
4 {4, 6, 18, 20} , {0, 4, 6, 20} {0, 4, 6, 20} {4, 6, 7, 20} {4, 6, 18, 20}
closeness
{4, 20}
{0, 4, 20}
{20}
{4, 20}
{4, 7, 20}
{4, 6, 20} , {6, 7, 20}
{4}
betweenness
random-walk
{4}
{4, 20}
Table 18: Solutions for group centrality on DBpedia sample 1.
Fig. 11: Sample 2 from DBpedia Categories network.
Sample 2 from DBpedia Categories network labels:
– 0.- Wikipedia categories named after populated places in Italy
– 1.- Provinces of Italy
– 2.- Cities and towns in Emilia-Romagna
– 3.- Emilia-Romagna
– 4.- Parma
– 5.- Turin
– 6.- Cities and towns in Piedmont
– 7.- Communes of the Province of Parma
– 8.- Education in Italy by city
– 9.- Communes of the Province of Alessandria
– 10.- Geography of Emilia-Romagna
– 11.- Province of Pavia geography stubs
– 12.- Province of Pavia
– 13.- Bologna
– 14.- Communes of the Province of Bologna
– 15.- Buildings and structures in Bologna
– 16.- Province of Arezzo
– 17.- Province of Ancona
– 18.- Province of Lucca
– 19.- Visitor attractions in Bologna
– 20.- Tortona
– 21.- Novi Ligure
– 22.- Pavia
– 23.- Communes of the Province of Lucca
– 24.- Roman Catholic archbishops of Bologna
– 25.- History of Bologna
– 26.- Education in Turin
– 27.- Palaces in Bologna
– 28.- Education in Bologna
– 29.- University of Pavia
– 30.- Education in Emilia-Romagna
– 31.- Culture in Bologna
– 32.- Culture in Emilia-Romagna
– 33.- Buildings and structures in Pavia
– 34.- Buildings and structures in the Province of Pavia
– 35.- Companies by region of Italy
– 36.- Companies based in Bologna
– 37.- Companies based in Emilia-Romagna
– 38.- Education in Italy by region
– 39.- Media in Bologna
degree
{13}
n
1
2 {0, 13} , {1, 13} , ... (2)
3
4
{0, 1, 13} , ... (4)
{0, 1, 3, 13} , ... (1)
betweenness random-walk
{13}
closeness
{13}
{12, 13}
{1, 13}
{0, 1, 13}
{0, 1, 13}
{0, 1, 3, 13} {0, 1, 3, 13} {0, 1, 3, 13}
{13}
{0, 13}
{0, 1, 13}
Table 19: Solutions for group centrality on DBpedia sample 2.
Fig. 12: Sample 3 from DBpedia Categories network.
Sample 3 from DBpedia Categories network labels:
– 0.- Neognathae
– 1.- Birds by classification
– 2.- Procellariiformes
– 3.- Phoenicopteriformes
– 4.- Pelecaniformes
– 5.- Hornbills
– 6.- Bucerotidae
– 7.- Ardeidae
– 8.- Egretta
– 9.- Aceros
– 10.- Anthracoceros
– 11.- Buceros
– 12.- Ceratogymna
– 13.- Ocyceros
– 14.- Penelopides
– 15.- Bucerotinae
– 16.- Tockus
– 17.- Phalacrocoracidae
– 18.- Fregatidae
– 19.- Falconiformes
– 20.- Accipitridae
– 21.- Oceanodroma
– 22.- Hydrobatinae
– 23.- Hydrobatidae
– 24.- Phalacrocorax
– 25.- Plotopteridae
– 26.- Bucerotiformes
– 27.- Limnofregata
– 28.- Fregata
– 29.- Oceanitinae
– 30.- Aviceda
– 31.- Dryotriorchis
– 32.- Erythrotriorchis
– 33.- Anorrhinus
– 34.- Fregetta
– 35.- Oceanites
– 36.- Botaurus
– 37.- Anhingidae
– 38.- Rhyticeros
– 39.- Pelecanus
degree
{5}
{4, 5}
n
1
2
3
4 {4, 5, 20, 23} {4, 5, 20, 23} {4, 5, 20, 23} {4, 5, 20, 23}
closeness
{1}
{1, 5}
betweenness
random-walk
{1}
{1, 5}
{4, 5, 23}
{1}
{4, 5}
{4, 5, 23}
{4, 5, 23}
{4, 5, 23}
Table 20: Solutions for group centrality on DBpedia sample 3.
Fig. 13: Sample 1 from Roget’s Thesaurus network.
Sample 1 from Roget’s Thesaurus network labels:
– 0.- Jack
– 1.- ardor
– 2.- chips
– 3.- cob
– 4.- cordiality
– 5.- dress down
– 6.- empressement
– 7.- fervency
– 8.- fervidness
– 9.- fervor
– 10.- fire
– 11.- foment
– 12.- give a whipping
– 13.- go
– 14.- gusto
– 15.- heartiness
– 16.- hearty
– 17.- heat
– 18.- jacktar
– 19.- kale
– 20.- lather
– 21.- mariner
– 22.- navigator
– 23.- passionateness
– 24.- sailorman
– 25.- salt
– 26.- sea dog
– 27.- seafarer
– 28.- seafaring man
– 29.- spondulix
– 30.- sugar
– 31.- trim
– 32.- unction
– 33.- vehemence
– 34.- verve
– 35.- warm
– 36.- warm the blood
– 37.- warmth
– 38.- warmth of feeling
– 39.- whale
{10, 25, 39}
{35}
{10}
degree
{10}
{10, 25}
n
1
2
3
4 {10, 17, 25, 39} , ... (87) {10, 17, 25, 39} , ... (87) {10, 17, 25, 35} {10, 17, 25, 39}
Table 21: Solutions for group centrality on Roget’s Thesaurus sample 1.
closeness
{10, 25}
{25, 35}
{10, 25, 35}
{10, 25}
{10, 25, 39}
betweenness
random-walk
{35}
{10, 25, 39}
Fig. 14: Sample 2 from Roget’s Thesaurus network.
Sample 2 from Roget’s Thesaurus network labels:
– 0.- alliterate
– 1.- assonate
– 2.- bedpan
– 3.- blench
– 4.- blink
– 5.- chevy
– 6.- chuck
– 7.- chunk
– 8.- cracked
– 9.- cut
– 10.- dash
– 11.- dodge
– 12.- duck
– 13.- fight shy of
– 14.- fling
– 15.- hoar
– 16.- lay
– 17.- pelt
– 18.- poesy
– 19.- poetry
– 20.- pound
– 21.- pull back
– 22.- pun
– 23.- recoil
– 24.- reft
– 25.- rhyme
– 26.- rime
– 27.- scour
– 28.- shrink
– 29.- shy
– 30.- shy at
– 31.- side step
– 32.- slit
– 33.- song
– 34.- stab
– 35.- submarine
– 36.- swerve
– 37.- verse
– 38.- whack
– 39.- whop
degree
{29}
{26, 29}
n
1
2
3
4 {10, 12, 26, 32} , ... (4) {10, 12, 24, 26} , ... (4) {10, 12, 26, 29} {10, 12, 26, 29}
closeness
{26, 29}
{26, 29}
{10, 12, 26}
{9, 29}
{9, 26, 29}
betweenness
random-walk
{10, 12, 26}
{10, 12, 26}
{9}
{9}
{29}
Table 22: Solutions for group centrality on Roget’s Thesaurus sample 2.
Fig. 15: Sample 3 from Roget’s Thesaurus network.
Sample 3 from Roget’s Thesaurus network labels:
– 0.- ass
– 1.- bring about
– 2.- bring to effect
– 3.- bring to pass
– 4.- burro
– 5.- chucklehead
– 6.- create
– 7.- cuddy
– 8.- dickey
– 9.- do
– 10.- doit
– 11.- donkey
– 12.- dub
– 13.- duffer
– 14.- effect
– 15.- gawk
– 16.- gawkhammer
– 17.- gawky
– 18.- generate
– 19.- get
– 20.- lobster
– 21.- longear
– 22.- looby
– 23.- loon
– 24.- lubber
– 25.- lummox
– 26.- lump
– 27.- lunkhead
– 28.- majority
– 29.- mass
– 30.- moke
– 31.- most
– 32.- plurality
– 33.- preponderance
– 34.- preponderancy
– 35.- put up a tree
– 36.- slouch
– 37.- stick
– 38.- swab
– 39.- the greater number
degree
{11}
{11, 14}
{37}
{37}
n
1
2
3
4 {11, 14, 29, 37} , ... (440) {11, 14, 29, 37} , ... (440) {11, 14, 26, 37} {11, 14, 29, 37}
Table 23: Solutions for group centrality on Roget’s Thesaurus sample 3.
{11, 14, 29} , ... (6)
{1, 14, 29} , ... (6)
{37}
closeness
{14, 26}
{14, 26}
{11, 14, 29}
{26, 37}
{11, 26, 37}
betweenness
random-walk
|
1708.07609 | 2 | 1708 | 2018-05-09T22:22:32 | Clique-based Method for Social Network Clustering | [
"cs.SI",
"physics.soc-ph",
"stat.AP"
] | In this article, we develop a clique-based method for social network clustering. We introduce a new index to evaluate the quality of clustering results, and propose an efficient algorithm based on recursive bipartition to maximize an objective function of the proposed index. The optimization problem is NP-hard, so we approximate the semi-optimal solution via an implicitly restarted Lanczos method. One of the advantages of our algorithm is that the proposed index of each community in the clustering result is guaranteed to be higher than some predetermined threshold, $p$, which is completely controlled by users. We also account for the situation that $p$ is unknown. A statistical procedure of controlling both under-clustering and over-clustering errors simultaneously is carried out to select localized threshold for each subnetwork, such that the community detection accuracy is optimized. Accordingly, we propose a localized clustering algorithm based on binary tree structure. Finally, we exploit the stochastic blockmodels to conduct simulation studies and demonstrate the accuracy and efficiency of our algorithms, both numerically and graphically. | cs.SI | cs |
Clique-based Method for Social Network
Clustering
Guang Ouyang, Dipak K. Dey, Panpan Zhang
May 11, 2018
Abstract
In this article, we develop a clique-based method for social network clus-
tering. We introduce a new index to evaluate the quality of clustering results,
and propose an efficient algorithm based on recursive bipartition to maxi-
mize an objective function of the proposed index. The optimization problem
is NP-hard, so we approximate the semi-optimal solution via an implicitly
restarted Lanczos method. One of the advantages of our algorithm is that the
proposed index of each community in the clustering result is guaranteed to be
higher than some predetermined threshold, p, which is completely controlled
by users. We also account for the situation that p is unknown. A statistical
procedure of controlling both under-clustering and over-clustering errors si-
multaneously is carried out to select localized threshold for each subnetwork,
such that the community detection accuracy is optimized. Accordingly, we
propose a localized clustering algorithm based on binary tree structure. Fi-
nally, we exploit the stochastic blockmodels to conduct simulation studies
and demonstrate the accuracy and efficiency of our algorithms, both numeri-
cally and graphically.
Keywords: Clique-score index, localized clustering algorithm, modularity, so-
cial network, spectral analysis,stochastic block model
1
Introduction
Networks are proliferating all around us, and they appear in different forms, such
as (hardwired) electrical grids or (virtual) social relationships. Networked systems
spread in various scientific and applied disciplines, for example, the Internet, the
World Wide Web, metabolic networks, neural networks, food webs and social net-
works, etc. In this paper, we place our focus on social networks. Social network
1
analysis is a branch of the social science which is an academic discipline studying
a society and the behavior of entities therein. In sociometric or other quantitative
studies, social networks are usually modeled by graph structures consisting of a set
of nodes or vertices connected by directed arcs or undirected edges. More specif-
ically, the actors in a social network are represented by nodes. For each pair of
nodes, if there appears some pattern of ties, they will be connected by an edge.
Edges can be directed or undirected, depending on the feature and interpretation
of the network. There are a variety of social networks, such as the Facebook [29],
marriage networks [25] and smart business networks [24].
Due to solid theoretical foundation of statistics, statistical methodologies have
been a significant input to the studies of social networks. A plethora of statistical
methods have been established and developed to uncover relational structure of
social networks, and dyadic ties between actors therein. In this paper, we focus on a
significant research topic in social networks-clustering. More precisely, our goal
is to develop some statistical methods for accurately clustering actors in a social
network into mutually exclusive communities. This process, in many literatures, is
called "community detection."
Roughly speaking, the fundamental principle underlying social network clus-
tering is that a group of actors who are excessively connected are more likely to
form a community. Technically speaking, the formation of a community requires
that the connections of actors within the community are significantly higher than
the connections between actors from different communities. From the sociological
point of view, the occurrence of high connection density between actors in a com-
munity is usually due to some kind of homology or homogeneity of actors. For
instance, consider a friendship network on Facebook. Intrinsically, students from
the same department of a college are more likely form a friendship community, as
they have a very high probability to know and friend each other. The homogeneities
are reflected in the location parameter (i.e., college) and the academic parameter
(i.e., department). On the other hand, students with different education, social or
geographic background are much less likely to be connected.
Past research on social network clustering can be summarized into two cate-
gories. One approach is to propose a (parametric or nonparametric) probabilistic
graphical model (PGM) which characterizes the community structures of a social
network. Pioneering work of such model-based approach were the p1 model [13]
and the stochastic blockmodel (SBM) [14]. Several successful models were pro-
posed for community detection in the last two decades, including an extension of
the SBM [22], a latent position model [12], a latent position cluster model [11],
and a mixed membership SBM in [1], etc. We refer the interested readers to [10]
for a complete and comprehensive review of PGMs for social network clustering.
Another approach is to consider a metric that can be used to quantitatively evaluate
2
the quality of social network clustering. The task is to specify an objective func-
tion based on the proposed metric, and the ultimate goal is to design an efficient
algorithm to optimize the objective function over all potential clustering strategies.
In this article, we call this class of approaches metric-based methods. Precursory
work in this direction traced back to [28], in which a measure called cluster co-
efficient was proposed to evaluate mutual acquaintance between actors in a social
network. We refer the interested readers to [18] and [19] for extensive discussions
about cluster coefficient. While cluster coefficient is the metric that is often used
for random graphs or dynamic network models, we place our focus on cluster-
ing problems of static networks in this manuscript. Representative and popular
methods for static network clustering are the spectral clustering method [21], the
normalized cut approach [27], and the modularity maximization method [20], etc.
The contribution of this paper is as follows:
1. We propose a novel clustering method based on graph cliques such that the
clique score (a new index defined to evaluate clustering outcomes) of each
identified community is higher than some threshold p.
2. When threshold p is unknown, we develop a systematic strategy to select
localized thresholds p (for each subnetwork which requires further subdivi-
sion) by controlling over-clustering and under-clustering simultaneously.
3. The two algorithms proposed in this manuscript are efficient, easy to imple-
ment, and provide consistently reliable clustering results.
We would like to point out that even though undirected binary social networks
are considered in this manuscript for the sake of interpretation, our method can
be extended to directed or weighted networks in a similar manner, done mutatis
mutandis. The rest of this manuscript is organized as follows. In Section 2, we
introduce some notations that will be used throughout the paper. In Section 3, we
briefly review two classical clustering methods. Section 4 is divided into two sub-
sections. In Section 4.1, we propose a new metric to quantitatively measure the
quality of clustering results, and then establish an objective function based on it,
followed by an algorithm which is designed upon the idea of recursive bipartition
to optimize the objective function. In Section 4.2, we consider the situation that
the global parameter p is not predetermined, and develop a method to compute
localized parameter p so as to maximize the detection accuracy of our algorithm.
We further propose a localized algorithm (corresponding to localized parameter p),
with some modifications on the algorithm developed in Section 4.1. We present
several simulation examples in Section 5 to demonstrate the efficiency of our al-
gorithms and accuracy and consistency of clustering results. In addition, we nu-
merically compare the performance of the proposed algorithm and the traditional
3
modularity maximization algorithm. Lastly, we address some concluding remarks
and potential future studies in Section 6.
2 Notations
In this section, we introduce the notations that will be used throughout the manuscript.
Let G = G(V, A) be an undirected graph to model a social network of V = n
actors, where A is an n × n adjacency matrix such that
in which
aij =
for i, j ∈ V . Let D be an n × n diagonal matrix such that
1,
0,
(cid:40)
deg (1)
0
...
0
D =
A = (aij)n×n,
Nodes i and j are connected,
otherwise,
,
0
deg (2)
...
0
···
···
...
··· deg (n)
0
0
...
where deg (i) represents the degree of node i ∈ V . Consider the matrix L defined
as
L = D − A.
The normalized Laplacian matrix of G [5, page 2] is then given by
L = D−1/2LD−1/2 = I − D−1/2AD−1/2,
where I denotes the identity matrix of rank n.
Two graph invariants on which many classical network clustering methods de-
pend on are volume and cut. The volume of a graph G, denoted Vol(G), is the total
number of degrees of the nodes in G, i.e.,
n(cid:88)
i=1
Vol(G) =
deg (i).
The cut, on the other hand, is defined on subgraphs of G. Let G1 and G2 be two
disjoint subgraphs of G, the cut of G1 and G2, denoted Cut(G1, G2), is the number
of edges linking G1 and G2, i.e.,
(cid:88)
aij.
i∈G1,j∈G2
Cut(G1, G2) =
4
3 Prerequisites
In this section, we give brief reviews of the spectral clustering method with a con-
centration on the normalized cut and the modularity maximization approach as
prerequisites.
3.1 Spectral network clustering
We first look at the spectral network clustering algorithm developed in [27] and [21],
inspired from the spectral graph theory [5]. Generally speaking, a measure called
the normalized cut was adopted as an objective function to quantify the number of
edges across different communities. Suppose that a social network G is split into
h communities G1, G2, . . . , Gh. The normalized cut is given by
h(cid:88)
k=1
Ncut(G1, G2, . . . , Gh) =
Cut(Gk, Gk)
Vol(Gk)
,
(1)
where Gk denotes the complement of Gk in G, for k = 1, 2, . . . , h. Consider
an n × h community indicating matrix P = (pik)n×h, in which each entry is
pik = 1/(cid:112)Vol(Gk) for node i in community Gk. The optimization problem cor-
responding to Equation (1) is, in fact, a discrete trace minimization problem, which
can be approximated by a standard trace minimization problem with a relaxation
of the discreteness condition as follows:
min
G1,G2,...,Gh
Tr(P(cid:62)LP) ≈ min
P∈Rn×h
Tr(P(cid:62)LP),
(2)
subject to P(cid:62)DP = I. Let C = D1/2P. The optimization problem on the right
hand side of Equation (2) is equivalent to
Tr(C(cid:62)LC),
min
C∈Rn×h
subject to C(cid:62)C = I. This is a standard Rayleigh quotient problem, and the solu-
tion of C is composed of the first h eigenvectors of L; see [5] and [15]. Thus, the
solution to the right hand side of Equation (2) can be obtained by solving the first
h eigenvectors in a generalized eigenvalue system Lv = λDv, which can be done
via an adaptive algorithm based on bipartition proposed in [27].
3.2 Modularity maximization
Another popular algorithm for social network clustering, known as the modularity
maximization, was first introduced in [20]. In essence, the underlying principle is to
5
partition a social network into mutually exclusive communities such that the num-
ber of edges across different communities is significantly less than the expectation,
whereas the number of edges within each community is significantly greater than
the expectation. In [20], a bipartition situation was considered, and the clustering
outcome was evaluated by a measure-modularity-defined as
Q =
1
2Vol(G)
s(cid:62)Bs,
where s is an n × 1 column indication vector such that
(cid:40)
si = 1,
si = −1,
if node i belongs to community 1;
if node i belongs to community 2,
and B = (bij)n×n is an n × n matrix with entires
bij = aij − deg (i) deg (i)
Vol(G)
,
for i = 1, 2, . . . , n. Subdivisions for existing communities are available by repeat-
edly implementing the proposed modularity algorithm. The decision of whether or
not subdividing an existing community Gk of size nGk depends on an associated
modularity matrix BGk =
with entries
(cid:16)
(cid:17)
bGk
ij
nGk×nGk
ij = bij − δ(i, j)
bGk
bil,
(cid:88)
l∈Gk
where δ(·,·) denotes the Kronecker delta function. Subdivision for Gk is termi-
nated if the largest eigenvalue of BGk is zero.
4 Clique-based clustering algorithm
In this section, we propose a novel algorithm for social network clustering. More
specifically, we define a new measure called the p-clique index to quantitatively
evaluate the quality of clustering outcome. The section is divided into two subsec-
tions. We introduce a clique-based clustering algorithm in Section 4.1, and then
extend it to a localized clique-based clustering algorithm in Section 4.2. The lo-
calized algorithm enables us to update the threshold p for each subnetwork so as
to well control the potential over-clustering or under-clustering problems. We will
discuss the details in the sequel.
6
4.1 Clique-based clustering algorithm
In this section, We give a clique-based clustering algorithm, inspired from the mod-
ularity maximization algorithm proposed in [20]. In graph theory, a clique is de-
fined as a complete graph on a set of nodes, i.e., each pair of nodes is connected
by an edge. A clique is called maximal if it cannot be extended to any larger-size
clique by including any adjacent node. The ideal clustering outcome is that each
community in a network is a maximal clique. In reality, this is hard to achieve. For
many real world social networks, it is even difficult to guarantee that each com-
munity forms a clique. Therefore, an appropriate measure to assess the degree of
connectivity of a community is needed. The next graph invariant measure can be
used to gauge the internal link density of each community in a network.
Definition 1 (clique score). The clique score of a community (cluster, subnetwork)
is the ratio of the number of observed ties to the number of edges in the clique over
the same number of nodes.
For example, a community consisting of 10 nodes and 18 internal links has
(cid:1) = 0.4. It is obvious that a clique always has clique score one.
clique score 18/(cid:0)10
2
Our goal is to develop an adaptive algorithm to maximize the overall clique scores
(e.g., weighted average) of all communities in a network, subject to the clique
score of each community exceeding some predetermined threshold 0 ≤ p ≤ 1.
The condition of "exceedance" in our algorithm is essential as it guarantees that
none of the communities in our clustering outcome performs extremely bad or does
not achieve the minimum standard. In addition to this, the choice of p is flexible,
depending on the users' needs or the realistic features of communities in a social
network. In Section 4.2, we will discuss how to choose an appropriate value of p to
optimize the performance of the proposed algorithm when no prior information of
p is available. In the next definition, we bridge the gap between clique graph and
p.
Definition 2 (p-clique). A p-clique is a random graph of a set of nodes, of which
each pair is connected by an edge independently with probability p, for 0 ≤ p ≤ 1.
The p-clique defined in this manuscript is not novel, and structurally it is equiv-
alent to the Erdos-R´enyi model proposed by [6]. The definition of p-clique (c.f.
Definition 2) adopts an alternative interpretation of the Erdos-R´enyi model given
by [9]. Since the nodes are connected independently, there is no structure of com-
munities or clusters in p-cliques theoretically. Hence, p-cliques appear to be a
proper benchmark model in our study. The expected number of edges in a p-clique
on n nodes is np(1 − p).
7
G1, G2, . . . , Gh respectively with community sizes n1, n2, . . . , nh such that(cid:80)h
Suppose that a social network G of size n is clustered into h communities,
n. Our task is to search for a clustering rule such that the total degree of nodes in
each community is significantly larger than the expected number of edges of a p-
clique of the same size, whereas the total number of links across different commu-
nities is minimized. Based on this idea, we propose a measure called the p-clique
index as follows, and our ultimate goal is to design an adaptive algorithm for an
optimal clustering rule where the p-clique index is maximized.
k=1 nk =
Definition 3 (p-clique index). Let G be a social network that consists of n nodes,
and C = [G1, G2, . . . , Gh] be a clustering rule which divides G into h communi-
ties. The p-clique index is given by
1
n(n − 1)
(cid:32) h(cid:88)
(cid:0)Vol(Gk) − pnk(nk − 1)(cid:1)
(cid:1)
− (cid:88)
(cid:0)Cut(Gk, Gl) − pnknl
(cid:88)
(cid:0)(aij − p)δ(ci, cj) + (p − aij)(1 − δ(ci, cj))(cid:1), (3)
1≤k(cid:54)=l≤h
1
k=1
D(c, p) =
=
n(n − 1)
1≤i(cid:54)=j≤n
where c = (c1, c2, . . . , cn)(cid:62) is the membership indication vector for nodes.
The essence of p-clique index is to reward connected nodes in the same com-
munity (with 1 − p) and disconnected nodes from different communities (with p),
but penalize connected nodes from different communities (with −(1− p)) and dis-
connected nodes in the same community (with −p). Different from model-based
methods, this approach is not to fit data (i.e., observation) to any type of generative
model or p-clique structures. Rather, our goal is to determine a clustering rule, in
which each community has a higher clique score than a predetermined threshold p.
The algorithm for our clique-based clustering approach is based on the hi-
erarchical clustering algorithm developed for modularity maximization in [20].
To begin with, we consider bipartition, i.e., clustering a social network into two
communities 1 and 2. Define an alternative membership indication vector, s =
(s1, s2, . . . , sn)(cid:62), as follows:
(cid:40)
si = 1,
si = −1,
if node i belongs to community 1,
if node i belongs to community 2,
8
for i = 1, 2, . . . , n. Then, the p-clique index (c.f. Equation (3)) is equivalent to
D(s, p) =
1
n(n − 1)
(aij − p)sisj =
1
n(n − 1)
sT C(p)s,
(cid:88)
1≤i(cid:54)=j≤n
(cid:110)
s(cid:62)
(cid:17)
where the p-clique matrix C(p) is given by
C(p) = A − p(1n×n − In×n),
in which 1n×n is an n × n matrix of all ones. In what follows, the network clus-
tering is converted to an optimization problem
s(cid:62)C(p)s
(cid:111)
(cid:110)
max
(4)
.
s
This is equivalent to
max
s
{D(s, p) − D(1n×1, p)}
1
s(cid:62)C(p)s − 1(cid:62)
max
n(n − 1)
s
(cid:111)
=
=
1
n(n − 1)
max
s
n×1C(p)1n×1
C(p) −
1
n
n(cid:88)
i,j=1
C(p)ij
In×n
,
s
(5)
where C(p)ij denotes the (i, j)th entry of p-clique matrix C(p). Since s = {−1, 1}n
is dyadic, the optimization problem is NP-hard. To relax the problem, our strategy
is to allow s to be any normalized real-valued vector. One solution to Equation (5)
is the eigenvector v = (v1, v2, . . . , vn)(cid:62) corresponding to the largest eigenvalue
In×n, denoted by λmax. We thus obtain a natural
approximation of the solution; that is, we cluster the nodes with respect to the signs
i,j=1 C(p)ij
n
(cid:80)n
of C(p) −(cid:16) 1
of the components of v: (cid:40)
sapprox
i
sapprox
i
= 1,
= −1,
vi ≥ 0,
vi < 0,
for i = 1, 2, . . . , n.
We remark that we would rather work on the optimization problem in Equa-
tion (5) than that in Equation (4) analytically, albeit they are mathematically iden-
tical. The underlying reason is that Equation (5) provides an instinctive insight
of the decision rule of partitioning an existing community. Our rule is that we
do not further subdivide the existing cluster if the eigenvalue λmax ≤ 0 and
9
D(1n×1, p) ≥ 0. Both of the conditions are needed since λmax ≤ 0 indicates
that D(1n×1, p) ≥ max{maxs{D(s, p)}, 0} and D(1n×1, p) ≥ 0 implies that the
link density of the existing community is already higher than p.
We next propose an algorithm based on recursive bipartition for our p-clique
approach. In practice, we first determine the p-clique matrix, C(G)(p) for a given
network G of size n. We partition G into two clusters G1 and G2 with respect to
the signs of the entries of the eigenvector corresponding to the largest eigenvalue
of C(G)(p), and then compute the additional contribution to the p-clique index due
to the division, denoted by
∆D(p) =
1
n(n − 1)
siC(G)(p)ijsj − C(G)(p)ij
.
(cid:88)
(cid:16)
i,j∈G
(cid:17)
We continue to apply the bipartition algorithm respectively to G1 (according to
the associated p-clique matrix C(G1)(p), where C(G1)(p) is a submatrix extracted
directly from C(G)(p) only for the nodes contained in G1) and G2 (according to
the associated p-clique matrix C(G2)(p) obtained in a similar manner), if at least
one of the two regularity criteria is met. We terminate the algorithm until no further
partition is needed. The algorithmic procedure is presented in Algorithm 1.
Algorithm 1: The bipartition-based algorithm for p-clique index maxi-
mization
Input: p-clique matrix C(G)(p) of network G, empty community list L
1 Procedure BiPartition(G, C(G)(p));
2 Compute the eigenvector s corresponding to the largest eigenvalue of
3 Partition G into G1 and G2 according to the signs of entries of s;
4 Compute the additional contribution to p-clique index, ∆D(p);
C(G)(p);
5 if ∆D(p) > 0 or(cid:80)
i,j∈G C(G)
BiPartition(G1, C(G1)(p));
BiPartition(G2, C(G2)(p));
ij (p) < 0 then
6
7
8 else
9
10 end
Add G to community list L
Output: Community list L
To conclude this section, we address some remarks on the proposed algorithm.
The essence of Algorithm 1 is to maximize the additional contributions to the over-
all p-clique index, whenever a division of an existing cluster is implemented (ver-
sus its current state) . As mentioned, the optimization problem is NP-hard, and our
10
algorithm will continue to be executed if(cid:80)
strategy is to relax the problem by allowing s to be any real vector with (cid:96)2 norm
equal to one. Our goal is to determine the eigenvector associated with the largest
eigenvalue of the p-clique matrix, and specifically our strategy is to exploit an im-
plicitly restarted Lanczos method developed in [4]. It is worthy of noting that our
(p) < 0 for some G(cid:48) even
when ∆D(p) ≤ 0, since, under such circumstance, the clique index of G(cid:48) is less
than p. We take the quality (i.e., having clique score higher than predetermined
threshold p) of each resulting community as a higher priority, bearing with non-
optimal grade for the overall p-clique index. We view this as a major feature, as
well as an advantage, of our algorithm, since the choice of threshold p is absolutely
flexible, depending on the users' needs.
i,j∈G(cid:48) C(G(cid:48))
ij
On the other hand, a natural question arising from our algorithm is " what if
there is no specific requirement or prior information for p?" An arbitrary choice of
p may lead to over-clustering or under-clustering problems. Having this concern
in mind, we propose a modified algorithm based on Algorithm 1 in Section 4.2.In
addition, we carry out a statistical procedure for "reasonable" selection of unspec-
ified p so as to simultaneously minimize the errors of over-clustering and under-
clustering.
4.2 Localized clustering algorithm
We have demonstrated that the algorithm proposed in Section 4.1 is advantageous
for social network clustering, as it allows users to control the quality of each re-
sulting community. In many cases, the threshold parameter p is predetermined or
preselected, based on users' needs or past research experience. For the cases that
p is not specified, it is needed to develop a systematic method to choose an opti-
mal assignment of p. Probably a question that needs to be answered in advance
is whether or not there exists such optimum p. An analogous issue occurs for the
modularity maximization algorithm, and was discussed in [26] and [17], where the
conclusion from both was negative for the existence of such overall optimal value
of p. In this section, we consider a localized clustering strategy, the core idea of
which is to select different values of p for different subnetworks.
In essence, our strategy for the selection of p is a process of balancing over-
clustering and under-clustering. Intrinsically, a large value of p usually results in
small sizes of clusters (i.e., over-clustering), whereas a small value of p sometimes
fails to guarantee the quality of clusters (i.e., under-clustering). The procedure that
balances between over-clustering and under-clustering is analogous to dealing with
type I errors and type II errors in statistical hypothesis testings. We borrow these
two terminologies in our study. Let us call the error of over-clustering as type I
error and the error of under-clustering as type II error. Our goal is determine a
11
distinct value of p for each existing cluster such that both types of errors are well
controlled.
Recall the p-clique (i.e., the Erdos-R´enyi model) introduced in Definition 2.
The model is constructed completely at random without any cluster structure, sug-
gesting that we can exploit it to control type I error, and accordingly determine an
upper bound of p. Consider an Erdos-R´enyi graph, ER(n, p0), where n and p0 are
given. Intuitively, we need to set the threshold parameter p significantly less than
p0 so that there is a small probability to divide ER(n, p0) into two subgraphs or
more by our algorithm. Assume that α is the maximal percentage of the number
of nodes to be split from the Erdos-R´enyi graph under tolerance. Our goal turns to
find the largest value of p such that at most αn nodes are split off of the majority.
Let X denote the observed inter-across link density between the split group (i.e.,
αn nodes) and the remainder (i.e., (1− α)n nodes), and FX be its distribution. An
instinctive and reasonable choice of p is thus the αth percentile of FX. Although
the expected number of inter-across edges is (1 − α)np0 in theory, the inter-across
link density is anticipated to be much smaller than the internal density within the
large group of (1 − α)n nodes. In this regard, we approximate FX by a truncated
normal distribution, where the top α is curtailed; that is, X is normally distributed
with mean
(cid:115)
E[X] = p0 − φ(zα)
1 − α
p0(1 − p0)
(1 − α)n
,
and variance
Var[X] =
p0(1 − p0)
(1 − α)n
(cid:34)
(cid:18) φ(zα)
1 − α
(cid:19)2(cid:35)
,
1 − zαφ(zα)
1 − α
−
where φ(·) denote the density function of the standard normal distribution, and zα
is the (1− α)th percentile of standard normal. Thus, we obtain an upper bound for
p as a function of α, which is given by
(cid:111)
(cid:112)Var[X]
(cid:115)
p0(1 − p0)
(1 − α)n
(cid:41)
,
(6)
(cid:110)
(cid:40)
pU(α) = max
= max
0, E[X] − zα
0, p0 − ξ(α)
where ξ(α) is a constant depending on α only.
The next task is to determine the lower bound for p. Suppose that we have two
independent Erdos-R´enyi graphs which are respectively denoted by ER(n1, p1)
and ER(n2, p2), and p12 is the link density between the two graphs. Let β be
the probability that the two graphs are merged. We once again consider normal
12
approximation, and conclude that the two graphs are both statistically significant if
we have
(cid:115)
min{p1, p2} > p12 + zβ
p12(1 − p12)
n1n2
,
(7)
the right-hand side of which in fact forms the lower bound for the parameter p.
However, this lower bound is intractable in general as it requires the information of
p12, which is usually unknown for most real-world networks. Therefore, we place
focus on the upper bound for p, and our strategy is to set the parameter p as large
as possible under tolerance so as to minimize the probability of merging significant
subnetworks.
Finally, we propose a new algorithm for unspecified p based on Algorithm 1
proposed in Section 4.1. The new algorithm is designed for controlling type I
and II errors simultaneously. As mentioned, however, it seems to be unreasonable
to have a global threshold p for our algorithm. We elaborate the reasonings and
demonstrate our solution via the following illustrative example.
Suppose that we cluster a network G of size n into two subnetworks G1 of size
n1 and G2 of size n2. Initially, we adopt a threshold p(G) which depends on the
observed link density of G. However, if we continue to use p(G) as the threshold
when G1 or G2 or both need to be further clustered, we may have to bear with over-
clustering or under-clustering risks in the subdivision processes. Alternatively, we
suggest to reset the threshold(s) before subdividing G1 or G2 or both. In other
words, we choose
(cid:40)
(cid:40)
and
p(G1) = max
p(G2) = max
0, p1 − ξ(α)
0, p2 − ξ(α)
(cid:115)
(cid:115)
(cid:41)
(cid:41)
p1(1 − p1)
(1 − α)n1
p2(1 − p2)
(1 − α)n2
as updated thresholds for G1 and G2, respectively. From then on, the threshold
parameters are refreshed in this manner for all subnetworks that need to be fur-
ther subdivided. As for each subnetwork to which a fresh threshold parameter is
assigned, we call the new algorithm localized clustering algorithm.
One of the most effective ways to illustrate this heirachical clustering process
is probably to exploit binary tree. We start with a root node that represents the
original network which needs to be clustered. At the first level, two child nodes
are attached to the root node. The child nodes represent either subnetworks or
communities. If a child node is a subnetwork which requires further subdivision, it
will carry over two higher-level child nodes and itself turns to an internal node. If
13
a child node is a community which does not need further subdivision, it becomes
a terminal node in the tree. We use rectangle for internal nodes and circle for
terminal nodes. When the algorithm is terminated, the clustering result is reflected
in all the terminal nodes in the binary tree. An example of binary tree is given in
Figure 1.
Network G
Subnetwork G1
Subnetwork G2
Community 1
Subnetwork G3
Community 2
Community 3
Community 4
Community 5
Figure 1: An example of binary tree that represents a result of five communities
We are now in the position of defining a new clique index, the local clique
index, modified from the p-clique index given in Definition 3.
Definition 4 (local clique index). Consider a network G consisting of n nodes. Let
T be the binary tree that describes a hierarchical clustering procedure on G, and
{v} be the collection of all internal nodes of T . The local clique index is given by
(cid:88)
(cid:88)
(cid:16)
LD(T ) =
1
n(n − 1)
v∈T
i(cid:54)=j∈v
(aij − pv)δ(v)
ij + (pv − aij)
1 − δ(v)
ij
,
(8)
(cid:16)
(cid:17)(cid:17)
where pv is the threshold of parameter p for internal node (subnetwork) v.
As shown in Figure 1, our new algorithm is again based on recursive bipartition
procedures, and the goal is to maximize the score function given in Equation (8).
Analogous to Algorithm 1, we need to determine the local clique matrix for each v
in T , i.e.,
C(v) = A(v) − pv (1nv×nv − Inv×nv ) ,
14
where A(v) is the updated adjacency matrix for subnetwork v and nv is the size of
v. Besides, we need to compute the additional contribution from each bipartition
of v to the overall score LD(T ), i.e.,
(cid:16)
(cid:17)(cid:17)
.
(cid:88)
(cid:16)
i(cid:54)=j∈v
∆LD(v) =
1
n(n − 1)
(aij − pv)δ(v)
ij + (pv − aij)
1 − δ(v)
ij
(cid:80)
The algorithm for hierarchical clustering process is terminated as ∆LD(v) ≤
i(cid:54)=j∈v(aij − pv) for all existing v in T , and then all remaining inter-
n(n−1)
nal nodes v turn out to be terminal nodes, i.e., added to the community list. We
summarize our strategy in Algorithm 2, slightly modified from Algorithm 1.
1
Algorithm 2: The algorithm of network clustering based on local clique
index maximization
Input: Network G, binary tree T with a single root node representing
G, tolerance of type I error α
(cid:114)
1 Procedure LocalBiPartition(G);
2 Determine network size nG and the clique score pobs
G − ξ(α)
(cid:41)
3 Compute the threshold pG = max
;
4 Create local clique matrix C(G) = A(G) − pG (1nG×nG − InG×nG);
5 Compute the eigenvector s corresponding to the largest eigenvalue of
G of G;
G (1−pobs
pobs
G )
(1−α)n
(cid:40)
0, pobs
C(G);
6 Partition G into G1 and G2 with respect to the signs of s;
7 Compute additional contribution, ∆LD(G), to overall local clique index
by partitioning G;
(cid:80)
i(cid:54)=j∈v(aij − pG) then
Add G1 to the left child node position of G;
LocalBiPartition(G1);
Add G2 to the right child node position of G;
LocalBiPartition(G2);
8 if ∆LD(G) >
9
10
11
12
nG(nG−1)
1
Output: Binary tree T
5 Simulations
In this section, we conduct some simulation studies to evaluate the performance
of two clique-based clustering algorithms proposed in the previous sections. We
also show that the proposed algorithm outperforms the modularity maximization
approach [20] for network clustering. The SBM in [22] is adopted to generate
15
networks, as they allow us to predetermine the structure of simulated networks,
which can be used as the ground truth for comparisons.
To begin with, we briefly review the SBM. Given a network of n nodes which
belong to h nonempty communities, let n1, n2, . . . , nh be respectively the size of
each community. For i = 1, 2, . . . , n, a mapping c : {1, 2, . . . , n} (cid:55)→ {1, 2, . . . , h}
preserves the membership information for each node labeled with i. An h × h
probability matrix B describes the link densities within every community, as well
as those between different communities, i.e., B =
. Notice that we
Bc(i),c(j)
have to require Bc(i),c(j) ≤ min
for all i, j, when predefining
matrix B; otherwise, the simulated network would be against the clustering struc-
ture obtained by our algorithm(s). Suppose that B (the probabilistic structure of
network) is specified, we are able to simulate the entries in the adjacency matrix
Bc(i),c(i), Bc(j),c(j)
(cid:110)
(cid:111)
(cid:16)
(cid:17)
(cid:16)
(cid:17)
aij = Bernoulli
Bc(i),c(j)
for i < j. Suppose that the network is undirected, we have aji equal aij by sym-
metry. We also assume that all the entries on the diagonal equal 0, as loops are not
considered in our study.
To quantitatively evaluate the performance of algorithms, we adopt two well-
defined robust measures: the normalized mutual information (NMI) and the Ad-
justed Rand Index (ARI), respectively proposed in [8] and in [16]. Suppose that
T is the ground truth of community structure, and S is the clustering result of an
algorithm, the NMI of T and S is given by
−2(cid:80)CT
k=1
k=1 Nk· log
(cid:80)CT
(cid:80)CS
(cid:16) Nk·
(cid:17)
N··
l=1 Nkl log
+(cid:80)CS
(cid:16) NklN··
Nk·N·l
l=1 N·l log
(cid:17)
(cid:16) N·l
N··
(cid:17) ,
NMI(T, S) =
where CT and CS are the number of communities for T and S, respectively; (Nkl)
is a CT × CL confusion matrix, in which Nkl denotes the number of nodes that
should be in community k according to the truth, but are mis-clustered into com-
munity l according to algorithm S; Nk·, Nl·, and N·· are standard definitions of the
sum of the kth row, the sum of the lth column, and the overall sum of the confusion
matrix, respectively. We borrow the same notations and give the definition of ARI
as follows:
(cid:0)Nkl
(cid:80)CS
(cid:80)CT
(cid:104)(cid:80)CT
(cid:1) +(cid:80)CS
(cid:0)Nk·
k=1
l=1
2
k=1
2
(cid:1) −(cid:104)(cid:80)CT
(cid:0)Nk·
(cid:1)(cid:105) −(cid:104)(cid:80)CT
(cid:0)Nl·
k=1
2
(cid:1)(cid:80)CS
(cid:0)Nk·
(cid:0)Nl·
(cid:1)(cid:80)CS
(cid:1)(cid:105)(cid:14)(cid:0)N··
(cid:0)Nl·
(cid:1)
(cid:1)(cid:105)(cid:14)(cid:0)N··
2
2
l=1
(cid:1) .
l=1
2
k=1
2
l=1
2
2
ARI(T, S) =
1
2
16
(cid:16)
(cid:40)
(cid:40)
1,
0,
M (T )
ij =
1,
0,
and
M (S)
ij =
(cid:16)
In addition, we propose a measure analogous to NMI. Once again, assuming
that T is the true structure of the simulated network based on SBMs, and S is the
analogy from our clustering algorithm, we consider two n × n binary matrices,
M (T )
, defined respectively as follows:
(cid:17)
(cid:17)
and
M (S)
ij
ij
Nodes i and j are in the same community in model T ,
otherwise;
Nodes i and j are in the same community by algorithm S,
otherwise.
Our measure is defined on a cluster level, and in the form of an h × h matrix. The
fundamental principle of our measure is simple; that is, we compute the proportion
of mis-clustered nodes, from cluster to cluster. More precisely, for all nodes in
different communities k and l (k (cid:54)= l) under T , the error measure is given by
kl =
i,j s.t.
c(T ) (i)=k,c(T )(j)=l
(cid:88)
(cid:88)
(cid:12)(cid:12)(cid:12)M (T )
ij − M (S)
nknl
ij
(cid:12)(cid:12)(cid:12)M (T )
ij − M (S)
nk(nk − 1)
ij
(cid:12)(cid:12)(cid:12)
,
(cid:12)(cid:12)(cid:12)
.
where nk and nl are the sizes of communities k and l, respectively. The error
measure for a single community k is defined analogously, i.e.,
kk =
i,j s.t.
c(T )(i)=c(T )(j)=k
Ultimately, the error matrix is given by
= (kl)h×h.
We would like to point out that our error matrix measure can be more appealing
in some comprehensive analysis, as it shows where (i.e., in which community or
communities) exactly a large amount of mis-clustering occurs when the clustering
result far deviates from ground truth.
5.1 Effect of threshold p
In the first experiment, we show that a correct choice of threshold p has a significant
impact on the p-clique index clustering algorithm (c.f. Algorithm 1). We simulate
17
Cluster (size: 100) Cluster 2 (size: 10) Cluster 3 (size: 10)
Cluster 1 (size: 100)
Cluster 2 (size: 10)
Cluster 3 (size: 10)
0.2
0.05
0.05
0.05
0.5
0.05
0.05
0.05
0.5
Table 1: Link densities of clusters of a simulated SBM1
an SBM consisting of 120 nodes which are clustered into three communities of
sizes 100, 10 and 10, respectively. The parameters of in-group and cross-group
link densities are summarized in Table 1.
The expected clique score of the simulated SBM1 is approximately 0.1597,
which can be used as an estimate of the overall link density of the network. Let
the error parameter α be equal to 0.025. According to Equation (6), the upper
bound for the threshold p is 0.09541. On the other hand, the lower bound for p
(c.f. Equation (7)) is max{0.0635, 0.0927} = 0.0927. Suppose that we choose
p = 0.09, simulate 100 independent SBM1s, and compute the distance-based error
matrix . Albeit the threshold p is just slightly less than the lower bound, we have
a large under-clustering error for clusters 2 and 3, i.e., 23 = 32 = 0.2218 with
standard error SE(23) = SE(32) = 0.0376, indicating that the probability of
misclassifying nodes from these two clusters is about 22% in average. Suppose
that the value of p is increased to 0.11 (even though p = 0.11 is greater than the
upper bound), the errors 23 = 32 drop dramatically to 0.0614 with standard error
SE(23) = SE(32) = 0.0172. As 23 = 32 ≈ 6% is the largest entry in the
error matrix for p = 0.11, it seems that over-clustering does not bring too much
trouble in this experiment; the reason is that all predefined in-group densities are
significantly larger than cross-group densities. Due to the limit of space, we refer
the interested readers to [23, Sections 4.2 and 4.3] for more analogous examples.
Nevertheless, as long as the parameter p is fairly close to the proposed threshold
selection interval from the above, the clustering outcomes for this experiment (c.f.
Table 1) are under satisfactory. We choose the optimal value of p = 0.9527, and
depict the result in Figure 2, where the three communities are clearly identified and
colored by blue, red and green.
18
Figure 2: Clustering result of SBM1 by Algorithm 2; p = 0.9527
5.2 Global threshold v.s. localized thresholds
The next experiment is designed to compare the performance of the algorithms
proposed in this manuscript. We show that the localized algorithm provides more
reliable outcomes when the threshold p is unknown. We consider SBM2 with 140
nodes which are clustered into three communities of sizes 100, 20 and 20, respec-
tively. The parameters of in-group and cross-group link densities are summarized
in Table 2.
Cluster 1 (size: 120) Cluster 2 (size: 20) Cluster 3 (size:20)
Cluster 1 (size: 120)
Cluster 2 (size: 20)
Cluster 3 (size: 20)
0.2
0.05
0.05
0.05
0.6
0.12
0.05
0.12
0.8
Table 2: Link densities of clusters of simulated SBM2
The expected clique score of the simulated SBM2 is approximately 0.1546.
We again set the error parameter α at 0.025. The associated threshold parameter p
19
according to Equation (6) is 0.0959. As the parameter p is less than the cross-group
link density between communities 2 and 3, it seems to be difficult to separate the
two clusters with the overall threshold p via Algorithm 1. To verify our conjecture,
we simulate 100 independent SBM2s, compute the NMI for each replication, and
take the average as an estimate. We obtain (cid:91)NMI = 0.8488 with standard error
0.0025. In addition, we compute the proposed block-wise distance-based measure,
summarized in Table 3.
Cluster 1
Cluster 2
Cluster 3
11 = 0.0006
12 = 0.0.0012
13 = 0.0012
SE(11) = 0.0011 SE(12) = 0.0003 SE(13) = 0.0003
21 = 0.0012
22 < 10−4
23 = 0.9890
SE(21) = 0.0030
SE(22) < 10−4
SE(23) = 0.0010
31 = 0.0012
32 = 0.9890
33 = 0.0010
SE(31) = 0.0030 SE(32) = 0.0010 SE(23) = 0.0009
Cluster 1
Cluster 2
Cluster 3
Table 3: The block-wise error measure of clustering SBM2 via Algorithm 1
Although community 1 is successfully identified, we observe that the estimate
of error rate between communities 2 and 3 is 23 = 0.9890 = 98.90%, which sug-
gests that the BiPartition algorithm with the global threshold p = 0.0959 fails to
separate these two communities almost surely. This is also reflected in the cluster-
ing result (via Algorithm 1) of the simulated SBM (c.f. Table 2) given in Figure 3.
The entire network is divided into two cluster (rather than three), which are colored
by red and green.
We remedy this problem by applying the localized clustering algorithm, i.e.,
Algorithm 2. We start with the root node (the original simulated SBM) in the bi-
nary tree structure. We use threshold p = 0.0959 to bipartition the root node,
and obtain community 1, and subnetwork 2, where the latter requires for further
clustering. Subnetwork 2 consists of 40 nodes and the expected clique score is
approximately 0.4026. With the same α = 0.025, the updated threshold param-
eter for subnetwork 2 is 0.2536. We would like to mention that in practice we
also compute the threshold parameter for subnetwork 1 (community 1), and obtain
20
Figure 3: Clustering result of SBM2 by Algorithm 1
0.1231 for implementing Algorithm 2, where we find that no further subdivision is
needed. After subdividing subnetwork 2, we continue to compute new thresholds
for both subsequent subnetworks, and ultimately find that they form the other two
communities in the network.
Another 100 independent SBMs are simulated, and the NMI for each simulated
network is computed. The mean estimate is (cid:91)NMIlocal = 0.9677 with standard
error 0.0034. We also compute the block-wise error rates, and present them in
Table 4, where we find a significant improvement of 23 = 32 = 0.0019 versus
0.9890. The small error rate implies that the communities 2 and 3 are significantly
identifiable according to the updated threshold for subnetwork 2. Analogously,
we depict the clustering result of a simulated SBM via Algorithm 2, shown in
Figure 4. The network is successfully divided into three communities as predefined
in Table 2. The communities are colored by blue, red and green.
5.3 The propose algorithm v.s. modularity maximization
Notice that the algorithm proposed in this manuscript is inspired from the mod-
ularity maximization algorithm.
In this section, we would like to compare the
proposed algorithm with the modularity approach.
In the literature, there is an
extensive discussion about the limitations and drawbacks of the modularity-based
algorithms. One of the most significant problems of the modularity method is
21
Cluster 1
11 = 0.0231
Cluster 2
12 < 10−4
SE(11) = 0.0033
SE(12) < 10−4
Cluster 3
13 = 0.0001
SE(13) < 10−4
21 < 10−4
SE(21) < 10−4
31 < 10−4
SE(31) < 10−4
22 = 0.0334
23 = 0.0019
SE(22) = 0.0057 SE(23) = 0.0019
32 = 0.0019
33 = 0.0357
SE(32) = 0.0019 SE(23) = 0.0067
Cluster 1
Cluster 2
Cluster 3
Table 4: The block-wise error measure of clustering SBM2 via Algorithm 2
that the maximization of modularity score is not always consistent with the opti-
mized clustering outcome, which was addressed by [7]. This limitation is related
to under-clustering, as it seems that the modularity maximization algorithm in-
tends to merge small clusters, especially in large-size networks. It is believed that
the modularity-based methods undergo over-clustering problems as well. Both of
these issues were stressed and discussed in [26] and [17]. To the best of our knowl-
edge, neither of them has been systematically solved up to date. We refer the read-
ers to [3] for extensive discussions about inconsistency of clustering results from
the modularity maximization algorithm. On the other hand, both over-clustering
and under-clustering concerns are considered and well controlled in our algorithm,
which empirically ensures consistency. We present the following three simulation
examples to show resistance of the proposed algorithm in this manuscript.
We reconsider SBM1, a simulated network contains two extremely small com-
munities which are extremely loosely linked; SBM2, a simulated network contains
two relatively small communities which are fairly loosely linked; and SBM3, a
simulated network which is partitioned into communities of approximately even
size. The structural parameters are summarized in Table 5.
We respectively apply the modularity maximization algorithm and the localized
clique-based algorithm to these three networks, and evaluate the clustering results
by using the mean estimates of both NMI and ARI, based on 100 independent
copies of each simulated network. The results are presented in Table 6.
Based on the experimental results, we observe that the modularity maximiza-
22
Figure 4: Clustering result of SBM2 by Algorithm 2
tion algorithm performs extremely poorly for SBM1. As a matter of fact, the
modularity algorithm even fails to distinguish the two smaller communities (c.f.
clusters 2 and 3). As the sizes of small communities and the link density there-
between increase, the modularity maximization algorithm recovers (as reflected in
the results for SBM2), but apparently still does not appear as well-performed as
our algorithm. For networks comprising similar-size communities (e.g., SBM3),
the modularity maximization algorithm seems to outperform our algorithm, but
not significantly. Having the randomness of simulated networks in mind, we thus
conclude that the proposed algorithm in this manuscript is preferred due to its con-
sistency and reliability.
5.4 Time complexity
In the era of big data, researchers always concern about the efficiency of algo-
rithms, especially the newly proposed algorithm, when the network size is large.
In the last part of this section, we look into this issue numerically by implementing
the localized algorithm in Python for several networks of different sizes and struc-
ture. Both mean estimates of NMI and ARI are computed. Our testing results are
summarized in Table 7. We are convinced that the proposed algorithm is able to
provide accurate clustering results in a relatively short amount of time.
23
Cluster 1 (size: 60) Cluster 2 (size: 40) Cluster 3 (size:40)
Cluster 1 (size: 60)
Cluster 2 (size: 40)
Cluster 3 (size: 40)
0.2
0.05
0.05
0.05
0.6
0.12
0.05
0.12
0.8
Table 5: Link densities of clusters of a simulated SBM3
Network
(cid:91)NMI
Modularity maximization
SE((cid:91)NMI) (cid:100)ARI
SE((cid:100)ARI) (cid:91)NMI
Localized clique-based method
SE((cid:91)NMI) (cid:100)ARI
SE((cid:100)ARI)
SBM1
0.1681
0.0057
0.0514
0.0056
0.9309
0.0047
0.8556
0.0074
SBM2
0.7525
0.0092
0.5159
0.0106
0.9677
0.0030
0.9525
0.0035
SBM3
0.9568
0.0048
0.9055
0.0054
0.9477
0.0039
0.8719
0.0064
Table 6: Comparison of clustering results respectively from the modularity maxi-
mization algorithm and the localized clique-based algorithm
6 Concluding remarks
In this section, we address several remarks and discuss some possible future work.
To conclude, we propose a new clique-based measure in this manuscript to eval-
uate the quality of network clustering, and design an algorithm to maximize an
objective function based on the proposed measure. The clique score of each com-
munity in our clustering result is guaranteed to be higher than some predetermined
threshold p. We also consider the situation at which the threshold p is unspecified.
We develop an approach which accounts for over-clustering and under-clustering
problems simultaneously to select localized p for the network and its subsequent
networks. An associated localized algorithm is proposed and discussed.
Studies of networks or network models usually involve big data problems.
When network size or parameter space or both are large, it is always challeng-
ing to use model-based clustering methods, as many of them depend on accurate
but slow Bayesian MCMC algorithms, for example [22]. However, the methods
24
Number of clusters Number of simulations (cid:91)NMI (cid:100)ARI
Time
3
4
10
25
100
100
20
20
0.8596
0.9309
92.7 ms
0.9687
0.9779
94.5 ms
0.9895
0.9901
1.66 s
0.8960
0.8869
12.6 s
Size
120
1270
7000
20000
Table 7: A summary of community detection for several simulated SBMs via Al-
gorithm 2
proposed in this manuscript attempt to convert clustering analysis to optimization
problems. Therefore, many sophisticated machine learning techniques and well-
developed approximation methods are ready to use to deal with big data issues.
It is worthy of mentioning that the methods considered in this manuscript also
applicable to sparse social network, since the computation of p-clique index is
primarily based on the p-clique matrix C(p) = A − p(1n×n − In×n). This matrix
is not sparse even if the adjacency matrix A is sparse. Numerical methods, such
as the Lanczos method in [4], promise that the eigenvector corresponding to the
largest eigenvalue of C(p) always can be determined very fast.
The development of the localized clustering algorithm in this paper depends on
a strong assumption that the null network is an Erdos-R´enyi model. This may not
be true for many real-world networks. It is suggested in [2] that many networks
around us follow power law, which is not the case for the Erdos-R´enyi graphs. We
conjecture that it may be more accurate to consider a scale-free network as null for
the studies of social networks possessing power-law property, and we will consider
future research in this direction.
References
[1] AIROLDI, E.M., BLEI, D.M., FIENBERG, S.E. and XING, E.P. Mixed mem-
bership stochastic blockmodels. Journal of Machine Learning Research, 9,
1981–2014. (2008)
[2] BARAB ´ASI, A.-L. and ALBERT, R. Emergence of scaling in random net-
works. Science, 286, 509–512. (1999)
25
[3] BICKEL, P.J. and CHEN, A. A nonparametric view of network models and
Newman-Girvan and other modularities Proceedings of the National Academy
of Sciences of the United States of America, 106, 21068–21073. (2009)
[4] CALVETTI, D., REICHEL, L. and SORENSEN, D. An implicitly restarted
Lanczos method for large symmetric eigenvalue problems. Electronic Trans-
actions on Numerical Analysis, 2, 1–21. (1994)
[5] CHUNG, F.R.K. Spectral Graph Theory. American Mathematical Society,
Providence, RI. (1997)
[6] ERD OS, P. and R ´ENYI, A. On random graphs I. Publicationes Mathematicae,
6, 290–297. (1959)
[7] FORTUNATO, S. and BARTH ´ELEMY, M. Resolution limit in community de-
tection. Proceedings of the National Academy of Sciences of the United States
of America, 104, 36–41. (2007)
[8] FRED, A. and JAIN, A. Robust data clustering, in the Proceedings of IEEE
Computer Society Conference on Computer Vision and Pattern Recognition, 2,
128–133. (2003)
[9] GILBERT, E. N. Random graphs. Annals of Mathematical Statistics, 30, 1141–
1144. (1959)
[10] GOLDENBERG, A., ZHENG, A.X., FIENBERG, S.E. and AIROLDI, E.M.
A survey of statistical network models. Foundations and Trends in Machine
Learning, 2, 129–233. (2010)
[11] HANDCOCK, M.S., RAFTERY, A.E. and TANTRUM, J.M. Model-based
clustering for social networks. Journal of the Royal Statistical Society, Series
A, 170, 301–354. (2007)
[12] HOFF, P.D., RAFTERY, A.E. and HANDCOCK, M.S. Latent space ap-
proaches to social network analysis. Journal of the American Statistical Associ-
ation, 97, 1090–1098. (2002)
[13] HOLLAND, P. W. and LEINHARDT, S. An exponential family of probability
distributions for directed graphs. Journal of the American Statistical Associa-
tion, 76, 33–50. (1981)
[14] HOLLAND, P.W., LASKEY, K.B. and LEINHARDT, S. Stochastic blockmod-
els: First steps. Social Networks, 5, 109–137. (1983)
26
[15] HORN, R.A. and JOHNSON, C.R. Matrix Analysis. Cambridge University
Press, New York. (1985)
[16] HUBERT, L. and ABRABIE, P. Comparing partitions. Journal of Classifica-
tion, 2, 193–218. (1985
[17] LANCICHINETTI, A. and FORTUNATO, S. Limits of modularity maximiza-
tion in community detection. Physical Review E, 84, 066122. (2011)
[18] NEWMAN, M.E.J. The structure of scientific collaboration networks. Pro-
ceedings of the National Academy of Sciences of the United States of America,
98, 404–409. (2001)
[19] NEWMAN, M.E.J., STROGATZ, S.H. and WATTS, D.J.. Random graphs
with arbitrary degree distributions and their applications. Physical Review E,
64, 026118. (2001)
[20] NEWMAN, M.E.J. Modularity and community structure in networks. Pro-
ceedings of the National Academy of Sciences of the United States of America,
103, 8577–8582. (2006)
[21] NG, A.Y., JORDAN, M.I. and WEISS, Y. On spectral clustering: Analysis
and an algorithm. Advances in Neural Information Processing Systems, 14, 849–
856. (2001)
[22] SNIJDERS, T.A.B. and NOWICKI, K. Estimation and prediction for stochas-
tic blockmodels for graphs with latent block structure. Journal of Classification,
14, 75–100. (1997)
[23] OUYANG, G. Social Network Community Detection. Ph.D. dissertation. Uni-
versity of Connecticut. (2015)
[24] PAO, L.-F. Discovering the dynamics of smart business networks. Computa-
tional Management Science, 1, 445–458. (2014)
[25] PEI, X., ZHAN, X.-X. and JIN, Z. Application of pair approximation method
to modeling and analysis of a marriage network. Applied Mathematics and Com-
putation, 294, 280–293. (2017)
[26] REICHARDT, J. and BORNHOLDT, S. Statistical mechanics of community
detection. Physical Review E, 74, 016110. (2006)
[27] SHI, J. and MALIK, J. Normalized cuts and image segmentation. IEEE
Transaction on Pattern Analysis and Machine Intelligence, 22, 888–905. (2000)
27
[28] WATTS, D.J. and STROGATZ, S.H. Collective dynamics of "small-world"
networks. Nature, 440–442. (1998)
[29] WOHLGEMUTH, J. and MATACHE, M.T. Small-wold properties of Facebook
group networks. Complex Systems, 23, 197–225. (2014)
28
|
1902.03093 | 1 | 1902 | 2019-01-31T16:59:01 | A large-scale crowdsourced analysis of abuse against women journalists and politicians on Twitter | [
"cs.SI",
"cs.LG",
"stat.AP",
"stat.ML"
] | We report the first, to the best of our knowledge, hand-in-hand collaboration between human rights activists and machine learners, leveraging crowd-sourcing to study online abuse against women on Twitter. On a technical front, we carefully curate an unbiased yet low-variance dataset of labeled tweets, analyze it to account for the variability of abuse perception, and establish baselines, preparing it for release to community research efforts. On a social impact front, this study provides the technical backbone for a media campaign aimed at raising public and deciders' awareness and elevating the standards expected from social media companies. | cs.SI | cs |
A large-scale crowd-sourced analysis of abuse against
women journalists and politicians on Twitter
Laure Delisle∗†
Element AI
Alfredo Kalaitzis∗†
Element AI
Krzysztof Majewski†
Element AI
Archy de Berker†
Element AI
Milena Marin‡
Amnesty International
Julien Cornebise†
Element AI
Abstract
We report the first, to the best of our knowledge, hand-in-hand collaboration
between human rights activists and machine learners, leveraging crowd-sourcing
to study online abuse against women on Twitter. On a technical front, we carefully
curate an unbiased yet low-variance dataset of labeled tweets, analyze it to account
for the variability of abuse perception, and establish baselines, preparing it for
release to community research efforts. On a social impact front, this study provides
the technical backbone for a media campaign aimed at raising public and deciders'
awareness and elevating the standards expected from social media companies.
1
Introduction
Social media platforms have become a critical space for women and marginalized groups to express
themselves at an unprecedented scale. Yet a stream of research by Amnesty International [1, 2]
showed that many women are subject to targeted online violence and abuse, which denies them the
right to use social media platforms equally, freely, and without fear. Being confronted with toxicity at
a massive scale leaves a long-lasting effect on mental health, sometimes even resulting in withdrawal
from public life altogether [3]. A first smaller-scale analysis of online abuse against women UK
Members of Parliament (MPs) on Twitter [4, 5] proved the impact such targeted campaigns can have:
it contributed to British Prime Minister Theresa May publicly calling out the impact of online abuse
on democracy [6].
This laid the groundwork for the larger-scale Troll Patrol project that we present here: a joint effort
by human rights researchers and technical experts to analyze millions of tweets through the help
of online volunteers. Our main research result is the development of a dataset that could help in
developing tools to aid online moderators. To that end, we i) Designed a large, enriched, yet unbiased
dataset of hundreds of thousands of tweets; ii) Crowd-sourced its labeling to online volunteers; iii)
Analyzed its quality via a thorough agreement analysis, to account for the personal variability of
abuse perception; iv) Compared multiple baselines with the aim of classifying a larger dataset of
millions of tweets. Beyond this collaboration, this should allow researchers worldwide to push the
envelope on this very challenging task -- one of many in natural language understanding [7].
The social impact Amnesty International is aiming for is ultimately to influence social media compa-
nies like Twitter into increasing investment and resources -- under any form -- dedicated to tackling
online abuse against women. With this study, we contribute to this social impact by providing the
research backbone for a planned media campaign in November 2018.
2 Crowd-sourcing an importance-sampled enriched set
Core to this study is the careful crafting of a large set of tweets followed by a massive crowd-sourced
data labeling effort.
∗Equal contribution. †{laure,freddie,km,archy,julien}@elementai.com; ‡[email protected]
32nd Conference on Neural Information Processing Systems (NIPS 2018), Montréal, Canada.
Figure 1: Left to right: Distribution of annotations-per-tweet: To analyze agreement, we used only tweets
annotated more than twice (∼73k); Values of Contain Abuse are ordinal; Type and Medium conditioned on
Contain Abuse (cid:54)= No: the majority of abuse is not easily classified, and the vast majority of abuse is textual.
Studied population: We selected 778 women politicians and journalists with an active, non-protected
Twitter account, with fewer than 1 million followers, including most women British MPs and all
US Congresswomen, and journalists from a range of news organizations representing a diversity of
media bias. Full details are in Appendix A.
Tweet collection: 14.5M tweets mentioned at least one woman of interest during 2017. We obtained
a subset of 10K per day sampled uniformly from Twitter's Firehose, minus tweets deleted since
publication, totaling 2.2M tweets.
Pre-labeling selection: Taking into account the average labeling time per tweet from a pilot study,
the expected duration of the campaign, and the expected graders' engagement, we targeted labeling
at most 275K tweets in triplicate. We first selected 215K tweets, correcting the 10K daily cap using
per-day stratified sampling proportional to each day's actual volume. While this sample is statistically
representative of the actual tweet distributions, its class imbalance would induce high variance into
any estimator, and waste the graders' engagement. We therefore enriched the dataset with 60K tweets
pre-filtered through the Naive-Bayes classifier pre-trained in [5]. To maintain statistical non-bias, we
keep track of the importance sampling weights.
Volunteers labeling via crowd-sourcing: Finally, these tweets, properly randomized, were deployed
through Amnesty Decoders, the micro-tasking platform based on Hive [8] and Discourse [9] where
Amnesty International engages digital volunteers (mostly existing members and supporters) in
human rights research. Great effort was put into designing a user-friendly, interactive interface,
accessible at [10] -- see Appendix D for screenshots. After a video tutorial, volunteers were shown
an anonymized tweet from the randomized sample, then were asked multiple-choice questions: 1)
"Does the tweet contain problematic or abusive content?" (No, Problematic, Abusive). Unless their
answer was No, the follow-up questions were "What type of problematic or abusive content does it
contain?" (at least one of six) and (optional question) "What is the medium of abuse?" (one of four).
See Fig. 1 for details and summary statistics. At all times they had access to definitions and examples
of abusive and problematic content, and the typologies thereof -- see Appendix E.
By August 2018, 157K unique tweets containing 167K mentions of the studied individuals had been
categorized at least once, totalling 337K labels, thanks to the contribution of 4, 537 online volunteers.
Experts labeling: In addition to engaging digital volunteers, Amnesty also asked three experts
(Amnesty's researcher on online abuse against women, Amnesty's manager of the Troll Patrol project
and an external expert in online abuse) to label a sub-set of 568 tweets. Those tweets were sampled
from tweets labeled by exactly three volunteers as of June 8, 2018. To ensure low variance in the
estimates, we once again used importance sampling, inflating the proportion of potentially abusive
tweets by sampling 500 tweets uniformly from those labeled as "Abusive" by the Naive-Bayes
classifier mentioned in [5] and "Basic Negative" by Crimson Hexagon's sentiment analysis (our
Firehose access provider), and 500 tweets uniformly sampled on the remainder.
Re-weighting after importance sampling: To ensure that any inference or training based on the
enriched sample is representative of the Twitter distribution, we use importance sampling to re-weight
the tweets in the empirical distribution. The weights are defined as the ratio of the target distribution
(as estimated by the daily counts) and the enriched distribution -- see Appendix C for the full derivation
of the weights.
2
123456789times annotated25k50kno. tweetsAnnotation countsNoProblematicAbusive0255075%300k28k7kIs the content problematic or abusive?10k20kNASexual threatsHomophobia or transphobiaEthnic or religious slurPhysical threatsRacismSexism or misogynyOther0%2%2%5%5%8%22%55%Type of abusive content103104VideoOther attachmentnaImageText0.5%0.5%0.7%4.3%94.1%Medium of abuse3 Analysis and generalization
3.1 Agreement analysis
We quantified the agreement among raters -- within crowd and within experts -- using Fleiss' kappa (κ),
a statistical measure of inter-rater agreement [11]. κ is designed for nominal (non-ordinal categorical)
variables, e.g. Fig 1(c), whereas in ordinal variables κ tends to underestimate the agreement because
it treats the disagreement between Problematic <> Abusive the same as No <> Abusive. We also use
the intra-class correlation (ICC) [12] for ordinal categorical annotations, like Contains Abuse: No
< Problematic < Abusive. We define κ and icc below, and further explain in Appendix B.
Figure 2: Visualizing the distribution of annotations a(t) (+ jitter for clarity) in the multinomial 2-simplex.
The corners are events of complete agreement. The center is no agreement with the non-ordinal assumption, but
c = 3, c ∼ P (C); Agreement
partial agreement with ordinality. Left to right: Simulated perfect agreement, a(t)
among 3 experts on 1000 tweets: empirical probabilities are visually amplified by over-sampling a(t) to 20k;
Agreement among N = 3 Decoders per tweet: if N > 3, raters are chosen randomly; Simulated agreement-by-
chance only: a(t) ∼ Multinomial (N = 3, p = P (C)). The multinomial assumes independence between trials.
A hierarchical modeling approach can capture inter-rater dependence [13, 14].
Fleiss' kappa:A rater can annotate a tweet as class c ∈ C = {No, Problematic, Abusive}. The
annotation a = (aN o, aP r, aAb), ac ∈ {0, 1, 2, 3}, Σcac = N, contains the class counts for a tweet
annotated by N raters. The overall agreement for a set of tweets T is κ = 1T Σtκ(t), where
N (N−1) ∈ [0, 1] is the fraction of
κ(t) = Σcr(t)
pairs of raters that agree on c. P (C = c) = pc is the empirical probability of c, hence Σcp2
c is the
probability of agreement-by-chance.
is the within-tweet agreement, and rc = ac(ac−1)
c −Σcp2
1−Σcp2
c
c
ICC (intra-class correlation): Let A ∈ RT×N be the matrix of annotations, Ai,j ∈ {0, 1, 2}
(ordinal values raters can assign), and each row is a tweet annotated by N random raters. The
N ΣjAi,j and the overall mean is µ = 1T Σiµi. The within-tweet
tweet-specific mean is µi = 1
(N−1) Σj (Ai,j − µi)2, and its average Vw = 1T ΣiV (i) is the
disagreement for tweet i is V (i) = 1
overall within-tweet variance. Similarly, the between-tweet variance is Vb = NT−1 Σi(µi − µ)2. The
icc can now be expressed in terms of a one-way ANOVA [12]: icc =
, the fraction of
variation in annotations that is not explained by between-tweet disagreements.
Results: Table 1 and Figure 2 (mid left / mid right) show more agreement among the experts than
among the volunteers -- higher κ and ICC among the former. There is also more agreement when
assessing the presence of abuse than when assessing the type of abuse.
Vb+(N−1)Vw
Vb−Vw
Figure 3: Left & center: performance of Perspective API and fine-tuned BERT classifiers, with respect to the
experts' and crowd's labels. Right: performance of the crowd-as-a-classifier against the experts' labels. Note:
Recall is equivalent to TPR, hence the y-axes (TPR<>Recall) of the two plots are aligned.
3
Problematic0123Abusive0123No0123Simulated perfect agreementProblematic0123Abusive0123No0123Agreement amongst expertsProblematic0123Abusive0123No0123Agreement amongst DecodersProblematic0123Abusive0123No0123Simulated agreement by chance12log10 probability0.00.51.0FPR0.00.20.40.60.81.0TPR0.00.51.0precision(0.29, 0.52)(0.45, 0.41)weighted ROC / Precision-Recall (Perspective)vs Experts (auc=0.78, F1-opt=0.38)vs Crowd (auc=0.89, F1-opt=0.43)F1-optimal0.00.51.0FPR0.00.20.40.60.81.0TPR0.51.0precision(0.50, 0.44)(0.35, 0.57)weighted ROC / Precision-Recall (fine-tuned BERT)vs Experts (auc=0.89, F1-opt=0.47)vs Crowd (auc=0.91, F1-opt=0.43)F1-optimal0.00.51.0FPR0.00.20.40.60.81.0TPR0.51.0precision(0.41, 0.53)weighted ROC / Precision-Recall (Crowd)vs Experts (auc=0.90, F1-opt=0.46)F1-optimalTable 1: Agreement per variable and
per labeling cohort.
Experts
Labels from
Contain Abuse
Type of Abuse
Crowd
κ
.26
.16
ICC κ
.35
-
.54
.74
ICC
.70
-
Table 2: Classifier performance vs. crowd vs. expert labels
Labels from
Naive Bayes
Crimson Hexagon
Davidson et al.
Perspective API
Fine-tuned BERT
Crowd
Crowd
P recision Recall F ∗
.13
.17
.20
.14
.36
.53
.43
.45
.43
.35
-
-
.25
.40
.27
.41
.57
-
1 AP
.11
-
.25
.34
.40
-
Experts
P recision Recall F ∗
.40
.32
.04
.05
.39
.35
.38
.29
.47
.50
.41
.46
.27
.04
.46
.52
.44
.53
1 AP
.21
-
.25
.25
.36
.39
3.2 Comparison of baseline classifiers
The core focus in this study is to build and analyze the dataset, with a view to extend that analysis to
the remaining 2M unlabeled tweets using state of the art models. We prepare this follow-up research
community effort by establishing baselines on various classification models.
Classifiers: In Table 2, Naive Bayes refers to the classifier from [5]. Crimson Hexagon refers to
sentiment labels -- Category and Emotion -- from Crimson Hexagon. We also benchmarked the
pre-trained classifier from Davidson et al. [15]. Perspective API refers to the public toxicity scoring
API provided by Jigsaw [16, 17]. We also trained our own model, which combined a pre-trained
BERT embedder [18] and an abuse-specific embedding trained from scratch. For details see F.
Methodology: For this analysis, we conflate the labels Problematic and Abusive into one positive
(Abusive) class. The crowd labels are the majority votes over labels on tweets labeled by exactly
three volunteers. The expert labels are majority votes over labels from the three domain experts
mentioned in Section 2. For Crimson Hexagon, we define Abusive as the intersection of Category
= Basic Negative and Emotion = Anger Disgust.
Results: Table 2 shows the F ∗
1 (optimal F1 score), corresponding precision and recall, and the
Average Precision (AP ), to evaluate several abuse detection classifiers with respect to labels from the
crowd and from the experts.
4 Discussion
Dataset availability and reproducibility: Amnesty International intends to publish as much of the
dataset as possible to encourage replication and further research on the topic. At the very least the
URLs of the tweets and the grades will be made public. Publishing the actual tweets is more delicate
due to Twitter Terms and Conditions. Publishing the meta-data on the graders (gender, location)
would be of great interest, but is still under discussion from an ethical point of view.
Future work: We aim to eventually apply different classifiers to the whole unlabeled dataset, so as
to scale up the human rights researchers' work by sifting through the huge amount of tweets. As
shown in Section 3.2, this will require a careful tuning of models to increase the precision beyond its
current performance. In parallel, we also want to analyze the scale, typology and intersectionality of
abuse, either on the labeled set or on the classified extra 2M tweets, for the planned media campaign.
Social impact: The sheer volume of hateful speech on social media has recently prompted govern-
ments to put strong pressure on social media companies to remove such speech [19]. The moderation
of abusive messages at scale requires some form of automated assistance. Our results highlight the
double challenge of automatic abuse classification: the subjectivity in the labels and the limited ability
of state-of-the-art classifiers to generalize beyond training data. This all points toward the need for
systems where human subtlety and context awareness are empowered by automatic pre-screening.
Whether the companies themselves should be trusted with (or required to implement) such moderation,
or whether they should fund or be supervised by a third-party neutral watchdog, goes far beyond a
purely technical conversation. This is why collaboration between technical experts (machine learners,
data scientists) and domain experts (human rights researchers, anti-censorship activist, etc.), as well
as society in a broader sense, is so important for genuinely impactful AI for Social Good efforts.
Acknowledgements
We are extremely grateful to all the volunteers from Amnesty Decoders for their hard work. We would like to
thank Nasrin Baratalipour, Francis Duplessis, Rusheel Shahani and Andrei Ungur for modelling support. We
also thank Jerome Pasquero for his support, and the Perspective team for access to their API.
4
References
[1] Azmina Dhrodia. Unsocial media: The real toll of online abuse against women, November
2017. URL www.medium.com/amnesty-insights/unsocial-media-the-real-toll-
of-online-abuse-against-women-37134ddab3f4. [Online; posted 20-November-2017].
[2] Amnesty International. Toxic Twitter, 2018. URL https://www.amnesty.org/en/latest/
research/2018/03/online-violence-against-women-chapter-1.
[3] Committee on Standards in Public Life.
Intimidation in public life.
2017. URL
https://assets.publishing.service.gov.uk/government/uploads/system/
uploads/attachment_data/file/666927/6.3637_CO_v6_061217_Web3.1__2_.pdf.
[4] Azmina Dhrodia. Unsocial media: Tracking Twitter abuse against women MPs, Septem-
ber 2017.
URL www.medium.com/@AmnestyInsights/unsocial-media-tracking-
{T}witter-abuse-against-women-mps-fc28aeca498a. [Online; posted 04-September-
2017].
[5] Ekaterina Stambolieva. Technical report, Amnesty International, 2017. URL https://
drive.google.com/file/d/0B3bg_SJKE9GOenpaekZ4eXRBWk0/view.
[6] The Guardian.
to democracy',
URL https://www.theguardian.com/society/2018/feb/05/theresa-may-
2018.
calls-abuse-in-public-life-a-threat-to-democracy-online-social-media.
Theresa may calls abuse in public life 'a threat
[7] Roberto González-Ibáñez, Smaranda Muresan, and Nina Wacholder. Identifying sarcasm in
Twitter: A closer look. pages 581 -- 586, 2011. URL http://dl.acm.org/citation.cfm?id=
2002736.2002850.
[8] New York Times Labs. Hive: Open-source crowdsourcing framework, 2014. URL http:
//nytlabs.com/blog/2014/12/09/hive-open-source-crowdsourcing-framework/.
[9] Discourse. Discussion forum. URL https://www.discourse.org/.
[10] Troll patrol, 2018. URL https://decoders.amnesty.org/projects/troll-patrol.
[11] Joseph L Fleiss. Measuring nominal scale agreement among many raters. Psychological bulletin,
76(5):378, 1971.
[12] Patrick E Shrout and Joseph L Fleiss. Intra-class correlations: uses in assessing rater reliability.
Psychological bulletin, 86(2):420, 1979.
[13] Alfredo Kalaitzis and Ricardo Silva. Flexible sampling of discrete data correlations without
In Advances in Neural Information Processing Systems, pages
the marginal distributions.
2517 -- 2525, 2013.
[14] Ricardo Silva and Alfredo Kalaitzis. Bayesian inference via projections. Statistics and Comput-
ing, 25(4):739 -- 753, 2015.
[15] Thomas Davidson, Dana Warmsley, Michael Macy, and Ingmar Weber. Automated hate
speech detection and the problem of offensive language, 2017. URL https://aaai.org/ocs/
index.php/ICWSM/ICWSM17/paper/view/15665.
[16] Jigsaw. Perspective API. URL https://www.perspectiveapi.com.
[17] Hossein Hosseini, Sreeram Kannan, Baosen Zhang, and Radha Poovendran. Deceiving google's
perspective api built for detecting toxic comments. arXiv preprint arXiv:1702.08138, 2017.
[18] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. Bert: Pre-training of
deep bidirectional transformers for language understanding, 2018.
[19] Björn Gambäck and Utpal Kumar Sikdar. Using convolutional neural networks to classify
hate-speech. 2017.
5
[20] Randal Douc and Eric Moulines. Limit theorems for weighted samples with applications to
sequential Monte Carlo methods. Annals of Statistics, 36(5):2344 -- 2376, 2008.
[21] Hugging Face Development Team. PyTorch pretrained BERT. URL https://github.com/
huggingface/pytorch-pretrained-BERT.
[22] Luis von Ahn.
resources/.
List of abusive words.
URL https://www.cs.cmu.edu/~biglou/
6
A Population definition
We selected politicians and journalists with an active, non protected Twitter account, with fewer than
1 million followers. The group included:
• All women members of the British Parliament (220, including 22 women who left parliament
during the June 2017 elections and excluding one politician with over 1 million followers);
• All women in the United States Congress (107, excluding 3 politicians with more than 1
• And women journalists working at the following news organizations, selected to represent a
million followers);
diversity of media bias:
-- Breitbart (16),
-- Daily Mail (78),
-- The Sun (54),
-- The Guardian (124),
-- The New York Times (278),
-- Gal-Dem (23),
-- PinkNews (9).
B Agreement analysis
B.1 Fleiss' Kappa
Notation A rater can annotate a tweet as class c ∈ C = {No, Problematic, Abusive}. The
annotation tuple a = (aN o, aP r, aAb), ac ∈ {0, 1, 2, . . .}, Σcac = N, contains the class-specific
counts for a tweet annotated by N raters.
Estimation of κ The within-class agreement-ratio rc = ac (ac−1)
N (N−1) ∈ [0, 1] is the ratio of pairs of
raters that agree on c, over the total of pairs of N raters. P (C = c) = pc is the empirical marginal
probability of class c. Hence, Σc p2
c is the overall probability of agreement by chance across a dataset
of tweets. For a specific tweet t we can compute the within-class agreement κ(t)
, where
the numerator is the agreement-above-chance attained on c, and the denominator is the best-case-
scenario (maximal) agreement-above-chance attainable across classes. Hence κ(t)
is the fraction that
c
the attained agreement in c contributes to the best-case scenario, while accounting for agreement-by-
chance. Finally, the within-tweet agreement for a tweet t is the sum across classes, κ(t) = Σcκ(t)
c ,
and the overall agreement across a set of tweets T is the expectation
c −p2
1 − Σcp2
c = r(t)
c
c
κ = ET [κ(.)] ≈ 1T Σtκ(t).
(1)
B.2 ICC (intra-class correlation)
Notation We denote the matrix of annotation as A ∈ RT × N . In this work, Ai, j ∈ {0, 1, 2}
(ordinal values raters can assign), where each row represents a tweet annotated by N random raters.
Algorithm The tweet-specific mean is µi = 1
N ΣjAi,j and the overall mean is µ = 1T Σiµi. We
(N−1) Σj (Ai,j−µi)2.
can express the within-tweet disagreement as the within-tweet variance V (i) = 1
Then the average of within-tweet disagreements expresses the overall within-tweet variance, Vw =
1T ΣiV (i). Similarly, the between-tweet variance is Vb = NT−1 Σi(µi − µ)2. Note that the i-th tweet
is polarized when V (i) is maximized, i.e. half of the raters choose 0 and the other half choose 2. In
the extreme scenario that all tweets are maximally polarizing, Vb = 0. Therefore Vb expresses the
overall tendency for disagreement-by-chance. All classes of ICC are equivalent to a type of ANOVA
(ANalysis Of VAriance) in linear mixed-effects model of annotations [12]. In our case,
(2)
Vb − Vw
Vb + (N − 1)Vw
icc(1, k) =
7
Intuitively, the ANOVA framework defines agreement as the fraction of variation in annotations that
is not explained by between-tweet disagreements.
Systemic disagreement As mentioned above, in extreme scenarios where Vb is small, the ICC can
be negative. Negative κ and icc values might seem like an artifact of degenerate or extreme data, only
to be dismissed as no agreement in the downstream analysis. At closer inspection, the numerator
shows that subtracting the agreement-by-chance yields a measure of systemic disagreement: e.g.
expecting P (agreement-by-chance) = 0.9 but observing agreement only 20% of the time, implies a
systemic cause for polarizing opinions (e.g. controversial content, raters annotating with different
rules).
C Importance sampling analysis
Population and Crimson sets W and C: We denote the population (World set) as W , and the
sample obtained from the Twitter firehose (Crimson set) as C. Members of the sets W and C are
observation tuples (t, k, d), where t is the text content of a tweet, k ∈ {0, 1} is the output of a Naive
Bayes Classifier NBC : t (cid:55)→ k, and d is the day in 2017 that a tweet was published:
C ⊂ W = {(t, k, d)}
(3)
Distributions pW and pC: We define pW and pC as the probability mass over sets W and C,
respectively, and any marginals and conditionals thereof:
(4)
(5)
The density pW (d) is directly available from the daily total volumes nd of tweets matching the query,
total that is provided by Crimson Hexagon alongside the smaller sampled set C:
pW (t, k, d) = pW (t, kd) pW (d)
pC(t, k, d) = pC(t, kd) pC(d)
nd = {(t, k, d(cid:48)) ∈ W : d(cid:48) = d} provided as metadata,
pW (d) =
.
(6)
nd(cid:80)
d(cid:48) nd(cid:48)
The Crimson set C is constructed by uniform sampling over tweets in W , such that for any day d, the
conditional probabilities over both sets are equal:
pC(t, kd) = pW (t, kd)
Then, using eq. (7) in (5):
pC(t, k, d) = pW (t, kd) pC(d)
Constructed set A: The final set A is defined as the union
A = B ∪ F,
where
B = {(t, k, d) ∼ pB(t, k, d) (cid:39) pW (t, kd) pW (d) (cid:39) pW (t, k, d)}
approximates the world joint distribution through stratified sampling per day, and
F = {(t, k, d) ∈ C\B : k = 1}
(11)
is an enriched sample resulting from pre-filtering by a simple Naive Bayes classifier. The cardinalities
of these sets are: C = 2.2M, B = 215k, F = 60k and A = 275k.
With β =
B+F, and z(d) a normalizing constant depending on d:
F
pA(t, kd) =
where I(.) is the indicator function.
The conditional probabilities of a tweet are identical in W and A:
z(d)
βI(k = 1) pA(t, kd) + (1 − β) pA(t, kd)
pW (tk, d) = pA(tk, d) .
Combining equations (13) and (12) leads to:
pA(t, kd) ∝ βI(k = 1) pW (tk, d) pW (kd) + (1 − β) pW (tk, d) pW (kd) .
8
(7)
(8)
(9)
(10)
(12)
(13)
(14)
Importance weights wi: Estimating statistics on the world set W using the samples in set A can
be achieved using importance sampling, i.e. assigning a specific weight pW (t, k, d)/pA(t, k, d) to
each triplet (t, k, d) in A.
For each tweet (t, k, d) ∈ A, we define the weighting function w
w(t, k, d) =
=
pW (t, k, d)
pA(t, k, d)
pW (tk, d) pW (k, d)
pA(tk, d) pA(k, d)
.
Injecting equation (13) in equation (15), we can simplify by pW (tk, d):
w(t, k, d) =
=
pW (k, d)
pA(k, d)
pW (kd) pW (d)
pA(kd) pA(d)
.
(15)
(16)
Since A is a finite set, the probability mass functions pA(kd) and pA(d) in equation (16) are directly
accessible by simple counting.
The probability mass functions pW (d) is known from (6). The term pW (kd) is not available in closed
form, but can be estimated straightforwardly. Indeed from equation (7) we have pW (kd) = pC(kd),
and the latter can be estimated by simple counting on C, leading to empirical estimate:
{(t, k(cid:48), d(cid:48)) ∈ C : k(cid:48) = k}
This leads to the final plug-in estimator of the importance weights:
pW (kd) =
{(t, k(cid:48), d(cid:48)) ∈ C : k(cid:48) = k, d(cid:48) = d}
w(t, k, d) =
pW (kd)pW (d)
pA(kd)pA(d)
.
.
(17)
(18)
For any given function f (t, k, d), we therefore estimate its expectation in the whole population W
using the self-normalized importance estimator:
EW [f (t, k, d)] =
f (ti, ki, di) .
(19)
(cid:88)
(ti,ki,di)∈A
wi(cid:80)
j wj
where for any tweet (ti, ki, di) with GUID (Globally Unique Identifier) i we use the estimated
unnormalized importance weight wi := w(ti, ki, di).
Note that for full mathematical rigour, the asymptotic consistency of the importance sampling
estimator EW could be proven by showing that the replacement of the density estimator pW in the
plug-in estimator w is asymptotically valid. Such a proof could proceed along the lines of [20], but is
outside of the scope of this article.
9
D Labeling tool screenshots
The workflow presented to each grader by the labelling tool is illustrated in Figure 4 and Figure 5.
Figure 4: First stage of labeling: Initial screen showing an anonymized tweet, with anonymized handles and
first question.
(a) Second stage of
labeling:
Identification of the type of abuse.
(b) Third, optional stage of label-
ing: Identification of the part of
the tweet that carries the abuse.
(c) Warning displayed after clas-
sifying a tweet as abusive, to min-
imize the impact on the labelers'
mental health.
Figure 5: Follow-up stages, conditional on the first stage of labeling.
E Definitions and examples used in Troll Patrol - Trigger Warning
Abusive content Abusive content violates Twitter's own rules and includes tweets that promote
violence against or threaten people based on their race, ethnicity, national origin, sexual orientation,
gender, gender identity, religious affiliation, age, disability, or serious disease.
Examples include physical or sexual threats, wishes for the physical harm or death, reference to
violent events, behaviour that incites fear or repeated slurs, epithets, racist and sexist tropes, or other
content that degrades someone. For more information, see Twitter's hateful conduct policy.
In examples shown below, tweets were anonymized and only show a standard template (incl. the
author handle, the author profile picture, the tweet date and time, likes and retweets).
10
Problematic content Hurtful or hostile content, especially if it were repeated to an individual on
multiple or cumulative occasions, but not as intense as an abusive tweet. It can reinforce negative or
harmful stereotypes against a group of individuals (e.g. negative stereotypes about a race or people
who follow a certain religion). Such tweets may have the effect of silencing an individual or groups
of individuals.
Sexism or misogyny
Insulting or abusive content directed at women based on their gender, includ-
ing content intended to shame, intimidate or degrade women. It can include profanity, threats, slurs
and insulting epithets.
Racism Discriminatory, offensive or insulting content directed at a woman based on her race,
including content that aims to attack, harm, belittle, humiliate or undermine her.
Homophobia or transphobia Discriminatory, offensive or insulting content directed at a woman
based on her sexual orientation, gender identity or gender expression. This includes negative
comments towards bisexual, homosexual and transgender people.
Ethnic or religious slur Discriminatory, offensive or insulting content directed at a woman based
on her ethnic or religious identities.
11
Physical threats Direct or indirect threats of physical violence or wishes for serious physical harm,
death, or disease.
Sexual threats Direct or indirect threats of sexual violence or wishes for rape or other forms of
sexual assault.
Other There will be some tweets that fall under the 'other category' that are problematic and/or
abusive. For example, statements that target a user's disability, be it physical or mental, or content
that attacks a woman's nationality, health status, legal status, employment, etc.
F Abuse Classification Model
Model architecture We used a pretrained BERT model [18] (12 layers, 768 units per layer) as
the basis for our classification model. We took the final-layer representation of the first token in the
sequence as a fixed-length tweet embedding (see Figure 3 of [18]). The model was implemented
in Pytorch, and made use of the BERT implementation provided at [21], which in turn utilizes a
pre-trained model provided by Google.
To account for out-of-vocabulary abusive words, we added a second single-layer word embedding
(128 units), which we trained from scratch with a limited abusive vocabulary. This vocabulary
included a list of 1300 'possibly abusive' words available online [22], and the 1000 words which
occurred most disproportionately in the abusive class of the training data. To obtain a fixed-length
representation from this embedder, we took the mean across words in each tweet.
We concatenated these two representations to obtain a fixed-length tweet representation (of length
896), and passed througha fully-connected layer of 64 units before returning a decision via a binary
softmax layer.
Data We split the crowd-sourced data into train, validation, and test sets (90 : 5 : 5). We adjust all
reported performance metrics for the original importance sampling (see C).
Training We trained the model end-to-end with stochastic gradient descent (learning rate = 0.0001,
momentum=0.9) for 11 epochs, minimizing a cross-entropy loss.
12
Figure 6: We combined a pre-trained BERT model with a word embedding exclusively including abusive words.
The two embeddings were concatenated and passed through a fully-connected layer before a softmax layer
returned the prediction. Numbers in orange are layer widths.
13
|
1912.05123 | 1 | 1912 | 2019-12-11T05:35:36 | Collective Identity Formation on Instagram -- Investigating the Social Movement Fridays for Future | [
"cs.SI"
] | In recent years, social media changed the way individuals participate in social movements. While activists demonstrate on the street to fight for a public goal, members of specific movements can also act collective online. Thus, different aspects might influence the formation of collective identity and therefore drive collective action on social media. This study combines the perspectives of social identity- and identity theory in order to examine how members of an opinion-based group contribute to the collective group/social identity formation and therefore, to collective action. To this end, we applied automated text classification techniques to Instagram communication related to the social movement Fridays for Future. Analysing 1,137 comments showed that individuals mainly express Group Cohesion and Emotional Attachment rather than Solidarity by commenting on Instagram. This study further presents a proposed model of collective group/social identity of collective action. Succeeding research aims at enhancing the classification and testing the model. | cs.SI | cs | Australasian Conference on Information Systems
2019, Perth Western Australia
Brünker et al.
Collective Identity Formation on Instagram
Collective Identity Formation on Instagram -- Investigating
the Social Movement Fridays for Future
Research in Progress
Felix Brünker
Professional Communication in Electronic Media/Social Media
University of Duisburg-Essen
Duisburg, Germany
Email: [email protected]
Fabian Deitelhoff
Institute for the Digital Transformation of Application and Living Domains
University of Applied Science and Arts
Dortmund, Germany
Email: [email protected]
Milad Mirbabaie
Faculty of Business Studies and Economics
University of Bremen
Bremen, Germany
Email: [email protected]
Abstract
In recent years, social media changed the way individuals participate in social movements. While
activists demonstrate on the street to fight for a public goal, members of specific movements can also
act collective online. Thus, different aspects might influence the formation of collective identity and
therefore drive collective action on social media. This study combines the perspectives of social identity-
and identity theory in order to examine how members of an opinion-based group contribute to the
collective group/social identity formation and therefore, to collective action. To this end, we applied
automated text classification techniques to Instagram communication related to the social movement
Fridays for Future. Analysing 1,137 comments showed that individuals mainly express Group Cohesion
and Emotional Attachment rather than Solidarity by commenting on Instagram. This study further
presents a proposed model of collective group/social identity of collective action. Succeeding research
aims at enhancing the classification and testing the model.
Keywords: Collective Identity, Identity Theory, Collective Action, Social Movement, Instagram
304
Brünker et al.
Collective Identity Formation on Instagram
Australasian Conference on Information Systems
2019, Perth Western Australia
1 INTRODUCTION
The way individuals participate in social movements changed over the last decades due to the
development of social media platforms (Tye et al. 2018). Individuals now have opportunity structures
(Mirbabaie et al. 2016) to be part of social movements in a virtual way. This step breaks the boundaries
of physical participation in social movements on the streets. However, individuals can not only be part
of a movement by a low-cost effort via social media but rather activist may use social media to catalyse
the participation and popularity of certain social movement which they support. In this way, the
relevance of social movements may increase for society and political agenda such as the #metoo debate
did (Manikonda et al. 2018). However, one recent movement which tries to put the topic of climate
change on the local, as well as global political agenda, is Fridays for Future (Neimark 2019). To this end,
individuals organise and communicate via social media (Stieglitz et al. 2016) and therefore establish
online opinion-based groups (Stieglitz et al. 2018; Thomas et al. 2012) by dedicated social media
accounts such as the profile of "Greta Thunberg", the public face of Fridays for Future. Further, being
part of such an opinion-based group might support common convictions and therefore show up
collective actions.
Regarding this context through the lens of identity theory reveals that not only a group membership
influences the formation of identity within an opinion-based group. Likewise, information systems such
as social media might play a discrete role in identity formation (Carter et al. 2017; Carter and Grover
2015; Liu and Chan 2010). According to identity theory, individuals form their identities by internalised
meanings connected to the Self (Person), an individualised Role, or as a member of a Group (McCall
and Simmons 1966; Stets and Serpe 2013). However, identity theory does not comprehensively include
inter- and intragroup dynamics (Hogg 2018; Turner et al. 1987). Likewise, regarding identity formation
during social movements reveals a multitude of group dynamics which identity theories miss to explain
in-depth (Postmes et al. 2006). Therefore, we consider social identity theory with its subtheory
collective identity to fulfil this gap (Davis et al. 2019).
Therefore, we plan to examine how collective action is influenced by the collective group and social
identity, i.e. collective group/social identity. As this is research in progress, we aim to answer as a first
step how collective group/social identity is formed on social media within a social movement. Thus, we
derived the following research question:
RQ1: How is the collective group/social identity formed on Instagram within an opinion-based
community?
In order to answer the above research question, we analysed comments from two posts on Instagram by
Greta Thunberg, the public face of the social movement Fridays for Future. Overall, we manually
collected 1,137 comments from February 2019 until July 2019 for further analysis. To better understand
collective identity formation and therefore collective action on social media, we provide first insights
how members of an opinion-based community contribute to collective identity formation. As most of
the research on social media focus on Twitter or Facebook (Bunker et al. 2017; Mirbabaie et al. 2017; Oh
et al. 2013; Stieglitz et al. 2017), we decided to examine the case Fridays for Future on Instagram as the
social media platform of choice. In this way, we aim to broaden the understanding of social movement
research on social media by providing findings according to a platform which differs in the way of usage
to Twitter or Facebook. Therefore, we expect to provide new preliminary findings of social movements
on social media in the area of information systems research.
The paper is structured as follows. First, we provide an overview of the collective identity formation on
social media as well as its role in collective action. Second, we outline our research design by describing
the examined case, the data collection, and the data analysis. Furthermore, we present our preliminary
findings based on the data analysis in the subsequent section. Last, we provide a conclusion of our
outcome and an outlook for a follow-up study and further research.
2 BACKGROUND
2.1 Collective Identity Formation on Social Media
In order to understand the formation of (social) collective identity and its impact on collective action on
social media, it is crucial to investigate the role of the individual and (social) group influences (Thomas
et al. 2012). To this end, identity theory describes the individual identity by three overlapping
dimensions: Person, Role and Group/Social (Davis et al. 2019; Stets and Serpe 2013). The dimensions
Person and Role refer to "identities which are internalized meanings attached to the self as a unique
person [as well as] an occupant of a role" (Davis et al. 2019, p. 3). Likewise, group identity describes the
305
Australasian Conference on Information Systems
2019, Perth Western Australia
Brünker et al.
Collective Identity Formation on Instagram
membership in an (activist) community whereas social identity is untied from a network and an
expression of one's status or lifestyle (Davis et al. 2019).
However, taking only identity theory into account is not sophisticating to describe the complex process
of collective identity formation during a social movement. Thus, Davis et al. (2019) integrated the theory
of collective identity into the dimension group/social of identity theory and called it collective
group/social identity (see Figure 1). The scholars described collective identity as a subtheory of social
identity theory that pertains to activist identification on social media (Davis et al. 2019). In this context,
collective group/social identity closes the gap between identity theory and social identity theory by
providing a theoretical foundation which considers the interrelation between individual, interpersonal
and group/social in an information system such as social media (Burke and Stryker 2016; Davis et al.
2019; Miller et al. 2016).
Figure 1: Conceptual integration of collective identity into identity theory (Davis et al. 2019)
Furthermore, collective identity combines the bases group cohesion, emotional attachment, and
solidarity (Polletta and Jasper 2001). These three bases might show up on social media in several ways.
However, even in heterogeneous networks which are loosely connected are these three bases important
for identity formation and maintenance during a social movement (Melucci 1988; Miller et al. 2016). In
the context of social movements, social media provides individuals self-verifying capabilities by various
participation patterns such as liking, commenting or connecting which others (Miller et al. 2016).
Subsequently, evolving personal networks could drive individuals to support the collective. This can be
motivated by emotional attachments on social media (Melucci 1988; White 2010). However, several
influencing factors might form collective action and drive participation in social movements as the social
identity model of collective action (SIMCA) suggests (van Zomeren et al. 2008).
2.2 Collective Identity and Collective Action
Collective action can be described as an action which is exclusively based on the voluntary cooperation
of individuals (Marwell and Oliver 1993). Furthermore, collective action strives to establish a public or
semi-public good (Heckathorn 1996). In this context, existing research often explains group interactions
as a central factor for social identity formation (Postmes et al. 2006; Postmes and Spears 2008; van
Zomeren et al. 2008) as well as opinion-based group identification (Thomas et al. 2012). According to
the integrative meta-analysis of collective action research by van Zomeren et al. (2008), the three
subjective variables perceived injustice, perceived efficacy, and social identification could influence
collective action. The scholars derived the SIMCA (Figure 2) which emphasises a central role of social
identity in promoting collective action. It shows how social identification is formed by group
interactions.
Figure 2: The social identity model of collective action (SIMCA) (van Zomeren et al. 2008)
However, Thomas et al. (2012, 2016) proposed an approach focussing on opinion-based group identity
as well as group-based effects on the formation of collective action. But, the studies neglected the link
306
Australasian Conference on Information Systems
2019, Perth Western Australia
Brünker et al.
Collective Identity Formation on Instagram
between identity theory and the formation of a collective identity towards collective action (Davis et al.
2019). Especially in social movements, individuals forming a collective identity which could emerge on
the basis of group members experiencing a common set of interests or goals (Stets and Serpe 2013).
However, people differ in the level of participation during a social movement which could be related to
individuals' multiple identities or the extent of commitment to the group (Stets and Serpe 2013). Thus,
examining the formation of collective identity is crucial to understand the evolving of collective action
in social movements. We, therefore, aim to examine collective group/social identity (Davis et al. 2019)
to investigate the role of identity formation on collective action.
3 RESEARCH DESIGN
3.1 Case Description
The social movement Fridays for Future grows in global attention due to the large devotion of the head
of the movement, Greta Thunberg. Thunberg is a young Swedish climate activist who started the global
phenomenon Fridays for Future by striking school each Friday. Moreover, this social movement is
mainly driven by young students. Fridays for Future appeals to the citizen in several countries around
the world to stand together and fight against climate change. The members of the movement utilising
social media to organise new strikes and demonstrations. Nowadays, the social movement reached
global attention. The participation in Fridays for Future scores about 4717 strikes in more than 3800
cities across every continent ("Strike List Countries" 2019).
3.2 Data Collection
In order to investigate how collective identity is formed on Instagram by the three bases of collective
identity: solidarity, emotional attachment, and group cohesion, we manually collected 1,137 comments
of two public available post by Greta Thunberg on Instagram. The two posts were chosen due to their
call for global participation on the first (post one) and second (post two) global strike for climate.
Furthermore, the social media platform Instagram is chosen as the object of research due to its
popularity, especially in the generation of current students. Likewise, public communication about a
certain topic builds up under the umbrella of a distinct post on Instagram. Thus, examining the
communication related to two major calls for participation in global climate strikes might give relevant
insights into the research objective.
3.3 Data Analysis
To analyse the collected comments for both posts, we saved the comment data in an SQLite database.
For every comment, we collected the publicly available data, consisting of the comment content (text),
date of creation, and the username of the poster. Additionally, we connected every comment with the
shortcode, Instagram's unique identifier for a post.
For the first analysis step, we annotated every comment with the language used within the comment
content. We could not annotate 372 out of the 1,137 comments, because the content contains only
mentions of other Instagram users, hashtags, or Emojis. We did not use Emojis, hashtags, or the
usernames for deducing the language, because this is not reliable and might lead to false conclusions.
We found sixteen different languages used in the comment contents. The dominant language is English
(584), followed by Italian (65), Swedish (53), Spanish (25), and French (10). The remaining eleven of
the sixteen languages are below ten occurrences each. Therefore, we focused on English comments in
our further analysis, to focus on the majority of comments containing one language and its specific
characteristics for categorising the comments.
In order to categorise every comment by the three bases of collective identity, we created three lists of
words, Emojis, and hashtags. To this end, we randomly selected 200 comments out of the 1,137 and
manually categorised words, Emojis, and hashtags to the fitting collective identity base. The subsequent
step for categorising the comments into the three collective identity bases is automated through a SQL
statement. During this step, a single comment can be assigned to multiple collective identity bases. We
searched for the previously defined words, Emojis, and hashtags within the comment contents with a
like operator. We do not count the number of occurrences for every word, Emoji or hashtag, we are
tracking if one is present or not. Therefore, a comment can be between none or all categories. This is
important, because a comment can, for example, be an emotional attachment and enhancing the group
cohesion.
307
Brünker et al.
Collective Identity Formation on Instagram
Australasian Conference on Information Systems
2019, Perth Western Australia
4 PRELIMINARY FINDINGS
Out of the 584 comments, the above-mentioned SQL statement could not classify 145 English comments
in at least one category. This is because of not explainable words (e.g. "periotd"), maybe due to
misspelling, very short questions (e.g. "Only ??") or comments in general (e.g. "Me") with just one or
two words, or because of text that does not make any sense in the context of Fridays for Future in general
or the two posts specifically. Some comments could be classified as troll comments, with content like
"lol" or "nah". Such comments can also be an Emotional Attachment, but without more context, we
decided to not classify them because the content is ambiguous. For this first analysis, we do not take
troll comments or short comments/questions into account. Due to the fact, that these comments are not
classified to one of the three bases, they are automatically ignored in our subsequent analysis. The
following table shows the words, Emojis, and hashtags for our classification:
Collective Identity
Bases
Group Cohesion
Emotional
Attachment
Words
Hashtags
we, us, together, strong,
can't wait, don't stop,
let's do, there, with you,
see you, @
cool, super, yes, stupid,
no, fuck, dumb, cunt,
asshole, bitch, shit,
useless, rock, best
#cleanair, #cleanenergy,
#FridaysForFuture, #ClimateStrike,
#climatestrikes, #climatecrisis,
#SchoolStrike4Climate,
#climatechange
-
Emojis
-
Solidarity
thank, thanks, legend,
hero
#GreatGreta, #DropoutGreta,
#fightthesystem, #govegan,
#endanimalabuse, #vegan,
#savetheplanet, #yesshecan
Table 1. Words, Emojis, and hashtags used for classification.
The corresponding SQL statement categorized the remaining 439 comments as Group Cohesion (299),
Emotional Attachment (279), and Solidarity (86). It is evident, that some comments were, at least,
categorized as two bases. 24 English comments are in all of the three categories. This is the case for
comments with, on average, more text than the other comments (more than 10 words), or due to many
used Emojis and/or hashtags. If only comments in exclusively one category are considered, our analysis
reveals 120 comments according to Group Cohesion, 100 to Emotional Attachment, and 18 to Solidarity.
The third table shows, that it is uncommon for a comment to belong to just one of our three categories.
The Fridays for Future movement arouses strong emotions among their followers. Therefore, and
because of the amount of Emojis and hashtags, a comment in the category Group Cohesion is likely to
be in the Emotional Attachment category, too, and vice versa. The data and our findings suggest, that
the two bases Group Cohesion and Emotional Attachment are the dominant factors expressing collective
identity within an opinion-based group in the context of Fridays for Future.
5 CONCLUSION AND NEXT STEPS
As this research in progress, we provide preliminary results on collective identity formation on social
media. Our findings show to what extent the three bases of collective social/group identity arise on
Instagram within an opinion-based community (Friday for Futures). In order to conceptualise the
concept of collective identity and collective action, we derived the proposed model of collective
group/social identity of collective action (Figure 3). We plan to test this model in a succeeding study to
examine the impact of each dimension on the collective group/social identity as well as the indirect effect
on collective action. To this end, we aim to conduct a laboratory study based on the preliminary findings
of this research in progress. The findings of this study provide first insights to how each base (Solidarity,
Emotional Attachment, and Group Cohesion) occur on Instagram within an opinion-based group.
308
Australasian Conference on Information Systems
2019, Perth Western Australia
Brünker et al.
Collective Identity Formation on Instagram
Figure 3: Proposed model of collective group/social identity of collective action
However, at this point of research, we need to expand the preliminary findings to observe a broader
dataset and review the findings against another sample of data. First, we need further classification on
the given dataset, including the phased-out languages. Therefore, we aim to enhance the classification
of the comments in order to get more precise results according to the new data. Likewise, we aim to
improve the list for the automated classification according to the new data. Second, we plan to gather
data from several official Fridays for Future Instagram accounts as well as Twitter communication
related to the Fridays for Future movement in order to validate the findings.
6 REFERENCES
Bunker, D., Mirbabaie, M., and Stieglitz, S. 2017. "Convergence Behaviour of Bystanders : An Analysis
of 2016 Munich Shooting Twitter Crisis Communication," in Proceedings of the 28th
Australasian Conference on Information Systems (ACIS), pp. 1 -- 11.
Burke, P. J., and Stryker, S. 2016. "Identity Theory: Progress in Relating the Two Strands," in New
Directions in Identity Theory and Research, New York, NY: Oxford University Press, pp. 657 --
810.
Carter, M., Compeau, D., Kennedy, M. I. L., and Schmalz, M. 2017. "The Content and Context of Identity
in a Digital Society," in Proceedings of the 25th European Conference on Information Systems
(ECIS), Guimarães, Portugal, pp. 3245 -- 3254.
Carter, M., and Grover, V. 2015. "Me, My Self, and I(T): Conceptualizing Information Technology
Identity and Its Implications," MIS Quarterly (39:4), pp. 931 -- 957.
Davis, J. L., Love, T. P., and Fares, P. 2019. "Collective Social Identity: Synthesizing Identity Theory and
Social Identity Theory Using Digital Data," Social Psychology Quarterly.
Heckathorn, D. D. 1996. "The Dynamics and Dilemmas of Collective Action," American Sociological
Review (61:2), pp. 250-277.
Hogg, M. A. 2018. "Social Identity Theory," in Contemporary Social Psychological Theories, Standford
CA: Stanford University Press.
Liu, N., and Chan, H. C. 2010. "Understanding the Influence of Social Identity on Social Support Seeking
Behaviors in Virtual Healthcare Community," in ICIS 2010 Proceedings.
Manikonda, L., Beigi, G., Liu, H., and Kambhampati, S. 2018. "Twitter for Sparking a Movement , Reddit
for Sharing the Moment: # Metoo through the Lens of Social Media," in 11th SBP-BRiMS 2018,
DC, USA.
Marwell, G., and Oliver, P. 1993. The Critical Mass in Collective Action: A Micro-Social Theory, New
York: Cambridge University Press.
McCall, G. J., and Simmons, J. L. 1966. Identities and Interactions, New York: Free Press.
Melucci, A. 1988. "Getting Involved: Identity and Mobilization in Social Move- Ments," International
Social Movement Research (1:26), pp. 329 -- 348.
Miller, S. D., Taylor, V., and Rupp, L. J. 2016. "Social Movements and the Construction of Queer
Identity," in New Directions in Identity Theory and Research, New York, NY: Oxford University
Press, pp. 443 -- 69.
Mirbabaie, M., Stieglitz, S., and Eiro, M. R. 2017. "#IronyOff -- Understanding the Usage of Irony on
Twitter during a Corporate Crisis," in PACIS 2017 Proceedings.
309
Australasian Conference on Information Systems
2019, Perth Western Australia
Brünker et al.
Collective Identity Formation on Instagram
Mirbabaie, M., Stieglitz, S., and Volkeri, S. 2016. "Volunteered Geographic Information and Its
Implications for Disaster Management," in Proceedings of the 49th Hawaii International
Conference on System Sciences (HICSS), pp. 207 -- 216.
Neimark, B. 2019. "Address the Roots of Environmental Crime," Science (364:6436), (J. Sills, ed.), pp.
138 -- 138.
Oh, O., Agrawal, M., and Rao, H. R. 2013. "Community Intelligence and Social Media Services: A Rumor
Theoretic Analysis of Tweets During Social Crises," MIS Quarterly (37:2), pp. 407 -- 426.
Polletta, F., and Jasper, J. M. 2001. "Collective Identity and Social Movements," Annual Review of
Sociology (27:1), pp. 283 -- 305.
Postmes, T., Baray, G., Haslam, S. A., Morton, T. A., and Swaab, R. I. 2006. "The Dynamics of Personal
and Social Identity Formation," in Individuality and the Group: Advances in Social Identity,
London, United Kingdom: SAGE Publications Ltd, pp. 215 -- 236.
Postmes, T., and Spears, R. 2008. Toward an Integrative Social Identity Model of Collective Action : A
Quantitative Research Synthesis of Three Socio-Psychological Perspectives, (134:4), pp. 504 -- 535.
Stets, J. E., and Serpe, R. T. 2013. "Identity Theory," in Handbook of Social Psychology, J. DeLamater
and A. Ward (eds.), Dordrecht: Springer Netherlands, pp. 31 -- 60.
Stieglitz, S., Meske, C., Ross, B., and Mirbabaie, M. 2016. "Going Back in Time to Predict the Future -
The Complex Role of the Data Collection Period in Social Media Analytics," Information Systems
Frontiers.
Stieglitz, S., Mirbabaie, M., and Potthoff, T. 2018. "Crisis Communication on Twitter during a Global
Crisis of Volkswagen -- The Case of 'Dieselgate,'" in Proceedings of the 51st Hawaii International
Conference on System Sciences (HICSS), pp. 513-522.
Stieglitz, S., Mirbabaie, M., Schwenner, L., Marx, J., Lehr, J., and Brünker, F. 2017. "Sensemaking and
Communication Roles in Social Media Crisis Communication," in Proceedings Der 13.
Internationalen Tagung Wirtschaftsinformatik (WI 2017), St. Gallen, pp. 1333 -- 1347.
"Strike List Countries." 2019. Fridays For Future, May 30. (https://fridaysforfuture.org/events/list,
accessed July 30, 2019).
Thomas, E. F., Mavor, K. I., and McGarty, C. 2012. "Social Identities Facilitate and Encapsulate Action-
Relevant Constructs: A Test of the Social Identity Model of Collective Action," Group Processes &
Intergroup Relations (15:1), pp. 75 -- 88.
Thomas, E. F., McGarty, C., and Mavor, K. 2016. "Group Interaction as the Crucible of Social Identity
Formation: A Glimpse at the Foundations of Social Identities for Collective Action," Group
Processes & Intergroup Relations (19:2), pp. 137 -- 151.
Turner, J. C., Hogg, M. A., Oakes, P. J., Reicher, S. D., and Wetherell, M. S. 1987. Rediscovering the
Social Group: A Self-Categorization Theory, Cambridge, MA: Basil Blackwell.
Tye, M., Leong, C., Tan, F. T. C., Tan, B., and Khoo, Y. H. 2018. "Social Media for Empowerment in
Social Movements: The Case of Malaysia's Grassroots Activism," Communications of the
Association for Information Systems (42:1), pp. 408 -- 430.
White, R. W. 2010. "Structural Identity Theory and the Post-Recruitment Activism of Irish Republicans:
Persistence, Disen- Gagement, Splits, and Dissidents in Social Movements," Social Problems
(57:3), pp. 341 -- 370.
van Zomeren, M., Postmes, T., and Spears, R. 2008. "Toward an Integrative Social Identity Model of
Collective Action: A Quantitative Research Synthesis of Three Socio-Psychological Perspectives,"
Psychological Bulletin (134:4), pp. 504 -- 535.
Acknowledgments
This work was supported by the Deutsche Forschungsgemeinschaft (DFG) under grant No. GRK 2167,
Research Training Group "User-Centred Social Media". Furthermore, this project has received funding
from the European Union's Horizon 2020 research and innovation programme under the Marie
Skłodowska-Curie grant agreement No 823866.
Copyright: © 2019 Brünker, Deitelhoff & Mirbabaie. This is an open-access article distributed under the terms
of the Creative Commons Attribution-NonCommercial 3.0 Australia License, which permits non-commercial
use, distribution, and reproduction in any medium, provided the original author and ACIS are credited.
310
|
1503.03137 | 1 | 1503 | 2015-03-11T00:52:20 | Comparing Network Structures of Commercial and Non-commercial Biohacking Online-communities | [
"cs.SI"
] | This paper compares two biohacking groups, Bulletproof Executive and DIYbio, whose distinct goals result in differences in social network structures, activities and entry points. | cs.SI | cs | COMPARING NETWORK STRUCTURES OF COMMERCIAL AND NON-COMMERCIAL
BIOHACKING ONLINE-COMMUNITIES
Sipra Bihani, Michael Hartman, Florian Sobiegalla, Amanda Rosenberg
IIT Stuart School of Business, University of Bamberg
10 West 35th Street, 18th Floor
Chicago USA, Bamberg Germany
[email protected], [email protected], [email protected],
[email protected]
PROCEEDINGS COINs15
ABSTRACT
This paper compares
two biohacking groups,
Bulletproof Executive and DIYbio, whose distinct
goals result in differences in social network structures,
activities and entry points.
INTRODUCTION
The term biohacking was first used online in
December 2008 and now encompasses a wide range
of topics and activities (Google Trends). We define
biohacking as the amateur practice of biological
experimentation for a self-defined purpose using a
variety of DIY devices and techniques in a non-
traditional setting (Bennett 2009; Delfanti 2013;
personal communication, October 29 2014).
The two groups this paper analyzes are DIYbio and
Bulletproof Executive (BE.) DIYbio was founded in
2008 by Mackenzie Cowell and Jason Bobe with the
mission of “establishing a vibrant, productive and
safe community of DIY biologists” (DIYbio). BE is
led by founder Dave Asprey, who has a personal and
financial interest in discovering methods that help
people “reach
the state of high performance”
(Bulletproof). These two groups have grown their
networks online in different ways.
COMPARISON OF BIOHACKING GROUPS
Both BE and DIYbio use online social media to share
knowledge, expand their network, and meet their
respective goals. Both groups have a website, a blog,
a Facebook page, and a Twitter account; DIYbio also
has a newsletter and Google group while BE has
multiple Twitter accounts, a YouTube channel, an
Instagram account, a Google+ page, a podcast, and an
online store. The five methods used to develop the
comparison are secondary research for context on
biohacking and
interview an active
the 2014 Bulletproof
biohacker who attended
Conference to learn the diversity of motivations of
biohackers; a survey to DIYbio local chapters to
understand their definition of biohacking and current
activities; and social network analysis with Condor,
trends; an
Gephi, and Wordle to create a network of actors; and
content analysis with TagCrowd of the two group’s
blogs to analyze activities.
Figure 1 (left) : Twitter fetch for “DIYbio” on Dec 6,
2014; Figure 2 (right): Twitter fetch for “LondonBioHack”
on Dec 6, 2014
DIYbio has the mission of democratizing biological
research, which has implications for its network
structure and entry points. As Figure 1 shows, the
network has no central node. The network
is
composed of 55 regional COINs from 21 countries
that set their own protocols (DIYbio). Figure 2 shows
the tweets of “LondonBioHack”, which is a local
chapter. Actors tweeting about this group are more
connected with one another than those tweeting about
DIYbio. Since actors create new technology and
ideas, LondonBioHack and DIYbio both coolfarm
with projects such as OpenerPCR and an outline of
biohacking ethics, respectively (survey, Nov 19, 2014,
DIYbio, Gloor 2010).
In regards to entry points, DIYbio has no form of
public outreach, such as advertising, for people
outside of the network to learn about it. The local
groups get public visibility by disseminating their
findings on their chapter websites and through
members’ personal blogs. In accordance with Gloor,
DIYbio can be classified as a self-selecting
collaborative innovation network (COIN) because
members aim to contribute to current scientific
knowledge in an open source environment (2007,
2010). People who are or want to become a part of
the virtual network are intrinsically motivated to
reach a shared goal and develop their own set of rules.
with a CIN in which actors share a common interest
and spot new trends that will become cool (Gloor
2007).
accounts:
@bulletproofexec
Figure 3: Twitter Fetch for “Bulletproof Coffee” in blue,
“Bulletproofexec” in red, “Dave Asprey” in green on Nov.
19, 2014. The central yellow node is (@bulletproofexec.)
To examine the structure of BE, we looked at its two
Twitter
and
@BPNutrition. As Figure 3 shows, Asprey, as
represented by the handle @bulletproofexec, is a
central node in the BE network; @BPNutrition is a
bridge to other accounts. There are tweets about
Bulletproof Coffee by accounts that are not directly
connected to either Asprey or @BPNutrition. The
commercial product has spurred attention to form a
Collaborative Interest Network (CIN) with members
who share a common interest and practice without
necessarily identifying as biohackers (Gloor, 2010).
Asprey continues to be a coolhunter by brokering a
network with different biohacking circles and experts
on self-improvement topics that he brings together on
his social media and at the annual Bulletproof
Conference (Gloor 2007). In an interview with a
participant at the conference, the biohacker said that
he felt like it was the first real biohacking conference
because it covered a variety of topics such as electron
flow, gut ecology, habit formation, and nutrient
injections (personal communication, October 29
2014.) This brokering enables BE to be influential in
many biohacking topic areas and provides channels
for commercialized products.
its different social media outlets, BE
Through
promotes the company’s central product and entry
point, called Bulletproof Coffee, which is marketed
as more effective at improving productivity and
efficiency than the average cup of coffee. People
without a specific interest in biohacking can learn
about Bulletproof Coffee by stumbling upon it at a
local coffee shop or by reading about it in media
outlets, such as The New York Times (Bulletproof).
As Figure 4 shows, the easily identifiable Bulletproof
Coffee had growth in Google searches that have far
surpassed searches for related terms. Based on the
commercial entry point and the mix of biohackers
and non-biohackers, BE can be described as a COIN
Figure 4: Google Trend visualization of interest in search
terms from January 2008 to December 2014.
CONCLUSION
The research finds a significant interrelation among
organization goals, structure, activity, and entry
points as shown in Table 1. DIYbio is an
interconnected network of deeply engaged biohackers
that coolfarms, whereas, by coolhunting and forming
CINs, BE exposes many people to biohacking
methods and products for self-improvement.
BE
DIYbio
coolhunting
commercial
no leader
coolfarming
open-source
Network structure a COIN with a CIN a COIN of COINs
Network influence leader
Activity
Entry points
Table 1: Comparison of BE and DIYbio based on influence,
structure, focus, and entry points.
Since biohacking is a young and growing practice,
some questions remain about the social network
structures of the two organizations under examination.
As the communities mature, their structure may
evolve. For instance, will the CIN members drinking
the COIN and begin
Bulletproof Coffee enter
biohacking? Will
the umbrella organization of
DIYbio continue to connect networks or will they
become more and more autonomous?
REFERENCES
Bennett, Gaymon & Nils Gilman, Anthony Stavrianakis & Paul
Rabinow (2009, Dec). From synthetic biology to biohacking: are
we prepared? Nature Biotechnology, 27, 12, 1109-1111.
Bulletproof (2014) Website. Retrieved from: http://bit.ly/1FMNiXp.
Visited on 2015, Feb 9.
Delfanti, Alessandro. (2013). Biohackers: The Politics of Open
Science. New York: Pluto Press.
DIYbio.
http://DIYbio.org.
Gloor, P., & Cooper, S. (2007). Coolhunting: Chasing Down the
Next Big Thing. New York: AMACOM.
Gloor, P. (2010). Coolfarming: Turn Your Great Idea into the Next
Big Thing. AMACOM, NY 2010.
Google Trends. (2014, Dec 6). ‘Bulletproof Coffee’, ‘DIYbio’,
‘Biohacking’ Topics. Retrieved from: http://bit.ly/1Bnqy0y
10). DIYbio. Retrieved
(2014, Nov
from:
|
1712.02433 | 1 | 1712 | 2017-12-06T22:59:51 | Identifying Data Noises, User Biases, and System Errors in Geo-tagged Twitter Messages (Tweets) | [
"cs.SI"
] | Many social media researchers and data scientists collected geo-tagged tweets to conduct spatial analysis or identify spatiotemporal patterns of filtered messages for specific topics or events. This paper provides a systematic view to illustrate the characteristics (data noises, user biases, and system errors) of geo-tagged tweets from the Twitter Streaming API. First, we found that a small percentage (1%) of active Twitter users can create a large portion (16%) of geo-tagged tweets. Second, there is a significant amount (57.3%) of geo-tagged tweets located outside the Twitter Streaming API's bounding box in San Diego. Third, we can detect spam, bot, cyborg tweets (data noises) by examining the "source" metadata field. The portion of data noises in geo-tagged tweets is significant (29.42% in San Diego, CA and 53.47% in Columbus, OH) in our case study. Finally, the majority of geo-tagged tweets are not created by the generic Twitter apps in Android or iPhone devices, but by other platforms, such as Instagram and Foursquare. We recommend a multi-step procedure to remove these noises for the future research projects utilizing geo-tagged tweets. | cs.SI | cs | Identifying Data Noises, User Biases, and System Errors in
Geo-tagged Twitter Messages (Tweets)
Ming-Hsiang Tsou
Hao Zhang
Chin-Te Jung
Center for Human Dynamics in the
Center for Human Dynamics in the
Esri (Beijing) R&D Center,
Mobile Age, San Diego State
University, 5500 Campanile Drive,
San Diego, CA 92182, USA.
01-6195940205
[email protected]
Mobile Age, San Diego State
University, 5500 Campanile Drive,
San Diego, CA 92182, USA.
[email protected]
Beijing, China
[email protected]
ABSTRACT
Many social media researchers and data scientists collected geo-
tagged tweets to conduct spatial analysis or identify spatiotemporal
patterns of filtered messages for specific topics or events. This
paper provides a systematic view to illustrate the characteristics
(data noises, user biases, and system errors) of geo-tagged tweets
from the Twitter Streaming API. First, we found that a small
percentage (1%) of active Twitter users can create a large portion
(16%) of geo-tagged tweets. Second, there is a significant amount
(57.3%) of geo-tagged tweets located outside the Twitter Streaming
API's bounding box in San Diego. Third, we can detect spam, bot,
cyborg tweets (data noises) by examining the "source" metadata
field. The portion of data noises in geo-tagged tweets is significant
(29.42% in San Diego, CA and 53.47% in Columbus, OH) in our
case study. Finally, the majority of geo-tagged tweets are not
created by the generic Twitter apps in Android or iPhone devices,
but by other platforms, such as Instagram and Foursquare. We
recommend a multi-step procedure to remove these noises for the
future research projects utilizing geo-tagged tweets.
Keywords
Social media, Geo-tagged, Data noises, Twitter, Tweets.
1. INTRODUCTION
Twitter is one of the most popular social media platforms used in
academic research works due to its large number of users,
comprehensive metadata, openness of messages, and public
available application programming interfaces (APIs). Tweets are
the actual Twitter messages created by users to express their
feelings, events, or activities within 140 characters including
spaces. Geocoding tasks for tweets are important for social media
analytics because data scientists and researchers need to aggregate
social media messages or users into a city, a region, or nearby
points of interests (POI) for location-based analysis and regional
trend analysis. Currently,
the public Twitter Application
Programming Interfaces (APIs) can provide five
types of
geocoding sources: 1. Geo-tagged coordinates, 2. Place check-in
location (bounding box), 3. User Profile Location, 4. Time Zones,
5. Texts containing locational information (explicit or implicit
information). Among the five geocoding methods, tweets with
geo-tagged coordinates is the most popular data source used in
location-based social media research. Geo-tagged tweets have
precise latitude and longitude coordinates (decimal degrees) stored
in a metadata field of tweets, called "geo" (a deprecated field name
in APIs) or "coordinates" (the current field name in APIs). When
users turn on the precise location tag function on their Twitter
accounts (which is off by default), their tweets will be geo-tagged
using GPS or Wi-Fi signals in their mobile devices. Since many
users do not enable precise location tags, there are only around 1%
of tweets containing geo-tagged information. The percentage of
geo-tagged tweets may vary among different topics or keywords.
For example, during a wildfire event, the percentage of geo-tagged
tweets can become 4% or higher collected by using wildfire related
keywords [1].
researchers used geo-tagged
Geo-tagged tweets are valuable data for social media researchers
and geographers to study geographic context and spatial association
within social media data. One popular method of collecting geo-
tagged tweets is to utilize Twitter's Streaming API with a
predefined bounding box or multiple predefined keywords.
Previous works have demonstrated that social media data collected
by the Twitter Streaming API (free version with 1% sampling rate)
are a good sample of Twitter's Firehose API (very expensive
version providing100% tweet data in Twitter servers) [2]. In
academics, many
for
conducting spatial analysis and GIS operations for their research
projects. For example, the 2013 special issue of "Mapping
Cyberspace and Social Media" in Cartography and Geographic
Information Science [3] includes seven refereed research papers
and four out of seven paper are using geo-tagged tweets as their
main data sources. There are two types of Twitter APIs in general,
Streaming API for collecting real-time feeds of Twitter messages
and Search API for collecting historical tweets (up to 7 or 9 days
before the search date) with specific keywords or user names with
database query methods. This paper will only focus on the
characteristics of geo-tagged tweets collected from the Twitter
Streaming API.
tweets
2. TWITTER SPAMS, BOTS, AND
CYBORGS
Previous research has identified three major types of data noises in
Twitter data, spams, bots, and cyborgs. Twitter spams, similar to
email spams, vary in different forms. Some spams are transparent
and easy to be identified while some spams are sophisticated [4].
Spams are usually created for reaching more users and increase the
financial gain for spammers. Spammers now use multiple platforms
to disseminate spams which also include social media services [5].
Many researchers have addressed the importance of eliminating
spams for a clearer and safer online networking environment [6].
The existence of spams in Twitter was first noticed in 2008 by
studying over 100,000 Twitter users and grouping them base on
follower-to-following ratios [7]. The groups contain broadcasters
(users with large amount of followers), acquaintances (users who
have a follower-to-following ratio close to 1), and miscreants (users
who follow a lot and less followed) [7]. Many Twitter spams
include URLs. According to Grier et al. [8], 8% of the URLs shared
on Twitter are considered as the linkage to malicious websites,
which contains malware or scams [8]. Clicking on those embedded
URL may cause serious problems to users' privacy and local
computers [9]. The harmfulness of spams does not only limit to
malware and scams. Spam message also waste the storage space on
server side [10].
to defeat
the definition of spam accounts
Twitter released its rules on eliminating and controlling spams and
abuse which include the regulation on banning the spam accounts
permanently, and
[11].
Unfortunately, some messages from spam accounts have been
changed correspondingly
these rules. Previously,
researchers tried to detect spam account by building a URL
blacklist. However, 90% of users have already clicked on a spam
URL before it is put into blacklist [8]. Furthermore, the URL
shorten service also lead to the uncertainty on detecting spam URL
[12]. Currently, three major trends for detecting spam accounts
include data compression algorithms [13], machine learning [14],
and statistics [15]. In recent years, more and more new spam
detection methods are created based on these three bases. Lin and
Huang [10] evaluated the tweets by examining the URL rate and
the interaction rate. Lumezanu and Feamster [5] categorized the
tweets by characterizing the publishing behavior and analyzing the
effectiveness of spam. Bayesian statistic was utilized for
classifying the tweets [16]. It is worth to learn that most of the spam
tweets are not sent by human but bots. However, bots does not only
send out spam tweets, but also send out useful information
sometimes, such as weather information, traffic update, and
earthquake events.
The existence of bots may not be widely recognized by all the
Twitter users. According to Japan Times, the bot is defined as
follow: "Twitter-bots are small software programs that are
designed to mimic human tweets. Anyone can create bots, though it
usually requires programming knowledge. Some bots reply to other
users when they detect specific keywords. Others may randomly
tweet preset phrases such as proverbs. Or if the bot is designed to
emulate a popular person (celebrity, historic icon, anime character
etc.) their popular phrases will be tweeted. Not all bots are fully
machine-generated, however, and interestingly the term "bot" has
also come to refer to Twitter accounts that are simply "fake"
accounts. [17]."
Meanwhile, cyborgs, a mix of humans and bots, refer to either bot-
assisted humans or human-assisted bots [18]. A bot can send tweets
automatically by called Twitter APIs. Sometimes, after a bot
receives audience, the creator (human) may tweet through bots
which led to a merged version of humans and bots – cyborgs. The
emergence of bots and cyborgs should be attributed to the growing
users population and open nature of Twitter [18]. Bots and cyborgs
generate many tweets everyday by providing various information,
including news updates, advertisements, emergency information, et
al. [18]. Some researchers study how to increase bots' influence in
social media [19]. On the other hand, identifying bot and cyborgs
are not easy [20]. According to Chu and his team [8], they identified
that 10.5% of Twitter accounts are bots while 36.2% are classified
as cyborgs. The existence of bots and cyborgs bring both pros and
cons. The information being tweeted, such as news, job posting,
SAMPLE: Permission to make digital or hard copies of all or part of this
work for personal or classroom use is granted without fee provided that
copies are not made or distributed for profit or commercial advantage and
that copies bear this notice and the full citation on the first page. To copy
otherwise, or republish, to post on servers or to redistribute to lists,
requires prior specific permission and/or a fee.
SMSociety'17, July 28–30, 2017, Toronto, ON, Canada.
Copyright 2010 ACM 1-58113-000-0/00/0010 …$15.00.
DOI: http://dx.doi.org/...
allow people with the access to latest updates. However, the spam
tweets sent by bots are harmful to social media users.
Azmandian [21] introduce a two-steps procedure for eliminating
the bots from the Twitter data. The two-steps are: (1) All the Twitter
users whose tweets contain URLs more than 70% of the time will
be identified as bots. (2) All the users who traveled for more than
120km/h will be identified as a bot. However, these previous
research did not focus on the elimination of spams, bots and
cyborgs in geo-tagged tweets. This paper will focus on how to
identify and remove data noises and errors in geo-tagged tweets.
3. SYSTEM ERRORS IN THE
STREAMING APIS FOR GEO-TAGGED
TWEETS
Since the Twitter Streaming API provides the bounding box
option to enable users to search and collect geo-tagged tweets
within the bounding box area. Many people think that all collected
geo-tagged tweets by the Streaming API will be restricted within
the user-defined bounding box. However, we compared two case
studies of Streaming API with bounding boxes for the County of
San Diego and the City of Columbus during one month
(November, 2015). Both cases illustrated that there are only
42.7% of tweets are contained within San Diego County and
83.8% of tweets are within the City of Columbus (Table 1).
Table 1. The percentage of geo-tagged tweets within the original
bounding box or within the State boundary in the County of San
Diego and the City of Columbus collected in one month
(November, 2015).
Figure 1 illustrates the spatial distribution of geotagged tweets
collected by the Twitter Streaming API using the bounding box of
San Diego County during two months (October and November,
2015). Around 42.7% of the geo-tagged tweets are within the
boundary of San Diego County and 57.3% of tweets are outside the
original defined bounding box. We also conducted kernel density
maps using geotagged tweets and found out that the major hot spots
(clustered areas) are located around San Diego Downtown and two
other hot spots are around the cities of Los Angeles and San
Francisco. Figure 1 illustrates that the distribution of outside-
bounding box tweets are mainly located in California and a few
tweets are located in Mexico. There are a small amount of tweets
located in South America, Europe, and Southeast Asia.
Figure 2 illustrates the spatial distribution of geotagged tweets
using the bounding box of the City of Columbus in Ohio, USA
during October and November, 2015. 83.8% of tweets are within
the actual boundary of the City of Columbus. 15.8% of tweets are
within the Ohio State. Only 0.4% of geotagged tweets are outside
the Ohio State.
Comparing the two case studies, the San Diego case has much
higher ratio of outside bounding box tweets. The Columbus case
Percentage to total TweetsTweets in San Diego County (SDC)9794442.7%131464Tweets in Cali. State (excluding SDC)5638224.6%Other Regions7508232.7%Total Tweets229408Percentage to total TweetsTweets in Columbus City (CC)5329183.8%10279Tweets in Ohio State (excluding CC)1004315.8%Other Regions2360.4%Total Tweets63570GeoViewer@SanDiegoNovemberOutside BoundaryGeoViewer@ColumbusNovemberOutside Boundary
has better results of using bounding box to collect the mid-size city
level tweets.
The Twitter rule #2 may be the key reason for collecting tweets
outside the bounding box. For example, if a tweet selects
"California" as the place to check-in, the place box of California
will overlap with the bounding box of San Diego. Therefore, the
tweet outside San Diego will be selected. However, there are still
several global geo-tagged tweets which cannot be explained by the
heuristic rules. We will recommend that the future users of Twitter
Search APIs should add the geo-filter procedure after collecting
geo-tagged tweets using bounding box methods to remove the
system errors.
4. DATA NOISES FROM COMMERCIAL
BOT AND CYBORG TWEETS
In this paper, we defined the noises in social media as the messages
created by bots or cyborgs with commercial purposes (such as
advertisements and marketing events) since most social media
researchers focus on self-expression messages by actual human
beings. After manually reviewing hundreds of geo-tagged tweets in
our collection, we found out that one easy way to detect the bot or
cyborg tweets for advertisement is to examine a metadata field in
tweets, called "source". If a tweet was created on an iPhone device,
the source field will be "Twitter for iPhone". If a tweet was created
by specific bots or web programs, the source field could be
"TweetMyJOBS", "dlvr.it", or "AutoCarSale". Therefore, by
classifying different types of "source" values in the metadata, we
can remove these noises created by bots or cyborgs for commercial
purposes (Table 2).
We collected one month of geotagged tweets in San Diego County
in November 2015. After removing the tweets outside the San
Diego County, 97,944 tweets are within San Diego County. After
reviewing hundreds of different source names in tweets, we created
a black list for data noises and advertisement tweets based on the
source names in San Diego (Table 2). Among the total tweets in
San Diego, there are 29.42% tweets being recognized as noise data
by our list. Table 3 illustrates the top six categories of noise sources,
including Jobs (21.17%), Advertisement (3.49%), Weather
(2.18%), Earthquake information (1.06%), News (0.97%), and
Traffic (0.53%).
Similar to the previous comparison studies, we also collect one
month of geotagged tweets in the City of Columbus in November
2015. Table 3 illustrated the black list for data noises and
advertisement tweets in Columbus. There are 53.47% tweets being
recognized as noise data in Columbus based on our black list which
is much higher than the San Diego case. The top five categories of
noise sources in Columbus are Jobs (43.23%), Advertisement
(3.63%), Traffic (2.79%), News (2.10%), and Weather (1.72%).
We cannot find the Earthquake information bots in the City of
Columbus.
Table 2. The Proportion of data noises with different "source"
names in one month of geo-tagged tweets (November, 2015) in
San Diego County
Figure 1. The spatial distribution of geo-tagged tweets using the
Streaming API with the bounding box of San Diego County
(October and November 2015) at county, state, and world scales.
Figure 2. The spatial distribution of geo-tagged tweets using the
streaming API with the bounding box of Columbus City (October
and November 2015) at county, state, and world scales.
There is one possible explanation about this system error generated
by the Twitter APIs. Based on the Twitter API documents
(https://dev.twitter.com/streaming/overview/request-
parameters#locations), the streaming API uses the following
heuristic rules to determine whether a given Tweet falls within a
bounding box:
If the coordinates field is populated, the values there will be
tested against the bounding box. Note that this field uses
geoJSON order (longitude, latitude).
If coordinates is empty but place is populated, the region
defined in place is checked for intersection against the
locations bounding box. Any overlap will match.
If none of the rules listed above match, the Tweet does not
match the location query. Note that the geo field is deprecated,
and ignored by the streaming API.
1.
2.
3.
services with personalized recommendations and tips. The generic
Twitter apps are the fifth for Android and the seventh for iPhone
devices (Figure 3).
Figure 4 illustrates the proportion of "source" categories within the
City of Columbus. The most popular platform in Columbus is the
"TweetMyJOB" bots. The second popular platform is Instagram.
The ranking of the rest categories are similar to the San Diego case
study.
Table 3. The Proportion of data noises with different "source"
names in one month of geo-tagged tweets (November, 2015) in the
City of Columbus
Figure 3. The numbers of Tweets produced by different platforms
inside the San Diego bounding box during the month of November,
2015.
Figure 3 illustrates the proportion of "source" categories including
both noise and non-noise tweets within one month of geo-tagged
tweets (November 2015) from the Streaming API within the San
Diego County boundary. The red color indicates the tweets labelled
as bots or cyborgs based on our black list. The green color indicates
the tweets created by generic Twitter platform (such the Android or
iOS Twitter Apps). The blue color indicates the tweets from other
third-party apps or services, such as Instagram or Foursquare. The
most popular source (platform) in San Diego geo-tagged tweets is
Instagram (46,484 tweets, 47.46%), which is a very popular social
media platform for sharing photos and videos either publicly or
privately on mobile devices. Instagram users can extend their photo
sharing to other platforms, including Twitter and Facebook. Since
the default setting of Instagram is geotag-enabled. Therefore, most
Instagram messages sharing on Twitter include detail geolocations.
The second popular platform is "TweetMyJOB", which contains
job market advertising tweets using the geolocations of recruiting
companies. Foursquare is a location-based search-and-discovery
Figure 4. The numbers of Tweets produced by different platforms
inside the City of Columbus bounding box during the month of
November, 2015.
5. WHERE ARE THESE BOTS?
This section will focus on the visualization of the actual locations
of these bot and cyborg tweets in our collected data. From a spatial
analysis perspective, if we cannot remove these noises, the spatial
distribution patterns of these noises may cause a significant
problem or biases in the outcomes of spatiotemporal analysis.
We started to map the most popular bots in our black list:
TweetMyJOBS, which is a Twitter-based recruiting service
embedded with the job advertisement tweets. We found out that
most of TweetMyJOBS tweets are around the center of cities (San
Diego downtown or Columbus downtown) (Figure 5) due to the
higher density of business buildings and addresses in the center of
Source categorySource nameHashtagTweet numberPercentageJobTweetMyJOBS16005SafeTweet by TweetMyJOBS4726CareerCenter6Total2073721.17%Advertisementdlvr.it2837Golfstar269dine here182Simply Best Coupons77Auto City Sales56sp_californiaCoupon41Total34213.49%WeatherCities2105iembot24Sandaysoft Cumulus7Total21362.18%EarthquakeEarthquake762everyEarthquake203EarthquakeTrack.com69QuakeSOS9Total10431.06%NewsSan Diego Trends843WordPress.com111Total9540.97%TrafficTTN SD traffic512TTN LA traffic11Total5230.53%Percentage of Noise:29.42%Source categorySource nameHashtagTweet numberPercentageJobTweetMyJOBS16789SafeTweet by TweetMyJOBS6250Total2303943.23%Advertisementdlvr.it1642circlepix147dine here77Beer Menus53sp_ohioCoupon4DanceDeets4sp_oregonCoupon3SmartSearch2JCScoop1LeadingCourses.com1Total19343.63%TrafficTTN CMH traffic1486Total14862.79%NewsColumbus Trends1021eLobbyist80WordPress.com10twitterfeed8stolen_bike_alerter1Total11202.10%WeatherCities578iembot337Total9151.72%Percentage of Noise:53.47%
cities. The red color areas in Figure 5 are the high kernel density
areas created by the clusters of tweets.
should remove these bot or cyborg tweets before conducting any
spatiotemporal analysis using geotagged tweets.
Figure 5. The spatial distribution of the TweetMyJOBS tweets in
San Diego (top) and Columbus (bottom) during the month of
November, 2015. Red color areas are the clustered tweets in these
locations.
There are other spatial distribution patterns of bots or cyborgs based
on their source names:
• Cities is one of the twitter bots for weather forecasting. Their
spatial distribution is following the locations of major weather
stations or the center of local neighborhood throughout the
whole cities.
•
• Dlvr.it is a new service for attracting and engaging audiences
across the web with powerful content sharing tools. It can help
users to distribute their posted social media messages to other
platforms automatically. All dlvr.it tweets are located in a
single point (at the center of San Diego downtown and at the
center of Columbus downtown).
San Diego Trends and Columbus Trends is used for sending
out the local news. There is only one location tweeting through
San Diego Trends and Columbus Trends which is the
locations of San Diego City Hall and Columbus City Hall.
TNN CMH traffic is the platform of posting traffic accidents.
The whole platform generated 1486 tweets in Columbus City
during the month of November, 2015. According to the spatial
distribution and kernel density map below, the spatial
distribution of their tweets are highly correlated to major roads
and road intersections (Figure 6).
•
Based on these finding, we can conclude that the spatial
distributions of bots and cyborgs are not random. Different types of
bots have their unique spatial distribution patterns. Researchers
Figure 6. The spatial distribution of the TNN CMH traffic tweets
in Columbus during the month of November, 2015. Red dots are
the clustered tweets created by the traffic bots.
6. TWEETING FREQUENCY IN GEO-
TAGGED TWEETS (USER BIASES)
To explore potential user biases in geo-tagged tweets, this study
first calculated the frequency of geo-tagged tweets for individual
users. Geo-tagged tweets were collected within the bounding boxes
of San Diego County, CA and the City of Columbus, OH in U.S.
throughout the month of November, 2015. After removing the bots
and cyborgs, 69,317 human tweets are within San Diego bounding
box and 15,916 unique Twitter users (accounts) were identified
within the collected tweets. Figure 7 (left) reveals the number of
users along with their geo-tagged rates throughout the whole month
of November, 2015 in San Diego. Over 7,900 users only had one
tweet during the whole month, which consists up to 49% of total
users. More than 80% of Twitter users created less than 5 tweets in
the whole month. But 1% of Twitter users created 16% of total
Tweets. This finding is very similar to other literatures in Twitter
message analysis [22][23].
Tweets per user (San Diego)
Tweets per user (Columbus)
Figure 7. The number of users along with their geo-tagged tweeting
rates within November 2015 in San Diego County (left) and in
Columbus City (right).
Using the bounding box of the Columbus City, 29,902 human
tweets were identified for the month of November, 2015. 8,758
unique Twitter users are identified. Over 5,000 users in Columbus
only tweeted once during the whole month, which consists up to
58% of total users (Figure 7, right). Over 86% of Twitter users
created less than 5 tweets in the whole month. Meanwhile, 1% of
Twitter users created 19% of total Tweets.
The patterns of tweets per user in both San Diego and Columbus
cases are similar (Figure 1). The San Diego case has larger number
of human tweets and unique users. The Columbus case has higher
portion of users with only one tweet within one month and the
higher percentage of tweets created by 1% top users. Table 4 shows
a side by side comparison between the two case studies.
Table 4. User biases comparison between San Diego and
Columbus cases.
To avoid the user biases (small percentage of users creating large
amounts of tweets), we can calculate the number of unique users
rather than the number of tweets for statistic analysis [24]. We can
also remove top 1% or 5% of active users if we need to analyze the
common messages from the general population. Another possible
method is to select one tweet per user for sentiment or statistic
analysis.
7. DISCUSSION
When social media researchers and geographers utilized geo-
tagged tweets for their research projects, they need to identify and
remove data noises, user biases, and system errors from their
collected geo-tagged tweets. This paper provides a systematic view
to illustrate the characteristics of geo-tagged tweets from the
Streaming API focusing their noises, user biases, and system errors.
We recommend the following data process procedure for removing
the bot and cyborg tweets:
1. Using the Twitter Streaming with a bounding box to collect
geotagged tweets.
2. Use the same bounding box to filter out (remove) tweets
outside the bounding box or the actual boundary of cities using
GIS software.
necessarily reflect the views of the National Science Foundation.
The authors thank other HDMA team members' contribution to
this research.
REFERENCES
[1] Wang, Zheye, Xinyue Ye, and Ming-Hsiang Tsou.
(2016). Spatial, temporal, and content analysis of
Twitter for wildfire hazards. Natural Hazards: 1-18.
DOI: 10.1007/s11069-016-2329-6.
[2] Morstatter, Fred, Jürgen Pfeffer, Huan Liu, and
Kathleen M. Carley. "Is the sample good enough?
comparing data from twitter's streaming api with
twitter's firehose." arXiv preprint arXiv:1306.5204
(2013).
[3] Tsou, Ming-Hsiang, and Michael Leitner.
"Visualization of social media: seeing a mirage or a
message?." Cartography and Geographic Information
Science 40, no. 2 (2013): 55-60.
[4] Yardi, S., Romero, D., Schoenebeck, G., & boyd, d.
(2009). Detecting spam in a Twitter network. First
Monday, 15(1). doi:10.5210/fm.v15i1.2793.
[5] Lumezanu, C. & Feamster, N. (2012). Observing
Common Spam in Tweets and Email. IMC'12 Boston,
MA, USA.
[6] Chu, Z., Widjaja, I., & Wang, H. (2012). Detecting Social
Spam Campaigns on Twitter. Proceedings of the Applied
Cryptography and Network Security Conference (ACNS'12).
455–472. DOI:http://dx.doi.org/10.1007/978-3-642-31284-
7_27
[7] Krishnamurthy, B., Gill, P., & Arlitt, M. (2008, August). A
few chirps about twitter. In Proceedings of the first workshop
on Online social networks (pp. 19-24). ACM.
3. Manually review the source fields in the collected tweets to
identify top 10 or more bot or cyborg tweets and create a black
list for each city.
[8] Grier, C., Thomas, K., Paxson, V., & Zhang, M. (2010).
@spam: The underground on 140 characters or less. ACM
CCS.
4. Remove bot or cyborg tweets using the black list.
[9] Thosmas, K., & Nicol, D. M. (2010). The koobface botnet
5.
If the research needs to analyze common messages from the
general population, we should use the numbers of unique users
rather than the numbers of tweets in spatial analysis. Another
possible solution is to remove the top 1% or 5% active users
from the database.
Hopefully, by identifying these errors, biases, and noises,
researchers can remove these bots and cyborgs from their raw data
before conducting actual spatial analysis and improve their research
findings and outcomes.
8. ACKNOWLEDGMENTS
This material is based upon work supported by the National
Science Foundation under Grant No. 1416509, project titled
"Spatiotemporal Modeling of Human Dynamics Across Social
Media and Social Networks" and Grant No. 1634641, IMEE
project titled "Integrated Stage-Based Evacuation with Social
Perception Analysis and Dynamic Population Estimation". Any
opinions, findings, and conclusions or recommendations
expressed in this material are those of the author and do not
and the rise of social malware. In Proceedings of the 6rh
ACM Symposium on Information, Computer and
Communications Security.
[10] Lin, PC., & Huang, PM. A study of effective features for
detecting long-surviving Twitter spam accounts. IEEE
International Conference on Advanced Communication
Technology (ICACT), 2013 15th, 2013.
[11] Twitter (2016). The Twitter Rules. Archived from
https://support.twitter.com/articles/20170467.
[12] Uribl. (2013). Realtime URL Blacklist. Archived from
http://uribl.com/about.shtml.
[13] Bratko, A., Filipic, B., Cormack, G. V., Lynam, T. R., &
Zupan, B. (2006). Spam filtering using statistical data
compression methods. J. Mach. Learn. Res. 7:2673-2698.
[14] Goodman, J., Heckerman, D., & Rounthwaite, R. (2005).
Stopping spam. Scientific American 292(4):42–88.
[15] Fetterly, D., Manasse, M., & Najork, M. (2004). Spam, damn
spam, and statistics: using statistical analysis to locate spam
web pages. In Workshop on the Web and Databases.
Human TweetsHuman Users 1 time1-5 timesMost active userSan Diego69,31715,91649%84.20%903Columbus29,9028,75858%89.50%964Ratio of User who tweeted
[16] Wang, A. (2010). Don't Follow Me: Spam Detecting in
Twitter. Proc. Int'l Conf. Security and Cryptography
(SECRYPT).
tweets. Agents and Data Mining Interaction, vol.7607 of
Lecture Notes in Computer Science, pp. 139-149, Springer
Berlin Heidelberg
[17] Akimoto, A. (2011). Japan the Twitter nation. The Japan
[22] Li, Linna, Michael F. Goodchild, and Bo Xu. "Spatial,
Times. Archived from
http://www.japantimes.co.jp/life/2011/05/18/digital/japan-
the-twitter-nation/
[18] Chu, Z., Gianvecchio, S., Wang H., & Jajodia, S. (2010).
Who is Tweeting on Twitter, Human, Bot, or Cyborg.
ACSAC, Austin, Texas, USA.
[19] Messias, J., Schmidt, L., Oliveira, R., & Benevenuto, F.
(2013). You followed my bot! Transforming robots into
influential users in Twitter. First Monday, 18(7).
doi:10.5210/fm.v18i7.4217
[20] Boshmaf, Y., Muslukhov, I., Beznosov, K., & Ripeanu, M.
(2011). The socialbot network. In Proceedings of the 27th
Annual Computer Security Applications Conference (p. 93).
[21] Azmandian, M., Singh, K., Gelsey, B., Chang, Y.-H. &
Maheswaran, R. (2013). Following human mobility using
temporal, and socioeconomic patterns in the use of
Twitter and Flickr." Cartography and Geographic
Information Science 40, no. 2 (2013): 61-77.
[23] Sloan, L., & Morgan, J. (2015). Who Tweets with Their
Location? Understanding the Relationship between
Demographic Characteristics and the Use of Geoservices and
Geotagging on Twitter. PloS one, 10(11), e0142209.
[24] Tsou, Ming-Hsiang. "Research challenges and
opportunities in mapping social media and Big Data."
Cartography and Geographic Information Science 42,
no. sup1 (2015): 70-74.
|
1901.03629 | 1 | 1901 | 2019-01-11T16:11:45 | A Community-aware Network Growth Model for Synthetic Social Network Generation | [
"cs.SI",
"physics.soc-ph"
] | This study proposes a novel network growth model named ComAwareNetGrowth which aims to mimic evolution of real-world social networks. The model works in discrete time. At each timestep, a new link (I) within-community or (II) anywhere in the network is created (a) between existing nodes or (b) between an existing node and a newcoming node, based on (i) random graph model, (ii) preferential attachment model, (iii) a triangle-closing model, or (iv) a quadrangle-closing model. Parameters control the probability of employing a particular mechanism in link creation. Experimental results on Karate and Caltech social networks shows that the model is able to mimic real-word social networks in terms of clustering coefficient, modularity, average path length, diameter, and power law exponent. Further experiments indicate that ComAwareNetGrowth model is able to generate variety of synthetic networks with different statistics. | cs.SI | cs |
A Community-aware Network Growth Model for Synthetic Social
Network Generation
Furkan Gursoy
Bertan Badur
[email protected]
[email protected]
Dept. of Management Information Systems
Bogaziçi University
Istanbul, Turkey
Abstract
This study proposes a novel network growth model named ComAwareNetGrowth which aims to mimic
evolution of real-world social networks. The model works in discrete time. At each timestep, a new
link (I) within-community or (II) anywhere in the network is created (a) between existing nodes or (b)
between an existing node and a newcoming node, based on (i) random graph model, (ii) preferential
attachment model, (iii) a triangle-closing model, or (iv) a quadrangle-closing model. Parameters control
the probability of employing a particular mechanism in link creation. Experimental results on Karate
and Caltech social networks shows that the model is able to mimic real-word social networks in terms
of clustering coefficient, modularity, average path length, diameter, and power law exponent. Further
experiments indicate that ComAwareNetGrowth model is able to generate variety of synthetic networks
with different statistics.
Keywords Networks and graphs · Network growth models · Graph generators · Communities
1 Introduction
Purpose of this study is to build a network growth model that is able to generate synthetic networks which
resemble real-world social networks. Existing network growth models in the literature often aim to reproduce
only a very small set of network statistics. Our work, on the other hand, attempts to reproduce a larger list of
various statistics to evaluate the proposed model's accuracy.
The contribution of this study includes using combination of different growth mechanisms under a community-
aware framework, providing a growth model to understand evolution of many social networks, and providing a
generative mechanism which can be used in generating synthetic networks.
The rest of this study is structured as follows. In Section 2, the relevant literature is briefly reviewed. In
Section 3, the proposed model is formally described. In section 4, experimental results and findings are presented.
The conclusion and final remarks are given in Section 5.
Citation: Gursoy, F., & Badur, B. (2018). A Community-aware Network Growth Model for Synthetic Social Network Generation.
Proceedings of the 5th International Management Information Systems Conference
1
2 Background
Generally speaking, random graph models assume that the probabilities of links (edges) between nodes (vertices)
are independent of each other and equal. There are closely related versions of random graph models. For instance,
in original Erdos-Renyi model (Erdos & Renyi, 1959), all graphs on a fixed node set with a fixed number of links
are equally likely. On the other hand, in the model introduced by Gilbert (1959), each link has a fixed probability
of being present or absent, independently of the other links.
Random graph models and many other popular models in the literature are originally static models which
enable the study of structural features of networks. Another category of network models is growth models
(also called as generative network models). Preferential attachment model is an example of a model in the
latter category. (Simon, 1955), (Price, 1976), (Barabasi & Albert, 1999) are the seminal papers on preferential
attachment model. The main idea behind this model is as follows. At each time, a new node arrives and makes a
certain number of links with existing nodes using the node degrees as probability of making a link with the node.
This mechanism is able to generate a degree distribution which follows a power law which is observed in most
real-world networks.
Triadic closure is a concept in social network theory, first suggested by German sociologist Simmel (1908). It
follows the idea that two nodes are more likely to be connected if they have common neighbors. Generalizing
this, we can consider n-th order neighbors instead of only first-order neighbors. In this way, for instance, a
quadrangle-closure implies that two nodes are more likely to be connected if they have neighbors who are
neighbors with each other. Once a quadrangle is closed, a four-cycle is created. Lazega and Pattison (1999)
examine whether cycles larger than tri-cycles could be observed in an empirical setting to a greater extent than
could be accounted for by parameters for configurations involving at most three nodes. Snijders et al. (2006)
describe this as four-cycle partial conditional dependence and proposes it as a new configuration.
Kimura et al. (2004) present a model where links are created by a mixture of preferential attachment, uniform
attachment, and community-based attachment model. Leskovec et al. (2008) propose a network evolution model
considering the micromechanisms in social networks. Their model utilizes preferential attachment and triangle-
closure models in creating links. Lim et al. (2016) provide a comprehensive review of different approaches in
generating realistic synthetic graphs.
3 Proposed Model
The proposed model works in discrete time steps. It assumes that each node belongs to exactly one community.
At each time step, a new link is to be created. Nodes are assumed to arrive in uniform time intervals. The time
interval is found by dividing number of links (m) to number of nodes (n), thus a new node arrives at each m/n-th
step.
When a new node arrives, it is assigned a community label with respective probabilities given as input.
Then, the arriving node makes a link either within its community or in the whole network based on respective
probabilities specified by the input parameter. The link can be made with a uniformly selected random node or
with a node selected by using node degrees as the proxy probabilities (i.e., preferential attachment). If the link is
to be made within community, node degrees for preferential attachment process is calculated only considering the
links in the community.
At the time steps where no new node arrives, a new link is created between the existing nodes. One end of
the link is selected randomly among all existing nodes. The other end is selected within community/in whole
network, randomly or based on preferential attachment model; similar to the procedure explained previously for
a newly arriving node. However, another mechanism is available for links between existing nodes that is not
available for newly arriving nodes: triangle or quadrangle closing models. For a given node, a triangle is closed
by making a link to its second-order neighbor. A quadrangle is closed by making a link to its third-order neighbor.
2
More mechanisms can be created based on the proposed n-th order specification but considering that diameter
and average path length of observed networks are relatively small, including such mechanisms with higher n
value would mean making a link specifically to a distant node rather than a node in the neighborhood.
The selection of mechanisms (e.g., within community/in whole network, random/preferential attachment/triangle-
closure/quadrangle-closure) are controlled by input parameters. In some cases, the selected mechanism is not
able to generate a new link for reasons such as lack of possible triangles or quadrangles, or because all possible
links for the given node and mechanism already exist in the network. In those cases, at that time step, no action is
performed and model continues with the next time step. Although the property of uniform arrival of nodes is
distorted, the resulting network still has n nodes and m links.
In addition, potential target nodes are selected before checking whether they already have a link with the
source node. If a selected node is already connected, no action is performed at that time step too. This also results
in violation of uniform arrival of nodes. However, we chose to keep it this way to prevent overdensification of
relatively small communities where a randomly selected node is more likely to be an immediate neighbor.
Each mechanism employed in ComAwareNetGrowth model corresponds to the simplified versions of possible
link formations in real-world networks. The stronger the communities, the more probable for a node to make
connection within its community. Random links are usually less frequent in most social networks but actually
an existing mechanism. Preferential attachment reflects the 'rich get richer' phenomena. Triangle closures and
quadrangle closures are justified by the observation that nodes are usually more likely to make links within their
neighborhood rather than distant nodes.
Algorithm 1 presents our proposed model in general with omitting some details. The complete source code
in R software language and some network datasets generated using the proposed methodology are available at
furkangursoy.github.io.
4 Experimental Analysis
In this section, several experiments are conducted and results are analyzed. In the first part, we attempt to generate
two real-world undirected simple social networks: Zachary's Karate Club (Zachary, 1977) and Caltech Facebook
Network (Traud et al., 2011). The first network, called as Karate in the rest of the study, is a well-known social
network of a university karate club where links exist between members who interact outside the club. The latter
network, called as Caltech in the rest of the study, consists of the complete set of users from the Facebook network
of California Institute of Technology.
Table 1 displays various statistics of the two networks. The statistics are calculated using R's igraph package.
In calculation of modularity; first, communities are detected by utilizing fast greedy community detection
algorithm available in R. Estimated communities, then, are used in calculation of modularity. The sizes of the
found communities are also utilized as input probabilities for belonging to communities in the network growth
experiments.
Table 1: Network Statistics
n
34
769
m
78
16656
Clustering
Coefficient
0.26
0.29
Karate
Caltech
Avg. Path
Length Modularity Diameter
5.00
6.00
2.41
2.34
0.38
0.33
Power Law
Exponent
2.55
1.50
3
Algorithm 1 ComAwareNetGrowth: The Proposed Community-aware Network Growth Model
4.1 Experiments on Karate Network
The following parameter values are used to generate a social network that mimics Karate network: n = 34,
m = 78, k = 3, C = {0.24, 0.5, 0.26}, comp = 0.8, rpn = 0.22, ppn = 0.78, rpe = 0.04, ppe = 0.14,
c3pe = 0.41, and c4pe = 0.41. The experiments are repeated 10 times, and statistics for the generated and
observed networks are given in Table 2.
On average, the proposed growth model with the given parameter settings is able to mimic the Karate network
in general. However, modularity and and power law exponent1 (Newman, 2005) statistics are not closely matched.
Although most of the statistics can be generated with small standard deviations, modularity and clustering
coefficient show relatively larger variations in these experiments. This might be due to the very small size of the
network.
1Most networks follow power-law in the tail. Accordingly, in fitting the power law, lower bound is set as 2 for Karate and 5 for all
other experiments.
4
Table 2: Experimental Results for Karate Network
Avg. Path
Clustering
Coefficient
0.18
0.24
0.22
0.25
0.19
0.30
0.20
0.27
0.30
0.27
0.24
0.04
0.26
-0.02
Run#1
Run#2
Run#3
Run#4
Run#5
Run#6
Run#7
Run#8
Run#9
Run#10
Mean
StdDev
Observed
Diff.
Length Modularity Diameter
4.00
5.00
4.00
5.00
5.00
5.00
5.00
6.00
6.00
5.00
5.00
0.63
5.00
0.00
0.26
0.26
0.20
0.27
0.34
0.27
0.21
0.22
0.22
0.34
0.26
0.05
0.38
-0.12
2.32
2.42
2.35
2.47
2.50
2.38
2.31
2.52
2.55
2.56
2.44
0.09
2.41
0.03
Power Law
Exponent
2.20
2.13
2.10
2.31
2.22
2.20
2.24
2.02
2.14
2.19
2.18
0.08
2.55
-0.37
Figure 1 visualizes the communities found in the original Karate network and a synthetic network generated
by our model. In the synthetic network, communities are less separated than the original network. Especially, two
communities (displayed in white and black) do not come as separate communities. Note that, this is just one of
the generated networks. Other networks might more closely resemble the original network.
Figure 1: (a) Observed Network, (b) Generated Network
4.2 Experiments on Caltech Network
The following parameter values are used to generate a network that mimics Caltech network: n = 769, m =
16656, k = 8, C = {0.375, 0.341, 0.254, 0.017, 0.005, 0.004, 0.003, 0.003}, comp = 0.85, rpn = 0.333,
ppn = 0.666, rpe = 0.091, ppe = 0.182, c3pe = 0.363, and c4pe = 0.363. The experiments are repeated 10
times, and statistics for the generated and observed networks are given in Table 3.
5
Experimental results show that average path length, modularity, and power law exponent are closely matched
with negligible standard deviations. However, clustering coefficient and diameter values are not replicated
successfully in terms of difference between the generated and observed statistic. Caltech network is a larger
network than the Karate network. Therefore, as desired, variances in the generated statistics are almost zero.
Consequently, it can be concluded that given a sufficient number of nodes and links, our proposed growth model
is able to produce stable results.
Table 3: Experimental Results for Caltech Network
Clustering
Coefficient
0.17
0.17
0.17
0.17
0.17
0.17
0.17
0.17
0.17
0.17
0.17
0.00
0.29
-0.12
Run#1
Run#2
Run#3
Run#4
Run#5
Run#6
Run#7
Run#8
Run#9
Run#10
Mean
StdDev
Observed
Diff.
Avg. Path
Length Modularity Diameter Power Law
Exponent
1.52
2.19
2.20
1.52
1.52
2.20
1.52
2.19
1.52
2.19
1.52
2.19
2.20
1.52
1.52
2.20
1.52
2.19
1.52
2.20
2.20
1.52
0.00
0.00
1.50
2.34
-0.14
0.02
4.00
4.00
4.00
4.00
4.00
4.00
4.00
4.00
4.00
4.00
4.00
0.00
6.00
-2.00
0.32
0.32
0.33
0.34
0.32
0.33
0.32
0.33
0.33
0.32
0.33
0.01
0.33
0.00
4.3 Other Experiments
Another set of experiments are performed without the purpose of mimicking any real network but to explore
the variety of networks which can be generated with our proposed growth model. Parameter settings for eight
experiments are presented in Table 4. The first and last four experiments are the same except that m = 2000
for former experiments whereas m = 5000 for latter experiments, hence a denser network. Each experiment is
repeated for 10 times. The mean and standard deviations of generated statistics are presented in Table 5.
Table 4: Settings for Other Experiments
n m k C
{.2, 0.2, 0.2, 0.2, 0.2}
Exp#1 500 2000 5
Exp#2 500 2000 5
{.2, 0.2, 0.2, 0.2, 0.2}
Exp#3 500 2000 5 {.005, 0.055, 0.11, 0.28, 0.55}
Exp#4 500 2000 5 {.005, 0.055, 0.11, 0.28, 0.55}
{.2, 0.2, 0.2, 0.2, 0.2}
Exp#5 500 5000 5
Exp#6 500 5000 5
{.2, 0.2, 0.2, 0.2, 0.2}
Exp#7 500 5000 5 {.005, 0.055, 0.11, 0.28, 0.55}
Exp#8 500 5000 5 {.005, 0.055, 0.11, 0.28, 0.55}
comp rpn ppn rpe ppe c3pe c4pe
0.50 0.50 0.5 0.25 0.25 0.25 0.25
0.75 0.33 0.66 0.10 0.20 0.30 0.40
0.75 0.33 0.66 0.10 0.20 0.30 0.40
0.25 0.17 0.83 0.12 0.63 0.12 0.12
0.50 0.50 0.50 0.25 0.25 0.25 0.25
0.75 0.33 0.66 0.10 0.20 0.30 0.40
0.75 0.33 0.66 0.10 0.20 0.30 0.40
0.25 0.17 0.83 0.12 0.63 0.12 0.12
The experiments confirm that standard deviations are indeed very low. Diameter might be seen as an exception
to this but it is mostly due to the nature of that statistic. Since it is an integer value, even if the model generates
only two adjacent integer values for this statistic, standard deviation might come as large at the first sight.
As the number of links increase from 2000 to 5000, values for average path Length and diameter get smaller
as expected. On the other hand, clustering coefficent increases. There does not seem to be a meaningful change
in the values of modularity.
6
Table 5: Other Experimental Results
Avg. Path
Clustering
Coefficient
0.10
0.00
0.11
0.00
0.10
0.00
0.11
0.01
0.15
0.00
0.16
0.00
0.15
0.00
0.17
0.00
Exp#1 Mean
Std.Dev.
Exp#2 Mean
Std.Dev.
Exp#3 Mean
Std.Dev.
Exp#4 Mean
Std.Dev.
Exp#5 Mean
Std.Dev.
Exp#6 Mean
Std.Dev.
Exp#7 Mean
Std.Dev.
Exp#8 Mean
Std.Dev.
Length Modularity Diameter
7.50
0.71
7.60
0.52
7.60
0.70
7.60
0.52
5.10
0.32
4.90
0.32
5.20
0.42
5.00
0.00
0.38
0.01
0.47
0.01
0.34
0.02
0.42
0.01
0.36
0.01
0.44
0.00
0.31
0.01
0.40
0.02
3.31
0.02
3.33
0.03
3.29
0.02
3.39
0.02
2.51
0.00
2.52
0.01
2.51
0.01
2.55
0.01
Power Law
Exponent
2.41
0.03
2.41
0.04
2.39
0.03
2.47
0.04
1.82
0.01
1.81
0.01
1.82
0.01
1.82
0.01
5 Conclusion
In this work, we have developed a network growth model with the aim of exploring the mechanisms behind most
real-world networks, and being able to mimic real-world networks through these mechanisms. The proposed
growth model serves as an initial step to build a realistic growth model which can generate graphs with any set of
given statistics.
When there exist a sufficient number of nodes and links, our model generates networks which do not vary
between themselves in terms of the network statistics employed in this study. Such stability is highly desired.
However, some network statistics are not being successfully replicated. This might be because one or combination
of the two things. First, parameter values are determined based on a few manual experiments rather than estimating
them from the real network. Second, the mechanisms employed in the growth model might not be sufficient to
generate any social network easily, which suggest further development of the model.
Given the limitations of the current work, more effort in future should be directed towards developing more
accurate mechanisms, exploring relationships between the mechanisms, and estimating parameter values via
more systematic calibration experiments.
7
References
Barabasi, A. L., & Albert, R. (1999). Emergence of scaling in random networks. Science, 286(5439), 509-512.
doi:10.1126/science.286.5439.509
Erdos, P., & Renyi, A. (1959). On random graphs I. Publicationes Mathematicae (Debrecen), 6, 290-297.
Gilbert, E. N. (1959). Random graphs. The Annals of Mathematical Statistics, 30(4), 1141-1144.
Kimura, M., Saito, K., & Ueda, N. (2004). Modeling of growing networks with directional attachment and
communities. Neural Networks, 17(7), 975-988. doi:10.1016/j.neunet.2004.01.005
Lazega, E., & Pattison, P. E. (1999). Multiplexity, generalized exchange and cooperation in organizations: A case
study. Social Networks, 21(1), 67-90. doi:10.1016/s0378-8733(99)00002-7
Leskovec, J., Backstrom, L., Kumar, R., & Tomkins, A. (2008). Microscopic evolution of social networks.
Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining -
KDD 08. doi:10.1145/1401890.1401948
Lim, S., Lee, S., Powers, S. S., Shankar, M., & Imam, N. (2016). Survey of Approaches to Generate Realistic
Synthetic Graphs. doi:10.2172/1339361
Newman, M. (2005). Power laws, Pareto distributions and Zipfs law. Contemporary Physics, 46(5), 323-351.
doi:10.1080/00107510500052444
Price, D. D. (1976). A general theory of bibliometric and other cumulative advantage processes. Journal of the
American Society for Information Science, 27(5), 292-306. doi:10.1002/asi.4630270505
Simmel, G. (1908). Sociologie. Untersuchungen über die Formen der Vergesellschaftung. Duncker & Humblot.
Simon, H. A. (1955). On a Class of Skew Distribution Functions. Biometrika, 42(3/4), 425. doi:10.2307/2333389
Snijders, T. A., Pattison, P. E., Robins, G. L., & Handcock, M. S. (2006). New Specifications for Exponential
Random Graph Models. Sociological Methodology, 36(1), 99-153. doi:10.1111/j.1467-9531.2006.00176.x
Traud, A. L., Kelsic, E. D., Mucha, P. J., & Porter, M. A. (2011). Comparing Community Structure to Character-
istics in Online Collegiate Social Networks. SIAM Review, 53(3), 526-543. doi:10.1137/080734315
Zachary, W. W. (1977). An Information Flow Model for Conflict and Fission in Small Groups. Journal of
Anthropological Research, 33(4), 452-473. doi:10.1086/jar.33.4.3629752
8
|
1905.10351 | 3 | 1905 | 2019-08-28T15:36:05 | Tempus Volat, Hora Fugit -- A Survey of Tie-Oriented Dynamic Network Models in Discrete and Continuous Time | [
"cs.SI",
"stat.AP"
] | Given the growing number of available tools for modeling dynamic networks, the choice of a suitable model becomes central. The goal of this survey is to provide an overview of tie-oriented dynamic network models. The survey is focused on introducing binary network models with their corresponding assumptions, advantages, and shortfalls. The models are divided according to generating processes, operating in discrete and continuous time. First, we introduce the Temporal Exponential Random Graph Model (TERGM) and the Separable TERGM (STERGM), both being time-discrete models. These models are then contrasted with continuous process models, focusing on the Relational Event Model (REM). We additionally show how the REM can handle time-clustered observations, i.e., continuous time data observed at discrete time points. Besides the discussion of theoretical properties and fitting procedures, we specifically focus on the application of the models on two networks that represent international arms transfers and email exchange. The data allow to demonstrate the applicability and interpretation of the network models. | cs.SI | cs | Tempus Volat, Hora Fugit - A Survey of
Tie-Oriented Dynamic Network Models in
Discrete and Continuous Time
Cornelius Fritz∗, Michael Lebacher and Goran Kauermann
Department of Statistics, Ludwig-Maximilians-Universitat Munchen
Abstract
Given the growing number of available tools for modeling dynamic networks, the
choice of a suitable model becomes central. The goal of this survey is to provide an
overview of tie-oriented dynamic network models. The survey is focused on introducing
binary network models with their corresponding assumptions, advantages, and short-
falls. The models are divided according to generating processes, operating in discrete
and continuous time. First, we introduce the Temporal Exponential Random Graph
Model (TERGM) and the Separable TERGM (STERGM), both being
time-discrete models. These models are then contrasted with continuous process mod-
els, focusing on the Relational Event Model (REM). We additionally show how the
REM can handle time-clustered observations, i.e., continuous time data observed at
discrete time points. Besides the discussion of theoretical properties and fitting pro-
cedures, we specifically focus on the application of the models on two networks that
represent international arms transfers and email exchange. The data allow to demon-
strate the applicability and interpretation of the network models.
Keywords -- Continuous-Time, Discrete-Time, Event Modeling, ERGM, Random
Graphs, REM, STERGM, TERGM
∗[email protected]
1
9
1
0
2
g
u
A
8
2
]
I
S
.
s
c
[
3
v
1
5
3
0
1
.
5
0
9
1
:
v
i
X
r
a
1
Introduction
The conceptualization of systems within a network framework has become popular within
the last decades, see Kolaczyk (2009) for a broad overview. This is mostly because network
models provide useful tools for describing complex dependence structures and are applicable
to a wide variety of research fields. In the network approach, the mathematical structure of
a graph is utilized to model network data. A graph is defined as a set of nodes and relational
information (ties) between them. Within this concept, nodes can represent individuals,
countries or general entities, while ties are connections between those nodes. Dependent on
the context, these connections can represent friendships in a school (Raabe et al., 2019),
transfers of goods between countries (Ward et al., 2013), sexual relations between people
(Bearman et al., 2004) or hyperlinks between websites (Leskovec et al., 2009) to name just
a few. Given a suitable data structure for the system of interest, the conceptualization as
a network enables analyzing dependencies between ties. A central statistical model that
allows this is the Exponential Random Graph Model (ERGM, Robins and Pattison, 2001).
This model permits the inclusion of monadic, dyadic and hyperdyadic features within a
regression-like framework.
Although the model allows for an insightful investigation of within-network dependencies,
most real-world systems are typically more complex. This is especially true if a temporal
dimension is added, which is relevant, as most systems commonly described as networks
evolve dynamically over time. It can even be argued that most static networks are de facto
not static but snapshots of a dynamic process. A friendship network, e.g., typically evolves
over time and influences like reciprocity often follow a natural chronological order.
Of course, this is not the first paper concerned with reviewing temporal network models.
Goldenberg et al. (2010) wrote a general survey covering a wide range of models. The authors
laid the foundation for further articles and postulated a soft division of statistical network
models into latent space (Hoff et al., 2002) and p1 models (Holland and Leinhardt, 1981), all
originating in the Eds-Rnyi-Gilbert random graph models (Erdos and R´enyi, 1959; Gilbert,
1959). Kim et al. (2018) give a contemporary update on the field of dynamic models building
on latent variables. Snijders (2005) discusses continuous time models and reframes the
independence and reciprocity model as a Stochastic Actor oriented Model (SAOM, Snijders,
1996). Block et al. (2018) provide an in-depth comparison of the Temporal Exponential
Random Graph Model (TERGM, Hanneke et al., 2010) and the SAOM with special focus
on the treatment of time. Further, the ERGM and SAOM for networks which are observed
at single time points are contrasted by Block et al. (2019), deriving theoretical guidelines for
model selection based on the differing mechanics implied by each model.
In the context of this compendium of articles, the scope is to give an update on the
dynamic variant of the second strand of models relating to p1 models. We therefore extend
2
Figure 1: Tree diagram summarizing the dependencies between models originating in the
Erds-Rnyi-Gilbert graph model, models situated in a box with a grey background are dis-
cussed in this article. This graph is an update of Figure 6.1 in Goldenberg et al. (2010).
the summarizing diagram of Goldenberg et al. (2010) as depicted in Figure 1. Generally, we
divide temporal models into two sections, by differentiating between discrete and continuous
time network models. In this endeavor, we emphasize reviewing tie-oriented models. Tie-
oriented models are concerned with formulating a stochastic model for the existence of a tie
contrasting the actor-oriented approach by Snijders (2002), which specifies the model from
the actors point of view (Block et al., 2018). The Dynamical Actor-Oriented model (DyNAM,
Stadtfeld and Block, 2017) adopts this actor-oriented paradigm to event data. This type of
model was formulated with a focus on social networks (Snijders, 1996). Contrasting this, tie-
oriented models can be viewed as more general, since they are also applicable to non-social
networks.
Statistical models for time discrete data rely on an autoregressive structure and condition
the state of the network at time point t on previous states. This includes the TERGM and
the Separable TERGM (STERGM, Krivitsky and Handcock, 2014). There exists a variety of
recent applications of the TERGM. White et al. (2018) use a TERGM for modeling epidemic
disease outcomes and Blank et al. (2017) investigate interstate conflicts. In He et al. (2019)
Chinese patent trade networks are inspected and Benton and You (2017) use a TERGM
for analyzing shareholder activism. Applications of STERGMs are given for example by
Stansfield et al. (2019) that model sexual relationships and Broekel and Bednarz (2019) that
study the network of research and development cooperation between German firms.
3
Erdös-Rényi-Gilbdert(Gilbert 1959, Erdös and Rényi 1959)Latent Space ModelsStatic Variant (Hoff, Raftery, Handcock2002)Dynamic Variant (Sarkar, Moore 2005)p1 models(Holland and Leinhardt1981)Static Variant Dynamic Variant ERGM(Frank and Strauss1986)TERGM(Hanneke and Xing2006)STERGM(Krivitski and Handcock2012)Markov Chain-BasedDiscrete TimeMarkov Process-BasedContinuous TimeSAOM (Snijders 1996)DyNAM(Stadtfeld et al. 2017)REM(Butts 2008)Longitudinal DataTime Stamped DataIn case of time-continuous data, the model regards the network as a continuously evolving
system. Although this evolution is not necessarily observed in continuous time, the process
is taken to be latent and explicitly models the evolution from the state of the network at
time point t− 1 to t (Block et al., 2018). In this paper we discuss the relational event model
(REM, Butts, 2008) for the analysis of event data. Applications of the REM are manifold
and range from explaining the dynamics of health behavior sentiments via Twitter (Salath´e
et al., 2013), inter-hospital patient transfers (Vu et al., 2017), online learning platforms (Vu
et al., 2015), and animal behavior (Tranmer et al., 2015) to structures of project teams
(Quintane et al., 2013). Eventually, the REM is adapted to time-discrete observations of
networks. That is, we observe the time-continuous developments of the network at discrete
observation times only. Henceforth, we use the term time-clustered for this special data
structure.
In reviewing dynamic network models, we assume a temporal first-order Markov depen-
dency. To be more specific, this implies that the network at time point t only depends on
the previous observation of the network. This characteristic is widely used in the analysis of
longitudinal networks (Hanneke et al., 2010; Krivitsky and Handcock, 2014) and the result-
ing conditional independence among states of the network facilitates the estimation with an
arbitrary number of time points. In that respect, it suffices to only include two observational
moments for illustrative purposes, since the interpretation and estimation with a longer se-
ries of networks is unchanged. Lastly, the comparison of the methods at hand in a clear-cut
manner is hence enabled.
The paper is structured as follows. In Section 2 we give basic definitions that are used
throughout the paper and present the two data examples that will be analyzed as illustrative
examples. After that, Section 3 introduces time-discrete and Section 4 time-continuous
network models. They are applied in Section 5 on two data sets and Section 6 concludes.
Additional results relating to the applications can be found in the Supplementary Material.
2 Definitions and Data Description
2.1 Definitions
This article regards directed binary networks, with ties representing directed relations be-
tween two nodes at a time point. The respective information can be represented in an
adjacency matrix Yt = (Yij,t)i,j=1,..,n ∈ Y, where Y = {Y : Y ∈ {0, 1}n×n} represents the
set of all possible networks with n nodes. The entry (i, j) of Yt is "1" if a tie is outgo-
ing from node i to j in year t and "0" otherwise. Further, the discrete time points of
the observations of Yt are denoted as t = 1, . . . , T . We restrict our analysis to two time
points in both exemplary networks, which suffices for comparison. Hence, we set T = 2. In
4
t
Time
Number of events
Number of nodes
Number of possible ties n(n − 1)
Density
Transitivity
Reciprocity
Repetition
n
Arms Trade Network
2016
−
180
2017
−
180
32 220
0.021
0.195
0.081
−
32 220
0.020
0.202
0.083
0.641
Email Network
Period 1 Period 2
4 957
88
7 656
0.123
0.407
0.7
−
2 537
88
7 656
0.087
0.345
0.687
0.574
Table 1: Descriptive statistics for the international arms trade network (left) and the Euro-
pean research institutions email correspondence (right).
many networks, including our running examples self-loops are meaningless. We therefore fix
Yii,t ≡ 0 ∀ i ∈ {1, . . . , n} throughout the article. Further, all sub-scripted temporal indices
(Yt) are assumed to take discrete and all indices in brackets (Y (t)) continuous values. The
temporal indicator t denotes the observation times of the network and to notationally differ
this from time-continuous model we write t for continuous time.
To sufficiently compare different models, we use two application cases. The first one
represents the international trade of major weapons, which is given by discrete snapshots
of networks that are yearly aggregated over time-continuous trade instances, i.e., the time-
stamped information is not observed. Whereas the second application, a network of email
traffic, comes in time-stamped format, that can be aggregated to discrete-time observations.
2.2 Data Set 1: International Arms Trade
The data on international arms trading for the years 2016 and 2017 are provided by the
Stockholm International Peace Research Institute (SIPRI, 2019). To be more specific, infor-
mation on the exchange of major conventional weapons (MCW) together with the volume
of each transfer is included. In order to have a binary network representation, we discretize
the data and set edges Yij,t to "1" if country i sent arms to country j in t.
The left side of Table 1 gives some descriptive measures (Csardi and Nepusz, 2006) and
Figure 2 visualizes the arms trade network using the software Gephi (Bastian et al., 2009).
The density of a network is the proportion of realized edges out of all possible edges and
is similar in both years, indicating the sparsity of the modeled network. Clustering can
be expressed by the transitivity measure, providing the percentage of triangles out of all
connected triplets. Reciprocity in a graph is the ratio of reciprocated ties and is similar in
both years. As expressed by the high percentage of repeated ties, most countries seem to
5
Figure 2: The International Arms Trade as a binary network in 2016 (left) and 2017 (right).
Nodes that are isolated in both years are not depicted for clarity and the node size relates
to the sum of the out- and in-degree. The labels of the nodes are the ISO3 codes of the
respective countries.
continue trading with the same partners.
Additionally, different kinds of exogenous covariates may be controlled for in statistical
network models. In the given example we use the logarithmic Gross Domestic Product (GDP)
(World Bank, 2017) as monadic covariates concerning the sender and receiver of weapons.
We also include the absolute difference of the so called polity IV index (Center for systemic
Peace, 2017), ranging from zero (no ideological distance) to 20 (highest ideological distance),
as a dyadic exemplary covariate. These covariates are assumed to be non-stochastic and we
denote them by xt. See the Supplementary Material for a list of all included countries and
their ISO3 code.
6
BRAAFGCANINDUSACHNDZAFRADEUITANLDRUSZAFSWEAREGBRBLRAGOISRAUTARGARMAUSAZETURBHSBELBHRBGDYUGUKRBTNBOLCZEBWAESPCHEBFABDICMRSVKNORCHLUZBCOLZARCIVHRVDNKDOMECUEGYFINSLVESTETHGABGHAGRCHUNKGZIDNPOLIRNIRQBGRKORSVNIRLJAMJPNJORKAZKENKWTLVALBNLTULUXMKDMWIBRNMYSTHAMLIMLTMRTMUSMEXYUGMARMOZMYMNAMNPLNICNGAPAKOMNSGPPANPERNZLPHLPRTQATROMSAUGEOSENSLESDNTJKTZATTOTUNTKMUGAVNMZMBALBTCDCYPFJIGINHNDLAOLSONERPNGRWALKABRAAFGCANINDUSACHNDZAFRADEUITANLDRUSZAFSWEAREGBRBLRAGOISRAUTARGARMAUSAZETURBHSBELBHRBGDYUGUKRBTNBOLCZEBWAESPCHEBFABDICMRSVKNORCHLUZBCOLZARCIVHRVDNKDOMECUEGYFINSLVESTETHGABGHAGRCHUNKGZIDNPOLIRNIRQBGRKORSVNIRLJAMJPNJORKAZKENKWTLVALBNLTULUXMKDMWIBRNMYSTHAMLIMLTMRTMUSMEXYUGMARMOZMYMNAMNPLNICNGAPAKOMNSGPPANPERNZLPHLPRTQATROMSAUGEOSENSLESDNTJKTZATTOTUNTKMUGAVNMZMBALBTCDCYPFJIGINHNDLAOLSONERPNGRWALKA2.3 Data Set 2: European Research Institution Email Correspon-
dence
The second network under study represents anonymized email exchange data between insti-
tution members of a department in a European research institution (see Paranjape et al.,
2017, Email EU Core, 2019). In this data set, we observe events ω = (i, j, t) that represent
emails sent from department member i to department member j at a specific time point t.
The data contains n = 89 persons and is recorded over 802 days. For this paper, we
select the first two years and split them again into two years, labeled Period 1 and Period
2. Within the first period, 8 068 events are recorded and 4 031 in the second period. We
only regard one-to-one email correspondences, therefore we exclude all group mails from the
analysis. In the right column of Table 1 the descriptive measures for the two aggregated
networks are given and in Figure 3 they are visualized. All descriptive statistics are higher
in the email exchange network as compared to the arms trade network. In comparison to
the arms trade network, the aggregated network is more dense with more than 10% of all
possible ties being realized. In both years the transitivity measure is relatively higher in
both time periods. The high share of reciprocated ties is intuitive given that the network
represents email exchange between institution members that may collaborate. No covariates
are available for this network. See Annex A for the visualization of the degree distributions
of both applications.
3 Dynamic Exponential Random Graph Models
3.1 Temporal Exponential Random Graph Model
The Exponential Random Graph Model (ERGM) is among the most popular models for the
analysis of static network data. Holland and Leinhardt (1981) introduced the model class,
which was subsequently extended with respect to fitting algorithms and network statistics
(see Lusher et al., 2012, Robins et al., 2007). Spurred by the popularity of ERGMs, dynamic
extensions of this model class emerged, pioneered by Robins and Pattison (2001) who de-
veloped time-discrete models for temporally evolving social networks. Before we start with
a description of the model, we want to highlight that the TERGM as well as the STERGM
are most appropriate for equidistant time points. That is, we observe the networks Yt at
discrete and equidistant time points t = 1, ..., T . Only in this setting, the parameters allow
for a meaningful interpretation. See Block et al. (2018) for a deeper discussion.
Hanneke et al. (2010) is the main reference for the TERGM, a model class that utilizes
the Markov structure and, thereby, assumes that the transition of a network from time
point t − 1 to time point t can be explained by exogenous covariates as well as structural
7
Figure 3: The European research institution email correspondence aggregated to a binary
network divided into Period 1 (day 1-365, left) and Period 2 (day 1-365, right). The node
size relates to the sum of the out- and in-degree.
components of the present and preceding networks. Using a first-order Markov dependence
structure and conditioning on the first network, the resulting dependence structure of the
model can be factorized into
Pθ(YT , ..., Y2Y1, x1, ..., xT ) = Pθ(YTYT−1, xT )··· Pθ(Y3Y2, x3)Pθ(Y2Y1, x2).
(1)
In the formulation above, it is assumed that the joint distribution can be decomposed into
yearly transitions from Yt−1 to Yt. Further, it is assumed that the same parameter vector
θ governs all transitions. Often, this is an unrealistic assumption for networks observed
at many time-points because the generative process may change other time. Therefore, it
can be useful to allow for different parameter vectors for each transition probability (i.e.
θT , θT−1, ...). In such a setting, the parameters for each transition can either be estimated
sequentially (e.g. Thurner et al., 2018) or by using smooth time-varying effects (e.g. Lebacher
et al., 2019).
Given the dependence structure (1), the TERGM assumes that the transition from Yt−1
to Yt is generated according to an exponential random graph distribution with the parameter
θ:
.
(2)
Pθ(Yt = ytYt−1 = yt−1, xt) =
exp{θT s(yt, yt−1, xt)}
κ(θ, yt−1, xt)
8
Generally, s(yt, yt−1, xt) specifies a p-dimensional function of sufficient network statistics
which may depend on the present and previous network as well as on covariates. These
network statistics can include static components, designed for cross-sectional dependence
structures (see Morris et al., 2008 for more examples). However, the statistics s(yt, yt−1, xt)
explicitly allow temporal interactions, e.g. delayed reciprocity
sdelrecip(yt, yt−1) ∝(cid:88)
i(cid:54)=j
yji,tyij,t−1.
(3)
This statistic governs the tendency whether a tie (i, j) in t − 1 will be reciprocated in t.
Another important temporal statistic is stability
(yij,tyij,t−1 + (1 − yij,t)(1 − yij,t−1)) .
(4)
sstability(yt, yt−1) ∝(cid:88)
i(cid:54)=j
In this case, the first product in the sum measures whether existing ties in t − 1 persist
in t and the second term is one if non-existent ties in t − 1 remain non-existent in t. The
proportionality sign is used since in many cases the network statistics are scaled into a specific
interval (e.g. [0, n] or [0, 1]). Such a standardization is especially sensible for networks where
the actor set changes with time. Additionally, exogenous covariates can be included, e.g.,
time-varying covariates xij,t
sdyadic(yt, xt) =
yij,txij,t.
(5)
(cid:88)
i(cid:54)=j
There exists an abundance of possibilities for defining interactions between ties in t − 1
and t. From this discussion and equation (2) it also becomes evident, that in a situation
where the interest lies in the transition between two periods, a TERGM can be modeled
simply as an ERGM, including lagged network statistics. This can be done for example by
incorporating yij,t−1 as explanatory variable in (5) which is mathematically equivalent to the
stability statistic (4). In the application we call this statistic repetition (Block et al., 2018).
Concerning the estimation of the model, maximum likelihood estimation appears to be
a natural candidate due to the simple exponential family form (2). However, the nor-
malization constant in the denominator of model (2) often poses an inhibiting obstacle
when estimating (T)ERGMs. This can be seen by inspecting the normalization constant
y∈Y exp{θT s(yt, yt−1, xt)}, that requires summation over all possible net-
works y ∈ Y. This task is virtually infeasible, except for very small networks. Therefore,
Markov Chain Monte Carlo (MCMC) methods have been proposed in order to approximate
the logarithmic likelihood function (see Geyer and Thompson (1992) for Monte Carlo max-
κ(θ, yt−1, xt) = (cid:80)
9
imum likelihood and Hummel et al. (2012) for its adaption to ERGMs). The article by
Caimo and Friel (2011) provides an alternative algorithm that uses MCMC-based inference
in a Bayesian model framework. Another approach is to employ maximum pseudolikelihood
estimation (MPLE, Strauss and Ikeda, 1990) that can be viewed as a local alternative to
the likelihood (van Duijn et al., 2009) but is often regarded as unreliable and poorly under-
stood in the literature (Hunter et al., 2008, Handcock et al., 2003). However, the MPLE is
asymptotically consistent (Desmarais and Cranmer, 2012) and the often suspect standard
errors can be corrected via bootstrap (Leifeld et al., 2018). A notable special case arises if
the network statistics are restricted such that they decompose to
s(yt, yt−1, xt) =
yij,tsij(yt−1, xt),
(6)
(cid:88)
i(cid:54)=j
with sij being a function that is evaluated only at the lagged network yt−1 and covariates xt
for tie (i, j). With this restriction, we impose that the ties in t are independent, conditional
on the network structures in t − 1. This greatly simplifies the estimation procedure and
allows to fit the model as a logistic regression model (see for example Almquist and Butts,
2014) without the issues related to the MPLE.
A problem, that is very often encountered when fitting (T)ERGMs with endogenous
network statistics is called degeneracy (Schweinberger, 2011) and occurs if most of the prob-
ability mass is attributed to network realizations that provide either full or empty networks.
One way to circumvent this problems is the inclusion of modified statistics, called geometri-
cally weighted statistics (Snijders et al., 2006). Using the definitions of Hunter (2007), the
geometrically weighted out-degree distribution (GWOD) controls for the out-degree distri-
bution with one statistic, via
sGW OD(yt) = exp{αO} n−1(cid:88)
(cid:0)1 − (1 − exp{−αO})k(cid:1)Ok(yt),
(7)
k=1
with Ok(yt) being the number of nodes with out-degree k in t and αO as the weighting
parameter. Correspondingly, the in-degree distribution is captured by the geometrically
weighted in-degree distribution (GWID) statistic by exchanging Ok(yt) with Ik(yt), which
counts the number of nodes with in-degree k, and αO with αI. While on the one hand, the
weighting often effectively counteracts the problem of degeneracy, the statistics become more
complicated to interpret. Negative values of the associated parameter typically indicate a
centralized network structure.
Regarding statistics capturing clustering, the most common geometrically weighted tri-
angular structure is called geometrically weighted edge-wise shared partners (GWESP) and
10
builds on the number of two-paths that indirectly connect two nodes i and j given the
presence of an edge (i, j):
sGW ESP (yt) = exp{αS} n−2(cid:88)
(cid:0)1 − (1 − exp{−αS})k(cid:1)Sk(yt),
(8)
k=1
where αS is a weighting parameter. The number of edges with k shared partners (Sk(yt))
is uniquely defined in undirected networks.
If the edges are directed it must be decided,
which combination should form a triangle, see Lusher et al. (2012) for a discussion. As
a default, the number of directed two-paths is chosen (Goodreau et al., 2009). Generally,
a positive coefficient for GWESP indicates that triadic closure increases the probability of
edge occurrence and globally a positive value for the associated parameter means more triadic
closure as compared to a regime with a negative value (Morris et al., 2008).
3.2 Separable Temporal Exponential Random Graph Model
An useful improvement of the TERGM (2) is the STERGM proposed by Krivitsky and
Handcock (2014). This model can be motivated by the fact that the stability term leads to
an ambiguous interpretation of its corresponding parameter. Given that we include (4) in
a TERGM and obtain a positive coefficient after fitting the model it is not clear whether
the network can be regarded as "stable" because existing ties are not dissolved (i.e. yij,t =
yij,t−1 = 1) or because no new ties are formed (i.e. yij,t = yij,t−1 = 0). To disentangle this,
the authors propose a model that allows for the separation of formation and dissolution.
Krivitsky and Handcock (2014) define the formation network as Y + = Yt ∪ Yt−1, being
the network that consists of the initial network Yt−1 together with all ties that are newly
added in t. The dissolution network is given by Y − = Yt ∩ Yt−1 and contains exclusively
ties that are present in t and t − 1. Given the network in t − 1 together with the formation
and the dissolution network we can then uniquely reconstruct the network in t, since Yt =
Y +\(Yt−1\Y −) = Y − ∪ (Y +\Yt−1). Define θ = (θ+, θ−) as the joint parameter vector that
contains the parameters of the formation and the dissolution model. Building on that,
Krivitsky and Handcock (2014) define their model to be separable in the sense that the
parameter space of θ is the product of the parameter spaces of θ+ and θ− together with
conditional independence of formation and dissolution given the network in t − 1:
Pθ(Yt = ytYt−1 = yt−1, xt) =
Pθ+(Y + = y+Yt−1 = yt−1, xt)
(cid:123)(cid:122)
(cid:124)
Formation Model
Dissolution Model
(cid:125)
(cid:124)
11
Pθ−(Y − = y−Yt−1 = yt−1, xt)
.
(9)
(cid:123)(cid:122)
(cid:125)
Figure 4: Conceptual representation, illustrating formation and dissolution in the STERGM.
The structure of the model is visualized in Figure 4. On the left hand side the state of the
network Yt−1 is given, consisting of two ties (i, h) and (h, j). In the top network all ties that
could possibly be formed are shown in dashed and the actual formation in this example (i, j)
is shown in solid. On the bottom, the two ties that could possibly be dissolved are shown
and in this example (h, j) persists while (i, j) is dissolved. On the right hand side of Figure 4
the resulting network at time point t is displayed. Given this structure and the separability
assumption (9), it is assumed that the formation model is given by
Pθ+(Y + = y+Yt−1 = yt−1, xt) =
exp{(θ+)T s(y+, yt−1, xt)}
κ(θ+, yt−1, xt)
,
(10)
with κ(θ+, yt−1, xt) being the normalization constant. Accordingly, the dissolution model
can be defined. Inserting the separable models in (9) makes it apparent, that the STERGM
is a subclass of the TERGM since
Pθ(Yt = ytYt−1 = yt−1, xt) =
exp{(θ+)T s(y+, yt−1, xt)}
exp{(θ−)T s(y−, yt−1, xt)}
κ(θ−, yt−1, xt)
κ(θ+, yt−1, xt)
exp{θT s(yt, yt−1, xt)}
=
κ(θ, yt−1, xt)
12
ihjYt−1DissolutionFormationihjihjihj=∖(∖)YtY+Yt−1Y−with θ = (θ+, θ−)T , s(yt, yt−1, xt) = (s(y+, yt−1, xt), s(y−, yt−1, xt))T and the normalization
constant set accordingly.
For practical reasons it is important to understand that the term dissolution model is
somewhat misleading since a positive coefficient in the dissolution model implies that nodes
(or dyads) with high values for this statistic are less likely to dissolve. This is also the
standard implementation in software packages, but can simply be changed by switching the
signs of the parameters in the dissolution model.
The network statistics are used similarly as in a cross-sectional ERGM. In Krivitsky and
Handcock (2014) they are called implicitly dynamic because they are evaluated either at the
formation network y+ or the dissolution network y−, which are both formed from yt−1 and
yt. For example, the number of edges is separately computed now for the formation and the
dissolution network, giving either the number of edges that newly formed or the number of
edges that persisted. For example, reciprocity in the formation network is defined as
y+
jiy+
ij
(11)
srecip(y+, yt−1) = srecip(y+) ∝(cid:88)
i(cid:54)=j
and in case of the dissolution model, y+ is simply exchanged with y−. Similarly, and edge
covariates or the geometrically weighted statistics shown in equations (5), (7) and (8) are
now functions of y+ or y− not yt.
3.3 Model Assessment
In analogy to binary regressions models, the (S)TERGM can be evaluated in terms of their
receiver-operator-
characteristic (ROC) curve or precision-recall (PR), where the latter puts more emphasis
on finding true positives (e.g. Grau et al., 2015). A comparison between different models is
possible using, for example, the Akaike Information Criterion (AIC, Claeskens and Hjort,
2008). Here we want to highlight, that the AIC fundamentally builds on the log likelihood,
which in most realistic applications is only available as an approximation, see Hunter et al.
(2008) for further discussion.
However, in statistical network analysis it is often argued that suitable network models
should not exclusively provide good predictions for individual edges, but also be able to repre-
sent topologies of the observed network. The dominant approach to asses the goodness-of-fit
of (S)TERGMs is based on sampling networks from their distribution under the estimated
parameters and then comparing network characteristics of these sampled networks with the
same ones from the observed network (Hunter et al., 2008). For this approach, it is recom-
mendable to utilize network characteristics that are not used for specifying the model. For
instance, models that include the GWOD statistic (7) may not be compared to the simulated
13
values of it but against the out-degree distribution.
Hanneke et al. (2010) point out that for networks with more than one transition from
t−1 to t available it is possible to employ a "cross-validation-type" assessment of the fit. The
parameters can be fit repetitively to all observed transitions except one hold-out transition.
It is then checked, how well the network statistics from the hold-out transition period are
represented by the ones sampled from the coefficients obtained from all other transitions.
4 Relational Event Model
4.1 Time-Continuous Event Processes
The second type of dynamic network models results by comprehending network changes
as a continuously evolving process (see Girardin and Limnios, 2018 as a basic reference
for stochastic processes). The idea was originally introduced by Holland and Leinhardt
(1977). According to their view, changes in the network are not occurring at discrete time
points but as a continuously evolving process, where only one tie can be toggled at a time.
This framework was extended by Butts (2008) to model behavior, which is understood as a
directed event at a specific time, that potentially depends on the past. Correspondingly, the
observations in this section are behaviors which are given as triplets ω = (i, j, t) and encode
the sender i, receiver j, and exact time point t. This fine-grained temporal information
is often called time-stamped or time-continuous, we adopt the latter name. Furthermore,
we only regard dyadic events in this article, i.e., a behavior only includes one sender and
receiver.
The concept of behavior, hereinafter called event, generalizes the classical concept of
binary relationships based on graph theory as promoted by Wasserman and Faust (1994).
This event framework does not intrinsically assume that ties are enduring over a specific time
frame (Butts, 2009; Butts and Marcum, 2017). For example in an email exchange network,
sending one email at a specific time point is merely a brief event, which does not convey the
same information as a durable relationship. Therefore, the time-stamped information cannot
adequately be represented in a binary adjacency matrix without having to aggregate the
relational data at the cost of information loss (Stadtfeld, 2012). Nevertheless, a friendship
between actor i and j at a given time point can still be viewed as an event that has an
one-to-one analogy to a tie in the classical framework.
The overall aim of Relational Event Models (REM, Butts, 2008) is to understand the
dynamic structure of events conditional on the history of events (Lerner et al., 2013). This
dynamic structure, in turn, controls how past interactions shape the propensity of future
events. To make this model feasible, we leverage results from the field of time-to-event
analysis, or survival analysis respectively (see, e.g., Kalbfleisch and Prentice, 2002 for an
14
overview). The central concept of the REM can be motivated by the introduction of a
multivariate time-continuous Poisson counting process
N (t) = (Nij(t) i, j ∈ {1, . . . , n}),
(12)
where Nij(t) counts how often actors i and j interacted in [0, t). Note that we indicate
continuous time t with a tilde to distinguish from the discrete time setting with t = 1, 2, . . . , T
assumed in the previous section. Process (12) is characterized by an intensity function λij(t)
for i (cid:54)= j, which is defined as:
λij(t) = lim
dt↓0
P(Nij(t + dt) = Nij(t) + 1)
dt
.
This is the instantaneous probability of observing a jump of size "1" in Nij(t), which indicates
observing the event (i, j, t). Since we assume that there are no self-loops λii(t) ≡ 0 ∀ i =
1, . . . , n holds.
4.2 Time-Continuous Observations
Butts (2008) introduced the REM to analyze the intensity λij(t) of process (12) when time-
continuous data on the events are available. He assumed that the intensity is constant
over time but depends on time-varying relational information of past events and exogenous
covariates. Vu et al. (2011) extended the model by postulating a semi-parametric intensity
similar to Cox (1972):
λij(t N (t), x(t), θ) = λ0(t)exp(cid:8)θT sij
(cid:0)N (t), x(t)(cid:1)(cid:9),
(13)
where λ0(t) is an arbitrary baseline intensity, θ ∈ Rp the parameter vector and sij
a statistic that depends on the (possibly time-continuous) covariate process x(t) and the
counting process just prior to t.
(cid:0)N (t), x(t)(cid:1)
(cid:0)N (t), x(t)(cid:1). Solely the differing level of the model needs to be accounted for, since model
(cid:0)N (t), x(t)(cid:1) from the position
sij
(13) takes a local time-continuous point of view to understand the relational nature of the
observed events. This necessitates defining the statistics sij
of specific ties, in contrast to the globally defined statistics s(yt, yt−1, xt) in (2). To give an
example, the tie-level version of reciprocity for the event (i, j) is defined as
Generally, similar statistics as already introduced in Section 3 can be included in
(cid:0)N (t), x(t)(cid:1) = I(cid:0)Nji(t) > 0(cid:1),
sij,reciprocity
15
where I(·) is the indicator function. It only regards, whether already having observed the
event (j, i) prior to t has an effect on λij(t N (t), x(t), θ), in comparison to the network level
version (3) of delayed reciprocity that counted all reciprocated ties between the networks yt
and yt−1.
Degree statistics can be specified as either sender- or receiver-specific. If we, e.g., want
to control for the out-degree of the sender the corresponding tie-oriented statistic is:
(cid:0)N (t), x(t)(cid:1) =
n(cid:88)
I(cid:0)Nih(t) > 0(cid:1).
sij,SOD
The in-degree of the receiver can be formulated accordingly.
h=1
Clustering in event sequences may be captured by different types of nested two-path
configurations. For instance, the tie-oriented version of directed two-paths, henceforth called
transitivity, is given by:
(cid:0)N (t), x(t)(cid:1) =
n(cid:88)
I(cid:0)Nih(t) > 0(cid:1)I(cid:0)Nhj(t) > 0(cid:1).
sij,T RA
h=1
(cid:0)N (t), x(t)(cid:1) equal to the covariate values of interest. Since the effect of a past event at
The inclusion of monadic and dyadic exogenous covariates becomes straightforward by setting
sij,dyadic
time δ, say, on a present event at time t may vary according to the elapsed time t−δ, Stadtfeld
and Block (2017) introduced windowed effects, which only regard events that occurred in a
pre-specified time window, e.g. a year. We will come back to this point in the next section.
If time-continuous observations are available each dimension of the observed counting
process is conditional on the past independent. This, in turn, enables the construction of a
likelihood, which can subsequently be maximized. Assuming that Ω is the set of all observed
events and T the interval of observation, the likelihood can be written as:
L(θ) =
λij(t N (t), x(t), θ)exp
λkh(u N (u), x(u), θ)du
(14)
(cid:111)
.
(cid:89)
(i,j,t)∈Ω
(cid:90)
(cid:110) −
n(cid:88)
T
k,h=1
This likelihood is straightforward to maximize in the case of a parametric baseline intensity
λ0(t), for example Butts (2008) assumes λ0(t) = γ0. Alternatively, Butts (2008) analyzed
events with ordinal temporal information. In this setting, the likelihood is equal to the partial
likelihood introduced by Cox (1972) for estimating parameters of semi-parametric intensities
as in (13). Letting Ut denote the set of all possible events that could have occurred at time
16
point t but did not, the partial likelihood for continuous event data is defined as:
(cid:89)
(cid:80)
PLcont(θ) =
λij(t N (t), x(t), θ)
λkh(t N (t), x(t), θ)
(i,j,t)∈Ω
(k,h)∈Ut
.
(15)
Consecutively, Λ0(t) = (cid:82) t
0 λ0(u)du can be estimated with a Nelson Aalen estimator (see
Kalbfleisch and Prentice, 2002 for further details on the estimation).
When dealing with large amounts of event data the main obstacle is evaluating the sum
over the intensities of all possible ties in (15) (Butts, 2008). One exact option is to trade a
longer running time for a slimmer memory footprint by means of a coaching data structure.
Vu et al. (2011) exploit this by saving prior values of the sum and subsequently changing
it event-wise by elements of Ut whose covariates changed. Alternatively, Vu et al. (2015)
proposes approximate routines that utilize case-control sampling and stratification for the
Cox model (Langholz and Borgan, 1995). More precisely, the sum is only calculated over a
sampled subset of possible events in addition to stratification. Lerner and Lomi (2019) go
one step further and sample events out of Ω for the calculation of PL(θ) in (15).
Extensions of this model building on already well-established methods in social network
and time-to-event analysis were numerously proposed. Perry and Wolfe (2013) used a strat-
ified Cox model in (13). Stadtfeld et al. (2017) adopted the Stochastic Actor oriented Model
(SAOM) to events. DuBois and Smyth (2010) and DuBois et al. (2013) extended the Stochas-
tic Block Model (SBM) for time-stamped relational events. Further, DuBois et al. (2013)
adopted a Bayesian hierarchical model to event data when information is only available in
smaller groups.
4.3 Time-Clustered Observations
Generally, the approach discussed above requires time-continuous network data, meaning
that we observe the precise time points of all events. To give an instance, in the first data
example, this means that we need the exact time point t of an arms trade between country i
and j. Often, such exact time-stamped data are not available and, in fact, trading between
states can hardly be stamped with a single time point t. Indeed, we often only observe the
time-continuous network process at discrete time points t = 1, . . . , T . In such setting, we may
assume a Markov structure in that we do not look at the entire history of the process N (t)
but just condition the intensity (13) on the history of events from the previous observation
t − 1 to t. Technically this means that N (t) is adapted to Y (t) := N (t) − N (t − 1) and x(t)
for t ∈ [t − 1, t]. We then reframe (13) as:
λij(t Y (t), x(t), θ) = λ0(t)exp(cid:8)θT sij
(cid:0) Y (t), x(t)(cid:1)(cid:9).
(16)
17
In other words, we assume that the intensity of events between t−1 and t does not depend on
states of the multivariate counting process (12) prior to t− 1. For this reason, all endogenous
statistics introduced in Section 4.2 are now evaluated on Y (t) instead of N (t). This is a
reasonable assumption, if one is primarily interested in short-term dependencies between
the individual counting processes. It enables a meaningful comparison to the models from
Section 3 that assume an analog discrete Markov property. However, we want to emphasize
that this dependence structure is not vital to inferential results.
If we observe the continuous process at discrete time points it is inevitable that we observe
time clustered observations, meaning that two or more events happen at the same time point.
Under the term tied observations this phenomenon is well known in time-to-event analysis
and treated with several approximations. One option is the so-called Breslow approximation
(see Peto, 1972; Breslow, 1974). Let therefore
Ot = {(i, j) Nij(t) − Nij(t − 1) > 0}
where element (i, j) is replicated Nij(t) − Nij(t − 1) times in Ot, that is if an event between
i and j occurred multiple times in the interval from t − 1 to t then (i, j) appears respective
times in Ot. Given that we have not observed the exact time point of an event we also get
no information on the baseline intensity λ0(t) in (13) for t ∈ [t − 1, t] so that the model
simplifies to a discrete choice model structure (see, e.g., Train, 2009) which resembles the
partial likelihood (15) and is defined as:
(cid:0) Y (t), x(t)(cid:1)}
(cid:0) Y (t), x(t)(cid:1)}(cid:1)nt ,
(17)
(cid:81)
(cid:0)(cid:80)
T(cid:89)
t=1
(i,j)∈Ot
(k,h)∈Ut
exp{θT sij
exp{θT skh
PLclust(θ) =
where nt = Ot. Alternatively, one can replace the denominator in (17) by considering all
possible orders of the unobserved events in Ot giving the average likelihood as introduced
by Kalbfleisch and Prentice (2002). Since this can be a combinatorial and hence numerical
challenge, random sampling of time point orders among the time-clustered observations can
be used with subsequent averaging, which we call Kalbfleisch-Prentice approximation (see
Kalbfleisch and Prentice, 2002). Further techniques to deal with unknown time ordering
are augmenting the clustered events into possible paths of ordered events and adapting the
maximum likelihood estimation proposed for the SAOM by Snijders et al. (2010) or using
random sampling of the ordering. This can be legitimized in cases where we may assume
independence among events happening in one year, since the events take a long time to
materialize (Snijders, 2017).
18
4.4 Model Assessment
In comparison to the assessment for models operating in discrete time, widely accepted
methods dealing with relational event data are scarce. The proposals either stem from
time-to-event analysis or regard link prediction, which is the task of predicting the most
likely next event given the history of past events (Liben-Nowell and Kleinberg, 2007). One
example of the former option is the usage of Schnfeld residuals by Vu et al. (2017) to check
the assumption of proportional intensities, which is central to semi-parametric models as
the one proposed by Cox (1972). For the latter approach, we need to define a predictive
measure that quantifies how well the next event is predicted. Vu et al. (2011) proposed the
recall measure that estimates the percentage of test events which are in the list of K most
likely next events according to a given model. Evaluating this percentage for different values
of K permits a visualization of the predictive capabilities of the model. The strength of
the predicted intensity allows the ordering of events according to the probability of being
observed next. If we model the propensity of time-clustered events that represent binary
adjacency matrices one can alternatively adopt the analysis of the ROC and PR curve
introduced in Section 3.3.
5 Application
When it comes to software, there exist essentially three main R packages that are designed
for fitting TERGMs and STERGMs. Most important is the extensive statnet library
(Goodreau et al., 2008) that allows for simulation-based fitting of ERGMs. The library
contains the package tergm with implemented methods for fitting STERGMs using MCMC
approximations of the likelihood. However, currently the package tergm (version 3.5.2) does
not allow for fitting STERGMs with time-varying dyadic covariates for more than two time
periods jointly. The package btergm (Leifeld et al., 2018) is designed for fitting TERGMs us-
ing either maximum pseudo-likelihood or MCMC maximum likelihood estimation routines.
In order to obtain Bayesian Inference in ERGMs, the package bergm by Caimo and Friel
(2014) can be used. Besides implementations in R, the stand-alone program PNet (Wang
et al., 2006) allows for simulating, fitting and evaluating (T)ERGMs.
In order to ensure
comparable estimates we estimate the TERGM, as well as the STERGM, with the statnet
library, using MCMC-based likelihood estimation techniques. We use the package ergm and
include delayed reciprocity and the repetition of previous ties as dyadic covariates. The
STERGM is fitted using the tergm package.
Marcum and Butts (2015) implemented the R package relevent (version 1.0-4) to es-
timate the REM for time-stamped data. It was followed by the package goldfish (version
1.2) by Stadtfeld and Hollway (2018) for modeling event data with precise and ordinal tem-
19
poral information with an actor- and tie-oriented variant of the REM. Furthermore, it is
highly customizable in terms of endogenous and exogenous user terms and will be used in
the following applications.
We want to remark that the STERGM coefficients are implicitly dynamic, while in the
TERGM all network statistics except the lagged network and delayed reciprocity terms are
evaluated on the network in t. All covariates of the REM are continuously updated and the
intensity at time point t ∈ [t − 1, t] only depends on events observed in [t − 1, t). Like the
building period proposed by Vu et al. (2011), the events in t− 1 are only used for building up
the covariates and not directly modeled. Due to no compositional changes, we did not scale
any statistics. Moreover, we refer to the Supplementary Material for the model assessment.
5.1 Data Set 1: International Arms Trade
The results obtained for the arms trading data section are displayed in Table 2. For a detailed
interpretation of effects focusing on political, social, and economic aspects we refer to the
relevant literature (e.g. Thurner et al., 2018). Here we want to comment on a few aspects
only. While we do not have timestamps for the arms trades, the longitudinal networks can
still be viewed as time-clustered observations enabling the techniques from Section 4.3.
Both, the TERGM (column 1) and the REM (column 4) identify the repetition of previous
ties as a driving force in the dynamic structure of the network. Degree-related covariates,
which are GWID and GWOD in the (S)TERGM and in- and out-degree in the REM, capture
centrality in the network. The coefficients of the GWID and GWOD are negative and have
low p-values in the TERGM. This stands in contrast to the STERGM, where these effects
are only pronounced in the formation model (column 2), while they are insignificant effect
in the dissolution model (column 3). Hence, these effects suggest a centralized pattern in
the formation network, which is also captured by the TERGM. In the REM an analogous
pattern can be detected, since a higher in-degree of the receiver increases the respective
intensity, thus spurs trade relations. Similar interpretations hold for the out-degree of the
sender. Overall, countries that have a high out-degree are more likely to send weapons
and countries with a high in-degree to receive weapons, which again results in a centralized
network structure as indicated by the estimates in the TERGM and STERGM.
Lastly, consistent effects among the models were also found for the exogenous covariates.
Consider, for instance, the coefficient of the logarithmic GDP of the importing country. The
TERGM assigns a significantly higher probability to observe in-going ties to countries with
a high GDP just like the REM. However, disentangling the model towards formation and
dissolution we see strongly significant coefficients in the dissolution model while the effect
for the formation model is weakly significant.
Based on the independence assumption in (9) we can sum up the two AIC values and
20
TERGM
STERGM
REM
Formation Dissolution
−
−
−
−
Repetition
Edges
Reciprocity
3.671∗∗∗
(0.132)
−15.632∗∗∗ −17.186∗∗∗ −16.987∗∗∗
(3.587)
(1.809)
−0.058
−0.258
(0.619)
(0.306)
−1.823∗∗∗
−0.412
In-Degree (GWID)
(0.442)
(0.278)
−0.326
Out-Degree (GWOD) −3.220∗∗∗
(0.533)
(0.304)
0.150
0.050
(0.066)
(0.126)
−0.016
−0.024∗
(0.017)
(0.010)
0.323∗∗∗
0.313∗∗∗
(0.088)
(0.048)
0.327∗∗∗
0.165∗∗∗
(0.087)
(0.043)
−949.833
−258.425
1917.666
532.849
1917.666
(2.168)
−0.620
(0.436)
−2.106∗∗∗
(0.379)
−4.126∗∗∗
(0.462)
0.076
(0.071)
−0.028∗
(0.014)
0.394∗∗∗
(0.054)
0.135∗
(0.054)
−675.327
1366.654
Log Likelihood
AIC
(cid:80) AIC
log(GDP) Receiver
log(GDP) Sender
GWESP
Polity Score
1899.503
2.661∗∗∗
(0.143)
−
−
−0.109
(0.181)
0.060∗∗
In-Degree Receiver
(0.015)
0.010∗∗ Out-Degree Sender
(0.004)
0.010
(0.029)
−0.016
(0.009)
0.395∗∗∗
(0.039)
0.192∗∗∗
(0.032)
Transitivity
Table 2: Arms trade network: Comparison of parameters obtained from the TERGM (first
column), STERGM (Formation in the second column, Dissolution in the third column) and
REM (fourth column). Standard errors in brackets and stars according to p-values smaller
than 0.001 (∗∗∗), 0.05 (∗∗) and 0.1 (∗). Decay parameter of the geometrically weighted
statistics is set to log(2) and the Kalbfleisch-Prentice approximation was used with 100
random orderings of the events to find the estimates of the REM.
see that the AIC value of the STERGM is smaller than of the TERGM.
5.2 Data Set 2: European Research Institution Email Correspon-
dence
As already indicated by the descriptive statistics in Table 1, the email network seems to be
driven by three major structural influences: repetition, reciprocity, and transitive clustering.
21
TERGM
STERGM
REM
Formation Dissolution
−
−
2.27∗∗∗
(0.084)
−
−
1.655∗∗∗
(0.075)
−0.004
In-Degree Receiver
(0.003)
−0.0001 Out-Degree Sender
(0.003)
0.070∗∗∗
(0.008)
Transitivity
Repetition
Edges
Reciprocity
In-degree (GWID)
Out-degree (GWOD)
GWESP
Log Likelihood
AIC
(cid:80) AIC
−
−
1.367∗∗∗
(0.107)
−2.237∗∗∗
−5.755∗∗∗ −4.853∗∗∗
(0.224)
(0.247)
(0.237)
2.586∗∗∗
2.498∗∗∗
0.398∗∗∗
(0.226)
(0.157)
(0.112)
1.060∗∗
1.349∗
0.709
(0.415)
(0.648)
(0.333)
−0.369
−0.411
0.031
(0.397)
(0.431)
(0.312)
0.429∗∗∗
0.655∗∗∗
1.560∗∗∗
(0.086)
(0.111)
(0.110)
−1723.732 −1000.506 −505.431
3459.464
1020.862
3459.464
3031.874
2011.012
Table 3: Email exchange network: Comparison of parameters obtained from the TERGM
(first column), STERGM (Formation in the second column, Dissolution in the third column)
and REM (fourth column). Standard errors in brackets and stars according to p-values
smaller than 0.001 (∗∗∗), 0.05 (∗∗) and 0.1 (∗). Decay parameter of the geometrically weighted
statistics is set to log(2).
The estimates from Table 3 demonstrate, that all models were able to identify these forces.
According to the REM (column 4), the event network of email traffic in the research
institution is not centralized and primarily based on collaboration between coworkers. We
can draw those conclusions from insignificant estimates of degree-related statistics and highly
significant estimates regarding reciprocity and repetition. In the TERGM (column 1) we
find a positive and significant effect of GWID, while no effect can be found in the STERGM
(columns 2 and 3). The estimates of repetition and reciprocity in the REM and TERGM are
very pronounced. For instance, the estimates of the REM imply that a reciprocated event is
19.6 times more likely than an event with the same covariates only not being reciprocated.
Interestingly, the STERGM detects a lower effect of GWESP in the formation and dissolution
than the TERGM. The effect of the delayed reciprocity in the TERGM is less relevant than
reciprocity in the formation and dissolution model. This strongly differing effect size results
from the mathematical formulation of the statistics given in equations (3) and (11).
Contrasting the AIC values of the TERGM and STERGM shows that the dynamic struc-
22
ture of the email network is again better explained by the STERGM. In the Supplementary
Material we fit the TERGM and STERGM to multiple time points.
6 Conclusion
6.1 Further Models
Snijders (1996) formulated a two-stage process model operating in a continuous-time frame-
work. The dynamics are considered to evolve according to unobserved micro-steps. At
first, a sender out of all eligible actors gets the opportunity to change the state of all his
outgoing ties. Consecutively, the actor needs to evaluate the probability of changing the
present configuration with each possible receiver, which entails each actors knowledge of the
complete graph whenever he has the possibility to toggle one of his ties. Lastly, the deci-
sion is randomly drawn relative to the probabilities of all possible actions. In general, the
SAOM is a well-established model for the analysis of social networks, that was successfully
applied to a wide array of network data, e.g., in Sociology (Agneessens and Wittek, 2012;
de Nooy, 2002), Political Science (Kinne, 2016; Bichler and Franquez, 2014), Economics
(Castro et al., 2014), and Psychology (Jason et al., 2014). Estimation of this model variant
is predominantly carried out with the R package RSiena (Ripley et al., 2013).
Another notable model that can be regarded as a bridge between the ERGM and continuous-
time models is the Longitudinal ERGM (LERGM, Snijders and Koskinen, 2013; Koskinen
et al., 2015). In contrast to the TERGM, the LERGM assumes that the network evolves in
micro-steps as a continuous time Markov process with an ERGM being its limiting distri-
bution. Similar to the SAOM, the model builds on randomly assigning the opportunity to
change, followed by a function that governs the probability of a tie change. This model is
still tie-oriented, meaning that dyadic ties instead of actors are chosen and then have the
option to change the current network.
6.2 Summary
In this article, we put emphasis on tie-oriented dynamic network models. Comparisons
between these models can be drawn on the level at which each implied generating mechanism
works and how time is perceived. The overall aim in the TERGM is to find an adequate
distribution of the adjacency matrix Yt conditioning on information of previous realizations
of the network. In the separable extension, the aim remains unchanged, only splitting Yt
into two smaller sub-networks that include all possible ties that were and were not present in
Yt−1 separately. While the (S)TERGM proceeds in discrete time, the REM tackles modeling
the intensity on the tie level in continuous time conditional on past events. Therefore,
23
the TERGM and STERGM take a global and REM a local point-of-view, which results in
substantially different interpretations of the estimates.
Furthermore, we analyzed two data sets that represent two types of network data that
are traditionally either modeled by the TERGM and REM. By extending the REM to time-
clustered observations and aggregating events to binary adjacency matrices a meaningful
comparison between the STERGM, TERGM, and REM is enabled.
Acknowledgement
We thank the anonymous reviewers for their careful reading and constructive comments.
The project was supported by the European Cooperation in Science and Technology [COST
Action CA15109 (COSTNET)]. We also gratefully acknowledge funding provided by the
German Research Foundation (DFG) for the project KA 1188/10-1: International Trade of
Arms: A Network Approach. Furthermore we like to thank the Munich Center for Machine
Learning (MCML) for funding.
References
Agneessens, F. and R. Wittek (2012). Where do intra-organizational advice relations come
the role of informal status and social capital in social exchange. Social Net-
from?
works 34 (3), 333 -- 345.
Almquist, Z. W. and C. T. Butts (2014). Logistic Network Regression for Scalable Analysis
of Networks with joint Edge/Vertex Dynamics. Sociological methodology 44 (1), 273 -- 321.
Bastian, M., S. Heymann, and M. Jacomy (2009). Gephi: An open source software for
exploring and manipulating networks.
Bearman, P., J. Moody, and K. Stovel (2004). Chains of Affection: The Structure of Ado-
lescent Romantic and Sexual Networks. American Journal of Sociology 110 (1), 44 -- 91.
Benton, R. A. and J. You (2017). Endogenous dynamics in contentious fields: Evidence from
the shareholder activism network, 2006 -- 2013. Socius 3, 2378023117705231.
Bichler, G. and J. Franquez (2014). Conflict Cessation and the Emergence of Weapons
Supermarkets, pp. 189 -- 215. Cham: Springer International Publishing.
Blank, M., M. Dincecco, and Y. M. Zhukov (2017). Political regime type and warfare:
evidence from 600 years of european history. Available at SSRN 2830066 .
24
Block, P., J. Koskinen, J. Hollway, C. Steglich, and C. Stadtfeld (2018). Change we can
believe in: Comparing longitudinal network models on consistency, interpretability and
predictive power. Social Networks 52, 180 -- 191.
Block, P., C. Stadtfeld, and T. Snijders (2019). Forms of Dependence: Comparing SAOMs
and ERGMs From Basic Principles. Sociological Methods & Research 48 (1).
Breslow, N. (1974). Covariance Analysis of Censored Survival Data. Biometrics 30 (1),
89 -- 99.
Broekel, T. and M. Bednarz (2019, Jan). Disentangling link formation and dissolution in
spatial networks: An application of a two-mode stergm to a project-based r&d network in
the german biotechnology industry. Networks and Spatial Economics.
Butts, C. (2008). A Relational Event Framework for Social Action. Sociological Methodol-
ogy 38 (1), 155 -- 200.
Butts, C. (2009). Revisiting the foundations of network analysis. Science 325 (5939), 414 --
416.
Butts, C. and C. Marcum (2017). A Relational Event Approach to Modeling Behavioral
Dynamics. ArXiv e-prints.
Caimo, A. and N. Friel (2011). Bayesian inference for exponential random graph models.
Social Networks 33 (1), 41 -- 55.
Caimo, A. and N. Friel (2014). Bergm: Bayesian exponential random graphs in r. Journal
of Statistical Software 61 (2), 1 -- 25.
Castro, I., C. Casanueva, and J. L. Galn (2014). Dynamic evolution of alliance portfolios.
European Management Journal 32 (3), 423 -- 433.
Center for systemic Peace (2017). Polity IV Annual Time-Series, 1800-2015, Version 3.1.
http://www.systemicpeace.org. Accessed: 2017-06-02.
Claeskens, G. and N. L. Hjort (2008). Model selection and model averaging. Cambridge:
Cambridge University Press.
Cox, D. (1972). Regression Models and Life-Tables. Journal of the Royal Statistical Society.
Series B (Methodological) 34 (2), 187 -- 220.
Csardi, G. and T. Nepusz (2006). The igraph software package for complex network research.
InterJournal, Complex Systems 1695 (5), 1 -- 9.
25
de Nooy, W. (2002). The dynamics of artistic prestige. Poetics 30 (3), 147 -- 167.
Desmarais, B. A. and S. J. Cranmer (2012). Statistical mechanics of networks: Estimation
and uncertainty. Physica A: Statistical Mechanics and its Applications 391 (4), 1865 -- 1876.
DuBois, C., C. Butts, D. McFarland, and P. Smyth (2013). Hierarchical models for relational
event sequences. Journal of Mathematical Psychology 57 (6), 297 -- 309. Social Networks.
DuBois, C., C. Butts, and P. Smyth (2013). Stochastic blockmodeling of relational event
In C. M. Carvalho and P. Ravikumar (Eds.), Proceedings of the Sixteenth
dynamics.
International Conference on Artificial Intelligence and Statistics, Volume 31 of Proceedings
of Machine Learning Research, Scottsdale, Arizona, USA, pp. 238 -- 246. PMLR.
DuBois, C. and P. Smyth (2010). Modeling Relational Events via Latent Classes. In Pro-
ceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and
Data Mining, KDD '10, New York, NY, USA, pp. 803 -- 812. ACM.
Email EU Core (2019). Email EU core temporal, Department 3. https://snap.stanford.
edu/data/email-Eu-core-temporal-Dept3.txt.gz. Accessed: 2019-08-05.
Erdos, P. and A. R´enyi (1959). On Random Graphs i. Publicationes Mathematicae Debre-
cen 6, 290.
Geyer, C. J. and E. A. Thompson (1992). Constrained Monte Carlo maximum likelihood for
dependent data. J. R. Statist. Soc. B , 657 -- 699.
Gilbert, E. N. (1959, 12). Random graphs. Ann. Math. Statist. 30 (4), 1141 -- 1144.
Girardin, V. and N. Limnios (2018). Applied Probability (2 ed.). Heidelberg: Springer.
Goldenberg, A., A. X. Zheng, S. E. Fienberg, and E. M. Airoldi (2010). A Survey of Statistical
Network Models. Foundations and Trends in Machine Learning 2 (2), 129 -- 233.
Goodreau, S. M., M. S. Handcock, D. R. Hunter, C. T. Butts, and M. Morris (2008). A
statnet Tutorial. Journal of Statistical Software 24 (9), 1.
Goodreau, S. M., J. A. Kitts, and M. Morris (2009). Birds of a feather, or friend of a
friend? Using exponential random graph models to investigate adolescent social networks.
Demography 46 (1), 103 -- 125.
Grau, J., I. Grosse, and J. Keilwagen (2015). PRROC: computing and visualizing precision-
recall and receiver operating characteristic curves in R. Bioinformatics 31 (15), 2595 -- 2597.
26
Handcock, M. S., G. Robins, T. Snijders, J. Moody, and J. Besag (2003). Assessing degen-
eracy in statistical models of social networks. Technical report, Citeseer.
Hanneke, S., W. Fu, E. P. Xing, et al. (2010). Discrete temporal models of social networks.
Electronic Journal of Statistics 4, 585 -- 605.
He, X., Y. bo Dong, Y. ying Wu, G. rui Jiang, and Y. Zheng (2019). Factors affecting evolu-
tion of the interprovincial technology patent trade networks in china based on exponential
random graph models. Physica A: Statistical Mechanics and its Applications 514, 443 --
457.
Hoff, P. D., A. E. Raftery, and M. S. Handcock (2002). Latent Space Approaches to Social
Network Analysis. Journal of the American Statistical Association 97 (460), 1090 -- 1098.
Holland, P. and S. Leinhardt (1977). A dynamic model for social networks. The Journal of
Mathematical Sociology 5 (1), 5 -- 20.
Holland, P. W. and S. Leinhardt (1981). An exponential family of probability distributions
for directed graphs. J. Am. Statist. Ass. 76 (373), 33 -- 50.
Hummel, R. M., D. R. Hunter, and M. S. Handcock (2012). Improving simulation-based
algorithms for fitting ERGMs. Journal of Computational and Graphical Statistics 21 (4),
920 -- 939.
Hunter, D. R. (2007). Curved exponential family models for social networks. Social net-
works 29 (2), 216 -- 230.
Hunter, D. R., S. M. Goodreau, and M. S. Handcock (2008). Goodness of fit of social network
models. J. Am. Statist. Ass. 103 (481), 248 -- 258.
Hunter, D. R. and M. S. Handcock (2006). Inference in curved exponential family models
for networks. Journal of Computational and Graphical Statistics 15 (3), 565 -- 583.
Jason, L. A., J. M. Light, E. B. Stevens, and K. Beers (2014). Dynamic Social Networks in
Recovery Homes. American Journal of Community Psychology 53 (3-4), 324 -- 334.
Kalbfleisch, J. and R. Prentice (2002). The Statistical Analysis of Failure Time Data. Wiley-
Blackwell.
Kim, B., K. H. Lee, L. Xue, and X. Niu (2018). A review of dynamic network models with
latent variables. Statist. Surv. 12, 105 -- 135.
27
Kinne, B. J. (2016). Agreeing to arm: Bilateral weapons agreements and the global arms
trade. Journal of Peace Research 53 (3), 359 -- 377.
Kolaczyk, E. D. (2009). Statistical analysis of network data. Methods and Models. New York:
Springer Science & Business Media.
Koskinen, J., A. Caimo, and A. Lomi (2015). Simultaneous modeling of initial conditions and
time heterogeneity in dynamic networks: An application to Foreign Direct Investments.
Network Science 3 (1), 58 -- 77.
Krivitsky, P. N. and M. S. Handcock (2014). A separable model for dynamic networks. J.
R. Statist. Soc. B 76 (1), 29 -- 46.
Langholz, B. and O. Borgan (1995). Counter-matching: A stratified nested case-control
sampling method. Biometrika 82 (1), 69 -- 79.
Lebacher, M., P. W. Thurner, and G. Kauermann (2019, Mar). A Dynamic Separable
Network Model with Actor Heterogeneity: An Application to Global Weapons Transfers.
arXiv e-prints.
Leifeld, P., S. J. Cranmer, and B. A. Desmarais (2018). Temporal exponential random graph
models with btergm: estimation and bootstrap confidence intervals. Journal of Statistical
Software 83 (6), doi: 10.18637/jss.v083.i06.
Lerner, J., M. Bussmann, T. Snijders, and U. Brandes (2013). Modeling frequency and type
of interaction in event networks. Corvinus journal of sociology and social policy 4 (1),
3 -- 32.
Lerner, J. and A. Lomi (2019). Reliability of relational event model estimates under sam-
pling: how to fit a relational event model to 360 million dyadic events. arXiv preprint
arXiv:1905.00630 .
Leskovec, J., K. J. Lang, A. Dasgupta, and M. W. Mahoney (2009). Community Structure
in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters.
Internet Mathematics 6 (1), 29 -- 123.
Liben-Nowell, D. and J. Kleinberg (2007). The link-prediction problem for social networks.
J. Am. Soc. Inf. Sci. Technol. 58 (7), 1019 -- 1031.
Lusher, D., J. Koskinen, and G. Robins (2012). Exponential random graph models for social
networks: Theory, methods, and applications. Cambridge: Cambridge University Press.
28
Marcum, C. and C. Butts (2015). Constructing and Modifying Sequence Statistics for
relevent Using informR in R. Journal of Statistical Software 64 (5), 1 -- 36.
Morris, M., M. S. Handcock, and D. R. Hunter (2008). Specification of exponential-family
random graph models: terms and computational aspects. Journal of Statistical Soft-
ware 24 (4), 1548.
Paranjape, A., A. R. Benson, and J. Leskovec (2017). Motifs in temporal networks.
In
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining,
pp. 601 -- 610. ACM.
Perry, P. and P. Wolfe (2013). Point process modelling for directed interaction networks.
Journal of the Royal Statistical Society: Series B (Statistical Methodology) 75 (5), 821 -- 849.
Peto, R. (1972). Contribution to the discussion of the paper by Dr. Cox. Journal of the
Royal Statistical Society. Series B (Methodological) 34 (2), 187 -- 220.
Quintane, E., P. Pattison, G. Robins, and J. Mol (2013). Short- and long-term stability in
organizational networks: Temporal structures of project teams. Social Networks 35 (4),
528 -- 540.
Raabe, I. J., Z. Boda, and C. Stadtfeld (2019). The Social Pipeline: How Friend Influence
and Peer Exposure Widen the STEM Gender Gap. Sociology of Education 92 (2), 105 -- 123.
Ripley, R., K. Boitmanis, and T. Snijders (2013). RSiena: Siena - Simulation Investigation
for Empirical Network Analysis. https://CRAN.R-project.org/package=RSiena. R
package version 1.2-12.
Robins, G. and P. Pattison (2001). Random graph models for temporal processes in social
networks. Journal of Mathematical Sociology 25 (1), 5 -- 41.
Robins, G., P. Pattison, Y. Kalish, and D. Lusher (2007). An introduction to exponential
random graph (p*) models for social networks. Social Networks 29 (2), 173 -- 191.
Salath´e, M., D. Q. Vu, S. Khandelwal, and D. Hunter (2013). The dynamics of health
behavior sentiments on a large online social network. EPJ Data Science 2 (1), 4.
Sarkar, P. and A. W. Moore (2006). Dynamic Social Network Analysis using Latent Space
Models. In Y. Weiss, B. Scholkopf, and J. C. Platt (Eds.), Advances in Neural Information
Processing Systems 18, pp. 1145 -- 1152. MIT Press.
Schweinberger, M. (2011).
Instability, sensitivity, and degeneracy of discrete exponential
families. Journal of the American Statistical Association 106 (496), 1361 -- 1370.
29
SIPRI
(2019).
Arms Transfers Database.
https://www.sipri.org/databases/
armstransfers. Accessed: 2019-03-01.
Snijders, T. (1996). Stochastic actororiented models for network change. The Journal of
Mathematical Sociology 21 (1-2), 149 -- 172.
Snijders, T. (2002). The statistical evaluation of social network dynamics. Sociological
Methodology 31 (1), 361 -- 395.
Snijders, T. (2005). Models for Longitudinal Network Data, pp. 215247. Structural Analysis
in the Social Sciences. Cambridge University Press.
Snijders, T. (2017). Comment: Modeling of coordination, rate functions, and missing order-
ing information. Sociological Methodology 47 (1), 41 -- 47.
Snijders, T. and J. Koskinen (2013). Longitudinal Models, pp. 130140. Structural Analysis
in the Social Sciences. Cambridge University Press.
Snijders, T., J. Koskinen, and M. Schweinberger (2010). Maximum likelihood estimation for
social network dynamics. The Annals of Applied Statistics 4 (2), 567.
Snijders, T., P. E. Pattison, G. L. Robins, and M. S. Handcock (2006). New specifications
for exponential random graph models. Sociological Methodology 36 (1), 99 -- 153.
Stadtfeld, C. (2012). Events in social networks : a stochastic actor-oriented framework for
dynamic event processes in social networks. Ph. D. thesis.
Stadtfeld, C. and P. Block (2017). Interactions, Actors, and Time: Dynamic Network Actor
Models for Relational Events. Sociological Science 4 (14), 318 -- 352.
Stadtfeld, C. and J. Hollway (2018). goldfish: Goldfish -- Statistical network models for
dynamic network data. R package version 1.2.
Stadtfeld, C., J. Hollway, and P. Block (2017). Dynamic Network Actor Models: Investigat-
ing Coordination Ties through Time. Sociological Methodology 47 (1), 1 -- 40.
Stansfield, S. E., J. E. Mittler, G. S. Gottlieb, J. T. Murphy, D. T. Hamilton, R. Detels,
S. M. Wolinsky, L. P. Jacobson, J. B. Margolick, C. R. Rinaldo, et al. (2019). Sexual role
and hiv-1 set point viral load among men who have sex with men. Epidemics 26, 68 -- 76.
Strauss, D. and M. Ikeda (1990). Pseudolikelihood estimation for social networks. Journal
of the American statistical association 85 (409), 204 -- 212.
30
Thurner, P. W., C. S. Schmid, S. J. Cranmer, and G. Kauermann (2018). Network In-
terdependencies and the Evolution of the International Arms Trade. Journal of Conflict
Resolution.
Train, K. (2009). Discrete Choice Methods with Simulation. Cambridge University Press.
Tranmer, M., C. S. Marcum, B. Morton, D. Croft, and S. de Kort (2015). Using the relational
event model (rem) to investigate the temporal dynamics of animal social networks. Animal
Behaviour 101, 99 -- 105.
van Duijn, M. A., K. J. Gile, and M. S. Handcock (2009). A framework for the comparison
of maximum pseudo-likelihood and maximum likelihood estimation of exponential family
random graph models. Social Networks 31 (1), 52 -- 62.
Vu, D., L. Alessandro, M. Daniele, and P. Francesca (2017). Relational event models for
longitudinal network data with an application to interhospital patient transfers. Statistics
in Medicine 36 (14), 2265 -- 2287.
Vu, D., A. Asuncion, D. Hunter, and P. Smyth (2011). Dynamic egocentric models for cita-
tion networks. In Proceedings of the 28th International Conference on Machine Learning,
ICML 2011, Bellevue, Washington, USA, June 28 - July 2, 2011, pp. 857 -- 864.
Vu, D., D. Hunter, P. Smyth, and A. Asuncion (2011). Continuous-Time Regression Models
for Longitudinal Networks. In J. Shawe-Taylor, R. S. Zemel, P. L. Bartlett, F. Pereira,
and K. Q. Weinberger (Eds.), Advances in Neural Information Processing Systems 24, pp.
2492 -- 2500. Curran Associates, Inc.
Vu, D., P. Pattison, and G. Robins (2015). Relational event models for social learning in
MOOCs. Social Networks 43, 121 -- 135.
Wang, P., G. Robins, and P. Pattison (2006). Pnet: A program for the simulation and
estimation of exponential random graph models. University of Melbourne.
Ward, M., J. S. Ahlquist, and A. Rozenas (2013). Gravity's Rainbow: A Dynamic Latent
Space Model for the World Trade Network. Network Science 1.
Wasserman, S. and K. Faust (1994). Social Network Analysis: Methods and Applications.
Structural Analysis in the Social Sciences. Cambridge University Press.
White, L. A., J. D. Forester, and M. E. Craft (2018). Covariation between the physiologi-
cal and behavioral components of pathogen transmission: Host heterogeneity determines
epidemic outcomes. Oikos 127 (4), 538 -- 552.
31
World Bank (2017). World Bank Open Data, Real GDP. http://data.worldbank.org/.
Accessed: 2017-04-01.
32
A Annex: Additional Descriptives
Figures 5 and 6 depict the distributions of in- and out-degrees in the two networks. Building
on in- and out-degree of all nodes, these distributions represent the relative frequency of all
possible in- and out-degrees in the observed networks, which is calculated with the igraph
package in R (Csardi and Nepusz, 2006).
In the arms trade network, a strongly asymmetric relation is revealed, indicating that
about 70% of the countries do not export any weapons, while a small percentage of countries
accounts for the major share of trade relations. The distribution of the in-degree is not that
extreme but still we have roughly one third of all countries not importing at all.
The email exchange network shows a different structure. Here, many medium-sized in-
degrees can be found and only roughly 10% of all nodes have receiver no emails. For the out-
degree, this number doubles (roughly 20% have not sent emails). Further, the distribution
of the out-degree is more skewed then the one for the in-degree.
Figure 5: Arms trade network: Barplots indicating the distribution of the in- and out-degrees.
Black bars indicate the values of year 2016 and grey bars of 2017.
I
0.00.20.40.60.8051015DegreeProportionIn−Degree0.00.20.40.60.80204060DegreeProportionOut−DegreeFigure 6: Email exchange network: Barplots indicating the distribution of the in- and out-
degrees. Black bars indicate the values of period 1 and grey bars of period 2.
II
0.000.050.100.150.20010203040DegreeProportionIn−Degree0.000.050.100.150.20010203040DegreeProportionOut−DegreeB Supplementary Material
B.1 Countries in the International Arms Trade Network
Country Name
Niger
Nigeria
Norway
Oman
Country Name
Germany
Ghana
Greece
Grenada
Guatemala
Guinea
Guinea-Bissau
Palau
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Poland
Portugal
Qatar
Romania
Russia
Rwanda
Saint Kitts and Nevis
Saint Lucia
ISO3
ISO3
ISO3
Country Name
NER
DEU
AFG
Afghanistan
NGA
GHA
ALB
Albania
NOR
GRC
DZA
Algeria
OMN
GRD
AND
Andorra
PAK
GTM Pakistan
AGO
Angola
PLW
GIN
ATG
Antigua and Barbuda
PAN
GNB
ARG
Argentina
PNG
GUY
ARM Guyana
Armenia
PRY
HTI
Haiti
AUS
Australia
PER
HND
Honduras
AUT
Austria
PHL
HUN
Hungary
AZE
Azerbaijan
POL
ISL
Iceland
BHS
Bahamas
PRT
IND
India
BHR
Bahrain
QAT
IDN
Indonesia
BGD
Bangladesh
ROM
IRN
Iran
BRB
Barbados
RUS
IRQ
Iraq
BLR
Belarus
RWA
IRL
Ireland
BEL
Belgium
KNA
ISR
Israel
BLZ
Belize
ITA
LCA
Italy
BEN
Benin
JAM Saint Vincent and the Grenadines VCT
Jamaica
BTN
Bhutan
WSM
JPN
BOL
Japan
Bolivia
JOR
SMR
BWA Jordan
Botswana
STP
KAZ
BRA
Brazil
SAU
KEN
BRN
Brunei Darussalam
SEN
KOR
BGR
Bulgaria
YUG
KOS
BFA
Burkina Faso
SYC
KWT
BDI
Burundi
SLE
KGZ
KHM Kyrgyzstan
Cambodia
SGP
LAO
CMR
Cameroon
LVA
SVK
CAN
Canada
SVN
LBN
Cape Verde
CPV
SLB
LSO
Central African Republic CAF
ZAF
LBR
TCD
Chad
ESP
LBY
CHL
Chile
LKA
LTU
CHN
China
SDN
COL
Colombia
LUX
COM Macedonia (FYROM) MKD
Comoros
SUR
SWZ
ZAR Madagascar
DR Congo
SWE
COG Malawi
Congo
CHE
CRI
Costa Rica
TJK
CIV
Cote dIvoire
TZA
HRV Mali
Croatia
THA
CUB Malta
Cuba
Cyprus
CYP Marshall Islands
TMP
TGO
CZE
Czech Republic
TTO
DNK Mauritius
Denmark
TUN
DMA Mexico
Dominica
TUR
DOM Micronesia
Dominican Republic
TKM
ECU Moldova
Ecuador
UGA
EGY Mongolia
Egypt
El Salvador
SLV
UKR
ARE
GNQ Morocco
Equatorial Guinea
GBR
EST
Estonia
USA
ETH Myanmar
Ethiopia
URY
FJI
Fiji
Namibia
UZB
FIN
Finland
Nauru
VUT
FRA
France
Nepal
Gabon
GAB
VNM
Netherlands
ZMB
GMB New Zealand
Gambia
Georgia
GEO
ZWE
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Singapore
Slovakia
Slovenia
Solomon Islands
South Africa
Spain
Sri Lanka
Sudan
Suriname
MDG Swaziland
MWI
MYS
MDV
MLI
MLT
MHL
MRT
MUS
MEX
FSM
MDA
MNG Uganda
YUG
Ukraine
United Arab Emirates
MAR
MOZ
United Kingdom
MYM United States
NAM Uruguay
NRU
NPL
NLD
NZL
NIC
Sweden
Switzerland
Tajikistan
Tanzania
Thailand
Timor-Leste
Togo
Trinidad and Tobago
Tunisia
Turkey
Turkmenistan
Kazakhstan
Kenya
South Korea
Kosovo
Kuwait
Laos
Latvia
Lebanon
Lesotho
Liberia
Libya
Lithuania
Luxembourg
Malaysia
Maldives
Mauritania
Montenegro
Mozambique
Nicaragua
Uzbekistan
Vanuatu
Viet Nam
Zambia
Zimbabwe
Table 4: Countries included in the analysis of the international trade network with the ISO3
codes, that are used in the graphical representations of the network.
III
B.2 Simulation-based Goodness-of-fit in (S)TERGMs
In Figures 7 and 10 we show simulation-based godness-of-fit (GOF) diagnostics for the the
TERGM model and in Figures 8, 9, 11 and 12 for the STERGM in the formation and
dissolution model, respectively. The figures are created by the R package ergm (version
3.10.4) and follow the approach of Hunter et al. (2008).
In all three models, the fitted
model is used in order to simulate 100 new networks. Based on these, different network
characteristics are computed and visualized in boxplots.
The standard characteristics used are the complete distributions of the in-degree, out-
degree, edge-wise shared partners and minimum geodesic distance (i.e. number of node pairs
with shortest path of length k between them). The solid black line indicates the measure-
ments of these characteristic in the observed network. These statistics show whether mea-
sures like GWID, GWOD and GWESP are sufficient to reproduce global network patterns.
Because many shares are rather small, we visualize the simulated and observed measures on
a log-odds scale.
On the bottom of the figures it is shown how well the actual network statistics are
reproduced. Note, that both models compare different things as the TERGM is evaluated
at yt while the STERGM regards y+ and y−. Overall, all plots indicate a satisfying fit of
the respective models.
IV
B.2.1 Data Set 1: International Arms Trade
Figure 7: Arms trade network: Simulation-based goodnes-of-fit diagnostics in the TERGM.
Boxplots give the evaluations of the respective network characteristics at the simulated net-
works and the solid line gives the actual values from the observed network. First four
panels give the log-odds of a node for different in-degrees (top left), out-degrees (top right),
edge-wise shared partners (middle, left) and minimum geodesic distance (middle right). All
included rescaled network statistics on the bottom panel.
V
012345678910121416−5−4−3−2−10in degreelog−odds for a nodelllllllllllllllllllllllllllllllllllllllllllllllllll0481217222732374247525762−6−4−201out degreelog−odds for a nodelllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll012345678910111213−6−5−4−3−2−1edge−wise shared partnerslog−odds for an edgellllllllllllllllllllllllllllllllllllllllll12345678910NR−10−6−202minimum geodesic distancelog−odds for a dyadllllllllllllllllllllllllllllllllledgecov.lnetedgesedgecov.lrecipgwodeg.fixed.0.693147180559945edgecov.poldiffnodeocov.lgdpnodeicov.lgdp−4−2024model statisticslog−odds for the statisticlllllllllllllllllllllllllllGoodness−of−fit diagnosticsFigure 8: Arms trade network: Simulation-based goodnes-of-fit diagnostics in the STERGM
for the formation model. Boxplots give the evaluations of the respective network character-
istics at the simulated networks and the solid line gives the actual values from the observed
network. First four panels give the log-odds of a node for different in-degrees (top left), out-
degrees (top right), edge-wise shared partners (middle, left) and minimum geodesic distance
(middle right). All included rescaled network statistics on the bottom panel.
VI
0246810121416182022−6−5−4−3−2−1in degreelog−odds for a nodelllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll04813182328333843485358636873−6−4−201out degreelog−odds for a nodelllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll012345678911131517−7−5−3−1edge−wise shared partnerslog−odds for an edgelllllllllllllllllllllllllllllllllllllllllllllllllllllllll123456789NR−10−6−4−202minimum geodesic distancelog−odds for a dyadlllllllllllllllllllllllllllllledgesmutualgwodeg.fixed.0.693147180559945edgecov.poldiffnodeocov.lgdpnodeicov.lgdp−4−2024model statisticslog−odds for the statisticllllllllllllllllllllllllFormation: Goodness−of−fit diagnosticsFigure 9: Arms trade network: Simulation-based Goodnes-of-fit diagnostics in the STERGM
for the dissolution model. Boxplots give the evaluations of the respective network character-
istics at the simulated networks and the solid line gives the actual values from the observed
network. First four panels give the log-odds of a node for different in-degrees (top left), out-
degrees (top right), edge-wise shared partners (middle, left) and minimum geodesic distance
(between them, middle right). All included rescaled network statistics on the bottom panel.
VII
0123456789101214−5−4−3−2−10in degreelog−odds for a nodellllllllllllllllllllllllllllllllllllllllllllllll03691317212529333741454953−6−4−20out degreelog−odds for a nodellllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll012345678910−5−4−3−2−10edge−wise shared partnerslog−odds for an edgelllllllllllllllllllllllllllllllll12345678NR−10−6−202minimum geodesic distancelog−odds for a dyadllllllllllllllllllllllllllledgesmutualgwodeg.fixed.0.693147180559945edgecov.poldiffnodeocov.lgdpnodeicov.lgdp−4−2024model statisticslog−odds for the statisticllllllllllllllllllllllllDissolution: Goodness−of−fit diagnosticsB.2.2 Data Set 2: European Research Institution Email Correspondence
Figure 10: Email exchange network: Simulation-based Goodnes-of-fit diagnostics in the
TERGM. Boxplots give the evaluations of the respective network characteristics at the sim-
ulated networks and the solid line gives the actual values from the observed network. First
four panels give the log-odds of a node for different in-degrees (top left), out-degrees (top
right), edge-wise shared partners (middle, left) and minimum geodesic distance (middle
right). All included rescaled network statistics on the bottom panel.
VIII
02468111417202326293235−5−4−3−2In−DegreeLog−Odds for a Nodellllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll024681013161922252831−5−4−3−2−1Out−DegreeLog−Odds for a Nodellllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll02468101214161820−7−6−5−4−3−2Edge−Wise Shared Partnerslog−odds for an edgellllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll123456789NR−8−6−4−20Minimum Deodesic Distancelog−odds for a dyadllllllllllllllllllllllllllllllRepetitionEdgesReciprocityGWIDGWODGWESP−4−2024Model Statisticslog−odds for the statisticllllllllllllllllllGoodness−of−fit diagnosticsFigure 11: Email exchange network: Simulation-based Goodnes-of-fit diagnostics in the
STERGM for the formation model. Boxplots give the evaluations of the respective network
characteristics at the simulated networks and the solid line gives the actual values from the
observed network. First four panels give the log-odds of a node for different in-degrees (top
left), out-degrees (top right), edge-wise shared partners (middle, left) and minimum geodesic
distance (middle right). All included rescaled network statistics on the bottom panel.
IX
036912162024283236404448−5.0−4.0−3.0in degreelog−odds for a nodelllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll036912162024283236404448−5.0−4.0−3.0−2.0out degreelog−odds for a nodellllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll02468111417202326293235−7−6−5−4−3−2edge−wise shared partnerslog−odds for an edgelllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll12345678NR−8−6−4−20minimum geodesic distancelog−odds for a dyadllllllllllllllllllllllllllledgesmutualgwideg.fixed.0.693147180559945gwesp.fixed.0.693147180559945−4−2024model statisticslog−odds for the statisticlllllllllllllllFormation: Goodness−of−fit diagnosticsFigure 12: Email exchange network: Simulation-based Goodnes-of-fit diagnostics in the
STERGM for the dissolution model. Boxplots give the evaluations of the respective network
characteristics at the simulated networks and the solid line gives the actual values from
the observed network. First four panels give the log-odds of a node for different in-degrees
(top left), out-degrees (top right), edge-wise shared partners (middle, left) and minimum
geodesic distance (between them, middle right). All included rescaled network statistics on
the bottom panel.
X
024681013161922252831−5−4−3−2−1in degreelog−odds for a nodellllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll02468101214161820222426−4−3−2−1out degreelog−odds for a nodelllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll012345678911131517−6−5−4−3−2−1edge−wise shared partnerslog−odds for an edgellllllllllllllllllllllllllllllllllllllllllllllllllllll123456789NR−8−6−4−20minimum geodesic distancelog−odds for a dyadlllllllllllllllllllllllllllllledgesmutualgwideg.fixed.0.693147180559945gwesp.fixed.0.693147180559945−4−2024model statisticslog−odds for the statisticlllllllllllllllDissolution: Goodness−of−fit diagnosticsB.3 ROC-based Goodness-of-fit
B.3.1 Data Set 1: International Arms Trade
As already stated in Section 3.3 of the main paper techniques for assessing the fit of a
probabilistic classification can be used when working with binary network data. In the case
of observations at discrete time points this allows an informal comparison of the models
proposed in Section 3 and 4.3.
In the case of the TERGM and STERGM the application of the ROC- and PR-curve
follows from the conditional probability of observing a specific tie (see equation (2.5) of
Hunter and Handcock, 2006). For the REM we predict the intensities of all possible events
given the information of t − 1 and use this value as a score in the calculation of the ROC
curve. While the latter approach is non-standard and can only be applied to REMs that
regard durable ties, it enables a direct comparison between the models as shown in Figure 13.
The results of the ROC curve indicate a generally good fit of all models. In the STERGM
more parameters are estimated, which seems to lead to a slightly bigger area under curve
(AUC) values as compared to the REM and TERGM. Similar to the conclusions from the
ROC curve, the PR curve favors the TERGM and STERGM over the REM.
Figure 13: Arms trade network: ROC and PR curves from the TERGM (dotted line),
STERGM (dotdashed line), and REM (solid line).The AUC values of the respective curves
are indicated in brackets.
XI
0.000.250.500.751.000.000.250.500.751.00SpecificitySensitivityTERGM (0.975)STERGM (0.985)REM (0.969) 0.000.250.500.751.000.000.250.500.751.00RecallPrecisionTERGM (0.633)STERGM (0.686)REM (0.611) B.3.2 Data Set 2: European Research Institution Email Correspondence
The second data set regards reoccurring events in the REM, which are aggregated for the
analysis of the TERGM and STERGM. Therefore, the ROC and PR curve are only available
for the TERGM and STERGM. The results are depicted in Figure 14. For this data set, the
ROC curves favor the TERGM. Yet, when emphasis is put on finding the true positives, the
PR curve detects a better model fit of the STERGM.
Figure 14: Email exchange network: ROC and PR curves from the TERGM (dotted line),
STERGM (dotdashed line), and REM (solid line). The AUC values of the respective curves
are indicated in brackets.
As explained in Section 4.4 one option to asses the goodness-of-fit of REMs is the recall
measure as proposed by Vu et al. (2011). We apply the measure in three different situations
that may be of interest when measuring the predictive performance of relational event models:
predict the next tie, next sender, and next receiver. The worst case scenario in terms of
predictions of a model would be random guessing of the next sender, receiver, or event, the
resulting recall rates are indicated by the dotted lines. The results in Figure 15 exhibit a
good predictive performance of the REM, i.e.
in about 75% of the events the right sender
and receiver is among the 25 most likely senders and receivers.
XII
0.000.250.500.751.000.000.250.500.751.00SpecificitySensitivityTERGM (0.92)STERGM (0.91)0.250.500.751.000.000.250.500.751.00RecallPrecisionTERGM (0.63)STERGM (0.658)(a)
(b)
(c)
Figure 15: Email exchange network: Recall Curves of REM regarding the next sender (a),
receiver (b), and event (c). The dotted line indicates the measure under random guessing of
the next sender, receiver, or event.
XIII
0.000.250.500.751.000255075CutoffRecall0.000.250.500.751.000255075CutoffRecall0.00.10.20.30.40.50100200300400CutoffRecallB.4 Application with multiple time points
In the main article, we fitted a TERGM as well as a STERGM to two time points, called
period 1 and period 2. However, it is possible to fit these models to multiple transitions. In
order to do so, we took the first two years of the email exchange network and aggregated
the deciles into 10 binary networks. Using again a first order Markov assumption and
conditioning on the first network, this allows to fit a TERGM as well as a STERGM to
the remaining nine networks. For comparison we additionally fit a REM to the data set.
The estimation is done using the function mtergm from the package btergm (version 3.6.1)
(Leifeld et al., 2018) that implements MCMC-based maximum likelihood. The STERGM is
fitted again using the package tergm (version 3.5.2).
The corresponding results can be found in Table 5 in column 1 to 3. Note that the
parameter estimates still refer to the transition from t − 1 to t and can interpreted in the
same way as in the main article.
In that regard note, that it is now assumed that the
coefficients stay constant with time. Possible approaches to relax this assumption were
given in the main article. The estimates of the REM (column 4) are consistent with the
(S)TERGM but slightly differ to the main article, since now we condition only on the first
out of 10 periods and hence model more events.
XIV
TERGM
STERGM
REM
Formation Dissolution
−
−
−
−
Edges
Repetition
Reciprocity
1.986∗∗∗
(0.058)
−3.435∗∗∗ −4.485∗∗∗ −0.769∗∗∗
(0.107)
(0.073)
(0.059)
2.755∗∗∗
1.090∗∗∗
1.761∗∗∗
(0.113)
(0.069)
(0.079)
−0.307∗
−1.239∗∗∗ −0.870∗∗∗
In-Degree (GWID)
(0.152)
(0.156)
(0.099)
Out-Degree (GWOD) −1.574∗∗∗ −1.757∗∗∗
−0.056
(0.159)
(0.155)
0.124∗∗
0.508∗∗∗
(0.043)
(0.029)
(0.097)
0.497∗∗∗
(0.028)
GWESP
−
2.354∗∗∗
(0.048)
−
−
In-Degree Receiver
1.699∗∗∗
(0.043)
0.007∗∗∗
(0.002)
0.009∗∗∗ Out-Degree Sender
(0.001)
0.199∗∗∗
(0.011)
Transitivity
Table 5: Email exchange network: Comparison of parameters obtained from the TERGM
(first column) and STERGM (Formation in the second column, Dissolution in the third
column). Standard errors in brackets and stars according to p-values smaller than 0.001
(∗∗∗), 0.05 (∗∗) and 0.1 (∗). Decay parameter of the geometrically weighted statistics is set
to log(2).
XV
|
1502.06682 | 2 | 1502 | 2015-02-26T15:31:34 | Maximizing Friend-Making Likelihood for Social Activity Organization | [
"cs.SI"
] | The social presence theory in social psychology suggests that computer-mediated online interactions are inferior to face-to-face, in-person interactions. In this paper, we consider the scenarios of organizing in person friend-making social activities via online social networks (OSNs) and formulate a new research problem, namely, Hop-bounded Maximum Group Friending (HMGF), by modeling both existing friendships and the likelihood of new friend making. To find a set of attendees for socialization activities, HMGF is unique and challenging due to the interplay of the group size, the constraint on existing friendships and the objective function on the likelihood of friend making. We prove that HMGF is NP-Hard, and no approximation algorithm exists unless P = NP. We then propose an error-bounded approximation algorithm to efficiently obtain the solutions very close to the optimal solutions. We conduct a user study to validate our problem formulation and per- form extensive experiments on real datasets to demonstrate the efficiency and effectiveness of our proposed algorithm. | cs.SI | cs |
Maximizing Friend-Making Likelihood for Social
Activity Organization
Chih-Ya Shen1, De-Nian Yang2, Wang-Chien Lee3, and Ming-Syan Chen1,2
1 Research Center for Information Technology Innovation, Academia Sinica
2 Institute of Information Science, Academia Sinica
3 Department of Computer Science and Engineering, The Pennsylvania State
University
{chihya,mschen}@citi.sinica.edu.tw,
[email protected],[email protected]
Abstract. The social presence theory in social psychology suggests that
computer-mediated online interactions are inferior to face-to-face, in-
person interactions. In this paper, we consider the scenarios of organiz-
ing in person friend-making social activities via online social networks
(OSNs) and formulate a new research problem, namely, Hop-bounded
Maximum Group Friending (HMGF), by modeling both existing friend-
ships and the likelihood of new friend making. To find a set of atten-
dees for socialization activities, HMGF is unique and challenging due
to the interplay of the group size, the constraint on existing friendships
and the objective function on the likelihood of friend making. We prove
that HMGF is NP-Hard, and no approximation algorithm exists unless
P = N P . We then propose an error-bounded approximation algorithm
to efficiently obtain the solutions very close to the optimal solutions. We
conduct a user study to validate our problem formulation and perform
extensive experiments on real datasets to demonstrate the efficiency and
effectiveness of our proposed algorithm.
1
Introduction
With the popularity and accessibility of online social networks (OSNs), e.g.,
Facebook, Meetup, and Skout4, more and more people initiate friend gatherings
or group activities via these OSNs. For example, more than 16 millions of events
are created on Facebook each month to organize various kinds of activities5,
and more than 500 thousands of face-to-face activities are initiated in Meetup6.
The activities organized via OSNs cover a wide variety of purposes, e.g., friend
gatherings, cocktail parties, concerts, and marathon events. The wide spectrum
of these activities shows that OSNs have been widely used as a convenient means
for initiating real-life activities among friends.
On the other hand, to help users expand their circles of friends in the cy-
berspace, friend recommendation services have been provided in OSNs to suggest
candidates to users who may likely become mutual friends in the future. Many
friend recommendation services employ link prediction algorithms, e.g., [10,11],
4 http://www.skout.com/
5 http://newsroom.fb.com/products/
6 http://www.meetup.com/about/
2
C.-Y. Shen, D.-N. Yang, W.-C. Lee, and M.-S. Chen
to analyze the features, similarity or interaction patterns of users in order to
derive potential future friendship between some users. By leveraging the abun-
dant information in OSNs, link prediction algorithms show high accuracy for
recommending online friends in OSNs.
As social presence theory [16] in social psychology suggests, computer-mediated
online interactions are inferior to face-to-face, in-person interactions, off-line
friend-making activities may be favorable to their on-line counterparts in cy-
berspace. Therefore, in this paper, we consider the scenarios of organizing face-
to-face friend-making activities via OSN services. Notice that finding socially
cohesive groups of participants is essential for maintaining good atmosphere for
the activity. Moreover, the function of making new friends is also an impor-
tant factor for the success of social activities, e.g., assigning excursion groups
in conferences, inviting attendees to housewarming parties, etc. Thus, for or-
ganizing friend-making social activities, both activity organization and friend
recommendation services are fundamental. However, there is a gap between ex-
isting activity organization and friend recommendation services in OSNs for the
scenarios under consideration. Existing activity organization approaches focus
on extracting socially cohesive groups from OSNs based on certain cohesive mea-
sures, density, diameter, of social networks or other constraints, e.g., time, spa-
tial distance, and interests, of participants [5,6,7,8]. On the other hand, friend
recommendation services consider only the existing friendships to recommend
potential new friends for an individual (rather than finding a group of people
for engaging friend-making). We argue that in addition to themes of common
interests, it is desirable to organize friend-making activities by mixing the "po-
tential friends", who may be interested in knowing each other (as indicated by
a link prediction algorithm), with existing friends (as lubricators). To the best
knowledge of the authors, the following two important factors, 1) the existing
friendship among attendees, and 2) the potential friendship among attendees,
have not been considered simultaneously in existing activity organization ser-
vices. To bridge the gap, it is desirable to propose a new activity organization
service that carefully addresses these two factors at the same time.
In this paper, we aim to investigate the problem of selecting a set of can-
didate attendees from the OSN by considering both the existing and potential
friendships among the attendees. To capture the two factors for activity organi-
zation, we propose to include the likelihood of making new friends in the social
network. As such, we formulate a new research problem to find groups with
tight social relationships among existing friends and potential friends (i.e., who
are not friends yet). Specifically, we model the social network in the OSN as
a heterogeneous social graph G = (V, E, R) with edge weight w : R → (0, 1],
where V is the set of individuals, E is the set of friend edges, and R is the set
of potential friend edges (or potential edges for short). Here a friend edge (u, v)
denotes that individuals u and v are mutual friends, while a potential edge [u′, v′]
indicates that individuals u′ and v′ are likely to become friends (the edge weight
w[u′, v′] quantifies the likelihood). The potential edges and the corresponding
Maximizing Friend-Making Likelihood for Social Activity Organization
3
0.4
g
0.8
0.5
e
0.7
f
0.9
a
0.6
b
0.3
d
a
0.4
g
0.8
0.5
e
0.2
c
0.7
f
0.9
g
0.7
f
c
d
g
0.8
0.7
f
0.9
e
d
(a) Input Graph G.
(b) H1.
(c) H2.
(d) H3.
Fig. 1. Illustrative Example.
edge weights can be obtained by employing a link prediction algorithm in friend
recommendation.
Given a heterogeneous social graph G = (V, E, R) as described above, we
formulate a new problem, namely, Hop-bounded Maximum Group Friending
(HMGF), to find a group that 1) maximizes the likelihood of making new friends
among the group, i.e., the group has the highest ratio of total potential edge
weight to group size, 2) ensures that the social tightness, i.e., hop count on
friend edges in G between each pair of individuals is small, and 3) is a suffi-
ciently large group, i.e., too small a group may not work well for socialization
activities.
Figure 1 illustrates the social graph and the interplay of the above factors.
Figure 1(a) shows a social graph, where a dash line, e.g., [a, b] with weight 0.6, is
a potential edge and a solid line, e.g., (c, d), is a friend edge. Figure 1(b) shows
a group H1:{a, e, f, g} which has many potential edges and thus a high total
weight. However, not all the members of this group have common friends as
social lubricators. Figure 1(c) shows a group H2:{c, d, f, g} tightly connected by
friend edges. While H2 may be a good choice for gathering of close friends, the
goal of friend-making in socialization activities is missed. Finally, Figure 1(d)
shows H3:{d, e, f, g} which is a better choice than H1 and H2 for socialization
activities because each member of H3 is within 2 hops of another member via
friend edges in G. Moreover, the average potential edge weight among them is
high, indicating members are likely to make some new friends.
Processing HMGF to find the best solution is very challenging because there
are many important factors to consider, including hop constraint, group size and
the total weight of potential edges in a group. Indeed, we prove that HMGF is an
NP-Hard problem with no approximation algorithm. Nevertheless, we prove that
if the hop constraint can be slightly relaxed to allow a small error, there exists a
3-approximation algorithm for HMGF. Theoretical analysis and empirical results
show that our algorithm can obtain good solutions efficiently.
The contributions made in this study are summarized as follows.
-- For socialization activity organization, we propose to model the existing
friendship and the potential friendship in a heterogeneous social graph and
formulate a new problem, namely, Hop-bounded Maximum Group Friending
(HMGF), for finding suitable attendees. To our best knowledge, HMGF is
the first problem that considers these two important relationships between
attendees for activity organization.
4
C.-Y. Shen, D.-N. Yang, W.-C. Lee, and M.-S. Chen
-- We prove that HMGF is NP-Hard and there exists no approximation al-
gorithm for HMGF unless P = N P . We then propose an approximation
algorithm, called MaxGF, with a guaranteed error bound for solving HMGF
efficiently.
-- We conduct a user study on 50 users to validate our argument for consider-
ing both existing and potential friendships in activity organization. We also
perform extensive experiments on real datasets to evaluate the proposed
algorithm. Experimental results manifest that HMGF can obtain solutions
very close to the optimal ones, very efficiently.
2 Problem Formulation
Based on the description of heterogeneous social graph described earlier, here we
formulate the Hop-bounded Maximum Group Friending (HMGF) tackled in this
paper. Given two individuals u and v, let dE
G(u, v) be the shortest path between
u and v via friend edges in G. Moreover, given H ⊆ G, let w(H) denote the total
weight of potential edges in H and let average weight, σ(H) = w(H)
H denote the
average weight of potential edges connected to each individual in H 7. HMGF is
formulated as follows.
Problem: Hop-bounded Maximum Group Friending (HMGF).
Given: Social network G = (V, E, R), hop constraint h, and size constraint p.
Objective: Find an induced subgraph H ⊆ G with the maximum σ(H), where
H ≥ p and dE
G(u, v) ≤ h, ∀u, v ∈ H.
Efficient processing of HMGF is very challenging due to the following reasons:
1) The interplay of the total weight w(H) and the size of H. To maximize σ(H),
finding a small H may not be a good choice because the number of edges in
a small graph tends to be small as well. On the other hand, finding a large H
(which usually has a high w(H)) may not lead to an acceptable σ(H), either.
Therefore, the key is to strike a good balance between the graph size H and the
total weight w(H). 2) HMGF includes a hop constraint (say h = 2) on friend
edges to ensure that every pair of individuals is not too distant socially from
each other. However, selecting a potential edge [u, v] with a large weight w[u, v]
may not necessarily satisfy the hop constraint, i.e., dE
G(u, v) > h which is defined
based on existing friend edges. In this case, it may not always be a good strategy
to prioritize on large-weight edges in order to maximize σ(H), especially when
u and v do not share a common friend nearby via the friend edges.
In the following, we prove that HMGF is NP-Hard and not approximable
within any factor. In other words, there exists no approximation algorithm for
HMGF.
Theorem 1. HMGF is NP-Hard and there is no approximation algorithm for
HMGF unless P = N P .
Proof. Due to the space constraints, we prove this theorem in the full version of
this paper (available online [1]).
7 Note that σ(H) = 0 if H = ∅.
Maximizing Friend-Making Likelihood for Social Activity Organization
5
3 Related Work
Extracting dense subgraphs or social cohesive groups among social networks is
a natural way for selecting a set of close friends for a gathering. Various social
cohesive measures have been proposed for finding dense social subgraphs, e.g.,
diameter [2], density [3], clique and its variations [4]. Although these social cohe-
sive measures cover a wide range of application scenarios, they focus on deriving
groups based only on existing friendship in the social network. In contrast, the
HMGF studied in this paper aims to extract groups by considering both the
existing and potential friendships for socialization activities. Therefore, the ex-
isting works mentioned above cannot be directly applied to HMGF tackled in
this paper.
Research on finding a set of attendees for activities based on the social
tightness among existing friends [5,6,7,8,9] have been reported in the literature.
Social-Temporal Group Query [5] checks the available times of attendees to find
the social cohesive group with the most suitable activity time. Geo-Social Group
Query [6,7] extracts socially tight groups while considering certain spatial prop-
erties. The willingness optimization for social group problem in [8] selects a set
of attendees for an activity while maximizing their willingness to participate. Fi-
nally, [9] finds a set of compatible members with tight social relationships in the
collaboration network. Although these works find suitable attendees for activi-
ties based on existing friendship among the attendees, they ignore the likelihood
of making new friends among the attendees. Therefore, these works may not be
suitable for socialization activities discussed in this paper.
Link prediction analyzes the features, similarity or interaction patterns among
individuals in order to recommend possible friends to the users [10,11,12,13,14].
Link prediction algorithms employ different approaches including graph-topological
features, classification models, hierarchical probabilistic model, and linear alge-
braic methods. These works show good prediction accuracy for friend recom-
mendation in social networks. In this paper, to estimate the likelihood of how
individuals may potentially become friends in the future, we employ link predic-
tion algorithms for deriving the potential edges among the individuals.
To the best knowledge of the authors, there exists no algorithm for activity
organization that considers both the existing friendship and the likelihood of
making new friends when selecting activity attendees. The HMGF studied in this
paper examines the social tightness among existing friends and the likelihood of
becoming friends for non-friend attendees. We envisage that our research result
can be employed in various social network applications for activity organization.
4 Experimental Results
We implement HMGF in Facebook and invite 50 users to participate in our user
study. Each user, given 12 test cases of HMGF using her friends in Facebook as
the input graph, is asked to solve the HMGF cases, and compare her results with
the solutions obtained by MaxGF. In addition to the user study, we evaluate the
performance of MaxGF on two real social network datasets, i.e., FB [15] and the
6
C.-Y. Shen, D.-N. Yang, W.-C. Lee, and M.-S. Chen
)
s
(
e
m
T
i
800
600
400
200
0
User(h=2)
MaxGF(h=2)
User(h=3)
MaxGF(h=3)
User_FeaRatio
MaxGF_FeaRatio MaxGF_ObjRatio
100%
User_ObjRatio
o
i
t
a
R
80%
60%
40%
10
14
18
22
V (p=2)
10
14
18
22
V (h=2, p=2)
User Satisfaction
o
i
t
a
R
100%
80%
60%
40%
20%
0%
User
DkS
MaxGF
(a) Required Time.
(b) FeaRatio and ObjRatio.
(c) User Satisfaction.
Fig. 2. User Study Results.
MS dataset from KDD Cup 20138. The FB dataset is extracted from Facebook
with 90K vertices, and MS is a co-author network with 1.7M vertices. We ex-
tract the friend edges from these datasets and identify the potential edges with
a link prediction algorithm [11]. The weight of a potential edge is ranged within
(0,1]. Moreover, we compare MaxGF with two algorithms, namely, Baseline and
DkS [3]. Baseline finds the optimal solution of HMGF by enumerating all the
subgraphs satisfying the constraints, while DkS is an O(V 1/3)-approximation
algorithm for finding a p-vertex subgraph H ⊆ G with the maximum density
on E ∪ R without considering the potential edges and the hop constraint. The
algorithms are implemented in an IBM 3650 server with Quadcore Intel X5450
3.0 GHz CPUs. We measure 30 samples in each scenario. In the following, Fea-
Ratio and ObjRatio respectively denote the ratio of feasibility (i.e., the portion
of solutions satisfying the hop constraint) and the ratio of σ(H) in the solutions
obtained by MaxGF or DkS to that of the optimal solution.
4.1 User Study
Figure 2 presents the results of the user study. Figure 2(a) compares the required
time for users and MaxGF to solve the HMGF instances. Users need much more
time than MaxGF due to challenges brought by the hop constraint and trade-
offs in potential edge weights and the group size, as explained in Section 2. As
V or h grows, users need more time because the HMGF cases become more
complicated. Figure 2(b) compares the solution feasibility and quality among
users and MaxGF. We employ Baseline to obtain the optimal solutions and de-
rive FeaRatio and ObjRatio accordingly. The FeaRatio and ObjRatio of users
are low because simultaneously considering both the hop constraint on friend
edges and total weights on potential edges is difficult for users. As shown, users'
FeaRatio and ObjRatio drop when V increases. By contrast, MaxGF obtains
the solutions with high FeaRatio and ObjRatio. In Figure 2(c), we ask each user
to compare her solutions with the solutions obtained by MaxGF and DkS, to
validate the effectiveness of HMGF. 74% of the users agree that the solution of
MaxGF is the best because HMGF maximizes the likelihood of friend-making
while considering the hop constraint on friend edges at the same time. By con-
trast, DkS finds the solutions with a large number of edges, but it does not
8 https://www.kaggle.com/c/kdd-cup-2013-author-paper-identification-
challenge/data
Maximizing Friend-Making Likelihood for Social Activity Organization
7
Baseline DkS MaxGF
DkS_FeaRatio MaxGF_FeaRatio
DkS_ObjRatio MaxGF_ObjRatio
1.E+05
1.E+03
1.E+01
1.E-01
o
i
t
a
R
100%
80%
60%
40%
20%
0%
o
i
t
a
R
100%
80%
60%
40%
20%
0%
50
100
150
200
250
V (h=4, p=15)
50
150
100
200
V (h=4, p=15)
250
50
150
100
200
V (h=4, p=15)
250
i
)
s
(
e
m
T
n
o
i
t
u
c
e
x
E
(a) Time of Diff. V .
(b) FeaRatio of Diff. V .
(c) ObjRatio of Diff V .
Baseline DkS MaxGF
DkS_FeaRatio MaxGF_FeaRatio
DkS_ObjRatio MaxGF_ObjRatio
1.E+05
1.E+03
1.E+01
1.E-01
o
i
t
a
R
100%
80%
60%
40%
20%
0%
o
i
t
a
R
100%
80%
60%
40%
20%
0%
2
4
3
5
h (V=150, p=15)
6
2
3
4
5
h (V=150, p=15)
2
3
4
5
h (V=150, p=15)
i
)
s
(
e
m
T
n
o
i
t
u
c
e
x
E
(d) Time of Diff. h.
(e) FeaRatio of Diff. h.
(f) ObjRatio of Diff. h.
Fig. 3. Comparisons with Optimal Solutions.
differentiate the friend edges and potential edges. Therefore, users believe that
the selected individuals may not be able to socialize with each other effectively.
4.2 Performance Evaluation
Baseline can only find the optimal solutions of small HMGF cases since it enu-
merates all possible solutions. Therefore, we first compare MaxGF against Base-
line and DkS on small graphs randomly extracted from FB. Figure 3(a) com-
pares the execution time of the algorithms by varying the size of input graph.
Since Baseline enumerates all the subgraphs H with H ≥ p, the execution
time grows exponentially. The execution time of MaxGF is very small because
the hop-bounded subgraphs and the pruning strategy effectively trim the search
space. Figures 3(b) and 3(c) present the FeaRatio and ObjRatio of the algo-
rithms, respectively. MaxGF has high ObjRatio because MaxGF iteratively re-
moves vertices with low incident weights from each hop-bounded subgraph Hv,
and extracts the solution SAP X with maximized σ(SAP X ) among different sub-
graphs in different Hv to strike a good balance on total edge weights and group
sizes as describe in Section 2. Moreover, the high FeaRatio and ObjRatio also in-
dicate that the post-processing procedure effectively restores the hop constraint
and maximizes the average weight accordingly. By contrast, DkS does not con-
sider the hop constraint and different edge types in finding solutions and thus
generates the solutions with smaller FeaRatio and ObjRatio.
Figures 3(d)-(f) compare execution time, FeaRatio and ObjRatio again but
by varying h. When h increases, the execution time of MaxGF grows slowly
because the pruning strategy avoids examining the hop-bounded subgraphs that
do not lead to a better solution. The FeaRatio and ObjRatio of MaxGF with
different h are high because MaxGF employs hop-bounded subgraphs to avoid
generating solutions with large hop distances on friend edges, and the post-
processing procedure effectively restores the hop constraint and maximizes the
objective function.
8
C.-Y. Shen, D.-N. Yang, W.-C. Lee, and M.-S. Chen
FB_FeaRatio
MS_FeaRatio
FB_GroupSize MS_GroupSize
FB
MS
o
i
t
a
R
100%
90%
80%
70%
70%
60%
e
z
i
S
p
u
o
r
G
G
250
200
150
100
50
50
0
2
3
4
5
6
2
3
4
5
6
h (p=60)
h (p=60)
i
)
s
(
e
m
T
n
o
i
t
u
c
e
x
E
1200
900
600
300
0
20
40
60
80
100
p (h=4)
(a) FeaRatio of Diff. h.
(b) SAP X of Diff. h.
(c) Time of Diff. p.
Fig. 4. Experimental Results on Different Datasets.
Figure 4 compares MaxGF in different datasets, i.e., FB and MS. Figures
4(a) and 4(b) present the FeaRatio and the solution group sizes with different h.
As h increases, MaxGF on both datasets achieves a higher FeaRatio due to the
post-processing procedure adjusts SAP X and further minimizes dE
G(u, v), ∀u, v ∈
SAP X . Moreover, it is worth noting that the returned group sizes grow when h in-
creases in MS. This is because MS contains large densely connected components
with large edge weights. When h is larger, MaxGF is inclined to extract larger
groups from these components to maximize the objective function. By contrast,
FB does not have large components and MaxGF thereby tends to find small
groups to reduce the group size for maximizing the objective function. In fact,
the solutions in FB are almost the same with different h. Finally, MaxGF needs
to carefully examine possible solutions with the sizes at least p, and thus Fig-
ure 4(c) shows that when p increases, the execution time drops because MaxGF
effectively avoids examining the candidate solutions with small group sizes.
5 Conclusion
To bridge the gap between the state-of-the-art activity organization and friend
recommendation in OSNs, in this paper, we propose to model the individu-
als with existing and potential friendships in OSNs for friend-making activity
organization. We formulate a new research problem, namely, Hop-bonded Max-
imum Group Friending (HMGF), to find suitable activity attendees. We prove
that HMGF is NP-Hard and there exists no approximation algorithms unless
P = N P . We then propose an approximation algorithm with guaranteed er-
ror bound, i.e., MaxGF, to find good solutions efficiently. We conduct a user
study and extensive experiments to evaluate the performance of MaxGF, where
MaxGF outperforms other relevant approaches in both solution quality and ef-
ficiency.
References
1. C.-Y. Shen, D.-N. Yang, W.-C. Lee, and M.-S. Chen. Maximizing Friend-Making
Likelihood for Social Activity Organization. arXiv:1502.06682, 2015.
2. S. Wasserman and K. Faust. Social Network Anlysis: Methods and Applications.
Cambridge University Press, 1994.
3. U. Feige, G. Kortsarz, and D. Peleg. The Dense k-Subgraph Problem. Algorithmica,
2001.
4. R. Mokken. Cliques, Clubs and Clans. Quality and Quantity: International Journal
of Methodology, 1979.
Maximizing Friend-Making Likelihood for Social Activity Organization
9
5. D.-N. Yang, Y.-L. Chen, W.-C. Lee, and M.-S. Chen. On Social-Temporal Group
Query with Acquaintance Constraint. VLDB, 2011.
6. D.-N. Yang, C.-Y. Shen, W.-C. Lee, and M.-S. Chen. On Socio-Spatial Group
Query for Location-based Social Networks. KDD, 2012.
7. Q. Zhu, H. Hu, J. Xu, and W.-C. Lee. Geo-Social Group Queries with Minimum
Acquaintance Constraint. arXiv:1406.7367v1, 2014.
8. H.-H. Shuai, D.-N. Yang, P. S. Yu, and M.-S. Chen. Willingness Optimization for
Social Group Activity. VLDB, 2014.
9. D. Surian, N. Liu, D. Lo, H. Tong, E.-P. Lim, and C. Faloutsos. Recommending
People in Developers' Collaboration Network. WCRE, 2011.
10. H. Kashima and N. Abe. A Parameterized Probabilistic Model of Network Evolu-
tion for Supervised Link Prediction. ICDM, 2006.
11. D. Liben-Nowell and J. Kleinberg. The Link Prediction Problem for Social Net-
works. Journal of the American Soceity for Information Science and Technology,
2007.
12. A. Clause, C. Moore, and M. Newman. Hierarchical Structure and the Prediction
of Missing Links in Network. Nature, 2008.
13. J. Kunegis and A. Lommatzsch. Learning Spectral Graph Transformations for Link
Prediction. ICML, 2009.
14. C. Leung, E.-P. Lim, D. Lo, and J. Weng. Mining Interesting Link Formation Rules
in Social Networks. CIKM, 2010.
15. B. Viswanath, A. Mislove, M. Cha, and K. Gummadi. On the Evolution of User
Interaction in Facebook. WOSN'09.
16. J. Short, E. Williams, and B. Christie. The Social Psychology of Telecommunica-
tions. London: Wiley, 1976.
|
1911.00067 | 1 | 1911 | 2019-10-31T19:26:21 | DNA: Dynamic Social Network Alignment | [
"cs.SI"
] | Social network alignment, aligning different social networks on their common users, is receiving dramatic attention from both academic and industry. All existing studies consider the social network to be static and neglect its inherent dynamics. In fact, the dynamics of social networks contain the discriminative pattern of an individual, which can be leveraged to facilitate social network alignment. Hence, we for the first time propose to study the problem of aligning dynamic social networks. Towards this end, we propose a novel Dynamic social Network Alignment (DNA) framework, a unified optimization approach over deep neural architectures, to unfold the fruitful dynamics to perform alignment. However, it faces tremendous challenges in both modeling and optimization: (1) To model the intra-network dynamics, we explore the local dynamics of the latent pattern in friending evolvement and the global consistency of the representation similarity with neighbors. We design a novel deep neural architecture to obtain the dual embedding capturing local dynamics and global consistency for each user. (2) To model the inter-network alignment, we exploit the underlying identity of an individual from the dual embedding in each dynamic social network. We design a unified optimization approach interplaying proposed deep neural architectures to construct a common subspace of identity embeddings. (3) To address this optimization problem, we design an effective alternating algorithm with solid theoretical guarantees.We conduct extensive experiments on real-world datasets and show that the proposed DNA framework substantially outperforms the state-of-the-art methods. | cs.SI | cs | DNA: Dynamic Social Network Alignment
Li Sun, Zhongbao Zhang, Pengxin Ji, Jian Wen, Sen Su
Beijing University of Posts and Telecommunications, Beijing, China
{l.sun, zhongbaozb, jpx, j.wen, susen}@bupt.edu.cn
Philip S. Yu
University of Illinois at Chicago, IL, USA
[email protected]
9
1
0
2
t
c
O
1
3
]
I
S
.
s
c
[
1
v
7
6
0
0
0
.
1
1
9
1
:
v
i
X
r
a
Abstract -- Social network alignment, aligning different social
networks on their common users, is receiving dramatic attention
from both academic and industry. All existing studies consider the
social network to be static and neglect its inherent dynamics. In
fact, the dynamics of social networks contain the discriminative
pattern of an individual, which can be leveraged to facilitate
social network alignment. Hence, we for the first time propose
to study the problem of aligning dynamic social networks.
Towards this end, we propose a novel Dynamic social Network
Alignment (DNA) framework, a unified optimization approach
over deep neural architectures, to unfold the fruitful dynamics
to perform alignment. However, it faces tremendous challenges
in both modeling and optimization: (1) To model the intra-
network dynamics, we explore the local dynamics of the latent
pattern in friending evolvement and the global consistency of the
representation similarity with neighbors. We design a novel deep
neural architecture to obtain the dual embedding capturing local
dynamics and global consistency for each user. (2) To model the
inter-network alignment, we exploit the underlying identity of
an individual from the dual embedding in each dynamic social
network. We design a unified optimization approach interplaying
proposed deep neural architectures to construct a common
subspace of identity embeddings. (3) To address this optimization
problem, we design an effective alternating algorithm with solid
theoretical guarantees. We conduct extensive experiments on real-
world datasets and show that the proposed DNA framework
substantially outperforms the state-of-the-art methods.
Index Terms -- social network alignment, dynamics, deep learn-
ing, optimization
I. INTRODUCTION
Social network alignment is to align different social net-
works on their common users, which is also known as anchor
link prediction [1]. It routinely finds itself in a wide spectrum
of applications, such as network fusion, link prediction, infor-
mation diffusion and cross-domain recommendation. On the
whole, social network alignment paves the way for the broad
learning across social networks. Thus, it is receiving increasing
attention from both academic and industry.
All existing studies [2], [3], [4], [5], [6], [7], [8], [9], [10],
[11], [12], [13], [14], [15], [16], [17], to the best of our knowl-
edge, consider social networks to be static. As shown in Fig. 1
(a), given static social networks with some anchor (common)
users, it is impossible to distinguish the counterpart of c in
social network A from c(cid:48) and d(cid:48) in network B. Indeed, static
social network alignment is still far away from the real-world
scenario, where there is nothing permanent except change.
Social networks are inherently dynamic as an individual more
often than not adds or deletes his or her friends. Hence,
can we leverage the dynamics of social networks to facilitate
Fig. 1: Difference between static and dynamic social network
alignment. Nodes denote users. Dotted lines denote intra-
network links and full lines denote anchor links. Fig. (a) shows
static social network alignment, where some anchor (common)
users, i.e., {a, a(cid:48)} and {b, b(cid:48)}, are known in advance, while
Fig. (b) shows dynamic social network alignment with social
networks evolving in the real-world scenario.
alignment? The answer is yes! We take advantage of the
order of friending in real-world dynamic social networks. The
order matters! In fact, friendship evolvement of an individual
across social networks is dominantly deterministic rather than
stochastic, as evidenced by the study of social psychology
[18]. Recall the toy example in Fig. 1 (b). We observe that
c first friends anchor user {a, a(cid:48)} and then friends {b, b(cid:48)}
in network A, and c(cid:48) also friends {a, a(cid:48)} prior to {b, b(cid:48)} in
network B. It shows that c and c(cid:48) share the same discriminative
pattern of dynamics. Thus, c is more likely to be aligned with
c(cid:48) than d(cid:48). Motivated by this observation, we for the first time
pose the problem of aligning dynamic social networks.
Towards this end, we propose a novel Dynamic social
Network Alignment framework, referred to as DNA, to unfold
the fruitful dynamics of social networks to perform alignment.
However, it faces tremendous challenges in both modeling and
optimization:
• The first and foremost challenge lies in how to model the
intra-network dynamics. An individual, more often than
not, expands or shrinks his or her friend list along with
the evolvement of dynamic social networks. However, no
existing studies focus on the representing users with such
complex dynamics for alignment. Thus, it is challenging
to encode the intra-network dynamics.
• The second challenge is how to model the inter-network
alignment. An intuitive idea is to discover the underly-
ing identity representation of users from different social
• Last but not
networks to facilitate alignment. Revealing such identity
representation is already nontrivial even if these social
networks are simplified to be static [4], [5], [19], [11],
[6]. Thus, it is tougher to reveal the underlying identity
from dynamic social networks.
it
the least, after modeling,
is always
a challenge to address the optimization problem. The
optimization problem tends to be nonconvex due to the
inherent complexity of dynamic network alignment. For
a nonconvex optimization, it lacks an effective method in
general to approach the optimal or suboptimal solution.
Thus, it renders this problem much more challenging.
To address the first challenge, we design a novel deep neural
architecture to model users in each dynamic social network. To
model users with dynamics, we exploit not only the temporal
evolvement in friending behaviors of a user, referred to as local
dynamics, but also representation similarity with the neighbors
of the user, referred to as global consistency. Specifically,
to capture local dynamics, we design an LSTM Autoencoder
zooming in the temporal friendship evolvement of each user
for encoding the evolvement pattern. To capture global con-
sistency, we design a consistency regularization and impose
it onto the heart of the LSTM Autoencoder for compensating
local dynamics. We utilize the hidden state in the heart of the
neural architecture, referred to as dual embedding, to jointly
embed local dynamics and global consistency for the users of
dynamic social network.
To address the second challenge, we design a unified
optimization approach to construct a common subspace from
different dynamic social networks. All behaviors of an individ-
ual across different social networks tend to share something
in common, termed as underlying identity. It can be leveraged
to identify this individual. Motivated by this fact, we first
introduce a projection matrix to transform the dual embedding
above into the identity embedding for the underlying identity
representation. Then, we formulate a unified optimization
approach to construct the common subspace of identity em-
beddings, where users are naturally aligned according to the
underlying identity. This optimization is constrained on the
collection of anchor users known in advance so that identity
embeddings of the same individual remain consistent. Fi-
nally, we obtain the unified optimization approach interplaying
proposed deep neural architectures, referred to as the DNA
framework, for dynamic social network alignment.
The optimization problem of DNA is not jointly convex
over the matrix variables of (1) neural architecture parameters
for dual embedding, (2) projection and (3) identity embed-
ding. To address this nonconvex optimization, we design an
effective alternating algorithm to approach a local optimum
of the objective, i.e., we update one of the matrix variables
while fixing others. Specifically, for the matrices of neural
architecture parameters, we employ the gradient method. For
the matrices of projections, we derive the closed-form solution
and prove that the derived solution is the global optimum.
For the matrices of identity embeddings, we first construct an
auxiliary function and then derive the multiplicative updating
rule. We further prove the correctness and convergence of the
multiplicative updating rule and draw corresponding theorems
with solid theoretical guarantees.
In DNA, the proposed deep neural architecture enjoys the
powerful nonlinear learning ability to capture the complex
dynamics, and the unified optimization takes advantage of its
inherent merit to naturally model the underlying identities. The
proposed DNA framework interplays two neural architectures
with the unified optimization,
thereby effectively aligning
dynamic social networks.
To evaluate DNA, we first restore the real-world dynamic
social network by framing a sequence of network snapshots via
the collected timestamps. Then, we conduct extensive experi-
ments on real-world datasets and demonstrate the superiority
of the proposed DNA framework.
Finally, we summarize noteworthy contributions as follows:
• To the best of our knowledge, we for the first time pose
the problem of aligning dynamic social networks.
• To address this problem, we design a novel DNA frame-
work. In DNA, we propose a novel deep neural archi-
tecture to capture the complex dynamics and a unified
optimization approach to construct the common subspace.
• To address the optimization of DNA, we design an
effective alternating algorithm to approach an optimum
with solid theoretical guarantees.
• We conduct extensive experiments on real-world datasets
and experimental results demonstrate evident superiority
of the proposed DNA framework.
The rest of this paper is organized as follows: in Sec. 2,
we formalize this problem. Sec. 3 and Sec. 4 introduce the
modeling and optimization of the proposed DNA framework,
respectively. Sec. 5 shows the experimental results and Sec. 6
summarizes the related work. Finally, we conclude our work
in Sec. 7.
II. PROBLEM DEFINITION
There are a source dynamic social network and a target
dynamic social network. While the terminology of social
network is commonly used, we use social graph in the rest of
this paper to avoid ambiguity with the terminology of neural
network. A dynamic social graph is naturally represented as
a graph tensor. We use the superscript of s (or t) to indicate
notations of the source graph tensor Gs (or target graph tensor
Gt). Take the social graph tensor Gs ∈ RN s×N s×M for
(·) in total and M snapshots in
instance. There are N s users us
time order. A slide of the tensor Gs,m ∈ RN s×N s represents
the mth snapshot of the dynamic social graph. The matrix
Gs,m can be asymmetric or symmetric and its element [Gs,m]ij
indicates directed or undirected connection strength between
the ith user and jth user at the time of mth snapshotting in Gs.
The value of [Gs,m]ij can be either binary {0, 1} or arbitrary
nonnegative value. The proposed framework, DNA, can align
any (un)directed (un)weighted dynamic social graphs indeed.
Without loss of generality, the source and target dynamic social
graphs are partially overlapped via the anchor users, who join
TABLE I: Main Notations and Definitions
Notations
G
A
U
V
P
Q
Du
Dc
α, β, γ
Definition
the dynamic social graph tensor
the anchor set with size of A
the matrix of dual embedding
the matrix of identity embedding
the indication matrix
the projection matrix
the dimension of dual embedding
the dimension of identity embedding
the model parameters
in both social graphs. These users are recorded in an anchor
set A = {(k, l)a}. Each element in A represents an anchor
user, i.e., the ath element (k, l)a describes the kth user in the
source graph Gs corresponds to the lth user in the target graph
Gt. We use A = {(k, l)a} to denote the size of A.
We summarize the main notations in Table 1 and formally
define the problem of aligning dynamic social networks:
Problem Definition (Aligning Dynamic Social Networks).
Given the source and target dynamic social graph tensors Gs
and Gt of M snapshots with an anchor set A, the problem
of aligning dynamic social networks is to find a mapping Φ
which maps a user to its owner of natural individual, i.e.,
(·)) holds if and only if the individual joins in
Φ(us
both dynamic social graphs.
(·)) = Φ(ut
III. DNA: FRAMEWORK
To address
the problem of aligning dynamic social
networks, we propose a novel Dynamic social Network
Alignment framework, referred to as DNA, with a unified op-
timization approach over deep neural architectures illustrated
in Fig. 2. In the DNA framework, to encode the intra-network
dynamics, we propose a novel deep neural architecture to
embed users of each dynamic social network. To address
the inter-network alignment, we design a unified optimiza-
tion framework interplaying proposed neural architectures to
construct a common subspace, where user embeddings of the
same individual are naturally aligned.
A. Modeling Users with Complex Dynamics
To model the complex dynamics, we explore the temporal
local dynamics.
evolvement of the user's friendship,
Moreover, user should own similar embedding with his or her
friends to facilitate alignment as pointed out in studies [8], [5].
That is, the global consistency, representation similarity with
the user's close neighbors, is of significant as well.
i.e.,
How can we capture both of them? Recently, LSTMs have
proved to be effective for encoding evolvement in the se-
quential data [20]. However, it largely remains open to model
users with complex dynamics for social network alignment. To
bridge this gap, we design a novel deep neural architecture,
LSTM Autoencoder with consistency regularization, where we
can obtain the dual embedding u(·)
i of dimension Du for each
user jointly embedding local dynamics and global consistency.
Since Gs is the same as Gt on encoding the dynamics, we use
Gs for elaboration in this subsection.
1) Ego Networks: What should be the input for capturing
the dynamics? We introduce the concept of an ego network
for each user and explore the temporal proximity evolvement
in his or her ego network via an LSTM Autoencoder.
i
i
i
,
and
i = ξr(ω−1)
r(ω)
probability that the random walker will not restart.
(1)
j[G]ij and ξ is the
ω r(ω)
D−1G + (1 − ξ)r(0)
Random walk with restart (RWR) [21] has been shown
as an effective strategy to identify the proximities. Here, we
leverage ω-step RWR to calculate the proximity between users.
Given an adjacency matrix G ∈ RN s×N s and a start node
i ∈ RN s, the RWR score vector
i, indicated by a binary r(0)
ri ∈ RN s encodes the proximities between user i and the
others. Formally, ri is defined as ri =(cid:80)
where D = diag({di}) with di = (cid:80)
aggregated adjacency matrix Gs,A = (cid:80)
Specifically, for the ith user, we first choose W friends with
high proximity to form the ego network. That is, we locate
the indexes {q1, q2, . . . , qW} of W largest RWR scores on the
m em−MGs,m with
exponential time decay for matrix G in Eq. (1). Now, the ego
network is formed by connecting each node to its W largest
RWR score neighbors over the aggregated adjacency matrix.
Next, we examine how the RWR scores to these W friends
evolve over the M snapshots. Specifically, we calculate the
∈ RW of user i for each snapshot Gs,m. The
ego vector xs,m
ego vector xs,m
contains the proximity between user i and his
(or her) W friends in the ego network, i.e., [xs,m
]w = [ri]qw
and ri is the RWR score vector on snapshot Gs,m, where
Gs,m serves as matrix G in Eq. (1). Finally, we obtain the
ego vector sequence {xs,m
}M
m=1 depicting the evolvement
regarding friendship distribution in the ego network for the
}M
given user i. The ego vector sequence {xs,m
m=1 is to feed
into the encoder LSTM.
i
i
i
i
i
i
i.e.,
2) Capturing Evolvement Pattern: How can we capture
local dynamics? For the ith
the evolvement pattern,
user, when ego vector sequence {xs,m
} is processed by the
encoder LSTM Cell recursively from 1 to M, the pattern of
temporal evolvement of his or her friendship is captured in
∈ RDu, where we have the function
the hidden state us,M
i = LSTMCell(us,m−1
us,m
) performed recursively and
us,0
is initiated to zero vector. In LSTM, gating mechanisms
(forget gate f, input gate i and output gate o) with cell state c
are leveraged for long- and short-term dependence. Formally,
we describe transformations in the LSTM cell as follows:
, xs,m
i
i
i
i
i
i
i
i
i = σ(Wf [us,m−1
f s,m
, xs,m
i = σ(Wi[us,m−1
is,m
, xs,m
i = σ(Wo[us,m−1
os,m
, xs,m
i = ReLU(Wc[us,m−1
cs,m
cs,m
i = f s,m
us,m
i = os,m
i (cid:12) cs,m−1
i (cid:12) ReLU(cs,m
i
i
i
i
i
] + bf ),
] + bi),
] + bo),
] + bc),
, xs,m
i
i (cid:12) cs,m
+ is,m
),
i
,
(2)
where [·,·] denotes concatenation. W(·) and b(·) are parameter
matrices and biases, respectively. σ is the sigmoid function and
(cid:12) is the Hadamard product. We utilize the activation function
ReLU to facilitate further optimization. The decoder LSTM
Fig. 2: An overview of DNA framework. The input are source and target dynamic social graphs with a collection of common
users known in advance, as shown in Fig. (a). For each dynamic graph, ego vector sequences are fed into the proposed deep
neural architecture to encode users with complex dynamics, as shown in Fig. (b), where superscript s or t is omitted for
clarity. Finally, interplaying the proposed deep neural architectures, DNA framework outputs a common subspace of identity
embeddings for alignment, as shown in Fig. (c).
i
decodes the hidden state xs,M
to recover ego vector reversely
from M to 1, and we append a full connection layer to the
decoder for dimension transformation, as shown in Fig. 2 (b).
For all users in the dynamic social graph Gs, we give
the reconstructed error of LSTM Autoencoder in the form of
tensor approximation: (cid:13)(cid:13)(cid:13)X s − X s(cid:13)(cid:13)(cid:13)2
,
F
i
i
(3)
where · F is the Frobenius norm. X s ∈ RN s×W×M is the
ego tensor. Its mth slide X s,m ∈ RN s×W is the matrix of ego
vector for the mth snapshot Gs,m, whose ith row is the ego
. X s is the reconstructed ego tensor from decoder
vector xs,m
LSTM. The evolvement pattern is embedded in the output
hidden state of the last encoder LSTM cell us,M
. According
to the study [22], this embedding space will preserve the local
dynamics in the graph tensor via minimizing the reconstructed
error even without an explicit preservation restriction.
ij = rij
(cid:13)(cid:13)us
i − us
(cid:104)
3) Consistency Regularization: Focusing on the temporal
evolvement of the user friendship, aforementioned embedding
us highlights local dynamics but lacks global consistency.
As a compensation, we impose a consistency regularization
Rs onto the heart of LSTM Autoencoder as shown in Fig.
2 (b), to incorporate the global consistency. Specifically, we
draw neighbors closer in the embedding space via a pairwise
penalty Rs
, where rij = [ri]j indicates
the proximity between the ith user and jth user in Gs. The
consistency regularization Rs is summation of Rs
ij over all
user pairs {(ij)} in Gs,
(cid:13)(cid:13)2
UsTGs,LUs(cid:105)
(4)
where Gs,L = D − Gs,A is the graph Laplacian and Us ∈
RN s×Du
is the dual embedding matrix of local dynamics and
global consistency, whose ith row corresponds to the ith user.
For dynamic social graph Gs, combining Eq. (3) and Eq.
(4), we obtain the loss function of the proposed deep neural
architecture as follows:
Ds =
(5)
where α is the weight parameter. The norm term is for local
dynamics and the trace term is for global consistency.
(cid:13)(cid:13)(cid:13)X s − X s(cid:13)(cid:13)(cid:13)2
Rs = T r
+ αRs,
+
F
j
2
,
B. Constructing Common Subspace
i ∈ RDc
All behaviors of an individual in both social graphs tend
to share a common nature, his or her underlying identity. It
can be leveraged to identify this individual. Motivated by this
fact, we design a unified optimization approach to construct
the common subspace of identity embedding vs
+ with
dimension Dc depicting such underlying identity.
Specifically, we first introduce a projection matrix Q(·) ∈
RDc×Du, for each dynamic social graph, to transform the
+ into the identity embedding vs
i .
dual embedding us
Use source dynamic graph Gs for elaboration. Formally, we
i Qs for the ith users. Thus, for Gs, we obtain
have us
the matrix of identity embedding Vs ∈ RN s×Dc
(Dc (cid:28)
min{N s, N t}), whose ith row is the identity embedding vs
i
for user i. We formulate this transformation as a loss term in
the form of matrix approximation:
i ∈ RDu
i = vs
+
(cid:107)Us − VsQs(cid:107)2
F .
(6)
Note that, Dc, without loss of generality, is not necessarily
equal to Du for dual embedding.
Then, we construct the common subspace of the identity
embeddings. Naturally, the identity embeddings of the same
individual in different networks remain equal, i.e., the matrices
of identity embedding Vs and Vt are aligned on the anchor
users. To formulate the constraint, we derive a pair of indi-
cation matrices {Ps, Pt} from the anchor set A = {(k, l)a},
where Ps ∈ RA×N s, Pt ∈ RA×N t and A is the size of
the anchor set A. The indication matrix Ps is defined as
a ∈ RN s is a binary
[ ps
vector with only one element valued 1, i.e., [ps
a]k = 1. The
a is to indicate the corresponding row, the identity
vector ps
k of kth user in Gs, for aligning. Similarly, Pt
embedding vs
a]l = 1 is the only
is defined as [ pt
a ∈ RN t. We enforce the
element valued 1 in binary vector pt
following equality
A ]T whose row vector ps
A ]T and [pt
2, . . . , ps
2, . . . , pt
1, ps
1, pt
(7)
for all anchor users in A to depict the alignment between
matrices of identity embeddings Vs and Vt.
PsVs = PtVt,
C. Optimization Objective
Now, we formulate a unified optimization interplaying the
proposed deep neural architectures for dynamic social network
alignment. Incorporating Eq. (5) and Eq. (6) for each dynamic
social graph G(·), we have following objectives:
J s = Ds + βUs − VsQs2
F ,
J t = Dt + βUt − VtQt2
F ,
(8)
where β weighs the significance of the projection.
Next, we rewrite the equality constraint in the form of
matrix approximation and reformulate the equality constraint
as a penalty term with a coefficient γ sufficiently large.
Finally, we obtain the unified optimization problem of DNA
framework, which interplays two deep neural architectures for
dynamic social network alignment, as follows:
J = J s + J t + γ(cid:13)(cid:13)PsVs − PtVt(cid:13)(cid:13)2
(9)
F ,
min
V(·),Q(·),Θ(·)
where Θ(·) denotes parameter matrices of the proposed neural
architecture. The users whose identity embeddings are posi-
tioned closely in the common subspace are regarded as good
candidates for the social network alignment.
IV. DNA: OPTIMIZATION
The optimization problem of DNA in Eq. (9) is not jointly
convex over matrix variables Q, V and Θ for both dynamic
social graphs. Thus, it is infeasible to obtain the closed-form
solution of the global optimum. To bridge this gap, we design
an effective alternating algorithm to approach an optimum. The
core idea is to approach a (local) optimal solution w.r.t. one
matrix variable while fixing others. Θ is readily to be solved
via gradient methods. Obviously, the key challenge lies in the
updating rules for Q and V. The derivation of updating rule of
the variables associated with Gt is the same as that of Gs and
thus omitted due to the limit of space. The overall procedure
of the DNA framework is summarized in Algorithm 1.
Algorithm 1: DNA Framework
Input: Source dynamic social graph tensor: Gs
Target dynamic social graph tensor: Gt
Anchor set: A
Output: Candidate lists for alignment between Gs and Gt
1 Generate ego tensor X s and X t for dynamic social graph
tensor Gs and Gt, respectively;
ego tensor via J s
2 Pretrain the proposed deep neural architecture for each
d and J t
d ;
3 Perform forward propagation to obtain Us(0) and Ut(0);
4 Initialize Vs(0) = Us(0) and Vt(0) = Ut(0);
5 while not converging do
6
7
Back-propagation to update Θs (or Θt);
for each dynamic social graph do
8
9
10
11
for each dynamic social graph do
(cid:16)
VsT Vs(cid:17)−1
Forward propagation to obtain Us (or Ut);
Update Qs =
rule of Qt is of the same structure);
Update Vs (or Vt) via Eqs. (14) and (15);
VsT Us (the updating
12 Generate candidate lists for alignment via computing the
distance between the rows in Vs and Vt.
where ⊗ denotes the Kronecker product. It is block diagonal,
[Hs
Q][k][k] = VsT Vs,
(13)
where Ik is a k-dimensional identity matrix and [Hs
Q][k][k]
is the (k, k)-th block in matrix Hs
Q. Obviously, the block
Q is always positive semidefinite as VsT Vs is
diagonal Hs
positive semidefinite. Thus, J is convex w.r.t. Qs. Therefore,
the global optimum is achieved by setting ∇s
Q = 0. Finally,
we obtain the closed-form updating rule for Qs in Eq. (10) as
the inverse matrix always exists for any positive semidefinite
matrix VsT Vs.
minJ (Qs), we give the closed-form
A. Updating Q
To solve Qs = arg
Qs
solution as follows:
Qs =
(cid:16)
VsT Vs(cid:17)−1
VsT Us
(10)
Theorem (Optimal Solution). Fixing other matrix variables,
the updating rule in the proposed DNA for Qs and Qt gives
the global optimal solution to minimize overall objective J
w.r.t. Qs and Qt, receptively.
Proof. First, we derive the matrix of partial differentials of J
w.r.t. Qs as follows:
∇s
Q = −2VsT Us + 2VsT VsQs
Then, we study the Hessian matrix Hs
Q = Ik ⊗ VsT Vs,
Hs
Q of J w.r.t. Qs:
(11)
(12)
B. Updating V
To solve Vs = arg
Vs
updating rule as follows:
(cid:115)
minJ (Vs), we give the multiplicative
Vs = Vs (cid:12)
where
β(Ψs + VsΓs) + γΛs
β(Υs + VsΦs) + γΠs ,
(14)
Ψs = (UsQsT )+ Υs = (UsQsT )−
Γs = (QsQsT )−
Φs = (QsQsT )+
Λs = PsT PtVt
Πs = PsT PsVs
√· are
Note that, (cid:12) is the Hadamard product. Both (·)
pairwise operators. Nonnegative operators (·)+ and (·)− are
defined as follows:
(·) and
(15)
[X+]ij =
[X]ij+[X]ij
2
[X−]ij =
[X]ij−[X]ij
2
,
(16)
TABLE II: Statistics of the datasets
Dataset
Twitter
Foursquare
#(Nodes)
5, 167
5, 240
#(Links)
164, 660
76, 972
#(Anchor Users)
2, 858
where · is the absolute value of a scalar. Hence, X+ and X−
are absolute value matrices of positive elements and negative
elements of an arbitrary matrix X, respectively.
Next, we prove the correctness of the multiplicative updat-
ing rule in Eqs. (14) and (15), and give the theorem below:
Theorem (Correctness). The limit point of multiplicative
updating rules of DNA for Vs (as well as Vt) in Eqs. (14)
and (15) satisfies the Karush-Kuhn-Tucker (KKT) condition.
Proof. We study the objective function J in Eq. (9) w.r.t. Vs,
referred to as J (Vs). Utilize the fact X2
F = tr(XT X) for
any real matrix X ∈ Rn×m. After some algebraic operations
and omitting constants, we obtain:
J (Vs) = − 2βtr((VsQs)T Us) + βtr((VsQs)T VsQs)
− 2γtr((PtVt)T PsVs) + γtr((PsVs)T PsVs).
(17)
We introduce the matrix Ω of the Lagrangian multipliers
to enforce the nonnegative constraint on Vs, leading to the
Lagrangian function of J (Vs),
L(Vs) = J (Vs) + tr(ΩVs).
(18)
Following the KKT complementary slackness condition, we
obtain the fixed point equation as follows,
where ∇s
[∇s
V]ij[Vs]ij = [Ω]ij[Vs]ij = 0,
V is the matrix of partial differentials:
∇s
V = − 2βUsQsT + 2βVsQsQsT
− 2γPtT
PtVt + 2γPsT PsVs.
(19)
(20)
The solution must satisfy Eq. (19) in the limit. Given the
multiplicative updating rule in Eqs. (14) and (15), we have,
in the limit, Vs(∞) = Vs(τ +1) = Vs(τ ) = Vs, where the
superscript (τ ) indicates the τ-th iteration. Utilizing the fact
X = X+ + X−, we obtain that:
V]ij[Vs]2
ij = 0.
[∇s
(21)
The right hand side in both Eq. (21) and Eq. (19) is 0. The left
hand side in both Eq. (21) and Eq. (19) is a multiplication of
two factors and the first factor in both equations is identical.
As [Vs]2
ij = 0 if and only if [Vs]ij = 0, we can claim that
Eq. (21) holds if and only if Eq. (19) holds. Thus, we reach
the Theorem (Correctness).
V. EXPERIMENT
A. Experimental Setup
Datasets: We enrich a benchmark dataset [4], [1], [11], [6],
[9], [7], Twitter-Foursquare (TF), by collecting time informa-
tion of friending. We restore the real-world dynamic social
(a) Precision@K under different K (b) Precision@3 under different λ
(c) MAP@K under different K
Fig. 3: Experimental results on Twitter-Foursquare dataset
(d) MAP@3 under different λ
network by framing a sequence of network snapshots via the
collected timestamps. The statistics are listed in Table II.
Comparison Methods: To evaluate the performance of the
proposed DNA framework, we chose several state-of-the-art
methods for comparison, which are introduced as follows:
• PALE [5]: It
leverages the structure information and
performs an embedding-matching framework to align
users across social networks.
• IONE [4]: It utilizes a unified optimization framework for
aligning social networks subject to hard or soft constraint
on the anchor users via an embedding approach.
• MASTER [11]: It constructs a common subspace of
multiple social networks via a semi-supervised optimiza-
tion framework. Note that, it only considers structure
information in this paper for fair comparison.
• DeepLink [6]: It introduces a neural framework, which
leverages dual learning to facilitate common subspace
construction to perform alignment.
Parameter Settings: In the proposed DNA framework, we set
ω to 3 for ω−step RWR. We utilize the l2 norm to regularize
the neural architecture parameters for alleviating overfitting
and employ the dropout trick in the training, whose empirical
value is set to 0.8.
Evaluation Metric: We evaluated all the comparison methods
in terms of the following metrics:
• Precision@K is defined as
(cid:80)NA
1i{success@K},
where 1i{success@K} = 1 if and only if
the
groundtruth exists in the candidate list of length K,
otherwise 1i{success@K} = 0. NA is the number of
groundtruth anchor users.
1
NA
, where Ranki
is the rank of the candidate hitting the ground truth in the
candidate list of length K. Specially, we set
= 0
for not hitting. NA is defined in Precision@K. Note that,
MAP highlights the rank of the hitting candidate in a
nonlinear way.
(cid:80)NA
• MAP@K is defined as
1
NA
Ranki
i=1
Ranki
i=1
1
1
Higher value of the metrics signifies better performance.
K13579111315Precision@K (%)203040506070PALEIONEMASTERDeepLinkDNAλ1020304050Precision@3 (%)203040506070PALEIONEMASTERDeepLinkDNAK13579111315MAP@K (%)1020304050PALEIONEMASTERDeepLinkDNAλ1020304050MAP@3 (%)1020304050PALEIONEMASTERDeepLinkDNA(a) Precision@3
(b) Precision@3
(a) Precision@3
(b) MAP@3
(c) MAP@3
(d) MAP@3
Fig. 4: Parameter sensitivity on Twitter-Foursquare dataset
B. Experimental Results
We first focus on verifying the importance of dynamics
and its reason behind, and then discuss the supervision for
DNA, where all the embedding dimensions are set to 128 as
default. Finally, we conduct sensitivity analysis on embedding
dimension. We repeated each experiment 10 times and report
the mean with 95% confidence interval.
The dynamics is important! We compare the proposed
DNA framework with static alignment methods to demonstrate
the importance of dynamics. To achieve this goal, we evaluate
DNA and its competitors under various settings. Specifically,
on both datasets, we first vary the length K of the candidate
list from 1 to 15 on 50%-overlap datasets, reported in Fig.
3 (a) and (c). We then vary the overlap rate λ from 10 to
50 while fixing K = 3, reported in Fig. 3 (d) and (d). The
overlap rate λ is measured by 2A
S+T , where A, S and T are
the number of anchor users, source network users and target
network users, respectively. A λ-overlap dataset is generated
by randomly deleting users. The performance in terms of both
precision and MAP are evaluated.
Obviously, DNA consistently outperforms all comparison
methods. For instance, DNA achieves 1.96× precision and
1.94× MAP of PALE on the 50%-overlap benchmark (TF)
dataset. The reasons are two-fold: (1) The DNA framework
captures the complex dynamics in the real-world social net-
work evolvement, which is discriminative for social network
alignment. However,
the other methods cannot effectively
identify the alignment due to limited user depiction, which
inevitably loses the fruitful information residing in network
dynamics. (2) DNA constructs a common subspace modeling
the underlying identities, and the users are thereby naturally
aligned in the common subspace. However, other methods,
such as IONE [4], PALE [5] and DeepLink [6], are some-
how powerless to reveal underlying identities of individuals
for alignment. To sum up, experimental results verify that
dynamics significantly facilitates social network alignment.
On the Snapshotting: The performance of DNA leverages
5 snapshots with the interval of 3 months in Fig. 3. Now,
is reasonable indeed. In general,
Fig. 5: Performance under different embedding dimensions
we zoom in the dynamics of social networks by varying
the frequency and number of snapshots. A natural question
arises that: the more the snapshots, the better the performance?
We evaluate the performance of DNA under various settings
of snapshotting, reported in Fig. 4 (a) and (c), where the
confidence interval is omitted for clarity. Both Precision@3
and MAP@3 of DNA increases as frequency and number of
snapshots increase in general. However, the performance tends
to be saturated when the information collected is adequate.
It
the higher frequency
and higher number of snapshots better restore the network
dynamics, i.e., friending behaviors in this context. It is of
high discriminative ability for alignment as it is dominantly
correlated to the patterns of individuals acting across social
networks as evidenced in the study [18]. For instance, if an
individual more often than not expands or shrinks his or her
friend list once a few weeks, it will reveal this pattern in a
few months. Thus, we need a time window long enough and a
snapshotting frequency high enough to capture the pattern of
friending or collaboration behavior. Moreover, we observed
that outdated information may not further help analysis as
stated in the study [18] as well. These results in fact verify the
motivation of our work and in turn shed light on the dynamics
of behavior pattern for the further study of social psychology.
On the Supervision Information: We analyze the impact
of training rate η by varying η from 1% to 5%. As shown in
Fig. 4 (b) and (d), the performance of DNA rises dramatically
as η increases from 1% to 3%, and then saturates when η
exceeds 3%. On both TF and AN datasets with 50% overlap
rate, DNA achieves better performance in terms of precision
and MAP than its competitors, leveraging only a few anchor
users. It is expected and the reason lies in two folds: (1)
In the DNA framework, the user dynamics are encoded in
a self-supervised way,
i.e., we can obtain the embedding
space without supervision. (2) The common subspace will be
constructed by aligning the embedding spaces on only a few
anchor users, which is one of the inherent merits of DNA. To
summarize, the experimental results on different training rates
verify the learning ability of the proposed DNA framework.
On the Embedding Dimension: We further discuss the
impact of the embedding dimension. The higher the em-
bedding dimension,
is not
always the case. We vary the dimension from 10 to 300 and
report the precision and MAP on both TF and AN datasets
in Fig. 5. As shown in these subfigures, both Precision@3
and MAP@3 of all these methods are undesirable when the
the better the performance? It
13011090Interval (day)70503010123Number456762595653Precision@3 (%)5354555657585960616263η12345Precision@3 (%)010203040506070PALEIONEMASTERDeepLinkDNA13011090Interval (day)70503010123Number456748454239MAP@3 (%)39404142434445464748η12345MAP@3 (%)01020304050PALEIONEMASTERDeepLinkDNADimension050100150200250300Precision@3 (%)010203040506070PALEIONEMASTERDeepLinkDNADimension050100150200250300MAP@3 (%)01020304050PALEIONEMASTERDeepLinkDNAdimension is low, and tends to be better as the dimension
increases. The reason lies in that when user embeddings with
low dimensionality tend to entangle densely, thus resulting in
the mislead of alignment. However, we will not obtain further
performance gain when embedding dimension is large enough
to layout user embeddings in the common embedding space.
Moreover, the DNA framework consistently outperforms all
comparison methods as the generated embeddings encode the
discriminative pattern residing in the dynamic social networks,
which significantly facilitates social network alignment.
VI. RELATED WORK
We summarize the related works in the following two fields:
A. Social Network Alignment
Social network alignment, a.k.a. anchor link prediction [23],
is to align different social networks on their common users. To
our knowledge, this problem is first proposed and addressed
by the study [24]. Some studies [2], [1], [25], [19], [26]
incorporate heterogeneous information to discover the latent
consistency of user identity, while others [3], [9], [4], [5], [6],
[7], [27] exploit the structure information to perform social
network alignment. Moreover, some studies [8], [10], [28],
[11], [12], [13], [14], [15] investigate to exploit both structure
and heterogeneous attribute information. However, all existing
studies consider the social network to be static for simplicity
and neglect its inherent dynamics. The essential distinction
between our work and all these studies above lies in that we
for the first time pose the problem of aligning dynamic social
networks and design the DNA framework to unfold the fruitful
dynamics for addressing this problem. In contrast to social
network alignment, biochemical network alignment [29], [30],
[31] aims to find similar conserved regions between networks
instead of exploring underlaying identities of nodes and thus
distinguishes itself with our work.
B. Network Embedding
Network embedding is to obtain a low-dimensional compact
vector representation for each node in a network. Inspired by
the success of word2vec, DeepWalk [32] conducts random
walks on the network and feeds generated node sequences
into Skip-gram. Following DeepWalk, node2vec [33] proposes
a novel random walk strategy to facilitate network embedding.
LINE [34] gives an explicit objective function of the first- and
second-order proximity for network embedding. Neural net-
works on graph, such as GCN [35], also obtain the embeddings
for each node. Some studies explore the structural regularity
regarding the regular equivalence [36], the embedding distribu-
tion [37] and the computational challenges [38], while others
attempt to incorporate the heterogeneous information [39],
[40]. Recently, a few works investigate the problem of dynamic
network embedding. However, they focus on positioning the
new arrivals [41], [42], facilitating the embedding in one
network [43], [44] or tailoring the embedding for other tasks,
e.g., anomaly detection [45]. The surveys [46], [47] give the
comprehensive summary. Distinguishing with these studies,
we focus on user embedding with complex dynamics for
dynamic social network alignment.
VII. CONCLUSION
To the best of our knowledge, this is the first study on the
problem of aligning dynamic social networks. We propose to
reveal the evolving pattern of the individuals in the dynamic
social network to facilitate aligning, inspired by the social
psychology. The dynamics in the social network contains
the discriminative pattern to facilitate alignment. However,
revealing such pattern faces significant challenges in both
modeling and optimization. Towards this end, we propose
a novel DNA framework, a unified optimization approach
over deep neural architectures, unfolding the fruitful dynamics
for alignment. In the DNA framework, to capture the intra-
network dynamics, we propose a novel neural architecture
in account of user dynamics. To address the inter-network
alignment, we design a unified optimization interplaying the
embedding spaces to construct
the common subspace. To
address this optimization problem, we design an effective alter-
nating algorithm with solid theoretical guarantees. We conduct
extensive experiments on real-world datasets and experimental
results demonstrate that DNA substantially outperforms the
state-of-the-art methods.
VIII. ACKNOWLEDGEMENT
This work was supported in part by: National Key Re-
search and Development Program of China under Grant
2018YFB1003804, National Natural Science Foundation un-
der Grant 61602050 and 61921003, Fundamental Research
Funds for the Central Universities 2019XD11 and NSF under
grants III-1526499, III-1763325, III-1909323, CNS-1930941,
and CNS-1626432.
REFERENCES
[1] X. Kong, J. Zhang, and P. S. Yu, "Inferring anchor links across multiple
heterogeneous social networks," in CIKM, 2013, pp. 179 -- 188.
[2] R. Zafarani and H. Liu, "Connecting users across social media sites: a
behavioral-modeling approach," in KDD, 2013, pp. 41 -- 49.
[3] S. Tan, Z. Guan, D. Cai, X. Qin, J. Bu, and C. Chen, "Mapping users
across networks by manifold alignment on hypergraph," in AAAI, 2014,
pp. 159 -- 165.
[4] L. Liu, W. K. Cheung, X. Li, and L. Liao, "Aligning users across social
networks using network embedding," in IJCAI, 2016, pp. 1774 -- 1780.
[5] T. Man, H. Shen, S. Liu, X. Jin, and X. Cheng, "Predict anchor links
across social networks via an embedding approach," in IJCAI, 2016, pp.
1823 -- 1829.
[6] F. Zhou, L. Liu, K. Zhang, G. Trajcevski, J. Wu, and T. Zhong,
"Deeplink: A deep learning approach for user identity linkage," in
INFOCOM, 2018, pp. 1313 -- 1321.
[7] C. Li, S. Wang, P. S. Yu, L. Zheng, X. Zhang, Z. Li, and Y. Liang, "Dis-
tribution distance minimization for unsupervised user identity linkage,"
in CIKM, 2018, pp. 447 -- 456.
[8] Y. Zhang, J. Tang, Z. Yang, J. Pei, and P. S. Yu, "Cosnet: Connecting
heterogeneous social networks with local and global consistency," in
KDD, 2015, pp. 1485 -- 1494.
[9] J. Zhang and P. S. Yu, "Multiple anonymized social networks alignment,"
in ICDM, 2015, pp. 855 -- 864.
[10] X. Cao and Y. Yu, "Bass: A bootstrapping approach for aligning
heterogenous social networks," in ECML-PKDD, 2016, pp. 459 -- 475.
[11] S. Su, L. Sun, Z. Zhang, G. Li, and J. Qu, "Master: across multiple social
networks, integrate attribute and structure embedding for reconciliation,"
in IJCAI, 2018, pp. 3863 -- 3869.
[43] L. Zhou, Y. Yang, X. Ren, F. Wu, and Y. Zhuang, "Dynamic network
embedding by modeling triadic closure process," in AAAI, 2018, pp.
571 -- 578.
[44] Y. Zuo, G. Liu, H. Lin, J. Guo, X. Hu, and J. Wu, "Embedding temporal
network via neighborhood formation," in KDD, 2018, pp. 2857 -- 2866.
[45] W. Yu, W. Cheng, C. C. Aggarwal, K. Zhang, H. Chen, and W. Wang,
"Netwalk: A flexible deep embedding approach for anomaly detection
in dynamic networks," in KDD, 2018, pp. 2672 -- 2681.
[46] P. Cui, X. Wang, J. Pei, and W. Zhu, "A survey on network embedding,"
IEEE Trans. on Knowl. and Data Eng., vol. 31, pp. 833 -- 852, 2018.
[47] D. Zhang, J. Yin, X. Zhu, and C. Zhang, "Network representation
learning: A survey," IEEE Trans. on Big Data, pp. 1 -- 25, 2018.
[12] Z. Zhong, Y. Cao, M. Guo, and Z. Nie, "Colink: An unsupervised
framework for user identity linkage," in AAAI, 2018, pp. 5714 -- 5721.
[13] J. Zhang, B. Chen, X. Wang, H. Chen, C. Li, F. Jin, G. Song, and
Y. Zhang, "Mego2vec: Embedding matched ego networks for user
alignment across social networks," in CIKM, 2018, pp. 327 -- 336.
[14] Y. Wang, C. Feng, L. Chen, H. Yin, C. Guo, and Y. Chu, "User
identity linkage across social networks via linked heterogeneous network
embedding," WWW Journal, pp. 1 -- 22, 2018.
[15] W. Xie, X. Mu, R. K.-W. Lee, F. Zhu, and E.-P. Lim, "Unsupervised user
identity linkage via factoid embedding," in ICDM, 2018, pp. 1338 -- 1343.
[16] J. Zhou and J. Fan, "Tanslink: User identity linkage across heterogeneous
social networks via translating embeddings," in INFOCOM, 2019.
[17] Y. Wang, H. Shen, J. Gao, and X. Cheng, "Learning binary hash codes
for fast anchor link retrieval across networks," in The Web Conf. (WWW).
ACM, 2019, pp. 3335 -- 3341.
[18] S. Utz, M. Tanis, and I. Vermeulen, "It is all about being popular: the
effects of need for popularity on social network site use," Cyberpsychol-
ogy Behavior & Social Networking, vol. 15, no. 1, pp. 37 -- 42, 2012.
[19] X. Mu, F. Zhu, E.-P. Lim, J. Xiao, J. Wang, and Z.-H. Zhou, "User
identity linkage by latent user space modelling," in KDD, 2016, pp.
1775 -- 1784.
[20] A. Graves and N. Jaitly, "Towards end-to-end speech recognition with
recurrent neural networks," in ICML, 2014, pp. 1764 -- 1772.
[21] H. Tong, C. Faloutsos, and J. Pan, "Fast random walk with restart and
its applications," in ICDM, 2006, pp. 613 -- 622.
[22] D. Wang, P. Cui, and W. Zhu, "Structural deep network embedding," in
KDD, 2016, pp. 1225 -- 1234.
[23] K. Shu, S. Wang, J. Tang, R. Zafarani, and H. Liu, "User identity linkage
across online social networks: A review," KDD Exp, pp. 5 -- 17, 2017.
[24] R. Zafarani and H. Liu, "Connecting corresponding identities across
communities," in ICWSM, vol. 9, 2009, pp. 354 -- 357.
[25] S. Liu, S. Wang, F. Zhu, J. Zhang, and R. Krishnan, "Hydra: Large-
scale social identity linkage via heterogeneous behavior modeling," in
SIGMOD, 2014, pp. 51 -- 62.
[26] Y. Ren, C. C. Aggarwal, and J. Zhang, "Meta diagram based active
social networks alignment," in ICDE, 2019.
[27] C. Li, Y. Wang, S. Wang, Y. Liu, P. S. Yu, Z. Li, and Y. Liang,
"Adversarial learning for weakly-supervised social network alignment,"
in AAAI, 2019.
[28] S. Zhang and H. Tong, "Final: Fast attributed network alignment," in
KDD, 2016, pp. 1345 -- 1354.
[29] J. Flannick, A. Novak, C. B. Do, B. S. Srinivasan, and S. Batzoglou,
"Automatic parameter learning for multiple local network alignment,"
Journal of computational biology, vol. 16, no. 8, pp. 1001 -- 1022, 2009.
[30] V. Vijayan, D. Critchlow, and T. Milenkovic, "Alignment of dynamic
networks," Bioinformatics, vol. 33, no. 14, pp. 180 -- 189, 2017.
[31] D. Aparicio, P. Ribeiro, T. Milenkovi, and F. Silva, "Temporal network
alignment via got-wave," Bioinformatics, pp. 1367 -- 4803, 2019.
[32] B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning of
social representations," in KDD, 2014, pp. 701 -- 710.
[33] A. Grover and J. Leskovec, "node2vec: Scalable feature learning for
networks," in KDD, 2016, pp. 855 -- 864.
[34] J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei, "Line: Large-
scale information network embedding," in WWW, 2015, pp. 1067 -- 1077.
[35] T. N. Kipf and M. Welling, "Semi-supervised classification with graph
convolutional networks," in ICLR, 2017.
[36] K. Tu, P. Cui, X. Wang, P. S. Yu, and W. Zhu, "Deep recursive network
embedding with regular equivalence," in KDD, 2018, pp. 2357 -- 2366.
[37] S. Pan, R. Hu, G. Long, J. Jiang, L. Yao, and C. Zhang, "Adversarially
regularized graph autoencoder for graph embedding," in IJCAI, 2018,
pp. 2609 -- 2615.
[38] D. Lian, K. Zheng, V. W. Zheng, Y. Ge, L. Cao, I. W. Tsang, and
X. Xie, "High-order proximity preserving information network hashing,"
in KDD, 2018, pp. 1744 -- 1753.
[39] C. Yang, Z. Liu, D. Zhao, M. Sun, and E. Chang, "Network representa-
tion learning with rich text information," in IJCAI, 2015, pp. 2111 -- 2117.
informed attributed network
[40] X. Huang, J. Li, and X. Hu, "Label
embedding," in WSDM, 2017, pp. 731 -- 739.
[41] L. Du, Y. Wang, G. Song, Z. Lu, and J. Wang, "Dynamic network
embedding: An extended approach for skip-gram based network em-
bedding," in IJCAI, 2018, pp. 2086 -- 2092.
[42] Z. Zhang, P. Cui, J. Pei, X. Wang, and W. Zhu, "Timers: Error-bounded
svd restart on dynamic networks," in AAAI, 2018, pp. 224 -- 231.
|
1704.05146 | 1 | 1704 | 2017-04-17T23:18:17 | On Predicting Geolocation of Tweets using Convolutional Neural Networks | [
"cs.SI"
] | In many Twitter studies, it is important to know where a tweet came from in order to use the tweet content to study regional user behavior. However, researchers using Twitter to understand user behavior often lack sufficient geo-tagged data. Given the huge volume of Twitter data there is a need for accurate automated geolocating solutions. Herein, we present a new method to predict a Twitter user's location based on the information in a single tweet. We integrate text and user profile meta-data into a single model using a convolutional neural network. Our experiments demonstrate that our neural model substantially outperforms baseline methods, achieving 52.8% accuracy and 92.1% accuracy on city-level and country-level prediction respectively. | cs.SI | cs |
On Predicting Geolocation of Tweets using
Convolutional Neural Network
Binxuan Huang and Kathleen M. Carley
School of Computer Science, Carnegie Mellon University,
5000 Forbe Ave., Pittsburgh, United States
{binxuanh,kathleen.carley}@cs.cmu.edu
Abstract. In many Twitter studies, it is important to know where a
tweet came from in order to use the tweet content to study regional user
behavior. However, researchers using Twitter to understand user behav-
ior often lack sufficient geo-tagged data. Given the huge volume of Twit-
ter data there is a need for accurate automated geolocating solutions.
Herein, we present a new method to predict a Twitter user's location
based on the information in a single tweet. We integrate text and user
profile meta-data into a single model using a convolutional neural net-
work. Our experiments demonstrate that our neural model substantially
outperforms baseline methods, achieving 52.8% accuracy and 92.1% ac-
curacy on city-level and country-level prediction respectively.
1
Introduction
Recently, there is growing interest in using social media to understand social phe-
nomena. For example, researchers have shown that analyzing social media reveals
important geospatial patterns for keywords related to presidential elections[26].
People can use Twitter as a sensor to detect earthquakes in real-time[24]. Recent
research also has demonstrated that Twitter data provides real-time assessments
of flu activity[1].
Using Twitter's API1, a keyword search can be done and we can easily
get tweet streams from across the world containing keywords of interest. How-
ever, we cannot conduct a fine-grained analysis in a specific region using such
a keyword-based search method. Alternatively, using the same API tweets with
geo-information can be collected via a bounding box. Since less than 1% of tweets
are tagged with geo-coordinates[8], using this location-based search means we
will lose the majority of the data. If we can correctly locate those ungeotagged
tweets returned from a keyword search stream, that would enable us to study
users in a specific region with far more information.
With this motivation, we are aiming to study the problem of inferring a
tweet's location. Specifically, we are trying to predict on a tweet by tweet ba-
sis, which country and which city it comes from. Most of the previous studies
rely on rich user information(tweeting history and/or social ties), which is time-
consuming to collect because of the Twitter API's speed limit. Thus those meth-
ods could not be directly applied to Twitter streams. In this paper, we study a
1 https://dev.twitter.com/docs
global location prediction system working on each single tweet. One data sam-
ple is one tweet JSON object returned by Twitter's streaming API. Our system
utilizes location-related features in a tweet, such as text and user profile meta-
data. We summarize useful features that can provide information for location
prediction in Table 1.
Table 1. Feature table
Type
Feature
Tweet content
Free text
User personal description Free text
Free text
User name
Free text
User profile location
Categorical
Tweet language(TL)
Categorical
User language(UL)
Timezone(TZ)
Categorical
UTC timestamp
Posting time(PT)
Recent research has shown that using bag-of-words and classical machine
learning algorithms such as Naive Bayes can provide us a text-based location
classifier with good accuracy[10]. Different from previous research, we intend to
use the convolutional neural network(CNN) to boost prediction power. Inspired
by the success of convolutional neural network in text classification[13], we are
going to use CNN to extract location related features from texts and train a
classifier that combines high-level text feature representations with these cat-
egorical features. To benchmark our method, we compared our approach with
a stacking-based method. Experimental results demonstrate that our approach
achieves 92.1% accuracy on country-level prediction and 52.8% accuracy on city-
level prediction, which greatly outperforms our baseline methods on both tasks.
2 Related work
Identifying demographic details of Twitter users[17] has been widely studied in
previous literature including inferring users' attributes like age, gender[6], po-
litical affiliation[18] and personalities like openness and conscientiousness[20].
Among these research, there is increasing interest in inferring Twitter user's lo-
cation, which is largely driven by the lack of sufficient geo-tagged data[8]. In
many situations, it is important to know where a tweet came from in order to
use the information in the tweet to effect a good social outcome. Key exam-
ples include: disaster relief[15], disaster management[4], earthquake detection[7],
predicting elections[25], and predicting flu trends[1].
A majority of previous works either focus on a local region e.g. United
States[5], Sweden[2], or using rich user information like a certain number of
tweets for each user[5], user's social relationship[12,19,27]. Different from these
works, this paper works on worldwide tweet location prediction. We only utilized
features in one single tweet without any external information. Thus this method
could be easily applied to real-time Twitter stream.
For fine-grained location prediction, there are several types of location rep-
resentation methods existing in literature. One typical method is to divide earth
into small grids and try to predict which cell one tweet comes from. Wing
and Baldridge introduced a grid-based representation with fixed latitude and
longitude[28]. Based on the similarity measured by Kullback-Leibler divergence,
they assign each ungeotagged tweet to the cell with most similar tweets. Because
cells in urban area tend to contain far more tweets than the ones in rural areas,
the target classes are rather imbalanced[9]. To overcome this, Roller et al. further
proposed an adaptive grid representation using K-D tree partition[22]. Another
type of representation is topic region. Hong et al. proposed a topic model to
discover the latent topic words for different regions[11]. Such parametric genera-
tive model requires a fixed number of regions. However, the granularity of topic
regions is hard to control and will potentially vary over time[10].
The representation we choose is city-based representation considering most
tweets come from urban area. One early work proposed by Cheng et al. using a
probabilistic framework to estimate Twitter user's city-level location based on
the content of tweets[5]. Their framework tries to identify local words with prob-
ability distribution smoothing. However, such method needs a certain number
of tweets(100) for each user to get a good estimation. Han et al. proposed a
stacking-based approach to predict user's city[9]. They combine tweet text and
meta-data in user profile with stacking[29]. Specifically, they train a multino-
mial naive Bayes base classifier on tweet text, profile location, timezone. Then
they train a meta-classifier over the base classifiers. More recently, Han et al.
further did extensive experiments to show that using feature selection method,
such as information gain ratio[21] and χ2 statistic could greatly improve the
classification performance.
3 Location prediction
In this section, we will introduce our location prediction approach. We first
briefly describe the useful features in a tweet JSON object. After that, we will
further explain how we utilize these features in our prediction model.
3.1 Feature Set
We have listed all useful information we want to utilize in Table 1. Tweet content,
user personal description, user name and profile location are four text fields
that we will use. Twitter users often reveal their home location in their profile
location and personal description. However, location indicating words are often
mixed with informal tweet text(e.g. chitown for Chicago). It is unrealistic to use
a gazetteer to find these words. In this work, we choose to apply CNN on these
four text fields to extract high-level representations.
In addition to these four text fields. there are another three categorical fea-
tures: tweet language, user language,and timezone. Tweet language is automati-
cally determined by Twitter's language detection tool. User language and time-
zone are selected by the user in his/her profile. These three categorical features
are particularly useful for distinguishing users at the country-level.
The last feature is UTC posting time. Using posting timestamp as a discrim-
inative feature is motivated by the fact that people in a region are more active
on Twitter at certain times during the day. For example, while people in United
Kingdom start to be active at 9:00 am in UTC time, most of the people in United
States are still asleep. We transform the posting time in UTC timestamp into
discrete time slots. Specifically, we divide 24 hours into 144 time slots each with
a length of 10 minutes. Thus each tweet will have a discrete time slot number in
the range of 144, which can be viewed as a categorical feature. In Figure 1, we
plotted the probability distribution of an user posting tweets in each time slot
in three different countries. As expected, there is a big variance between these
three countries.
Fig. 1. The probability of an user posting a tweet in different time slot in three different
countries: United States, United Kingdom, Japan.
3.2 Our Approach
Our approach is based on the convolutional neural network for sentence classi-
fication proposed by Kim[13]. Different from traditional bag-of-words method,
such convolutional neural networks take the word order into consideration. Our
model architecture is shown in Figure 2. We use this CNN architecture to ex-
i ∈ Rk be the
tract high-level features from four text fields in a tweet. Let xt
k-dimensional word vector corresponding to the i-th word in the text t, where
t ∈ {tweet content, user description, profile location, user name}. As a result,
one text of length n can be represented as a matrix
2 ⊕ .... ⊕ xt
(1)
where ⊕ is concatenation operator. In the convolutional layer, we apply each
filter w ∈ Rhk to all the word vector matrices, where h is the window size and
k is the length of a word vector. For example, applying filter w to a window of
i:i+h−1 + b). Here b ∈ R is a bias
word vectors xt
term and we choose f (x) as a non-linear ReLU function max(x, 0). Sliding the
filter window from the beginning of a word matrix till the end, we generated a
feature vector ct = [ct
n−h+1] for each text t. If we have m filters in the
convolutional layer, then we can produce m feature vectors for each text field
and 4m vectors in total.
i:i+h−1, we generated ct
i = f (w· xt
1, ct
2, ..., ct
X t
1:n = xt
1 ⊕ xt
n
Fig. 2. A diagram of the architecture of our neural model.
In the max-pooling layer, we apply a pooling operation over each feature
vector generated in the convolutional layer. Each pooling operation takes a fea-
ture vector as input and outputs the maximum value ct = max(ct). ct can be
viewed as the most representative feature generated by a filter on text t. Hence
we finally got a long vector θ ∈ R4m after the max-pooling layer. To avoid the
co-adaptation of hidden units, we apply dropout on the max-pooling layer that
randomly set elements in θ to zero in the training phase. After that, we append
four categorical features tweet language(TL), user language(UL), timezone(TZ)
and posting time(PT) with one-hot encoding at the end of θ and get θ. In the
last fully connected layer, we use a softmax function over this long vector θ to
generate the probability distribution over locations. Specifically, the probability
of one tweet coming from location li is
P (liθ) =
θ)
(2)
(cid:80)L
θ)
exp(βT
i
j=1 exp(βT
j
where L is the number of locations and βi are parameters in softmax layer. The
output predicted location is just the location with highest probability.
The minimization objective in the training phase is the categorical cross-
entropy loss. The parameters to be estimated include word vectors, weight vec-
tors w for each filters, the weight vectors β in softmax layer, and all the bias
terms. The optimization is performed using mini-batch stochastic gradient de-
scent and back-propagation[23].
4 Data
We used geo-tagged tweets collected from Twitter streaming API2 for training
and evaluation. In this study, we set the geographic bounding box as [-180, -90,
180, 90] so that we could get these geo-tagged tweets from the whole world.
Our collection started from January 7, 2017 to February 1, 2017. Because it is
very common for one user to post tweets from the same city, we randomly chose
one tweet for each city that one user has visited. This could ensure that there
is no strong overlap among our data samples. We only used tweets either with
specific geo-coordinates or a geo-bounding box smaller than [0.1,0.1]. For the
latter case, we used the center of one tweet's bounding box as its coordinates.
No other filtering was done. There are 3,321,194 users and 4,645,692 tweets in
total. For test data we used all tweets from 10% of the users who were randomly
selected. For the remaining 90% users, we picked tweets from 50,000 of them as
a development set and used the remaining tweets as training data.
There are two location prediction tasks we consider in this paper. The first
task is country-level location prediction. We adopted the country code in the
geo-tagged tweet as the label we want to predict. In our dataset, there are 243
countries and regions in total. The second task is city-level location classification.
We adopt the same city-based representation as Han et al.[3]. The city-based rep-
resentation consists of 3,709 cities throughout the world and was obtained by
aggregating smaller cities with the largest nearby city. We assigned the clos-
est city for each tweet based on orthodromic distance. Table 2 contains basic
statistics about our dataset. It is worth mentioning that this dataset is rather
imbalanced, where a majority of tweets are sent from a few countries/cities.
Table 2. Summaries about the dataset. Numbers in brackets are standard deviation.
# of
tweets
4645692 3321194
# of
users
# of
timezones
417
# of
lang.
103
# of countries
(or regions)
Tweets per
country
# of
cities
Tweets per
city
243
19118.0 (99697.1) 3709 1252.5(4184.5)
5 Experiments
5.1 Evaluation Measures
Following previous works of tweet geolocation prediction[9], we used four evalu-
ation measures listed below. One thing to note is that when we calculated the
error distance we used distance between predicted city and the true coordinates
in the tweet rather than the center of assigned closest city.
2 https://dev.twitter.com/streaming/reference/post/statuses/filter
– Acc: The percentage of correct location predictions.
– Acc@Top5: The percentage of true location in our top 5 predictions.
– Acc@161: The percentage of predicted city which are within a 161km(100
mile) radius of the true coordinates in the original tweet to capture near-
misses. This measure is only tested on city-level prediction.
– Median: The median distance from the predicted city to the true coordinates
in the original tweet. This measure is only tested on city-level prediction.
5.2 Baseline Method
We compared our approach with one commonly used ensemble method in pre-
vious research works [9,10]. We implemented an ensemble classifier based on
stacking[29] with 5-fold cross validation. The training of stacking consists of two
steps. First, five multinomial naive Bayes base classifiers are trained on different
types of data(tweet content, user description, profile location, user name and the
remaining categorical features). The outputs from the base classifiers are used
to train a multinomial naive Bayes classifier in the second layer. We call such
method STACKING in this paper. Same as [10], we also use information gain
ratio to do feature selection on text tokens. We call STACKING with feature
selection STACKING+.
5.3 Hyperparameters and Training
We used a tweet-specific tokenizer provided by NLTK3 to tokenize text fields. We
built our dictionary based on the words that appeared in text, user description,
and profile location. To reduce low-utility words and noise, we removed all words
that had a word frequency less than 10. For our proposed approach, we used filter
windows(h) of 3,4,5 with 128 feature vectors each, a dropout rate of 0.5 and batch
size of 1024. We initialize word vectors using word2vec4 vectors trained on 100
billion words from Google News. The vectors have dimensionality of 300 and were
trained using the continuous bag-of-words architecture[16]. For those words that
are not included in word2vec, we initialized them randomly. We also performed
early stopping based on the accuracy over the development set. Training was
done through stochastic gradient descent using Adam update rule with learning
rate 10−3[14]. For our baseline models, we applied additive smoothing with α =
10−2, which is selected on the development set. For STACKING+ method, we
first ranked these words by their information gain ratio value, then selected the
top n% words as our vocabulary. The tuning of n is based on accuracy over
the development set. We selected n as 40%, 55% for city-level prediction and
country-level prediction respectively.
5.4 Results
The comparison results between our approach and the baseline methods are
listed in Table 3 and Table 4. Our approach achieves 92.1% accuracy and 52.8%
3 http://www.nltk.org/api/nltk.tokenize.html
4 https://code.google.com/archive/p/word2vec/
accuracy on country-level and city-level location prediction respectively. Our
approach is consistently better than the previous model on the country-level
location prediction task as shown in Table 3. It greatly outperforms our baseline
methods over all the measures, especially on the city-level prediction task. It
could assign more than half of the test tweets to the correct city and gain more
than 20% relative improvement over the accuracy of the STACKING+ method.
Table 3. Country prediction results.
Table 4. City prediction results.
Acc Acc@Top5
STACKING 0.868 0.947
STACKING+ 0.871 0.950
Our approach 0.921 0.972
STACKING 0.389 0.573
STACKING+ 0.439 0.616
Our approach 0.528 0.692
Acc Acc@161 Acc@Top5 Median
77.5 km
47.2 km
28.0 km
0.595
0.629
0.711
Our approach performs better for countries with a large number of tweets. In
Figure 3, we plotted the precision and recall value for each country as a scatter
chart. The dot size is proportional to the number of tweets that come from that
country. Turkey appears to be the country with highest precision and recall.
These results suggest that our approach works better with more data samples.
The same graph is also plotted for city prediction in Figure 3. Because of
the skewness of our data and the difficulty of city-level prediction, our classifier
tends to generate labels towards big cities, which leads to high recall and low
precision for cities like Los Angeles.
Fig. 3. Two scatter graphs that show the performances for each country and cities.
The x-axis is precision, y-axis is recall. Each dot represents a country/city. The dot
size is proportional to the number of tweets that comes from the correponding location.
Some tiny invisible country outside of the scope are not shown in the figure.
For real world applications, people may ask how we could set a threshold to
get prediction results with high confidence. To answer this question, we further
examined the relation between prediction accuracy and the output probability.
Here the output probability is just the probability of our predicted location cal-
culated by equation 2. Figure 4 shows the distribution of tweets in terms of
output probability for two tasks. The grey bar represents the percentage of test-
ing tweets within certain range of output probability. The green bar represents
the percentage of correctly classified tweets. The number on the grey bar is the
accuracy for each output probability range.
As expected, the prediction accuracy increases as the output probability in-
creases. We get 97.2% accuracy for country-level prediction with output proba-
bility larger than 0.9. Surprisingly, the accuracy of city-level is as high as 92.7%
for the 29.6% of the tweets with output probability greater than 0.9. However,
the city-level accuracy for the remaining tweets with output probability less than
0.9 is only 48.4%. Unlike country-level prediction, the number of tweets decreases
as output probability increases, unless the output probability is larger than 0.9.
Fig. 4. Two bar charts that show the distribution of tweets in terms of the output
probability. The x-axis is the output probability associated with each prediction, the
y-axis is the percentage of tweets. The height of grey bar represents the percentage
of test data that has certain prediction output probability. The height of green bar
represents the percentage of correctly predicted tweets in each output probability range.
We listed the accuracy for each probability range above the bar. Take the rightmost
bar in country-level prediction for example, there are 81.8% test tweets' country are
predicted with output probability larger than 0.9. Among these 81.8% tweets, 97.2%
are predicted correctly.
6 Discussion and Conclusion
These experiments demonstrate that our approach is consistently better than
the prior method thus supporting more tweets to be accurately located by coun-
try, and city, of origin. At the country level, the more tweets that come from
the country, the better the prediction. Regardless of the number of tweets per
country, we can predict the country location for most tweets wih extremely high
confidence and accuracy. At the city level the results are more mixed. For a
small fraction of tweets we can get greater than 90% accuracy, but for the rest
of tweets the accuracy is less than 50%. For about half the tweets it is difficult
to infer the city location. This result is partially due to the fact that we base
the prediction on only a single tweet. Future work may consider using collection
of tweets per user. This result is also partially due to the fact that the data is
highly skewed toward a few cities. Future work should develop a training set that
is more evenly distributed across cities. Despite these limitations, this approach
shows promise.
This paper presents a method for geo-locating a single tweet based on the
information in a tweet JSON object. The proposed approach integrates tweet
text and user profile meta-data into a single model. Compared to the previous
stacking method with feature selection, our approach substantially outperforms
the baseline method. We developed the approach for both city and country level
and demonstrated the ability to classify tweets at both levels of granularity.
The results demonstrate that using a convolutional neural network utilizes the
textual location information better than previous approaches and boosts the
location prediction performance substantially.
Acknowledgments. This work was supported in part by the Office of Naval
Research (ONR) N000140811186, and the National Science Foundation(NSF)
00361150115291. The views and conclusions contained in this document are those
of the authors and should not be interpreted as representing the official policies,
either expressed or implied, of the Office of Naval Research or the National
Science Foundation. We want to thank tutors in the Global Communication
Center at Carnegie Mellon for their valuable advice.
References
1. Achrekar, H., Gandhe, A., Lazarus, R., Yu, S.H., Liu, B.: Predicting flu trends using
twitter data. In: Computer Communications Workshops (INFOCOM WKSHPS),
2011 IEEE Conference on. pp. 702–707. IEEE (2011)
2. Berggren, M., Karlgren, J., Ostling, R., Parkvall, M.: Inferring the location of
authors from words in their texts. arXiv preprint arXiv:1612.06671 (2016)
3. Bo, H., Cook, P., Baldwin, T.: Geolocation prediction in social media data by find-
ing location indicative words. In: Proceedings of COLING. pp. 1045–1062 (2012)
4. Carley, K.M., Malik, M., Landwehr, P.M., Pfeffer, J., Kowalchuck, M.: Crowd
sourcing disaster management: the complex nature of twitter usage in padang
indonesia. Safety science 90, 48–61 (2016)
5. Cheng, Z., Caverlee, J., Lee, K.: You are where you tweet: a content-based approach
to geo-locating twitter users. In: Proceedings of the 19th ACM international con-
ference on Information and knowledge management. pp. 759–768. ACM (2010)
6. Culotta, A., Kumar, N.R., Cutler, J.: Predicting the demographics of twitter users
from website traffic data. In: AAAI. pp. 72–78 (2015)
7. Earle, P.S., Bowden, D.C., Guy, M.: Twitter earthquake detection: earthquake
monitoring in a social world. Annals of Geophysics 54(6) (2012)
8. Hale, S., Gaffney, D., Graham, M.: Where in the world are you? geolocation and
language identification in twitter. Proceedings of ICWSM 12, 518–521 (2012)
9. Han, B., Cook, P., Baldwin, T.: A stacking-based approach to twitter user geolo-
cation prediction. In: ACL (Conference System Demonstrations). pp. 7–12 (2013)
10. Han, B., Cook, P., Baldwin, T.: Text-based twitter user geolocation prediction.
Journal of Artificial Intelligence Research 49, 451–500 (2014)
11. Hong, L., Ahmed, A., Gurumurthy, S., Smola, A.J., Tsioutsiouliklis, K.: Discover-
ing geographical topics in the twitter stream. In: Proceedings of the 21st interna-
tional conference on World Wide Web. pp. 769–778. ACM (2012)
12. Jurgens, D.: That's what friends are for: Inferring location in online social media
platforms based on social relationships. ICWSM 13, 273–282 (2013)
13. Kim, Y.: Convolutional neural networks for sentence classification. arXiv preprint
arXiv:1408.5882 (2014)
14. Kingma, D., Ba, J.: Adam: A method for stochastic optimization. arXiv preprint
arXiv:1412.6980 (2014)
15. Landwehr, P.M., Carley, K.M.: Social media in disaster relief. In: Data mining and
knowledge discovery for big data, pp. 225–257. Springer (2014)
16. Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed repre-
sentations of words and phrases and their compositionality. In: Advances in neural
information processing systems. pp. 3111–3119 (2013)
17. Mislove, A., Lehmann, S., Ahn, Y.Y., Onnela, J.P., Rosenquist, J.N.: Understand-
ing the demographics of twitter users. ICWSM 11, 5th (2011)
18. Pennacchiotti, M., Popescu, A.M.: Democrats, republicans and starbucks afficiona-
dos: user classification in twitter. In: Proceedings of the 17th ACM SIGKDD inter-
national conference on Knowledge discovery and data mining. pp. 430–438. ACM
(2011)
19. Qian, Y., Tang, J., Yang, Z., Huang, B., Wei, W., Carley, K.M.: A prob-
abilistic framework for location inference from social media. arXiv preprint
arXiv:1702.07281 (2017)
20. Quercia, D., Kosinski, M., Stillwell, D., Crowcroft, J.: Our twitter profiles, our
selves: Predicting personality with twitter. In: Privacy, Security, Risk and Trust
(PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing
(SocialCom), 2011 IEEE Third International Conference on. pp. 180–185. IEEE
(2011)
21. Quinlan, J.R.: C4. 5: programs for machine learning. Elsevier (2014)
22. Roller, S., Speriosu, M., Rallapalli, S., Wing, B., Baldridge, J.: Supervised text-
based geolocation using language models on an adaptive grid. In: Proceedings of
the 2012 Joint Conference on Empirical Methods in Natural Language Processing
and Computational Natural Language Learning. pp. 1500–1510. Association for
Computational Linguistics (2012)
23. Rumelhart, D.E., Hinton, G.E., Williams, R.J.: Learning representations by back-
propagating errors. Cognitive modeling 5(3), 1 (1988)
24. Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes twitter users: real-time
event detection by social sensors. In: Proceedings of the 19th international confer-
ence on World wide web. pp. 851–860. ACM (2010)
25. Shi, L., Agarwal, N., Agrawal, A., Garg, R., Spoelstra, J.: Predicting us primary
elections with twitter. URL: http://snap. stanford. edu/social2012/papers/shi. pdf
(2012)
26. Tsou, M.H., Yang, J.A., Lusher, D., Han, S., Spitzberg, B., Gawron, J.M., Gupta,
D., An, L.: Mapping social activities and concepts with social media (twitter) and
web search engines (yahoo and bing): a case study in 2012 us presidential election.
Cartography and Geographic Information Science 40(4), 337–348 (2013)
27. Wang, X., Xu, M., Ren, Y., Xu, J., Zhang, H., Zheng, N.: A location inferring
model based on tweets and bilateral follow friends. JCP 9(2), 315–321 (2014)
28. Wing, B.P., Baldridge, J.: Simple supervised document geolocation with geodesic
grids. In: Proceedings of the 49th Annual Meeting of the Association for Compu-
tational Linguistics: Human Language Technologies-Volume 1. pp. 955–964. Asso-
ciation for Computational Linguistics (2011)
29. Wolpert, D.H.: Stacked generalization. Neural networks 5(2), 241–259 (1992)
|
1909.01137 | 1 | 1909 | 2019-08-27T17:38:33 | Valuating User Data in a Human-Centric Data Economy | [
"cs.SI",
"cs.GT"
] | The idea of paying people for their data is increasingly seen as a promising direction for resolving privacy debates, improving the quality of online data, and even offering an alternative to labor-based compensation in a future dominated by automation and self-operating machines. In this paper we demonstrate how a Human-Centric Data Economy would compensate the users of an online streaming service. We borrow the notion of the Shapley value from cooperative game theory to define what a fair compensation for each user should be for movie scores offered to the recommender system of the service. Since determining the Shapley value exactly is computationally inefficient in the general case, we derive faster alternatives using clustering, dimensionality reduction, and partial information. We apply our algorithms to a movie recommendation data set and demonstrate that different users may have a vastly different value for the service. We also analyze the reasons that some movie ratings may be more valuable than others and discuss the consequences for compensating users fairly. | cs.SI | cs | Valuating User Data in a Human-Centric Data Economy
Marius Paraschiv
IMDEA Networks
Legan´es -- Madrid
Nikolaos Laoutaris
IMDEA Networks
Legan´es -- Madrid
[email protected]
[email protected]
9
1
0
2
g
u
A
7
2
]
I
S
.
s
c
[
1
v
7
3
1
1
0
.
9
0
9
1
:
v
i
X
r
a
Abstract -- The idea of paying people for their data is in-
creasingly seen as a promising direction for resolving privacy
debates, improving the quality of online data, and even offering
an alternative to labour-based compensation in a future domi-
nated by automation and self-operating machines. In this paper
we demonstrate how a Human-Centric Data Economy would
compensate the users of an online streaming service. We borrow
the notion of the Shapley value from cooperative game theory
to define what a fair compensation for each user should be for
movie scores offered to the recommender system of the service.
Since determining the Shapley value exactly is computationally
inefficient in the general case, we derive faster alternatives using
clustering, dimensionality reduction, and partial information.
We apply our algorithms to a movie recommendation data set
and demonstrate that different users may have a vastly different
value for the service. We also analyse the reasons that some
movie ratings may be more valuable than others and discuss
the consequences for compensating users fairly.
I. INTRODUCTION
Data, and the economy around it, are said to be driving
the fourth industrial revolution. Interestingly -- the people --
whose data is what moves the new economy, have a rather
passive role in it, as they are left outside the direct value
flow that transforms raw data into huge monetary benefits.
This is a consequence of the de facto understanding (or one
may say misunderstanding) between people and companies,
that
the former get unpaid access to online services in
exchange for unpaid access to their personal data. This is
increasingly being challenged by various voices who call
for the establishment of a new, renegotiated, relationship
between users and services. Indeed, a variety of pathologies
can be traced back to the way the data economy has been
working so far. Some are direct and obvious, such as privacy
risks for individuals, and market failures and dangers for the
economy from the rise of data monopolies and oligopolies.
Others are less obvious, and further reaching into the future,
such as mass unemployment due to data-driven automation.
It was estimated recently [1] that, if automation due to
artificial intelligence reaches maturity and fair remuneration
algorithms are set in place, a family of four could earn up to
$20,000 per year from their data. The idea of micropayments,
or providing small contributions to users in exchange for
their presence on a platform or for accessing a service,
is of course much older. In the pre-World Wide Web era,
France developed a videotex online service called Minitel,
that included micropayments as part of its design, but Jaron
Lannier brought it to public attention in 2013, in his book
"Who owns the future?"[2]. In it, he argues that we have
only underwent half of the Data Revolution, the part that
compensates users with implicit benefits, but not the part
that also compensates them with explicit monetary benefits.
There have been a series of proposed approaches for how
this compensation might materialise. The simplest, at least
in theory, would be to assign a context-free value to data, a
kind of dollar-per-bit measure. This has been proven to be
very hard [3], [4], [5], [12]. Indeed, since the value of data
is strongly connected to its intended use, it becomes very
difficult to argue about how to assign an a priori average
value. For traditional currencies, we are able to have a
context-free appreciation of their value for the simple reason
that we have been using these currencies long enough to
be able to do so. Although we clearly understand nowadays
that one's browsing and mobility patterns, social network, or
past purchases all have value, we are far from being able
to appreciate how much this value is in terms of dollars
or euros. The latter is further complicated by our inability
to tell in advance, by how many parties, and how many
times, a piece of data may be utilized. As an analogy, selling
an individual's data, or rather renting it temporarily, is as
difficult and risky as renting an infinitely fast vehicle, with no
gas and maintenance costs, and without any prior restrictions
with regard to mileage or the person driving it.
In a Human-Centric Data Economy, when a transaction,
or set of transactions,
is converted, a proportion of the
obtained revenue will be returned to the users. Defining the
right amount to be returned to the users is difficult, as it
depends on many market characteristics of a multilateral
value chain, such as competition and user loyalty [6]. In
this paper, we assume that the total amount of revenue to
be redistributed to users is given, e.g., 5% or 10%, or any
other number produced by the competition between services
A second proposed method has been to compensate users
for their privacy damage [13], [14]. Processing massive
amounts of data can lead to privacy infringements, such as
the leakage of habitual user behavior, their location or other
personal identifiable information (PII). Users are thus seen
as victims who must be compensated for their damage.
Our approach is different, we consider users as active
partners in the data value chain. Such a chain requires a
business model, smart predictive algorithms for extracting
useful information from raw data and online marketing for
attracting and retaining users, among many others. The
fundamental component of the value chain, however, is the
user, and it is ultimately a matter of common sense that they
should be rewarded in a fair manner, which may or may not
exceed the perceived privacy-related damages.
within a given sector. We thus turn our attention to the next
important question, namely: given a fixed total amount to be
distributed, how should this distribution be performed? How
should different users be compensated based on the value of
the data that they contribute to a specific service?
One obvious answer would be to split the sum by the
number of users on the platform. This may not be fair
however, because it
is unreasonable to assume that all
users contribute equally to the service. In the case of a
recommendation system, for example, some users may rate
and view hundreds of items, while others may have a
much sparser activity. Another example would be a traffic
application. Users who travel regularly through a given area
and constantly provide feed-back, may be more relevant to
the platform than occasional passers-by. Even at an equal
level of intensity, some movie scores, or location data may be
more important for a recommender than others. For example
a score for a blockbuster movie that
just aired may be
more important than a score for a well known (and voted)
blockbuster movie. Similarly, speed information for a known-
to-be-congested route is less useful to a navigation app than
speed data for an unknown alternative route with less traffic.
Another important point to understand is that the Data
Economy is not a zero-sum game. Paying users for data need
not be seen as a measure that will reduce the revenue or
profitability of online services. More and better data can lead
to better services and thus more revenue and profit. It is thus
not surprising that the vision of paying directly or through
taxes for data has received positive comments from industry
leaders such as Bill Gates [7], Elon Musk [8] and Mark
Zuckerberg [9]. Also, despite not happening today, there is a
realistic path that can lead to wide adoption. It only requires
that a small number of visionary companies start offering
micro-payments to get a competitive advantage in terms of
user retention, for others to follow, and the practice to get
traction in the online services market.
Our paper brings a threefold technical contribution towards
the realisation of a Human-Centric Data Economy:
• We define data payoff fairness in terms of accepted
economic notions. Specifically, we use the Shapley
value from collaborative game theory to define how
to split a total payback among all the users that have
provided data to a revenue-generating online service.
We also sketch a Contribution-Reward framework for
implementing such paybacks in practice.
• We develop two algorithms that can provide efficient
estimates of the Shapley value, which in its raw form
does not scale for large data sets. The first one applies
minibatch k-Means with N d-dimensional points, for
k clusters and t iterations directly on the definition
of Shapley to reduce the complexity from O(N !) to
O(N kdt + k!), where k, d, t (cid:28) N. The second is a
O(N 2) heuristic of local information that does not use
the Shapley definition.
• We apply the above algorithms to a movie scoring data
set and study how different users may be in terms of
their value for their service. We observe that some users
Fig. 1. The Contribution-Reward framework. In establishing the proportion
of each user's contribution, one first determines important features or
relevant measures that result in revenue. One such measure could be the
number of useful recommendations obtained from a recommender system.
After a measure or relevant feature has been identified, user contributions to
it are computed and users are ordered in a hierarchy. Based on their place
in the value hierarchy, they are remunerated.
may be as much as ×4 more valuable than others.
• Finally, we study how scoring behaviour impacts on
user value. We find that what differentiates a "good"
user from a "bad" one is that
the good user tends
to vote mainly for the most popular movies and is
consistent with the movie popularity hierarchy, namely
popular movies get high ratings and unpopular ones,
low ratings. By contrast, users at the other end of the
value distribution tend to vote and provide high scores
to unpopular movies as well.
While human centricity and fairness need to reside at the
core of the proposed framework, transparency must also be
considered. Users need a method of verifying for themselves
the amount of payment received and be able to connect their
behaviour on an online platform to the obtained revenue, in
a clearly interpretable manner. We discuss how to do this via
an accounting meta-data layer at the end of the article.
II. BACKGROUND
In the Background section, we introduce the Contribution-
Reward framework and describe the setting for our two algo-
rithms -- a recommender system generating recommendations
for the users of an online movie streaming service. We also
introduce the Shapley value, as the backbone of the first
proposed algorithm and also an accepted point of reference
in terms of fair credit distribution. The section ends with
a toy example that shows how the exact Shapley value is
computed in a simple two-user setting.
A. The Contribution-Reward Framework
The proposed Contribution-Reward framework, depicted
in Fig. 1, aims to provide users with a remuneration scheme
that is both fair and sustainable. With usage, the service
2
UsersDatasetFeature Importance andUser ContributionShapleyEstimatorScore to monetary valueconversion.Proportional user remunerationShapley scoresIndividual user contributionsto significant featuresData SampleUser-generated datagathers and stores relevant data. Based on the data type, a
number of important features are chosen and the contribution
of each user to the said features is estimated. Finally, the
user receives a repayment from the platform, proportional to
their estimated contribution. The difficulty of finding the said
estimation resides in the need to first observe which are the
relevant features that make a data set valuable. In the case
of recommendation data, for example, it could be that users
voting for the most popular movies, thus contributing to an
already existing hierarchy, are considered more valuable, or
on the contrary, users reviewing items which are initially
unpopular could bring an element of novelty, and thus a
higher overall value. On the other hand, if the accuracy and
update rate of the data set are essential, for example in traffic
applications, users with a higher contribution frequency may
be considered of higher value.
It thus becomes clear that user value depends on the struc-
ture of the data and its intended use. Due to this subjective
nature, deriving a generally-applicable valuation framework
is not a straightforward task. The question we raise here
is two-fold: first, how can one determine a hierarchy of
value for a given set of users and a particular use case
(recommender systems) and second, how can one quantify
the position of each user in the value hierarchy? An answer
to the second question is of particular importance, since if
one can assign scores to users, based on their contributions,
one can then define a mapping from these scores to an actual
financial amount.
For the rest of this paper, the setting is thus fixed: a
recommender system is trained on a training set, consisting
of movie reviews, and then makes predictions on a separate
test set. If the recommendations made to a user, on the test
set, have an error below a fixed threshold, we consider that
there is a high likelihood that the user will want to watch
the recommended item. We refer to these recommendations
as "clicks". As such, when we say: "user A has generated
5 clicks", this is to be interpreted as "the recommender has
made 5 recommendations to user A, all with an error below
our set threshold". Clicks here play the role of the important
feature in the Contribution-Reward framework.
The most naıve approach would be to train the recom-
mender system by removing one user at a time, and counting
the difference in the overall number of clicks obtained on the
test set. There are a series of disadvantages to this: first, a
data set may contain reviews from hundreds of thousands of
users, quickly making the leave-one-out training computa-
tionally unfeasible. The second drawback resides in the fact
that removing only a single user may not have the expected
result on the recommender. Indeed, if the user provides a
significant amount of novelty, it may happen that the system
produces more clicks in the absence of the user than in their
presence, leading to a negative assigned value. This would
further be difficult to map to a monetary contribution. In
the following sections, we present two alternative methods
which avoid these shortcomings and can be implemented in
a computationally-scalable way.
After a theoretical discussion of the proposed algorithms,
they are applied to a case study based on a subset of the
MovieLens data set [15], depicting how groups of users
can contribute differently to the overall performance of the
recommender system, and thus hold different values with
respect to the service.
B. Introducing the Shapley Value
Credit assignment in cooperative games has long been a
central problem of cooperative game theory. To this end,
Shapley [16], [17] proposed that players should be rewarded
in a manner proportional to their average marginal contribu-
tion to the payoff of any coalition they could join.
Let N be a set of N players and S ⊂ N be a coalition
with cost v(S). The Shapley value is a uniquely determined
vector of the form (φ1(v), ..., φn(v)), where the element
representing player i is given by
φi(v) =
1
N !
[v(S(π, i)) − v(S(π, i) \ i)],
(1)
(cid:88)
π∈SN
where π is a permutation representing the arrival order of
set N , while S(π, i) represents the set of players that have
arrived into the system before player i.
The Shapley value satisfies a series of important proper-
ties:
the total gain is completely distributed
• Efficiency:
among the players(cid:88)
i∈N
φi(v) = v(N )
(2)
• Symmetry: if i and j are two players who bring equal
contributions, in the sense that, for every subset S that
contains neither i nor j, v(S ∪ {i}) = v(S ∪ {j}), then
their respective Shapley values are also equal, φi(v) =
φj(v).
• Linearity: if two coalition games, denoted v and w are
combined, the resulting gain is the sum of the gains
derived from each game separately
φi(v + w) = φi(v) + φi(w)
(3)
and also φi(α · v) = α · φi(v), for any real α.
• Null player: the Shapley value of a null player is
zero. A player is considered null if they do not bring a
contribution to any possible coalition.
Unfortunately, the Shapley value has also been proven to
be NP-hard for many domains [18], [19], [20]. Since it takes
into account all possible coalitions, for each user, the number
of terms scales with N !, where N represents the number of
users, such that it quickly becomes computationally unfeasi-
ble.
In Ref. [21] the authors use Monte Carlo to approximate
the Shapley value for computing the cost contribution of
individual households to the peak hour traffic and costs
of an Internet Service Provider (ISP). In that case,
the
relatively simpler structure of the problem made Monte Carlo
an appropriate technique for approximating Shapley. Other
recent works have presented approximation algorithms for
3
Shapley for specific problems of lower complexity than
recommendation [10], [11]. In the context of the current
proposal, the inherent higher complexity of the considered
value functions v() that may represent the workings of com-
plex ML algorithms for things like recommendation, makes
using Monte Carlo inaccurate according to our preliminary
tests. Instead, we intend to use clustering to reduce the input
size of the problem. Our approach will be to first group
users in a number of clusters according to the similarity of
their movie ratings (or trajectories in the case of mobility
related applications), and then compute the Shapley value
of each cluster instead of each user. By controlling the
number of clusters we can make the computation as precise
and complex as our computing resources allow. In Section
III we will apply this method in the case of a movie
recommendation data set, containing an amount of users for
which the exact computation of Eq. 1 is not possible.
C. A Toy Example
The purpose of this section is to provide a very simple
example of computing the Shapley value for the case of
two users. Consider an artificial data set, containing movie
recommendations from two different users. The predictions
made by the recommender are the net contribution in our
case. We start from the marginal contributions V ({1}) = 12
and V ({2}) = 15, which would mean that the presence
of user 1 alone in the data set, causes the recommender to
produce 12 useful movie recommendations, and the presence
of user 2 alone results in 15 useful recommendations. Let
us further assume that the presence of both users, simultane-
ously, increases the number of recommendations to 28, hence
V ({1, 2}) = 28. Since it is clear that the two contributions
are not equal, the following question arises: how can we find
a factor, proportional to the user contributions, that would be
useful in determining a fair repayment ?
For this, we compute the Shapley value, as defined in
Eq. 1. We first note that
there are two possible orders
of arrival of the users, with equally likely probabilities of
occurrence: [1, 2] or [2, 1]. In the first situation, user 1 comes
first, bringing a contribution of V ({1}) = 12, followed
by user 2, who increases the overall useful contribution to
V ({1, 2}) = 28, thus, the net contributions of the two users,
for this particular order of arrival are
φ[1,2](1) = V ({1}) = 12,
φ[1,2](2) = V ({1, 2}) − V ({1}) = 28 − 12 = 16.
In the second case, the order of arrival is reversed, namely
[2, 1]. User 2 arrives first, bringing a contribution V ({2}) =
15, followed by user 1 who increases the net contribution to
V ({1, 2}) = 28, thus
φ[2,1](1) = V ({1, 2}) − V ({2}) = 28 − 15 = 13,
φ[2,1](2) = V ({2}) = 15.
Since the two cases are equally probable, the Shapley
value is the sum of the two marginal contributions multiplied
by the probability of the order of arrival (or of the factorial
of the number of users)
φ(1) =
φ(2) =
1
2!
1
2!
· (φ[1,2](1) + φ[2,1](1)) = 12.5,
· (φ[1,2](2) + φ[2,1](2)) = 15.5.
We thus see that the average marginal contribution of user
2 is higher than the one of user 1, and based on this factor,
we can devise a scheme of fair remuneration, to be presented
as part of the Contribution-Reward framework.
It is also worth noting that, in order to compute the Shap-
ley terms, we need to compute N ! marginal contributions,
which leads to scaling problems if an exact computation
of the Shapley value is required. The methods presented in
this paper provide ways of overcoming this obstacle through
various approximate approaches.
III. USER VALUE ESTIMATION
In this section we first present and then apply the two
proposed algorithms. We then discuss the results obtained on
a subset of the MovieLens data set. At the end of this section
and in the next, we will interpret user behaviour and try
to understand what is the relationship between votes given,
number of votes, types of movies reviewed and the assigned
user value.
A. Approximate Shapley Value Estimation (ASVE)
The first user contribution estimation method is based
on the Shapley value, described in the previous sections.
The algorithm is constructed around a recommender system
framework and we choose our value of interest to be the
number of "clicks" or useful recommendations that the model
provides, for a given data set. The pseudocode for this
algorithm is provided as Algorithm 1.
The input data consists of user identifiers, product iden-
tifiers (movie categorical IDs) and votes. From Eq. 1 we
observe that computing the Shapley value of each user in
the data set directly is unfeasible, as the computational
complexity is of order N ! where N (the number of users
in the data set) is typically extremely large (in the order
of hundreds of thousands or even millions for services like
YouTube and NetFlix). Clearly such an approach does not
scale.
There are two plausible directions one can pursue in order
to avoid the complexity barrier. The first is to attempt to
estimate the Shapley value using Monte Carlo sampling, as
done in Ref. [21]. The second, which we shall employ here,
takes advantage of the similarities between user behavioural
patterns. In general, when treating data related to user
preference, consumers tend to cluster into a limited number
of similar groups.
For example there may be individuals with a stronger
preference for action movies as opposed to romantic ones.
Exploiting such relationships allows us to greatly simplify
the estimate of a user's contribution to the overall data set.
4
# Cluster the users based on behaviour.
clusteredData, clusterLabels ← Cluster(inputData)
clusterCoalitions ← Compute(clusterLabels)
# Compute the total number of clicks.
K ← TrainPredict(inputDataset)
# Compute marginal contribution of every possible coalition.
# trainData and predData contain only clusters from coalition.
for S in clusterCoalitions do
Algorithm 1 Approximate Shapley Value Estimation
1: procedure ASVE
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
Vi ← V (π) − V (π − {i})
margContrib[i] += Vi
len(clusterLabels)! ∗ sum(margContrib[i])
# Create all possible permutations of complete cluster coalitions.
# and compute the marginal contribution of each cluster.
perm ← Permute(clusterLabels)
for π in perm do
VS ← TrainPredict(trainData, predData)
for i in clusterLabels do
for i in clusterLabels do
φi =
1
1+EuclideanDist(user, centroid(k)) )
k
φk
20:
21:
22:
23:
24:
25:
26:
# Compute the value of every user.
for userId in clusteredData do
φ1(userId) = ((cid:80)
userValSum += φ1(userId)
# Normalize user values to respect efficiency condition.
for userId in clusteredData do
φ1(userId) = φ1(userId) ·
K
userValSum
neighbors ← FindNeighbors(inputDataset, userId)
for id in neighbors do
Rec = 0
# Train model once to obtain the total number of clicks.
K ← TrainPredict(inputDataset)
# For all neighbors in a neighbourhood, compute the user's
# predictive potential
for userId in inputDataset do
Algorithm 2 Neighbourhood Similarity Value Estimation
1: procedure NSVE
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
# Scale the predictive potential by the total
# number of clicks divided by the sum of the predictive
# potentials, to respect the efficiency condition.
for userRec in RecList do
φ3(userId) ← K*userRec
j userRecj
newItems ← IntersectLeft(userId, id)
Rec+ = 1
RecList.append(Rec)
Rec ← 0
(cid:80)
The algorithm starts by clustering the input data, prior to
which, a dimensionality reduction method (such as PCA)
is applied. The next step is the calculation of all possible
coalitions of clusters. For example, for three clusters, these
are
{1},{2},{3},{1, 2},{1, 3},{2, 3},{1, 2, 3},
where {1} represents a data set where only the users corre-
sponding to the first clusters are present. The recommender
system is then trained on the filtered data sets, corresponding
only to the clusters in the above coalitions. A train-test
split is performed prior to this, but omitted in line 8 of
the pseudocode for clarity. During the prediction phase, the
model makes recommendations to users and also provides
an error estimate for each recommendation. We assert that,
for errors under a certain threshold, the recommendations
can be valuable, and we refer to these recommendations as
"clicks" for the rest of this paper, in analogy to advertising
recommendations where, if the user is interested in an advert,
they will click the banner.
After obtaining the number of clicks for every one of
the possible subsets of clusters, one must compute the
marginal contribution of the cluster. This takes into account
every possible complete coalition, where the order of arrival
matters. For example, in our three user case, all possible
complete coalitions are: {1, 2, 3},{2, 1, 3} and {3, 2, 1}. The
relevant code is between lines 11 - 19.
Finally, when the Shapley value (computed in line 19)
for each cluster is known, we can proceed to determine the
value of each individual user. For this, the centroid of the
cluster is labeled with the corresponding Shapley value of the
cluster. Thus, the value of each user is equal to the sum of all
individual cluster values divided by the Euclidean distance
between the point, representing the user, and the respective
cluster centroid, with one added for stability. The assigned
values, from both proposed algorithms, are then scaled with
the total number of clicks produced by the recommender, on
the complete data set, to ensure that the efficiency condition
is met. In this manner, to every point on a projected two-
dimensional surface, representing the space of all users, we
can assign an approximate Shapley value.
We have applied the ASVE algorithm to a subset of the
MovieLens data set, containing 92,394 total ratings on 4,180
movies from 610 users, with the intent on understanding if
the value hierarchy provided by the method can be intuitively
understood. First, the users were separated into three classes,
the best users (representing the ones with the highest scores
given by the ASVE method), average users and bad users.
We considered whether or not there is a relationship between
movie popularity (based on the overall number of ratings a
movie has received) and the vote distribution of the three
classes of users.
In Fig. 2, the user vote distributions are presented, for the
three classes of users. The movies are grouped into equal-
sized ordered buckets, with their popularity decreasing in
the positive direction of the horizontal axis. We observe that
5
Fig. 2. User vote distributions based on movie popularity for the ASVE method. Votes from the most valuable users are shown in red, those from average
users in blue and votes from the least valuable users are shown in green. For clarity, the movies have been grouped into ordered buckets, with popularity
decreasing in the positive direction of the horizontal axis.
Fig. 3. User vote distributions based on movie popularity for the NSVE method. Votes from the most valuable users are shown in red, those from average
users in blue and votes from the least valuable users are shown in green. For clarity, the movies have been grouped into ordered buckets, with popularity
decreasing in the positive direction of the horizontal axis.
users which the ASVE method considers as being the most
valuable, tend to vote mostly on popular movies, whereas
users considered to have low value, have a more widespread
distribution of votes. This reinforces our initial assumption
that the ASVE method gives high scores to users who agree
with a predetermined hierarchy, not necessarily to users with
a novel contribution.
One remark that must be made is that, by design, the
application of ASVE requires one prior check. When re-
moving a cluster of users, it is entirely possible that one or
more clusters provide a negative contribution. It is therefore
essential that one checks the values assigned to the clusters
for non-negativity, prior to applying the method to individual
users.
B. Neighbourhood Similarity Value Estimation (NSVE)
The second approach relies on first reducing the dimen-
sionality of the data set (similar to ASVE) and creating a
neighbourhood around each user. Based on the predictive
capability of the user on its neighbours, one can approximate
the user's importance.
The algorithm works as follows: first, the recommender
system is trained on the complete data set and a total number
of clicks (similar to the previous method) is obtained (line
4). For each user in the data set, we then construct a neigh-
bourhood and observe the number of items that the central
user has rated, and the neighbours have not. These elements
act as an estimator of the user's "predictive potential". For
example, if user A has seen and rated movies M1, M2 and
M5 and user B, which is in user A's neighbourhood, has only
seen movie M1 (out of the list that user A has rated overall),
then A could potentially recommend movies M2 and M5 to
B, so we say that "A has a predictive potential of 2 (movies)
over B). This predictive potential is then used, in line 18, to
proportionately assign clicks (from the total number K) to
each user, based on their respective predictive potentials.
One must keep in mind that the size of the neighbourhood
is a hyperparameter that must be determined through trial
and error. Furthermore, there may be other distance metrics,
other than the Euclidean distance, chosen here, that could
potentially offer a better estimate, however, for simplicity,
we restrict ourselves to Euclidean distances in the present
paper.
In order to compare the two methods, a proper scaling
must be found for the two corresponding distributions. The
unscaled distributions, shown in Fig. 4 are correlated, with
a correlation distance of 0.29 (0 representing a perfect
correlation) for the MovieLens data set. We were thus able
to learn an approximate mapping, that would project the
second distribution to the domain of the first, making a direct
comparison possible, as depicted in Fig. 5.
Due to the nature of this mapping being approximate,
one sees artefacts, such as the unusually tall peaks of
6
01234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556Popularity-sorted Movie Buckets0200040006000800010000Votes01234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556Popularity-sorted Movie Buckets0200040006000800010000Votesusers (according to both methods) seem to offer high scores
to a wide array of movies, going against the established
popularity hierarchy. This further serves to confirm that users
reinforcing an existing order are rated higher.
One point to notice is that, in the case of the NSVE, by
design a user cannot have a negative assigned value, thus
no prior checks are required, as in the case of ASVE. A
potential problem here is the reliance of the method on
the neighbourhood radius hyperparameter, which strongly
depends on the data set. Furthermore, users outside a given
neighbourhood have zero contribution to the final rating of
the neighbourhood source. This is in stark contrast to the
smooth value assignment of ASVE, and does give rise to a
series of artefacts, one of which being that there are always
(or at least in all practical situations) users with an assigned
zero value, which raises the difficulty of mapping this to an
actual financial amount.
A second artefact can be observed once we ask the
question: how many clicks do movies generate (over all users
in a fixed test set) based on their popularity? As can be seen
in Fig. 7, the Neighbourhood-based method is very sensitive
to the relative distance between users. As movies become
less popular and users who vote for them get spread over
larger distances, the amount of clicks generated (which in
the case of NSVE represent movies that the central user
can recommend to its immediate neighbours) quickly falls to
zero. Thus, NSVE strongly favors users who vote for popular
movies, where users who favor them cluster together.
From a computational standpoint, the NSVE algorithm
only requires one training of the recommender, in order
to obtain the total number of clicks. The neighbourhood
comparison operations are linear. Another advantage of this
method is that, if applied to a production environment, the
model would continuously train as new user data becomes
available, and only be required to perform occasional infer-
ence, to update the total number of clicks.
Another potential impediment to both methods is their
sensitivity to badly-labelled data. If, for example, in our
movie data set, the tags describing the movie genre are
not consistent or worse, misleading,
the
distances between users and result in both methods providing
inaccurate value estimates. Therefore, data cleaning and a
careful analysis of the data set are important, before the
algorithms are employed.
this will affect
IV. DISCUSSION
In the previous section, we have presented two credit-
assignment methods that could become part of an online
service, and transform users into active participants in the
information value flow, from its raw form to the final gen-
erated revenue. As the main producers of raw data, fairness
requires that users share part of the resulting revenue, in a
manner proportional to the significance of their data.
We have proposed two different methods that are in
agreement on a few key points. The first method is based on
the commonly-used Shapley value, which is approximated
by being computed at cluster level. The users are then
Fig. 4. The ASVE distribution, shown in blue, and the unscaled NSVE
distribution, shown in orange. It is important to note that, even though the
variance of the two distributions is different, the user value hierarchy is
maintained to a large degree.
Fig. 5.
The ASVE distribution, in blue, and scaled NSVE distribution,
in orange, showing artefacts due to the approximate mapping between the
two.
the projected NSVE distribution, compared to its ASVE
counterpart. While this is an issue that needs to be considered
when comparing method predictions, the mapping process
would not be necessary in a real-world implementation, as
it's sole purpose is to aid the comparison, and would be
irrelevant for the purpose of credit assignment.
Having the two distributions on the same scale, we con-
tinued our investigation by asking whether or not the second
method produces the same distribution of user votes, based
on movie popularity. As seen in Fig 3, both methods agree
on the fact that users considered valuable tend to vote for
popular movies.
It is instructive, at this point, to also see how users voted,
based on movie popularity, that is, is it the case that more
popular movies got higher ratings than less popular ones?
Also, how do the three classes of users rate movies of various
levels of popularity?
In Fig. 6, we present the vote distribution by user cate-
gory. Rather surprisingly, there is somewhat little difference
between users considered very valuable and those considered
average, as both classes seem to give high scores to very pop-
ular movies and low scores to unpopular ones. Less valuable
7
020406080100User Value020406080100Number of Users0102030405060User Value020406080100120140Number of UsersFig. 6. Movie ratings given by the three user classes, sorted by movie popularity. The average ratings from the best users (over both methods) are depicted
in blue, those from users with an intermediate value, in orange and those from the least valuable users, in green.
Fig. 7. Movie votes and number of clicks generated by the corresponding bucket, according to the two credit-assignment methods. The overall number
of votes is shown in blue, the number of clicks that movies in the corresponding bucket generate are shown in orange, for ASVE and green for NSVE.
scored based on their relative distance from the cluster
centers. The second method exploits user similarity, creating
a neighbourhood around each user, where users with similar
preferences may be found. It is thus assumed that the items
the central user can recommend are close to the interests of
his neighbours, such that they become potential clicks. This
is a very crude, but also very effective method for performing
distance-based recommendations.
We have seen that the two algorithms provide consistent
predictions on key aspects such as the distribution of user
votes based on their attributed value, the score given by users
based on the same attributed value and the number of clicks
movies produce, based on their popularity. These come to
confirm our initial hypothesis, based on intuition, that users
receiving high scores vote in line with the item's popularity
level. There are, however, points where the two methods do
not agree. The NSVE is more sensitive to distances between
users in the projected plane. In areas where the users are
sparsely distributed, NSVE tends to assign zero values to
them. This is not
the case for the ASVE algorithm, as
belonging to a cluster ensures a non-zero contribution to the
final outcome.
Also as a result of the sharp cut-off at the neighborhood's
boundary, the scores assigned to users by the Shapley-based
method change in a much smoother and more continuous
manner from one region to another. This reflects itself in a
much narrower distribution (as seen in Fig. 4). In contrast, the
user score distribution of the NSVE method has a very high
variance, assigning very small scores to users who are far
apart and very high scores to the ones in densely-populated
regions.
One issue not yet discussed is how should new users
be treated, with respect
to their overall value. As their
contribution is minimal, a valid argument would be to start by
assigning them relatively small scores (hence small propor-
tional payments). This is indeed the case for both methods.
Considering ASVE, a new user would likely be far from
the center of any cluster, and, as the proportional payment
decreases linearly with the distance from the cluster center,
would get a small reward. For NSVE the situation is rather
similar, a new user would either be in a sparsely-populated
area of the projected space or in a densely-populated area
but having very few possible recommendations for their
neighbours. In either case, they would receive a small score.
Finally, what should be the impact of low votes? This
question is of particular importance if either of the two
proposed algorithms is to be implemented in a realistic
setting. Observing Fig. 6, we see that valuable users give
high votes to popular films and low votes for unpopular
ones. If this rule were to hold for a vast array of data sets,
users could attempt to game the system, by voting based on
popularity and hence obtaining a high reward. This is also a
problem that stems from the objective of the two methods,
namely maximizing the number of clicks for each item and
not necessarily considering the element of novelty brought
into the system by each individual.
8
0123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657Popularity-sorted Movie Buckets0.00.51.01.52.02.53.03.54.0Average Rating0123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657Popularity-sorted Movie Buckets0200040006000800010000Votes / ClicksV. CONCLUSION
The current business model for online services is reaching
the limits of sustainability. The exchange of free services for
free data raises concerns both in terms of safety, with users
allowing highly sensitive private information to be used as a
currency, and also in terms of fairness, as an ever increasing
number of voices call for an evaluation of the real worth of
an individual's online impact.
In the present paper, we have proposed a framework to
determine the value of every user for an online service,
based on their contribution to a quantity or metric of interest.
The proposed framework must be fair, such that users are
rewarded proportionally to their contribution and transparent,
the payments need to be interpretable and linked to user
behaviour on the platform.
By restricting ourselves to the specific case of a rec-
ommender system, we aim to gain an understanding of
what type of behaviour increases the overall worth of an
individual to the service. Once the profile of valuable users
has been studied on a series of particular cases, our goal is to
generalize and establish value in a broader sense. A second
direction of future research is the creation of a transparent
accounting meta-data layer that users can access to make
sure that they have been fairly compensated, and do that in
a manner that does not harm their privacy by leaking data.
As our goal is to ultimately expand our analysis to a broad
spectrum of domains,
the proposed Contribution-Reward
framework aims to be as wide-reaching as possible. There are
no mentions regarding the types of data or its use cases. The
framework simply states that, once a set of important features
or relevant metrics can be identified, based on data type and
use case, a value hierarchy for users can be established. The
selection of the metrics or features is done in terms of their
impact on the overall revenue produced by the service, and
this selection may not be a trivial procedure. Once this has
been achieved, however, the second step of the framework is
the ranking of users, and this can be done with algorithms
similar to the ones proposed in our case study. The obstacles
reside not only in determining the value of an individual, but
also in ensuring the safety of their data and fairness of their
remuneration. Once every user has been assigned a score, the
final step of the framework consists in mapping the scores
to actual financial quantities. This is certainly not a static
map, as it may depend on a series of continuously-varying
parameters, such as revenue produced, amount of revenue
to be distributed among users and possibly even exchange
rates between different currencies. In this paper we cover
the second problem, which is concerned with ranking.
Following this line of reasoning, we have presented two
algorithms for assigning proportional value to users, for a
specific task. We then saw that these algorithms do agree
on a number of points, despite the fact that both rely on
approximations. We also introduced the exact method for
determining proportional contributions, the Shapley value,
which in its raw form does not scale to large coalitions,
but can serve as a reference or the basis for approximate
9
methods.
The predictions of the two algorithms are in line with
common-sense assessments of the value of a particular user,
for example with respect to their votes for the most popular,
and hence revenue-producing movies. While this does offer
further validation of the two methods, their limitations have
also been highlighted, and these stem from the fact that
both are, to different degrees, estimates of an exact but
uncomputable estimate.
in its infancy,
As this field, which may aptly be named Data Economics
is still
the number of research directions
is rather considerable. One such path would be to treat
other particular cases, such as traffic data and the case of
a traffic application, and understand the reasons behind the
difference in value for various types of users. One can then
hope that, having understood a number of such cases, they
will provide some intuition into possible generalizations. A
different research direction would be to address the other
two components of the reward framework, namely feature
or metric identification and score-to-currency mapping.
An important aspect of our future work is designing and
implementing a layer of transparency in the Contribution-
Reward framework, with the explicit aim of allowing users to
verify the manner in which their repayments are distributed
and connected to their behaviour. Transparency is a funda-
mental characteristic, as it will both increase user confidence
in regard to participating on a platform which implements the
proposed framework; and growing confidence will, in turn,
boost user presence and, hence, generated revenue.
The purpose of the present paper has been to first pose a
series of essential questions in Data Economics, especially
related to fair credit assignment, and to show that, for a
particular use case, a transparent algorithmic solution can
be found, based on a commonly-accepted economic method,
the Shapley value. It is our hope that, as our data economy
reaches maturity, the remaining open problems in the field
will soon be addressed.
REFERENCES
[1] Posner E. A. and Weyl E. G., Radical Markets Uprooting Capitalism
and Democracy for a Just Society. Princeton University Press, 2018,
ISBN 9780691177502.
[2] Lanier J., Who owns the future?. Simon & Schuster, 2013, ISBN
9781451654967.
[3] Moody D. L. and Walsh P., Measuring the value of information-an
asset valuation approach. ECIS, (496 -- 512), 1999.
[4] King K., A case study in the valuation of a database. Journal of
Database Marketing & Customer Strategy, 14, 2, (110 -- 119), 2007.
https://doi.org/10.1057/palgrave.dbm.3250041
[5] Alstyne, M. W., A Proposal for Valuing Information and Instrumental
Goods. Proceedings of the 20th International Conference on Informa-
tion Systems, 20, (328 -- 345), 1999.
[6] Gyarmati L., Laoutaris N., Sdrolias K., Rodriguez P. and Courcou-
betis C., From advertising profits to bandwidth prices-A quantitative
methodology for negotiating premium peering. NetEcon'14, 2014.
"arXiv:1404.4208v4
[7] Delaney K. J., The robot that takes your job should pay taxes, says
Bill Gates. 2017. Retrieved from: https://qz.com/911968/bill-gates-the-
robot-that-takes-your-job-should-pay-taxes/
[8] Thomas L., Universal basic income debate sharpens as observers
from:
grasp
https://www.cnbc.com/2017/03/25/universal-basic-income-debate-
sharpens.html
2017. Retrieved
inequality.
solutions
for
to
[9] Gillespie
P.,
Mark
income. What
basic
https://money.cnn.com/2017/05/26/news/economy/mark-zuckerberg-
universal-basic-income/index.html
Retrieved
2017.
it?.
is
Zuckerberg
supports
universal
from:
and Context. ACM Transactions on Interactive Intelligent Systems, 5,
4, Article No. 19, 2016.
[16] Shapley L. S., A Value for n-Person Games. Annals of Mathematics
Study, 28, (307 -- 317), 1953.
[10] Cabello S. and Chan T. M., Computing Shapley values in the plane.
[17] Winter E., The Shapley Value. Published in The Handbook of Ga-
meTheory, North-Holland, 2002, ISBN 9780444894281.
[18] Papadimitriou C. H., Computatational Complexity, Addison-Wesley,
1994, ISBN 9780201530827.
[19] Deng X. and Papadimitriou C. H., On the Complexity of Cooperative
Solution Concepts. Mathematics of Operations Research, 19, 2, (257
-- 266), 1994.
[20] Bachrach Y., Elkind E., Meir R., Pasechnik D., Zuckerman M. Rothe
J. and Rosenschein J. S., The Cost of Stability in Coalitional Games.
Proceedings of SAGT, (112 -- 134), 2009.
[21] Stanojevic R., Laoutaris N. and Rodriguez P., On Economic Heavy
Hitters: Shapley value analysis of 95th-percentile pricing. IMC'10
Melbourne, Australia, November 1-3, 2010.
2018. arXiv:1804.03894
[11] Zhao K., Mahboobi S. H. and Bagheri S. R., Shapley Value
Methods for Attribution Modeling in Online Advertising. 2018.
arXiv:1804.05327
[12] Blackwell D., Equivalent Comparisons of Experiments. Annals of
Mathematical Statistics, 24, (265 -- 272), 1953.
[13] Carrascal J. P., Riederer C., Erramilli V., Cherubini M. and Oliveira
R., Your browsing behavior for a big mac: economics of personal
information online. Proceedings of the 22nd international conference
on World Wide Web, (189 -- 200), 2013.
[14] Acquisti A., Taylor C. R. and Wagman L., The Economics of Privacy.
Journal of Economic Literature, 54, 2, 2016.
[15] Harper F. M. and Konstan J. A., The MovieLens Datasets: History
10
|
1605.07861 | 1 | 1605 | 2016-05-25T12:46:02 | Consensus in the Presence of Multiple Opinion Leaders: Effect of Bounded Confidence | [
"cs.SI",
"cs.MA",
"eess.SY"
] | The problem of analyzing the performance of networked agents exchanging evidence in a dynamic network has recently grown in importance. This problem has relevance in signal and data fusion network applications and in studying opinion and consensus dynamics in social networks. Due to its capability of handling a wider variety of uncertainties and ambiguities associated with evidence, we use the framework of Dempster-Shafer (DS) theory to capture the opinion of an agent. We then examine the consensus among agents in dynamic networks in which an agent can utilize either a cautious or receptive updating strategy. In particular, we examine the case of bounded confidence updating where an agent exchanges its opinion only with neighboring nodes possessing 'similar' evidence. In a fusion network, this captures the case in which nodes only update their state based on evidence consistent with the node's own evidence. In opinion dynamics, this captures the notions of Social Judgment Theory (SJT) in which agents update their opinions only with other agents possessing opinions closer to their own. Focusing on the two special DS theoretic cases where an agent state is modeled as a Dirichlet body of evidence and a probability mass function (p.m.f.), we utilize results from matrix theory, graph theory, and networks to prove the existence of consensus agent states in several time-varying network cases of interest. For example, we show the existence of a consensus in which a subset of network nodes achieves a consensus that is adopted by follower network nodes. Of particular interest is the case of multiple opinion leaders, where we show that the agents do not reach a consensus in general, but rather converge to 'opinion clusters'. Simulation results are provided to illustrate the main results. | cs.SI | cs | IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
1
Consensus in the Presence of Multiple Opinion
Leaders: Effect of Bounded Confidence
Ranga Dabarera, Student Member, IEEE, Kamal Premaratne, Senior Member, IEEE,
Manohar N. Murthi, Member, IEEE, and Dilip Sarkar, Senior Member, IEEE
c(cid:13)2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or
future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works,
for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
6
1
0
2
y
a
M
5
2
]
I
S
.
s
c
[
1
v
1
6
8
7
0
.
5
0
6
1
:
v
i
X
r
a
Abstract-The problem of analyzing the performance of net-
worked agents exchanging evidence in a dynamic network has
recently grown in importance. This problem has relevance in
signal and data fusion network applications and in studying
opinion and consensus dynamics in social networks. Due to
its capability of handling a wider variety of uncertainties and
ambiguities associated with evidence, we use the framework of
Dempster-Shafer (DS) theory to capture the opinion of an agent.
We then examine the consensus among agents in dynamic net-
works in which an agent can utilize either a cautious or receptive
updating strategy. In particular, we examine the case of bounded
confidence updating where an agent exchanges its opinion only
with neighboring nodes possessing 'similar' evidence. In a fusion
network, this captures the case in which nodes only update their
state based on evidence consistent with the node's own evidence.
In opinion dynamics, this captures the notions of Social Judgment
Theory (SJT) in which agents update their opinions only with
other agents possessing opinions closer to their own. Focusing
on the two special DS theoretic cases where an agent state
is modeled as a Dirichlet body of evidence and a probability
mass function (p.m.f.), we utilize results from matrix theory,
graph theory, and networks to prove the existence of consensus
agent states in several time-varying network cases of interest.
For example, we show the existence of a consensus in which a
subset of network nodes achieves a consensus that is adopted
by follower network nodes. Of particular interest is the case of
multiple opinion leaders, where we show that the agents do not
reach a consensus in general, but rather converge to 'opinion
clusters'. Simulation results are provided to illustrate the main
results.
Index Terms-Consensus, opinion leaders, bounded confidence,
social judgement theory.
I. INTRODUCTION
Motivation. In multi-agent systems like social networks or
a group of mobile robots completing a task, agent behavior is
determined by local interactions between neighboring agents.
In distributed control problems, reaching a consensus state is
often necessary for the agents to achieve a control objective
Manuscript submitted in September 2015. This work is based on research
supported by the U.S. Office of Naval Research (ONR) via grant #N00014-10-
1-0140, and the U.S. National Science Foundation (NSF) via grant #1343430.
RD, KP, and MNM are with the Department of Electrical and Com-
puter Engineering of the University of Miami, Coral Gables, Florida (e-
mail: {ranga, kamal, mmurthi}@miami.edu); DS is with the Department of
Computer Scienceof the University of Miami, Coral Gables, Florida (e-mail:
[email protected]).
[1], [2]. Within the context of distributed sensor fusion, the
agents exchange evidence to eventually have a good estimate
of unknown parameters [3]. Agents in a social network typi-
cally exchange opinions in some manner with their neighbors,
and update their own opinions, possibly resulting in consensus.
The work in [4] discusses models of opinion diffusion among
rational agents and social learning, explaining how opinions
emerge or fail to emerge in contexts of economics and social
sciences. Understanding the conditions under which a group
of agents will reach a possible consensus in a network with
time-varying links is a challenging problem that has recently
garnered much interest.
Previous Work. Previous work within signal processing,
control, and data fusion geared towards analyzing agent con-
sensus formation has mostly modeled an agent state as a real-
valued vector [1]–[3], [5], [6] (see also [7] and references
therein). While such an assumption is useful in the context of
agents achieving consensus on a control vector, or sensing
network agents achieving a consensus signal estimate, the
assumption of a real-valued vector may not necessarily be
always suitable within higher-level fusion, or the analysis of
opinion dynamics in social networks. In higher-level fusion,
agents could reach a consensus assessment regarding a situ-
ation, while in opinion dynamics, agents gravitate to reach a
possible consensus opinion. The inherent uncertainty within
such applications may necessitate a more structured agent
state vector such as a probability mass function (p.m.f.) or an
imprecise probabilisitic formalism, such as Dempster-Shafer
(DS) theory [8].
Agent states/opinions in complex fusion environments and
social networks involve more qualitative and nuanced informa-
tion and hence are associated with higher and a wider variety
of uncertainties. Uncertainty modeling formalisms based on
imprecise probability, such as DS theory, provide a conve-
nient framework for such scenarios. The DS theoretic (DST)
framework stands apart from alternate uncertainty handling
frameworks (such as, fuzzy sets, rough sets, etc.) in that it
bears a close relationship to the probabilistic framework [9].
DST models converge to and/or can be converted to p.m.f.
models in limiting cases, thus allowing for a swift general-
ization of legacy techniques. Moreover, DST models provide
a more intuitive and convenient approach for handling the
0000–0000/00$00.00 c(cid:13) 2016 IEEE
2
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
types of uncertainties and the nuances that are characteristic of
agent states and opinions in complex fusion environments and
social networks [7], [10]. For example. complete ignorance
can be captured via the 'vacuous' model and lack of evidence
can be captured by allowing evidential support for non-
singleton propositions (see Section II). For the variety of data
imperfection types that DST models can conveniently capture,
see Table 1 in [11]. However, much of the work on opinion
dynamics in social networks has focused on modeling the
agent states as either scalar real numbers, or a vector of real
numbers [12], e.g., see the Hegselmann-Krause (HK) model
[13], [14] and the Deffuant-Weisbuch (DW) model [15], [16].
In our recent work [7], [17], we utilized the DST framework
to address consensus formation in asynchronous dynamic/ad-
hoc networks with applications to high-level fusion networks,
and opinion dynamics in social networks. By utilizing DS
theory, the methods by which an agent models an opinion
and updates its opinion are now equipped with a powerful
mechanism for grappling with the uncertainty inherent
in
the problem, whether in the form of vague agent opinions,
or imprecise data in a fusion network (e.g., vague witness
statements). In [7], we presented the foundations of ana-
lyzing opinion dynamics and revision of agent state beliefs
in asynchronous dynamic/ad-hoc, demonstrating conditions
under which consensus is achieved.
Our more recent work in [17] utilized ideas from psy-
chology, namely Social Judgment Theory (SJT) [18], which
examines the basic psychological processes underlying the
expression of attitudes and their modifiability through com-
munication. In particular, in [17], we specifically used the
notion of bounded confidence which stems from the concept of
latitude of acceptance in SJT. In a social network, agents may
only communicate and exchange opinions with their neighbors
who have similar opinions on a particular topic. In other
words, an agent may be willing to update its opinion with
the neighboring agent's opinion only if the 'distance' to that
opinion is within a certain bound of confidence. The opinion
exchange models in the HK and DW models account for
these bounded confidence notions. The work in [19] addresses
statistical estimation of the bound of confidence. In [20] agents
are treated as Bayesian decision-makers and Bayes' risk error
has been used to estimate the bounds. The bounded confidence
assumption is also useful within high-level fusion networks to
capture situations where agents may only exchange evidence
with agents that have states similar to their own and perhaps
avoiding the use of faulty outlier sensors/agents.
Contributions. As in [7], [17], this present work of ours on
agent consensus formation in dynamic networks is formulated
within the DST framework. This allows us to embrace a wider
variety of uncertainties and nuances that are more representa-
tive of agent states/opinions in complex fusion networks and
social networks.
Taking this DST setting as a springboard, for the main
contributions of this work, we focus on two special cases of
DST agent opinion models, viz., opinions modeled as a p.m.f.
and a Dirichlet body of evidence (which allows one to retain
DS theory's ability to capture complete ignorance with only
a slight increase in computational complexity) [21]. Utilizing
results from matrix theory, graph theory, and networks, we
provide a thorough theoretical analysis of the conditions for
consensus formation among a group of agents residing within
a dynamic network (i.e., the network connectivity graph is
dynamic, so that links can appear, or disappear, meaning that
the agents may not have the same neighbors at each time
instant). Of particular value are the following:
(1) Each agent may employ either cautious or recep-
tive opinion update strategies, which essentially determines
whether the agent acts as an opinion 'leader' or an opinion
'follower.'
(2) The agents employ bounded confidence notions so that
an agent exchanges and updates its state/opinion with only
those neighbors whose opinions are similar (as measured by
a suitable norm) to its own opinion.
(3) The notion of opinion dynamic chains and corresponding
results being presented in this work capture network topolo-
gies, and conditions under which, where one or two groups
of agents interact with another group of agents to drive them
toward a consensus opinion or opinion clusters.
(4) Focusing on the two cases of p.m.f. and DST Dirichlet
agent opinion models, the behavior of the network in the pres-
ence of multiple opinion leaders is explored. The analytical
results require significantly less restrictive assumptions than
those in [17], which, to the authors' knowledge, is the only
other work that deals with multiple opinion leaders.
(5) These general analytical results are then used to study
how opinion leaders interact with opinion followers. In par-
ticular, it is shown that the arrival at a consensus opinion or
opinion clusters is dependent on the the number of opinion
leaders present and the agents' bounds of confidence.
(6) Several cases of interest in both opinion dynamics and
fusion domains are studied. This includes the the leader-
follower problem [22] where a subset of the networked agents
achieve an opinion cluster which is then followed and adopted
by the remaining agents.
(7) Finally, experimental evaluations are carried out
to
explore whether these results on p.m.f. and Dirichlet agent
opinions apply to and are valid for agent opinions represented
via general DST models.
As elaborated upon earlier, DST framework offers a more
intuitive and convenient avenue to capture the types of uncer-
tainties and the nuances associated with agent opinions. This
current work and the results regarding p.m.f. and Dirichlet
agent opinions constitute an important step toward understand-
ing how agents whose states/opinions are captured via more
general DST models behave in terms consensus and opinion
cluster formation.
Organization of Paper. The paper is organized as fol-
lows: Section II covers basic background material. Section III
presents our opinion update model with the conditional update
equation (CUE) as the governing equation. Our main theoret-
ical contribution on opinion dynamic chains driven by one
group (1-ODC) and opinion dynamic chains driven by two
groups (2-ODC) are in Section IV where we focus on two
special cases of the DST agent opinion model: Section IV-A
deals with agent opinions captured via p.m.f.s which would
appeal to readers with background knowledge in probabilistic
DABARERA, et al.: CONSENSUS IN THE PRESENCE OF MULTIPLE OPINION LEADERS ...
3
opinion representation; Section IV-B deals with DST Dirichlet
agent opinions. Section V provides experimental validation of
our results, including their applicability in scenarios where
agent opinions are captured via more general DST models.
II. PRELIMINARIES
We use N and R to denote the integers and reals, re-
spectively. Subscript ((cid:5))≥0 attached to these are their non-
negative counterparts; R[0,1] denotes the reals taking val-
ues in [0, 1]. The superscripts ((cid:5))N and ((cid:5))M×N denote N-
sized vector and (M × N )-sized matrix counterparts. For
(cid:80)N
X = {Xij} ∈ RM×N , (cid:107)X(cid:107) denotes its ∞-norm,
i.e.,
j=1 Xij. We use X > 0 and X ≥ 0 to
(cid:107)X(cid:107) = maxi∈1,M
denote a matrix/vector with positive and non-negative entries,
respectively. A matrix whose entries are all 0 s (and is of
compatible size) is denoted by 0; an N-element vector whose
elements are all 1 s is denoted by 1N .
such that (cid:80)
We use Θ to denote the cardinality of set Θ.
Relevant Notions from DS Theory. In DS theory, the frame
of discernment (FoD) refers to the set Θ = {θ1,··· , θM}
consisting of the mutually exclusive and exhaustive 'singleton'
propositions θi [8]. A singleton proposition θi ∈ Θ represents
the lowest level of discernible information; Θ = M is the
number of independent singleton propositions in the FoD Θ.
The power set of the FoD, 2Θ = {A : A ⊆ Θ}, denotes all the
possible subsets of Θ. For A ⊆ Θ, A denotes all singletons
in Θ that are not in A.
Basic Belief Assignment (BBA). A basic belief assignment
(BBA) or mass assignment is a mapping m(·) : 2Θ (cid:55)→ [0, 1]
A⊆Θ m(A) = 1 and m(∅) = 0. The BBA
measures the "support" assigned to proposition A ⊆ Θ.
Propositions that receive non-zero mass are referred to as focal
elements. The set of focal elements is the core F. The triplet
E = {Θ,F, m} is referred to as the body of evidence (BoE).
The mass vector corresponding to the BoE E is
m = [m(∅), m(θ1), . . . , m(θM ), m(θ1θ2), . . . , m(θ1θM ),
m(θ1θ2θ3), . . . , m(θ1θ2θM ), . . . , m(Θ)] ∈ R2M
[0,1]. (1)
Note that, masses are assigned to all propositions in 2Θ. DS
theory captures the notion of ignorance by allowing composite
(i.e., non-singleton) propositions to be focal elements, e.g., the
mass assignment m(θiθj) > 0 represents ignorance or lack
of evidence to differentiate between the singletons θi and θj.
The vacuous BBA which Θ as its only focal element (so that
m(Θ) = 1) captures complete ignorance.
Belief and Plausibility. Given a BoE, E ≡ {Θ,F, m}, the
B⊆A m(B),
represents the total support committed to A without also being
committed to its complement A. The plausibility Pl : 2Θ (cid:55)→
[0, 1], defined as Pl(A) = 1 − Bl(A), corresponds to the total
belief that does not contradict A. The uncertainty of A is
Θ : Bl(A) > 0}.
Un(A) = [Bl(A), Pl(A)]. We also use the notation (cid:98)F = {A ⊆
belief Bl : 2Θ (cid:55)→ [0, 1], defined as Bl(A) = (cid:80)
A BoE is called Bayesian if each focal element is a single-
ton. For a Bayesian BoE, the BBA, belief, and plausibility, all
reduce to the same probability (i.e., p.m.f.) assignment. The
expressive power that the DST framework wields a high cost:
For a given FoD Θ, where Θ = M, a DST model allocates
2M −2 mass assignments; only M −1 probability assignments
are required for a p.m.f. Much advances have been made for
the purpose of mitigating the associated computational burden
[23]–[25]. A special DST model which retains the ability to
capture complete ignorance with only a slight increase in
computational complexity is the Dirichlet BoE (so named
because of its close relationship with Dirichlet probability
distributions [21]). The singletons {θi} and Θ constitute the
only focal elements of a Dirichlet BoE, thus requiring only
M mass assignments.
DST Conditionals. Of the various notions of DST condi-
tionals that abound in the literature, the Fagin-Halpern (FH)
conditional offers a unique probabilistic interpretation and
constitutes a natural transition to the Bayesian conditional
notion [9], [25]. The extensive study in [26] identifies sev-
eral attractive properties of the FH conditionals including its
equivalence to other popular notions of DST conditionals.
Definition 1 (FH Conditionals). For the BoE E = {Θ,F, m}
[0, 1] and the conditional plausibility Pl(BA) : 2Θ (cid:55)→ [0, 1]
of B given A are, respectively,
and A ⊆ Θ s.t. A ∈ (cid:98)F, the conditional belief Bl(BA) : 2Θ (cid:55)→
Bl(BA) = Bl(A ∩ B)/[Bl(A ∩ B) + Pl(A ∩ B)];
Pl(BA) = Pl(A ∩ B)/[Pl(A ∩ B) + Bl(A ∩ B)].
The conditional core theorem [25] can be utilized to directly
identify the conditional focal elements to improve computa-
tional performance when applying FH conditionals.
DST Distance Measure. In our work, we need a distance
measure which captures the closeness between DST BoEs.
Among possible alternatives that have appeared in the litera-
ture, we use the DST distance measure in [27], [28].
Definition 2 (Distance Between BoEs). [27] The distance
between the two agent BoEs Ei = {Θ,Fi, mi} and Ej =
{Θ,Fj, mj} is
(cid:107)Ei − Ej(cid:107)J =
where mi, mj ∈ R2M
≥0 are the mass vectors associated with the
BoEs Ei and Ej, respectively; D = {dmn} ∈ R2M×2M
, with
dmn = Am∩ An/Am∪ An, Am, An ⊆ Θ, with ∅∩∅/∅∪
∅ ≡ 0.
(cid:105)1/2 ∈ R[0,1],
T D (mi − mj)
0.5 (mi − mj)
(cid:104)
≥0
Relevant Notions from Graph Theory. [29] We use Gk =
(V, Ek) to denote a directed graph at discrete-time (DT) instant
k ∈ N≥0. Here, eij ∈ Ek represents a unidirectional edge
from node Vj ∈ V to node Vi ∈ V . We use Ak to identify the
(N × N ) adjacency matrix associated with Ek.
Consider the directed graph Gk = (V, Ek). The out-
component of vertex Vi ∈ V is the set of vertices (including
vertex Vi itself) reachable via directed paths from vertex Vi.
The in-component of vertex Vi ∈ V is the set of vertices
(including vertex Vi itself) from which vertex Vi is reachable
via directed paths.
that X ∈ RN×N
and (cid:107)X(cid:107) = 1; we say that X ∈ RN×N
Relevant Notions from Stochastic Matrix Theory. We say
j=1 Xij = 1, ∀i ∈ 1, N
is sub-stochastic if
is stochastic if (cid:80)N
[0,1]
[0,1]
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
4
(cid:80)N
j=1 Xij ≤ 1, ∀i ∈ 1, N, and ∃ i ∈ 1, N s.t.(cid:80)N
j=1 Xij < 1.
Stochastic/sub-stochastic matrices and the limiting behavior of
their products play a critical role in our work.
III. DST MODELING OF OPINION DYNAMICS
In the work that follows, we consider N agents embedded
in the directed graph Gk = (V, Ek). Here, for i ∈ 1, N,
the node Vi ∈ V in Gk represents the i-th agent and the
directed edge eij ∈ Ek represents an unidirectional informa-
tion exchange link from the j-th agent to the i-th agent (i.e.,
the i-th agent can receive information from the j-th agent).
Unless otherwise mentioned, the opinion of the i-th agent at
time instant k ∈ N≥0 is taken to be captured via the BoE
Ei,k = {Θ,Fi,k, mi(·)k}, i ∈ 1, N. We assume that the agent
opinion BoEs are associated with the identical FoD Θ.
Definition 3 (Opinion Profile). Consider the agent BoEs
Ei,k = {Θ,Fi,k, mi(·)k}, i ∈ 1, N , k ∈ N≥0. The opinion
profile of B ⊆ Θ at k ∈ R≥0 is
πππ(B)k = [m1(B)k, . . . , mN (B)]T ∈ RN
[0,1],
with πππ(B)0 ∈ RN
[0,1] denoting its initial state.
A. Bounded Confidence
agents at time instant k:
For each agent, define the following sets of neighborhood
=(cid:8)Vj ∈ V : j ∈ 1, N , and eij ∈ Ek
Ni,k
Ni,k(εi) = {Vj ∈ Ni,k : (cid:107)Ei,k − Ej,k(cid:107)J ≤ εi} ,
(cid:9) ;
(2)
where (cid:107) · (cid:107)J refers to the distance measure in Definition 2
(while any valid norm applicable for DST BoEs could be
used); εi ≥ 0 is the latitude of acceptance or bound of
confidence associated with the i-th agent. So, Ni,k(εi) denotes
the neighbors of the i-th agent at time k left after 'pruning'
the links subjected to the bound of confidence requirement.
With εεε = [ε1, . . . , εN ]T , let
G†
k(εεε) = (V, E
†
k(εεε)),
(3)
where E
†
k(εεε) = {eij ∈ Ek : (cid:107)Ei,k − Ej,k(cid:107)J ≤ εi}.
The bounded confidence process of updating an agent's
opinion is as follows [5], [12]: the i-th agent updates its BoE
Ei in response to the opinion BoE Ej of its neighbor, the j-th
agent, only if j ∈ Ni(εi). In [15], the threshold εi is referred
to as an openness character. Another interpretation views εi
as an uncertainty, i.e., if the i-th agent possesses an opinion
with some degree of uncertainty εi, then it ignores the views
of those neighbor agents who fall outside its uncertainty range.
B. Opinion Updating and Consensus Formation
Opinion Updating. In what follows, we will use S to
identify the indices corresponding to a subset of the agents
in V , i.e., S ⊆ {1, 2, . . . , N} s.t. Vi, ∀i ∈ S, identifies a
subset of agents in V . To proceed, we adopt the following
Definition 4 (Opinion Clusters, Consensus). Let Ei,k, i ∈
1, N , k ∈ N≥0, denote the opinions of N agents embed-
ded within the network Gk = (V, Ek), where each agent
repeatedly updates its state by iterative opinion exchange. Let
S ⊆ {1, 2, . . . , N} identify a subset of the agents in V .
(i) Suppose limk→∞ (cid:107)Ei,k − Ej,k(cid:107)J = 0, ∀i, j ∈ S (or
limk→∞ Ei,k ≡ E∗, ∀i ∈ S) and suppose
equivalently,
limk→∞ Ei,k (cid:54)= E∗, ∀i ∈ 1, N \ S. Then, the agents in S
are said to form an opinion cluster.
(ii) The agents are said to reach a consensus if S = V , i.e.,
all the agents in V form a single opinion cluster.
Henceforth, our results will only be stated with the forma-
tion of a consensus in mind (e.g., see Lemma 1). Due to (ii)
above, these results can easily be reformulated so that they
pertain to the formation of opinion clusters.
In our work, we assume that each agent updates its opinion
in accordance with the conditional update equation (CUE):
Definition 5 (Conditional Update Equation (CUE)). [7], [30],
[31] Suppose the i-th agent updates its opinion Ei by taking
its neighboring agents j ∈ Ni,k(εi), where
into account
εi > 0 is the i-th agent's bound of confidence. The CUE-
based updated opinion of the i-th agent is
Bli(B)k+1 = αi,kBli(B)k +
βij(A)kBlj(BA)k.
Here, the index set Ii,k identifies the agents in Ni,k(εi); the
CUE parameters αi,k, βij(·)k ∈ R[0,1] satisfy
(cid:88)
j∈Ii,k\i
A∈ Fj,k
(cid:88)
(cid:88)
(cid:88)
αi,k +
βij(A)k = 1.
j∈Ii,k\i
A∈ Fj,k
The above CUE can also be expressed directly in terms
of DST mass values. Alternately, the updated mass values
can be computed from the updated belief values. Note that,
with agents utilizing CUE-based opinion updating, the edge
'weights' along both directions of an edge are not equal in
general because the CUE weights βij(·) and βji(·) are not
necessarily the same. It is for this reason that we treat the
underlying graph Gk as directed.
The work in [7], [30], [31] also provides various strategies
for selecting the CUE parameters. Of particular importance
are two particular strategies:
Definition 6 (Receptive and Cautious Update Strategies).
Consider the i-th agent updating its opinion Ei according to
the CUE-based update in Definition 5.
(i) The i-th agent is said to employ receptive updating if
βi,j(A)k ∝ mj(A)k, and receptively updating agents are
referred to as opinion leaders.
(ii) The i-th agent is said to employ cautious updating
if βij(A)k ∝ mi(A)k, and cautiously updating agents are
referred to as opinion followers.
Receptive updating 'weighs' the incoming evidence accord-
ing to the support each focal element receives from the incom-
ing BoEs. This has an interesting Bayesian interpretation: it
reduces to a weighted average of the p.m.f.s of the BoEs.
Cautious updating 'weighs' the incoming evidence according
to the support each focal elements receives from the BoE being
updated. We consider three cases:
DABARERA, et al.: CONSENSUS IN THE PRESENCE OF MULTIPLE OPINION LEADERS ...
5
(1) No Opinion Leaders: This is the most common scenario
that appears in the literature [12], [14], [15]. Here, all agents
are receptively updating and no opinion leaders are present.
(2) Single Opinion Leader: Here, all agents employ recep-
tive updating except one opinion leader. This is the scenario
considered in typical
leader-follower models [6], and the
recent work in [7]).
(3) Multiple Opinion Leaders: Here,
there are multiple
cautiously updating opinion leaders, generally with different
initial opinions. To our knowledge, this case has not been
addressed prior to the work in [17] which was based on
the work in [13], [32]. It provides sufficient conditions for
consensus/cluster formation under certain strong assumptions
(e.g., the agent opinions can be ordered in what is referred to
as an εεε-chain). We will relax such assumptions by utilizing
properties of products of stochastic/sub-stochastic matrices.
IV. OPINION DYNAMIC CHAINS WITH OPINION LEADERS
While the DST framework provides a powerful tool for
grappling with the types of uncertainties and nuanced infor-
mation prevalent in complex fusion and social networks, the
expressive power inherent in DST models levy a high compu-
tational burden. A Dirichlet BoE [21] is a special type of DST
BoE which retains DS theory's ability to capture complete
ignorance with only a slight increase in computational effort.
With our DST opinion model in place, we now focus on
probabilistic (i.e., p.m.f.) and DST Dirichlet agent opinions.
αi,k,
A. Probabilisitic Agent Opinions
With the DST BoEs Ei,k, i ∈ 1, N , k ∈ N≥0, possessing
only singleton focal elements, we have probabilistic agent
opinions. In this case,
the CUE-based opinion update in
Definition 5 reduces to the DT dynamic system
πππ(θp)k+1 = Wk πππ(θp)k, p ∈ 1, M ,
(4)
where πππ((cid:5))k ∈ RN
is row-
stochastic [33]. When all agents employ receptive updating,
[0,1], Wk = {wij,k} ∈ RN×N
[0,1]
wij,k =
(1 − αi,k)/Ni,k(εi),
0,
for i = j;
for j ∈ Ni,k(εi);
otherwise.
(5)
As in [34], we refer to Wk as the confidence matrix because
wij,k represents the weight
the i-th agent attaches to the
opinion of the j-th agent at
time step k. Note that, Wk
constitutes the weighted adjacency matrix of G†
k(εεε) in (3).
We proceed with
Proposition 1. In an environment where agents possess prob-
abilistic agent opinions, the opinion of a cautiously updating
agent is invariant.
Proof. Suppose the i-th agent employs a cautiously updating
strategy. Its CUE parameters satisfy (see Definition 6)
otherwise [25]. Using this and the fact that for singletons
propositions belief and masses are equal, the CUE-based up-
date in Definition 5 for the i-th agent reduces to mi(B)k+1 =
mi(B)k, ∀k ∈ N≥0.
Definition 7 (Left (or Backward) Products). [35]
{Wk}, Wk ∈ RN×N , is
(i) Left Product: The left product of the sequence of matrices
I,
Wk:(cid:96) =
W(cid:96),
WkWk−1 ··· W(cid:96),
for k < (cid:96);
for k = (cid:96);
for k > (cid:96).
(ii) Left-Converging Product: The left product Wk:0 is said
to be left-converging if limk→∞ Wk:0 exists, in which case we
write W∞ = limk→∞ Wk:0.
Note that the dynamic system in (4) can be expressed as
πππ(θp)k+1 = Wk:0 πππ(θp)0. Thus, whenever W∞ exists,
k→∞ πππ(θp)k+1 = W∞ πππ(θp)0.
lim
(6)
Clearly, the convergence of the agent opinions depends on
the existence and the nature of W∞. When W∞ exists, let us
denote the converged opinion profile for θp as πππ∗(θp) ∈ RN
[0,1].
Consensus (in the sense of Definition 4) is a special case of
a converged opinion profile.
Lemma 1. The agents form a consensus iff ∃ ηηη = {ηp} ∈
[0,1] s.t., πππ∗(θp) = ηp1N ,∀p ∈ 1, M , ∀i ∈ 1, N.
RM
Proof. Suppose πππ∗(θp) = ηp1N ,∀p ∈ 1, M , ∀i ∈ 1, N,
for some ηηη = {ηp} ∈ RM
[0,1]. This clearly means that
limk→∞ Ei,k ≡ E∗, ∀i ∈ 1, N. Thus,
the agents form a
consensus. Conversely, if limk→∞ Ei,k ≡ E∗, ∀i ∈ 1, N, we
must clearly have πππ∗(θp) = ηp1N ,∀p ∈ 1, M , ∀i ∈ 1, N.
The limiting behavior of the stochastic matrix product {Wk}
plays a crucial role in consensus analysis when DST BoEs
possess only singleton focal elements.
Lemma 2. Consider the stochastic chain {Wk}, k ∈ N≥0,
s.t. W∞ = 1 vT for some stochastic vector v ∈ RN
[0,1]. Then,
the agents reach the consensus πππ∗(θp) = (vT πππ(θp)0) 1, where
πππ(θp)0 ∈ RN
[0,1] denotes the initial opinion profile.
Proof. Use (6): limk→∞ πππ(θp)k+1 = 1 vT πππ(θp)0 = ηp1,
where ηp = vT πππ(θp)0. So, from Lemma 1, we achieve a
consensus.
1) No Opinion Leaders: This is the most widely studied
scenario and many consensus-related results applicable to this
case are available [6], [12], [34], [36], [37]. The work in
[34] studied convergence when each element in the stochastic
chain {Wk} has positive diagonals. From a graph theoretic
viewpoint, this implies that there is a path from each vertex to
itself; from an opinion dynamics perspective, this is referred
to as having the self-communicating property [34].
(cid:88)
j(cid:54)=i
(cid:88)
A∈ Fj,k
βij(B)k = µij,kmi(A)k; αi,k +
µij,k = 1,
2) Single Opinion Leader: We first introduce
for singletons A, B ∈ Θ. But, for singleton propositions
A, B ∈ Θ, Bl(BA) = 1 only if B = A, and Bl(BA) = 0
Definition 8 (Opinion Dynamics Chain Driven By One Group
†
(1-ODC)). The directed dynamic network G†
k(εεε))
in (3) is said to be an opinion dynamics chain driven by one
k(εεε) = (V, E
6
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
group (1-ODC) if its corresponding confidence matrix Wk in
(4) can be expressed as the lower block triangular matrix
(cid:20)Ak
(cid:21)
0
Ck Dk
Wk =
and Dk ∈ RNout×Nout
,
[0,1]
where Ak ∈ RNC×NC
matrices have compatible sizes.
[0,1]
, and the other
A, n ∈ N≥0, we express this as
for n ∈ N≥0. Here, we have used (10). Employing the notation
∆Pn = Pn − 1NoutvT
∆Pn+1 = Cn+1[An:0 − 1NC vT
Then, we may bound (cid:107)∆Pn+1 − Dn+1∆Pn(cid:107) as
(cid:107)∆Pn+1(cid:107) − (cid:107)Dn+1∆Pn(cid:107)
A] + Dn+1∆Pn, n ∈ N≥0.
≤ (cid:107)∆Pn+1 − Dn+1∆Pn(cid:107) = (cid:107)Cn+1[An:0 − 1NC vT
A](cid:107)
≤ (cid:107)An:0 − 1NC vT
A(cid:107).
(11)
A, where
vA is a NC-sized stochastic vector, implies that the agents in
VC converges to a consensus (see Lemma 2). Hence, given an
arbitrary A > 0, ∃NA ∈ N≥0 s.t.
We proceed by noting that limn→∞ An:0 = 1NC vT
(cid:107)An:0 − 1NC vT
A(cid:107) < A, ∀n ≥ NA.
(12)
From (11) and (12), we can obtain the following: given an
arbitrary A > 0, ∃NA ∈ N≥0 s.t.
(cid:107)∆Pn+1(cid:107) − (cid:107)Dn+1∆Pn(cid:107) < A, ∀n ≥ NA.
So, for n ≥ NA, we have
(cid:107)∆Pn+1(cid:107) < (cid:107)Dn+1∆Pn(cid:107) + A < ρ(cid:107)∆Pn(cid:107) + A,
where we use the fact that (cid:107)Dn+1(cid:107) ≤ ρ < 1, ∀n ≥ NA. This
upper bound for (cid:107)∆Pn+1(cid:107) yields
L−1(cid:88)
(cid:107)∆PNA+L(cid:107) < A
L−1(cid:88)
(cid:32)
(cid:96)=0
We note that
(cid:33)
ρ(cid:96) + ρL(cid:107)∆PNA(cid:107)
A
lim
L→∞
=
i.e., given an arbitrary P > 0, ∃LP ∈ N≥0 s.t.
(cid:96)=0
A
1 − ρ
,
ρ(cid:96) + ρL(cid:107)∆PNA(cid:107), L ≥ 0.
(13)
ρ(cid:96) + ρL(cid:107)∆PNA(cid:107) − A
1 − ρ
< P , ∀L ≥ LP .
Use this in (13): (cid:107)∆PNA+L(cid:107) < P + A/(1 − ρ), ∀L ≥ LP .
In other words,
lim
n→∞(cid:107)∆Pn(cid:107) = lim
(cid:20)πππA(θp)n+1
n→∞(cid:107)Pn − 1NoutvT
(cid:20)An:0 0NC×Nout
A(cid:107) = 0.
(cid:21)
(cid:21)(cid:20)πππA(θp)0
(cid:21)
Using (8) in (7), we get
πππD(θp)n+1
Pn
Dk:0
πππD(θp)0
=
Let us take the consensus among agents in VC as
πππ∗
A(θp) = (1NC vT
A) πππA(θp)0.
(14)
(15)
However, from (14), we know that limn→∞ Pn = 1Nout vT
A.
Then, by (15), we can write
(cid:20)πππ∗
(cid:21)
A(θp)
πππ∗
D(θp)
=
0NC×Nout
A
A 0Nout×Nout
1Nout vT
(cid:20) 1NC vT
(cid:124)
(cid:123)(cid:122)
1NC +Nout v∗T
(cid:20)πππA(θp)0
(cid:21)
πππD(θp)0
(cid:21)
(cid:125)
,
(16)
where v∗ is a (NC + Nout)-sized stochastic vector created by
concatenating the vectors vA and 0Nout×1, and
πππ∗
D(θp) = 1NoutvT
AπππA(θp)0.
(17)
L−1(cid:88)
(cid:96)=0
Proof. The opinion update strategy yields the dynamic
A
system
Fig. 1: An opinion dynamics chain driven by one group (1-
ODC).
C,k(εεε) = (VC, E
out,k(εεε) = (Vout, E
One may view an 1-ODC as consisting of a 'central'
†
C,k(εεε)) (with NC agents) and
†
out,k(εεε)) (with Nout
out,k(εεε) belongs to the in-component
C,k(εεε), for any k ∈ N≥0. See Fig. 1. Note that, Ak and
C,k(εεε)
component G†
another component G†
agents) s.t. no agent in G†
of G†
Dk correspond to the confidence matrices of agents in G†
and G†
Theorem 1. Consider agents embedded in a 1-ODC employ-
ing a CUE-based update strategy. Furthermore, suppose that
is a
stochastic vector so that the agents in VC reach their own
consensus, and
A, where vA ∈ RNC
(a) limn→∞ An:0 = 1NC vT
out,k(εεε), respectively.
(b) (cid:107)Dk(cid:107) ≤ ρ < 1, ∀k ∈ N≥0.
Then, the agents in V (i.e., agents in VC and Vout) reach
[0,1]
a consensus at the consensus reached by the agents in VC.
where k ∈ N≥0, θp ∈ Θ, and
(cid:21)
(cid:20)πππA(θp)k+1
(cid:21)
(cid:20)Ak
πππD(θp)k+1
0
Ck Dk
= Wk
,
(7)
(cid:20)πππA(θp)k
(cid:21)
(cid:20)An:0
πππD(θp)k
(cid:21)
0
Wk =
=⇒ Wn:0 =
Pn Dn:0
.
(8)
Here the sub matrices have sizes compatible with Wk. Use
Wn+1:0 = Wn+1Wn:0 to get
Pn+1 = Cn+1An:0 + Dn+1Pn, P0 = C0,
(9)
for n ∈ N≥0. Due to the row-stochasticity of Wk, we have
1Nout = Ck1NC + Dk1Nout, ∀k ∈ N≥0.
(10)
Subtract 1Nout vT
Pn+1 − 1NoutvT
A
A from both sides of (9):
= Cn+1An:0 + Dn+1Pn − 1NoutvT
= Cn+1An:0 + Dn+1Pn − [Cn+11NC + Dn+11Nout ] vT
= Cn+1[An:0 − 1NC vT
A] + Dn+1[Pn − 1Nout vT
A],
A
A
GC,k(ε)†Gout,k(ε)†CkDABARERA, et al.: CONSENSUS IN THE PRESENCE OF MULTIPLE OPINION LEADERS ...
7
Since (16) satisfies the conditions of Lemma 2, all agents in
V achieve a consensus. Moreover, as (16) and (17) show, this
consensus is the same consensus achieved within VC.
An immediate consequence of Theorem 1 is
k(εεε) = (V, E
Corollary 1. Consider the network G†
†
k(εεε)) in
(3) populated with receptively updating opinion followers
and a single cautiously updating opinion leader. Suppose
Dk corresponds to the confidence matrix of the receptively
updating opinion followers with (cid:107)Dk(cid:107) ≤ ρ < 1, ∀k ∈ N≥0.
Then, with a CUE-based update strategy, all the agents reach
a consensus opinion at the opinion of the opinion leader.
Proof. Construct a 1-ODC as in Definition 8 with G†
C,k(εεε)
containing the opinion leader only and G†
out,k(εεε) populated
†
with the opinion followers. Proposition 1 implies that V
C
(which consists of the only cautiously updating agent) gen-
erates a consensus. So, from Theorem 1, all the agents in V
reach a consensus at the opinion of the opinion leader.
Fig. 2: An opinion dynamics chain driven by two groups (2-
ODC).
3) Two Opinion Leaders: The situation turns out to be sig-
nificantly more complicated when there are multiple opinion
leaders. To look at the two opinion leader case, let us introduce
Definition 9 (Opinion Dynamics Chain Driven By Two
Groups (2-ODC)). The directed dynamic graph G†
k(εεε) =
†
k(εεε)) in (3) is said to be an opinion dynamics chain
(V, E
driven by two groups (2-ODC) if its corresponding confidence
matrix Wk in (4) can be expressed as the lower block
triangular matrix
Wk =
A(1)
k
0
C (1)
k
.
0
0
Dk
0
A(2)
k
C (2)
k ∈ RNC2×NC2
[0,1]
k
, and Dk ∈
k ∈ RNC1×NC1
[0,1]
, A(2)
Here, A(1)
RNout×Nout
; the other matrices have compatible sizes.
C1,k(εεε) = (VC1, E
out,k(εεε) = (Vout, E
[0,1]
One may view a 2-ODC as consisting of two 'central'
†
components G†
C1,k(εεε)) (with NC1 agents)
†
and G†
C2,k(εεε)) (with NC2 agents), plus a
C2,k(εεε) = (VC2, E
†
third component G†
out,k(εεε)) (with Nout
agents) s.t. no agent in G†
out,k belongs to the in-components
of either G†
C1,k(εεε) or G†
C1,k(εεε). See Fig. 2. Note that, A(1)
k ,
A(2)
k , and Dk correspond to the confidence matrices of agents
in G†
C1,k(εεε), G†
We now demonstrate that the agents in even a 2-ODC cannot
reach a consensus in general, even though the agents in VC1
and VC2 may have achieved their own consensus opinions.
C2,k(εεε), and G†
out,k(εεε), respectively.
(a)
n:0 = 1NC1vT
Theorem 2. Consider agents embedded in a 2-ODC employ-
ing a CUE-based update strategy. Furthermore, suppose that
n:0 =
[0,1] are stochastic
1NC2 vT
vectors so that the agents in VC1 and VC2 achieve their own
consensus opinions, and
limn→∞ A(1)
2 , where v1 ∈ RNC1
[0,1] and v2 ∈ RNC2
1 and limn→∞ A(2)
(b) (cid:107)Dk(cid:107) ≤ ρ < 1, ∀k ∈ N≥0.
Then, the following are true:
(i) The agents in V (i.e., agents in VC1, VC2, and Vout)
reach a consensus iff the consensus opinions of the agents in
VC1 and VC2 are equal.
(ii) When the consensus opinions of the agents in VC1
and VC2 are not equal, a consensus among the agents in
Vout occurs if ∃ λ(1)
k = 1 and
λ(1)
k C (1)
k 1NC1 = λ(2)
Proof. Note that we may write
k ∈ (0, 1) s.t. λ(1)
k 1NC2, ∀k ∈ N≥0.
k , λ(2)
k C (2)
k + λ(2)
A(1)
n:0
0
P (1)
n
,
0
A(2)
n:0
P (2)
n
0
0
Dn:0
Wn:0 =
where, for n ∈ N≥0,
(18)
(19)
P (1)
n+1 = C (1)
P (2)
n+1 = C (2)
n+1A(1)
n+1A(2)
n:0 + Dn+1P (1)
n:0 + Dn+1P (2)
n , P (1)
n , P (2)
0 = C (1)
0 ;
0 = C (2)
0 .
0
A(1)
(cid:21)
(cid:20)
(i) Suppose the two consensus opinions of the agents in VC1
and VC2 are equal. One may then recast the 2-ODC as a 1-
DOC with the confidence matrices corresponding to the central
component and the other component taken as
and
Dk, respectively. Noting that the central component reaches
a common consensus opinion, apply Theorem 1 to show that
all the agents must reach a consensus which is identical to
the common consensus opinion formed within the central
component. Conversely, if the two consensus opinions of the
agents in VC1 and VC2 are not equal, no consensus is possible
among the agents in VC1 and VC2 because these two sets of
agents do not update from each other.
k
0 A(2)
(ii) Suppose the two consensus opinions of the agents in VC1
and VC2 are not equal. The row stochasticity of Wk implies
k
(20)
k C (2)
k 1NC1 = λ(2)
k 1NC2 and λ(1)
k 1NC2 + Dk1Nout ;
k Dk1Nout, k ∈ N≥0,
k 1NC1 + C (2)
k 1NC1 + λ(2)
k C (1)
1Nout
= C (1)
k 1Nout = C (1)
λ(2)
where we used λ(1)
k +
λ(2)
k = 1. Now, proceed as we did in the proof of Theorem 1.
Subtract λ(2)
1 from both sides of (19) and substitute
k 1Nout vT
for 1Nout from (20):
n+1 − λ(2)
P (1)
= C (1)
n − λ(2)
for n ∈ N≥0. As before, we use the notation ∆P (1)
λ(2)
k 1NoutvT
n:0 − 1NC1 vT
1 ] + Dn+1[P (1)
1 ],
n −
k 1NoutvT
k 1Nout vT
n = P (1)
n+1[A(1)
1
1 to express this as
n+1 = C (1)
n+1[A(1)
n:0 − 1NC1 vT
∆P (1)
1 ] + Dn+1∆P (1)
n ,
GC1,k(ε)†Gout,k(ε)†GC2,k(ε)†Ck(1)Ck(2)8
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
for n ∈ N≥0. Now, bound (cid:107)∆P (1)
(cid:107)∆P (1)
n+1(cid:107) − (cid:107)Dn+1∆P (1)
n (cid:107)
n+1 − Dn+1∆P (1)
n:0 − 1NC1vT
1 (cid:107),
≤ (cid:107)∆P (1)
≤ (cid:107)A(1)
n+1 − Dn+1∆P (1)
n (cid:107) as
n (cid:107) = (cid:107)C (1)
n+1[A(1)
n:0 − 1NC1 vT
1 ](cid:107)
where we used the sub-stochasticity of C (1)
n .
Now, as in the proof of Theorem 1, use the fact that the
agents in VC1 and VC2 each achieve a consensus to show that
2 (cid:107)
n→∞(cid:107)P (1)
k 1NoutvT
n→∞(cid:107)P (2)
n − λ(1)
n − λ(2)
k 1Nout vT
lim
1 (cid:107) = lim
= 0.
In other words,
B. Dirichlet Agent Opinions
Next, let us suppose that agents opinions are modeled via
Dirichlet BoEs. Then, using the properties Bl(θiθi) = 1,
Bl(θiθj) = 0, i (cid:54)= j, and Bl(BΘ) = B, ∀B ⊆ Θ, one
can easily show that the CUE-based update mechanism in
Definition 5 retains the Dirichlet property of the updated BoEs
at each step. For this Dirichlet BoE case, the CUE-based
opinion update reduces to the following DT dynamic system:
πππ(θp)k+1 = Wk πππ(θp)k, p ∈ 1, M .
(21)
Here πππ(·)k is as in (4) and Wk = { wij,k} ∈ RN×N where
wij,k, i, j ∈ 1, N , k ∈ N≥0. When the i-th agent is receptively
updating,
n = λ(2)
n→∞ P (1)
lim
Denote the consensus among the agents in VC1 and VC2 as
k 1Nout vT
1 ;
k 1Nout vT
2 .
n→∞ P (2)
lim
n = λ(1)
wij,k =
πππ∗
A(1)(θp) = (1NC1 vT
πππ∗
A(2)(θp) = (1NC2 vT
1 ) πππA(1)(θp)0;
2 ) πππA(2)(θp)0,
=
πππ∗
respectively. Then we have
1
1NC1vT
(cid:104)
0
A(1)(θp)
πππ∗
A(2)(θp)
πππ∗
D(θp)
where πππ∗
πππ∗
D(θp) = 1Nout
D(θp) is given as
0
1NC2vT
2
k 1Nout vT
λ(2)
k 1NoutvT
1 λ(1)
λ(2)
k vT
1
λ(1)
k vT
2
,
0
0
2 0
πππA(1)(θp)0
(cid:105)(cid:20)πππA(1)(θp)0
(cid:21)
πππA(2)(θp)0
πππD(θp)0
.
πππA(2)(θp)0
k
k
Hence, from Lemma 2, we conclude that the agents in Vout
reach a consensus if λ(1)
k = 1, ∀k ∈ N≥0.
k + λ(2)
and C (2)
One may interpret this result in the following manner: the
matrices C (1)
signify the 'weights' or 'bias' that
agents in Vout give to the agents in VC1 and VC2, respectively.
To reach a consensus, each agent in Vout must give the same
proportion of weights to the agents in VC1 and VC2 for all
k ∈ N≥0: λ(2)
implies that a higher weight is given to
the opinions of the agents in VC1 than to the opinions of the
agents in VC2. This might be due to stronger interconnections
between the agents in VC1 and Vout or it could simply be due
to a bias towards the opinions of the agents in VC1.
k > λ(1)
k
As an immediate consequence of Theorem 2 we get
Corollary 2. Consider the network G†
†
k(εεε)) in (3)
populated with receptively updating opinion followers and two
cautiously updating opinion leaders. Suppose Dk corresponds
to the confidence matrix of the receptively updating opinion
followers with (cid:107)Dk(cid:107) ≤ ρ < 1, ∀k ∈ N≥0. Then, with a CUE-
based update strategy, the following are true:
k(εεε) = (V, E
(i) All the agents reach a consensus iff the opinions of the
two opinion leaders are equal.
(ii) When the opinions of the opinion leaders are not equal,
the opinion followers form an opinion cluster if the proportion
of weights each receptively updating agent gives to the two
opinion leaders is identical and no opinion leader is given
zero weight.
0,
αi,k,
(1 − αi,k)(1 + mj(Θ)k)
Ni,k(εi)
,
for i = j;
for j ∈ Ni,k(εi);
otherwise;
(22)
when the i-th agent is cautiously updating,
wij,k =
1,
(1 − αi,k)mi(Θ)k
Ni,k(εi)
,
0,
for i = j;
for j ∈ Ni,k(εi);
otherwise.
(23)
While we may still refer to Wk as the corresponding confi-
dence matrix, unlike Wk, Wk is not necessarily stochastic.
To proceed, we take inspiration from [31], where it is shown
that, under mild conditions, the masses for complete ambiguity
Θ vanish when two Dirichlet agents mutually update each
other. The same result turns out to hold true for multiple BoEs.
Lemma 3. Consider the CUE-based updating of the Dirichlet
BoEs as in (21). If
αi,k +
βij(Θ)k ≤ ρ < 1, ∀i, j ∈ 1, N , ∀k ∈ N≥0,
(cid:88)
j(cid:54)=i
then limn→∞ mi(Θ)n = 0, ∀i ∈ 1, N.
Proof. Observe that the update of πππ(Θ) can be written as
where
ΓΓΓk =
πππ(Θ)k+1 = ΓΓΓkπππ(Θ)k,
β21(Θ)k
α1,k
...
β12(Θ)k
α2,k
...
β13(Θ)k
β23(Θ)k
...
βN 1(Θ)k βN 2(Θ)k βN 3(Θ)k
.
···
···
...
···
β1N (Θ)k
β2N (Θ)k
...
αN,k
The condition in the statement implies that (cid:107)ΓΓΓk(cid:107)∞ ≤ ρ <
1, ∀k ∈ N≥0, which guarantees the claim.
Note that, each BoE being updated possessing at least one
singleton focal element ensures that the condition in Lemma 3
is satisfied, which in turn, ensures that the mass for each
completely ambiguous proposition vanishes in the limit. When
this occurs, one may show the following results which apply
to Dirichlet agents. These are the counterparts to Corollaries 1
and 2 which apply to probabilistic agents. Rigorous proofs of
DABARERA, et al.: CONSENSUS IN THE PRESENCE OF MULTIPLE OPINION LEADERS ...
9
k(εεε) = (V, E
these results are not provided; they can be carried out in a
manner which parallel the proofs of Corollaries 1 and 2.
Corollary 3. Consider the network G†
†
k(εεε))
in (3) populated with receptively updating Dirichlet opinion
followers and a single cautiously updating Dirichlet opinion
leader. Suppose that the condition in Lemma 3 is satisfied. Let
Dk denote the confidence matrix of the receptively updating
opinion followers with (cid:107)Dk(cid:107) ≤ ρ < 1, ∀k ≥ ND, for some
ND ∈ N≥0. Then all the agents reach a consensus opinion.
†
Corollary 4. Consider the network G†
k(εεε))
in (3) populated with receptively updating Dirichlet opinion
followers and two cautiously updating Dirichlet opinion lead-
ers. Suppose that the condition in Lemma 3 is satisfied. Let
Dk denote the confidence matrix of the receptively updating
opinion followers with (cid:107)Dk(cid:107) ≤ ρ < 1, ∀, k ≥ ND, for some
ND ∈ N≥0. Then, with a CUE-based update strategy, the
following are true:
k(εεε) = (V, E
(i) All
the agents reach a consensus iff
opinions of the two opinion leaders are equal.
the converged
(ii) When the opinions of the opinion leaders are not equal,
the opinion followers form an opinion cluster if the proportion
of weights each receptively updating agent gives to the two
opinion leaders is identical for k ≥ ND and no opinion leader
is given zero weight.
V. EMPIRICAL EVALUATIONS AND DISCUSSION
We now present some typical results obtained through
extensive simulations of scenarios where agent opinions are
captured via p.m.f.s (see Section V-A), Dirichlet BoEs (see
Section V-B), and more general DST BoEs (see Section V-C).
The results confirm our theoretical analysis in Section IV and
demonstrate the applicability of these results for the more
general DST models presented in Section III.
The agents in all the simulations employ a CUE-based
opinion update strategy with αi = 0.50, ∀i ∈ 1, N. The
agents' bounds of confidence are taken as identical,
i.e.,
εi = ε, ∀i ∈ 1, N. Note that, for αi > 0, ∀i ∈ 1, N, and for
sufficiently large ε, all agents satisfy the self-communicating
or the strong-aperiodic property [34], [37]. Even though being
embedded in a static network, the agents must accommodate
the bounds of confidence as the opinions are updated. In effect,
this creates a dynamic network G†
For ease of visualization, consensus/cluster formation are
displayed using bifurcation diagrams that depict the state of
consensus/cluster formation in the limit density versus ε [12].
k(εεε).
A. Probabilistic Agent Opinions
For our simulations we embed seven agents on a graph
of seven nodes and 100 agents on Erdos-R´enyi (ER) random
graphs of 100 nodes.
1) Simulations with Seven Agents: The FoD of the opinion
BoE of each agent is Θ = {θ1, θ2, θ3}. For the results shown
in Figures 3 to 6, initial opinion profile of θ1 is selected
as πππ(θ1)0 = [0.80, 0.78, 0.76, 0.40, 0.80, 0.10, 0.20]T ; the re-
maining masses are equally distributed among the opinion
profiles πππ(θ2)0 and πππ(θ3)0.
No Opinion Leaders. Fig. 3(a) shows the network topology
of the seven receptively updating agents Ri, i ∈ 1, 7. As
the corresponding bifurcation diagram in Fig. 3(b) shows, for
smaller values of ε, seven 'opinion clusters' are generated
because agents are essentially isolated. As the value of ε is
increased, the number of opinion clusters decreases because
the agents are updating their opinions based on opinions
of their neighbors who are within their confidence bounds.
Eventually, for ε > 0.46 (approx.), as expected from our
analytical results in Section IV-A1, a consensus emerges.
(a) Network topology.
(b) Bifurcation diagram for πππ(θ1).
(c) For ε = 0.5, first
iteration:
(R3, R6) and (R5, R7) do not ex-
change opinions because the cor-
responding opinion distances are
above ε = 0.5.
(d) For ε = 0.5, second iteration:
All neighbor agents exchange opin-
ions because all corresponding opin-
ion distances are below ε = 0.5.
Fig. 3: Probabilistic agents: Simulation results for seven recep-
tively updating agents (Ri, i ∈ 1, 7) and no opinion leaders.
A consensus occurs for ε > 0.46 (approx.). For ε = 0.5,
Figs 3(c) and 3(d) show the 'directions' of opinion exchange
at the first two iterations. Edge labels indicate the distance
between the opinions of the corresponding agent pair.
Even though the underlying network topology shown in
Fig. 3(a) is static, opinion updating occurs in a dynamic
network G†
k(εεε). To illustrate this further, consider the case
when ε = 0.5. As Fig. 3(c) illustrates, agent pairs (R3, R6)
and (R5, R7) do not exchange opinions because their opinion
distances exceed the bound of confidence ε = 0.5. However,
after the first iteration of opinion exchanges, distances among
agents change. As Fig. 3(d) illustrates, the opinion distances
of all agents (including (R3, R6) and (R5, R7)) are now well
within ε = 0.5 and, at the second iteration, all agents exchange
opinions with their neighboring agents.
Single Opinion Leader. We create this scenario by replacing
agent R1 in Fig. 3(a) with a cautiously updating agent C1
0.00.20.40.60.81.0Confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)R1R2R3R4R5R6R7(0.035)(0.017)(0.329)(0.017)(0.312)(0.346)(0.52)>ε=0.5(0.572)>ε=0.5(0.087)R1R2R3R4R5R6R7(0.146)(0.088)(0.089)(0.065)(0.146)(0.154)(0.421)<ε(0.351)<ε(0.078)10
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
thus obtaining the graph in Fig. 4(a). For this topology the
bifurcation diagram for πππ(θ1) is depicted in Fig.4(b). As
before, for smaller values of ε, each agent forms its own
'opinion cluster'. For larger values of ε, in accordance with
Corollary 1, a consensus emerges, and this consensus opinion
is the opinion of the opinion leader C1 (viz., m(θ1) = 0.80).
As Fig. 4(b) indicates, this consensus begins to emerge for
ε > 0.46 (approx.). The dynamic nature of opinion exchange
in the first three iterations is illustrated in Figs 4(c), 4(d), and
4(e).
(a) Network topology.
(b) Bifurcation diagram for πππ(θ1).
(c) For ε = 0.46, first
iteration: (R3, R6) and
(R5, R7) do not ex-
change opinions.
(d) For ε = 0.46, sec-
ond iteration. (R3, R6)
now exchange opinions;
(R5, R7) still do not
exchange opinions.
(e) For ε = 0.46, third
iteration. All agents ex-
change opinions with
their neighbors.
Fig. 4: Probabilistic agents: Simulation results for one opinion
leader (C1) and six receptively updating agents (Ri, i ∈ 2, 7).
A consensus occurs for ε > 0.46 (approx.), at C1's opinion
(i.e., m(θ1) = 0.80). For ε = 0.46, Figs 4(c), 4(d), and
4(e) show the 'directions' of opinion exchange at the first
three iterations. Edge labels indicate the distance between the
opinions of the corresponding agent pair.
Two Opinion Leaders. Here we replaced the two agents
{R1, R7} in Fig. 3(a) by the cautiously updating agents
{C1, C7}, respectively. Figs 5(a) and 5(b) show the corre-
sponding network topology and bifurcation diagram for πππ(θ1),
respectively. In accordance with Corollary 2, no consensus
is reached because the two opinion leaders {C1, C7} possess
different opinions.
With the opinions of two opinion leaders being different, the
number of opinion clusters created depends on the bound of
confidence ε. For 0.31 < ε < 0.42 (approx.), we observe two
opinion clusters, the minimum number of clusters possible.
We have achieved this by picking the agent BoEs carefully so
that the network separates into two components, each with its
own opinion leader, for the aforementioned values of ε. For
these values, the network gets separated into two components
(a) Network topology.
(b) Bifurcation diagram for πππ(θ1).
Fig. 5: Probabilistic agents: Simulation results for two opinion
leaders (C1 and C7) and five receptively updating agents
(Ri, i ∈ 2, 6). With the two opinion leaders possessing
different opinions, no consensus is achieved. A minimum of 2
opinion clusters are achieved for 0.31 < ε < 0.42 (approx.).
There is no consensus among the receptively updating agents.
{C1, R2, R3, R,R5} and {C7, R6} because (cid:107)E3 − E6(cid:107) > ε
and (cid:107)E5 − E7(cid:107) > ε, for 0.31 < ε < 0.42 (approx.). The
ensuing network generates two opinion clusters at the opinions
of the two opinion leaders C1 and C7. For larger values of ε,
some (or all) receptively updating agents get influenced by
both opinion leaders which creates different opinion clusters
that are influenced by both opinion leaders.
(a) Altered topology.
(b) Bifurcation diagram for πππ(θ1).
Fig. 6: Probabilistic agents: Simulation results for two opinion
leaders (C1 and C7) and five receptively updating agents
(Ri, i ∈ 2, 6) embedded in a topology that generates a con-
sensus among the receptively updating agents. This consensus
appears for ε > 0.43 (approx.).
and C (2)
k
k
As asserted in Corollary 2, when the two opinion leaders
possess different opinions, the receptively updating agents will
reach a consensus if the matrices C (1)
in Definition 9
k 1NC2, ∀k ∈ N≥0. Fig. 6(a)
satisfy λ(1)
shows a network topology which satisfies this condition, and
the corresponding bifurcation diagram in Fig. 6(b) shows the
emergence of a third opinion cluster around m(θ)1 = 0.50
(approx.) for ε > 0.43 (approx.).
k 1NC1 = λ(2)
k C (2)
k C (1)
2) Simulations with 100 Agents: Here we embed 100
agents in random graphs of 100 nodes generated using the
Erdos-R´enyi (ER) random graph model. As is well known,
for an ER random graph, the phase transition for network
0.00.20.40.60.81.0Confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)C1R2R3R4R5R6R7(0.017)(0.035)(0.329)(0.017)(0.312)(0.346)(0.52)>ε=0.46(0.572)>ε=0.46(0.087)C1R2R3R4R5R6R7(0.067)(0.104)(0.115)(0.024)(0.078)(0.091)(0.472)>ε=0.46(0.459)<ε(0.001)C1R2R3R4R5R6R7(0.079)(0.176)(0.055)(0.029)(0.042)(0.027)(0.456)<ε(0.272)<ε(0.115)0.00.20.40.60.81.0Confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)0.00.20.40.60.81.0Confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)DABARERA, et al.: CONSENSUS IN THE PRESENCE OF MULTIPLE OPINION LEADERS ...
11
(a) No opinion leaders.
(b) One opinion leader.
(c) Two opinion leaders.
Fig. 7: Probabilistic agents: Simulation results for 100 agents embedded in an Erdos-R´enyi random graph with p = 0.10 and
agent BoEs sampled from Dir(1, 1, 1). Consensus can be seen in Fig. 7(a) and 7(b), for ε > 0.26 and ε > 0.21, respectively.
(a) No opinion leaders.
(b) One opinion leader.
(c) Two opinion leaders.
Fig. 8: Dirichlet agents: Simulation results for 7 agents with no opinion leaders, one opinion leader and two opinion leaders
embedded in the graphs in Figs 3(a), 4(a), and 5(a) respectively. Consensus can be seen in Fig. 8(a) and 8(b), for ε > 0.51
and ε > 0.5, respectively.
connectivity occurs when the edge formation probability p
exceeds ln n/n [29]. With n = 100, ln n/n = 0.046 and
we used p = 0.10 for generating all our random graphs.
Moreover, every random graph was tested for connectedness
at initialization. For sufficiently large values of ε, the graph
G†
k(ε)ε)ε) is therefore essentially the same as Gk, and thus it is
connected as well.
The BoE of each agent was sampled from the symmetric
Dirichlet distribution Dir(1, 1, 1), which is equivalent to a
uniform distribution over the open standard 2-simplex [38].
As Figs 7(a) and 7(b) show, for ε > 0.26 (approx.) and
ε > 0.21 (approx.), a consensus appears when there are no
opinions leaders and when only one opinion leader is present,
respectively. In accordance with Corollary 2, Fig. 7(c) shows
that there is no consensus among the 100 agents when the two
opinion leaders have different opinions.
Fig. 8 shows the corresponding bifurcation diagrams. As is
evident, and in consistent with Corollary 3, a consensus can
be seen in Figs 8(a) and 8(b) for ε > 0.51 and ε > 0.5,
respectively. However,
there is no consensus
among the agents. This is consistent with Corollary 4(i)
because the cautious agents do not possess the same converged
opinion. The minimum number of opinion clusters appear for
0.26 < ε < 0.52 (approx.).
in Fig. 8(c),
Interestingly, even for higher values of ε, no consensus
emerges even among the receptive agents. Indeed, one would
expect that the receptive agents who are now less restrained
to exchange opinions with their neighbors would form an
opinion clusters of their own. In contrast, when the agents
are embedded in the graph shown in Fig. 6(a), a consensus
emerges among the receptive agents for ε > 0.46 (approx.).
See Fig. 9. This is because the graph topology in Fig. 6(a)
satisfies the condition in Corollary 4(ii).
B. Dirichlet Agent Opinions
Here, we repeat the experiments conducted with the 7-agent
topologies in Section V-A1 but with Dirichlet agent opinions.
For all the agents, we kept the same mass vectors πππ(θ2)0 and
πππ(θ3)0 as those in Section V-A1 while we used πππ(Θ)0 = 0.1;
the remaining masses were assigned to πππ(θ1)0.
C. General DST Agent Opinions
1) Simulations with Seven Agents: In this study, we as-
signed random DST mass assignments for the seven agents
embedded within the topology in Fig. 6(a). For this purpose,
we utilized the Dirichlet distribution which has been widely
0.00.20.40.60.81.0Confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)0.00.20.40.60.81.0Confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)0.00.20.40.60.81.0Confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)0.00.20.40.60.81.0confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)BifurcationDiagram0.00.20.40.60.81.0confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)BifurcationDiagram0.00.20.40.60.81.0confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)BifurcationDiagram12
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS
(a) No opinion leaders.
(b) One opinion leader.
(c) Two opinion leaders.
Fig. 10: General DST agents: Simulation results for seven receptively updating agents embedded within the network topology
in 6(a) and DST mass values sampled from Dir(4, 4, 4, 2, 2, 2, 1). A consensus appears for the no opinion leader and one
opinion leaders cases in Fig. 10(a) and 10(c) for ε > 0.18 (approx.) and ε > 0.17 (approx.), respectively.
1(θ2), m∗
2(θ1), m∗
formed by {R1, . . . , R5} converge to the probabilistic opinion
1(θ3)} = {0.63, 0.19, 0.18}; the second
{m∗
1(θ1), m∗
cluster formed by R6 and R7 converge to the general DST
opinion {m∗
2(θ2, θ3)} = {0.15, 0.85} which allows
no further 'refinement' between the singletons θ2 and θ3. Such
emergent behavior is qualitatively different than what appears
in prior models [12]–[16].
TABLE I: Initial and Converged Opinions (with ε = 0.30)
Agent
DST Mass Values
(θ1, θ2)
θ3
θ2
θ1
(θ2, θ3)
Initial Opinions:
R1
R2
R3
R4
R5
R6
R7
0.60
0.62
0.51
0.57
0.60
0.10
0.20
0.10
0.04
0.05
0.03
0.10
–
–
Converged Opinions (with ε = 0.30):
{R1, . . . , R5}
0.18
–
0.10
0.11
0.12
0.15
0.10
–
–
{R6, R7}
0.63
0.15
0.19
–
0.10
0.11
0.12
0.15
0.10
–
–
–
–
0.10
0.12
0.20
0.10
0.10
0.90
0.80
-
0.85
VI. CONCLUSION
In this paper, we use the DST framework for representing
agent opinions and explore the formation of consensus and
opinion clusters when agents residing within a network ex-
change and update their opinions. In particular, we explore
the effect that opinion leaders have on these processes. Our
opinion model accounts for aspects from SJT and possesses
the ability to capture a wider variety of uncertainties and
nuances in agent opinions, an advantage inherited from its
DST basis. Theoretical analysis, which focuses on probabilis-
tic and Dirichlet agent opinions, provides conditions for the
emergence of consensus and opinion clusters in the presence
of opinion leaders. Our results show that a consensus can be
formed when the number of opinion leaders is no more than
one and with a sufficiently high bound of confidence of the
agents. With two or more opinion leaders possessing different
opinions, no consensus can be reached in general. We also
explore the conditions for opinion cluster formation among
the opinion followers.
Fig. 9: Dirichlet agents: Simulation results for two opinion
leaders (C1 and C7) and five receptively updating agents
(Ri, i ∈ 2, 6) embedded in the graph in Fig. 6(a) generates
a consensus among the receptively updating agents. This
consensus appears for ε > 0.46 (approx.).
employed in opinion modeling [39]–[41]. In particular, for
each agent in each trial, the DST masses for θ1, θ2, θ3, (θ1θ2),
(θ1θ3), (θ2θ3), and Θ = (θ1θ2θ3) were sampled from the
Dirichlet distribution Dir(4, 4, 4, 2, 2, 2, 1). Figs 10(a), 10(b),
and 10(c) show the bifurcation diagrams when the network
contains no opinion leaders, one opinion leader, and two
opinion leaders, respectively.
As Fig. 10(a) shows, with no opinion leaders, a consensus
appears for ε > 0.18 (approx.). Fig. 10(b) shows bifurcation
diagram when only one opinion leader is present, and we
can see that a consensus appears for ε > 0.17 (approx.). As
Fig. 10(c) shows, with two opinion leaders, no consensus is
reached among the agents. However, it is interesting to note
that three opinion clusters emerge for ε > 0.21 (approx.).
As mentioned earlier, the main reason for utilizing the DST
framework for capturing agent opinions is its ability to capture
the types of uncertainties and the nuances that are characteris-
tic of agent states and opinions. DST agent opinions can also
generate new emergent behavior which cannot be captured via
probabilistic agents. For example, consider 7 receptive agents
embedded within the topology in Fig. 3(a). The initial opinions
and the converged opinions for ε = 0.30 appear in Table I.
Notice that two opinion clusters have emerged: the first cluster
0.00.20.40.60.81.0confidencebound,ε0.00.10.20.30.40.5DSmass,m(θ1)BifurcationDiagram0.00.20.40.60.81.0confidencebound,ε0.00.10.20.30.40.5DSmass,m(θ1)BifurcationDiagram0.00.20.40.60.81.0confidencebound,ε0.00.10.20.30.40.5DSmass,m(θ1)BifurcationDiagram0.00.20.40.60.81.0confidencebound,ε0.00.20.40.60.81.0DSmass,m(θ1)BifurcationDiagramDABARERA, et al.: CONSENSUS IN THE PRESENCE OF MULTIPLE OPINION LEADERS ...
13
Our current work involves extending this theoretical analysis
to scenarios where agent opinions are captured via more
general DST BoEs, which may require recourse to tools
from paracontractions theory [7]. It is also noteworthy that
we have taken all agents to possess the identical bound of
confidence value. When this is not
the opinion
exchange mechanism itself would be directional (because an
agent with a lower bound of confidence may update itself
from its neighbor agent who may not update itself because
of a higher bound of confidence value). An interesting future
research problem is the study of networked agents whose
bounds of confidence values are different. Another interesting
issue to be addressed is the assessment of the convergence
speed of our algorithms [42].
the case,
REFERENCES
[1] R. Olfati-Saber, J. A. Fax, and R. M. Murray, "Consensus and coopera-
tion in networked multi-agent systems," Proc. IEEE, vol. 95, no. 1, pp.
215–233, Jan. 2007.
[2] Z. Qu, J. Wang, and R. A. Hull, "Cooperative control of dynamical
systems with application to autonomous vehicles," IEEE Transactions
on Automatic Control, vol. 53, no. 4, pp. 894–911, 2008.
[3] L. Xiao, S. Boyd, and S. Lall, "A scheme for robust distributed sensor
fusion based on average consensus," Int. Symp. on Inf. Proc. in Sensor
Netw. (IPSN), pp. 63 – 70, Apr. 2005.
[4] C. Chamley, A. Scaglione, and L. Li, "Models for the diffusion of beliefs
in social networks: An overview," IEEE Signal Processing Magazine,
vol. 30, no. 3, pp. 16–29, May 2013.
[5] S. Fortunato, V. Latora, A. Pluchino, and A. Rapisarda, "Vector opinion
dynamics in a bounded confidence consensus model," Int. J. of Modern
Phys. C, vol. 16, no. 10, pp. 1535–1551, Oct. 2005.
[6] W. Ren, R. W. Beard, E. M. Atkins, and A. G. Theory, "A survey
of consensus problems in multi-agent coordination," Amer. Cont. Conf.
(ACC), pp. 1859–1864, 2005.
[7] T. Wickramarathne, K. Premaratne, M. Murthi, and N. Chawla, "Con-
vergence analysis of iterated belief revision in complex fusion environ-
ments," IEEE J. of Selected Topics in Sig. Proc., Special Issue on Sig.
Proc. for Social Netw., vol. 8, no. 4, pp. 598–612, Aug. 2014.
[8] G. Shafer, A Mathematical Theory of Evidence. Princeton Univ. Press,
1976.
[9] R. Fagin and J. Y. Halpern, "A new approach to updating beliefs," Proc.
Conf. on Uncertainty in Art. Intell. (UAI), pp. 347–374, 1991.
[10] S. Blackman and R. Popoli, Design and Analyis of Modern Tracking
Systems. Norwood, MA: Artech House, 1999.
[11] T. Wickramarathne, K. Premaratne, M. Kubat, and D. Jayaweera,
"CoFiDS: A belief-theoretic approach for automated collaborative filter-
ing," IEEE Transactions on Knowledge and Data Engineering, vol. 23,
no. 2, pp. 175–189, Feb. 2011.
[12] J. Lorenz, "Continuous opinion dynamics under bounded confidence: A
survey," Int. J. of Modern Phys. C, vol. 18, no. 12, pp. 1819–1838, Jul.
2007.
[13] U. Krause, "A discrete nonlinear and non-autonomous model of con-
sensus formation," Comm. Diff. Equations, no. 1, pp. 227–236, 2000.
[14] R. Hegselmann and U. Krause, "Opinion dynamics and bounded confi-
dence models, analysis and simulation," J. of Art. Societies and Social
Simulation, vol. 5, no. 3, Jun. 2002.
[15] G. Deffuant, D. Neau, F. Amblard, and G. Weisbuch, "Mixing beliefs
among interacting agents," Adv. in Complex Syst., vol. 03, no. 04, pp.
87–98, Jan. 2000.
[16] G. Weisbuch, "Bounded confidence and social networks," The European
Physical J. B - Condensed Matter, vol. 38, no. 2, pp. 339–343, Mar.
2004.
[17] R. Dabarera, R. Nunez, K. Premaratne, and M. Murthi, "Dynamics of
belief theoretic agent opinions under bounded confidence," Int. Conf. on
Inf. Fusion (FUSION), pp. 1–8, Jul. 2014.
[18] M. Sherif and C. Hovland, Social Judgment: Assimilation and Contrast
Effects in Communication and Attitude Change, ser. Yale Studies in
Attitude and Communication. Greenwood Pub. Group, Inc., 1980.
[19] A. A. Rad, H. Rahmandad, and M. Yahyanejad, "Estimating the dynam-
ics of individual opinions in online communities," in Proceedings of the
International System Dynamics Conference, Delft, 2014.
[20] K. Varshney, "Opinion dynamics with bounded confidence in the Bayes
risk error divergence sense," in Acoustics, Speech and Signal Processing
(ICASSP), 2013 IEEE International Conference on, May 2013, pp.
6600–6604.
[21] A. Josang, "Cumulative and averaging fusion of beliefs," Information
Fusion, vol. 11, no. 2, pp. 192–200, Apr. 2010.
[22] X. Lu, R. Lu, S. Chen, and J. Lu, "Finite-time distributed tracking
control for multi-agent systems with a virtual leader," IEEE Trans. Circ.
and Syst. I: Regular Papers, vol. 60, no. 2, pp. 352–362, Feb. 2013.
[23] M. Bauer, "Approximation algorithm and decision making in the
Dempster-Shafer theory of evidence-an empirical study," International
Journal of Approximate Reasoning, vol. 17, no. 2/3, pp. 217–237,
Aug./Oct. 1997.
[24] N. Wilson, "Algorithms for Dempster-Shafer theory," in Algorithms for
Uncertainty and Defeasible Reasoning, ser. Handbook of Defeasible
Reasoning and Uncertainty Management Systems, D. M. Gabbay and
P. Smets, Eds. Kluwer, 2000, vol. 5, pp. 421–475.
[25] T. Wickramarathne, K. Premaratne, and M. Murthi, "Toward efficient
computation of the Dempster-Shafer belief theoretic conditionals," IEEE
Transactions on Cybernetics, vol. 43, no. 2, pp. 712–724, Apr. 2013.
[26] D. Denneberg, "Conditioning (updating) non-additive measures," Ann.
of Operations Research, vol. 52, no. 1, pp. 21–42, Mar. 1994.
[27] A.-L. Jousselme, D. Grenier, and E. Boss´e, "A new distance between
two bodies of evidence," Inf. Fusion, vol. 2, no. 2, pp. 91–101, Jun.
2001.
[28] A. Martin, A.-L. Jousselme, and C. Osswald, "Conflict measure for the
discounting operation on belief functions," 11th Int. Conf. on Inf. Fusion
(FUSION), pp. 1–8, Jun. 2008.
[29] M. E. J. Newman, Networks: An Introduction. New York, NY: Oxford
University Press, 2012.
[30] K. Premaratne, D. A. Dewasurendra, and P. H. Bauer, "Evidence com-
bination in an environment with heterogeneous sources," IEEE Trans.
on Syst., Man, and Cyber. - A: Syst. and Humans, vol. 37, no. 3, pp.
298–309, 2007.
[31] K. Premaratne, M. Murthi, J. Zhang, M. Scheutz, and P. Bauer, "A
Dempster-Shafer theoretic conditional approach to evidence updating for
fusion of hard and soft data," Proc. Int. Conf. on Inf. Fusion (FUSION),
Seattle, WA, pp. 2122–2129, Jul. 2009.
[32] J. Dittmer, "Consensus formation under bounded confidence," Nonlinear
Anal.: Theory, Methods & Applicat., vol. 47, pp. 4615–4621, 2001.
[33] D. J. Hartfiel, Nonhomogeneous Matrix Products. World Scientific,
2002.
[34] J. Lorenz, "Convergence of products of stochastic matrices with positive
diagonals and the opinion dynamics background," in Positive Systems,
ser. Lecture Notes in Control and Inform. Sciences.
Springer, 2006,
vol. 341, pp. 209–216.
[35] I. Daubechies and J. C. Lagarias, "Sets of matrices all infinite products
of which converge ," Linear Algebra and its Applicat. , vol. 161, no. 0,
pp. 227 – 263, 1992.
[36] S. Chatterjee and E. Seneta, "Towards consensus: Some convergence
theorems on repeated averaging," J. of Appl. Probability, vol. 14, no. 1,
pp. 89–97, Mar. 1977.
[37] B. Touri and A. Nedic, "Product of Random Stochastic Matrices," IEEE
Transactions on Automatic Control, vol. 59, no. 2, pp. 437–448, Feb.
2014.
[38] C. M. Bishop, Pattern Recognition and Machine Learning. Secaucus,
NJ, USA: Springer-Verlag New York, Inc., 2006.
[39] K. Chaloner and G. T. Duncan, "Some properties of the Dirichlet-
multinomial distribution and its use in prior elicitation," Communications
in Statistics - Theory and Methods, vol. 16, no. 2, pp. 511–523, 1987.
[40] E. Regazzini and V. V. Sazonov, "Approximation of laws of multinomial
parameters by mixtures of Dirichlet distributions with applications to
Bayesian inference," Acta Applicandae Mathematica, vol. 58, no. 1-3,
pp. 247–264, 1999.
[41] R. E. Zapata-V´azquez, A. O'Hagan, and L. S. Bastos, "Eliciting expert
judgements about a set of proportions," Journal of Applied Statistics,
vol. 41, no. 9, pp. 1919–1933, 2014.
[42] A. Olshevsky and J. N. Tsitsiklis, "Convergence speed in distributed
consensus and averaging," SIAM J. Control Optim., vol. 48, no. 1, pp.
33–55, Feb. 2009.
|
1511.05618 | 1 | 1511 | 2015-11-17T23:36:46 | Topic Model Based Behaviour Modeling and Clustering Analysis for Wireless Network Users | [
"cs.SI"
] | User behaviour analysis based on traffic log in wireless networks can be beneficial to many fields in real life: not only for commercial purposes, but also for improving network service quality and social management. We cluster users into groups marked by the most frequently visited websites to find their preferences. In this paper, we propose a user behaviour model based on Topic Model from document classification problems. We use the logarithmic TF-IDF (term frequency - inverse document frequency) weighing to form a high-dimensional sparse feature matrix. Then we apply LSA (Latent semantic analysis) to deduce the latent topic distribution and generate a low-dimensional dense feature matrix. K-means++, which is a classic clustering algorithm, is then applied to the dense feature matrix and several interpretable user clusters are found. Moreover, by combining the clustering results with additional demographical information, including age, gender, and financial information, we are able to uncover more realistic implications from the clustering results. | cs.SI | cs | Topic Model Based Behaviour Modeling and
Clustering Analysis for Wireless Network Users
Bingjie Leng, Jingchu Liu, Huimin Pan, Sheng Zhou, and Zhisheng Niu
Tsinghua National Laboratory for Information Science and Technology
Department of Electronic Engineering
Email: {lengbj14, liu-jc12, phm13}@mails.tsinghua.edu.cn, {sheng.zhou, niuzhs}@tsinghua.edu.cn
Tsinghua University, Beijing 100084, China
5
1
0
2
v
o
N
7
1
]
I
S
.
s
c
[
1
v
8
1
6
5
0
.
1
1
5
1
:
v
i
X
r
a
Abstract—User behaviour analysis based on traffic log in wire-
less networks can be beneficial to many fields in real life: not only
for commercial purposes, but also for improving network service
quality and social management. We cluster users into groups
marked by the most frequently visited websites to find their
preferences. In this paper, we propose a user behaviour model
based on Topic Model from document classification problems. We
use the logarithmic TF-IDF (term frequency - inverse document
frequency) weighing to form a high-dimensional sparse feature
matrix. Then we apply LSA (Latent semantic analysis) to deduce
the latent topic distribution and generate a low-dimensional
dense feature matrix. K-means++, which is a classic clustering
algorithm, is then applied to the dense feature matrix and several
interpretable user clusters are found. Moreover, by combining
the clustering results with additional demographical information,
including age, gender, and financial information, we are able to
uncover more realistic implications from the clustering results.
Keywords—traffic log, user behaviour modeling, clustering
analysis, topic model.
I.
INTRODUCTION
Thanks to the wide adoption of smart devices such as
smart phones and tablets, nowadays people can perform an
unprecedented number of tasks online, ranging from news
and finance to social and gaming. As a consequence, Internet
browsing log in wireless networks has become an essential
source of information for analyzing users’ hidden preferences
and inferring their real life behaviour. With a deeper under-
standing on the usage pattern of mobile users, network service
providers are able to provide more personalized services and
improve the service quality as well. Users’ browsing interests
are also helpful
in fields such as urban planning, mobile
advertisement, transportation, education, etc [1–3].
The most naive way to extract user behaviour from the
Internet browsing dataset is to observe the long-term global
statistics of various websites. But in this situation, individual
differences will be covered up. On the contrary, if we focus on
the analysis on one single user, the similarity between users’
browsing habits will be ignored. Hence, clustering becomes an
efficient method to strike a balance between these two extremes
and extract the average behaviour of a group of users who have
similar browsing history. Therefore, we design and implement
a process to cluster similar users into groups, each of which
is labeled by the type of frequently visited websites.
To apply clustering algorithms, the first step is to represent
users with a profile vector through user behaviour modeling.
In this paper, we propose a user behaviour modeling method
based on the topic model, which is originally proposed for
paper:
document classification, to generate an original profile matrix.
To enhance the discriminative power of the original matrix, we
apply TF-IDF (term frequency - inverse document frequency)
weights to regenerate a feature matrix with large dimension-
ality. With methods in Latent semantic analysis (LSA) [4],
we are able to get a low-dimensional feature matrix reflecting
the distribution of different topics of all the users. Finally,
clustering algorithms such as K-means++ can be applied to
the final feature matrix and the clustering results are analyzed.
Concretely, we make the following contributions in this
• We analyze the similarity and differences between
network user modeling and document classification,
and propose to utilize text mining algorithms for
network user modeling problems.
Based on the analysis on our dataset, we utilize
logarithmic TF-IDF to generate sparse feature matrix
and use LSA for topic discovery and dimensionality
reduction. To our knowledge, this is the first study to
analyze user behaviour with a combination of these
tools.
• We extract users’ interests by clustering users with
similar browsing habits into groups. We also examine
our clustering results with additional demographical
information including age, gender, and financial in-
formation on the campus during five months. Obvious
preference differences are found between different
genders and age. It helps us explain our clustering
findings accordingly and proves that our algorithm can
work effectively. Moreover, our findings can help with
campus management in many aspects.
•
The rest of the paper is outlined as follows. Section
II introduces related work about user behaviour analysis in
WLAN. Section III presents the network user behavior mod-
eling problem and explain its analogy with topic modeling
in document classification. In Section IV, we introduce our
datasets and the details of our algorithm implementation. In
Section V, we present the clustering results and explain the
findings. Finally, in Section VI, we conclude and discuss future
work.
II. RELATED WORK
With the rapid development of wireless networks,
the
potential of user behaviour analysis has brought up tremen-
dous attention recently. The most common method for user
clustering is by applying K-means on raw profile matrix.
For example, the web browsing similarity among users of
TABLE I.
ANALOGY BETWEEN USER BEHAVIOUR MODELING AND TOPIC MODELING IN DOCUMENT CLASSIFICATION
Elements in Network User Behavior Modeling
Elements in Document Classification
Tuple of Domains/ Locations/ Time
Value for Tuple(Total Bytes/ Duration/ Request Numbers)
User
User Clustering
Document
Words
Frequency of Words
Document Classification
a university laboratory is examined using web log data in
in [5]. Besides, in [6], the authors evaluate the effectiveness
of K-Means and spectral clustering and discuss the effect of
the profile size to the clustering results. The authors in [7]
discuss this personalization problem from another perspective.
They apply K-Means to construct user profiles using device-
side traffic logs. The authors also point out that the extra
information on gender may help with the problem in future
work.
Besides K-means, other clustering algorithms are also
investigated in the literature. The authors in [8] present a
Greedy Clustering Using Belief Function (GCB) algorithm.
The representatives of the clusters are picked iteratively, so
that
the current representative is well separated from the
former ones. In [9], the authors analyze the online activity
and mobility for thousands of mobile users. They use Self-
Organized Map (SOM) for discovering mobile users’ trends.
In [10], the authors use a information theoretic co-clustering
method on user-domain matrix and consider the effect of
location.
Many similarity measures between users are studied. The
authors in [11] use dataset containing traces of 34 users and
mainly deal with temporal dimension. In their work, different
similarity matrices including Cosine Similarity, Hellinger dis-
tance and SVD are compared with each other. The authors in
[8] apply a belief function as the similarity measure.
A closely recent related work is [12]. Same as us, the
authors study user behaviour modeling in a perspective of
topic modeling. By way of analogy,
the authors find that
there are many similarities between user behaviour profiling
and document classification in natural language processing,
which is also used in our modeling. But in their work, the
authors generate their feature matrix by oversampling the
URLs, while we use TF-IDF weights. The data comes from
cellualr networks in their paper. But the datasets we use are
clollected from WLAN. In [13], the author proposes a similar
procedure in analyzing user preferences with our algorithm for
webpage prefetching. But the data set used in the paper is small
and there are only around 100 domains included. Therefore,
user behaviour cannot be fully presented.
III. USER BEHAVIOUR MODELING
There are many similarities between user behaviour anal-
ysis and document classification. We will introduce our user
behaviour modeling by comparing the nature of user behaviour
profiling with the properties of a document in this section.
The main purpose of document classification is to find the
hidden topics of the corpus of documents by unsupervised
learning algorithms. In Table I, the correspondences between
user behaviour modeling and topic modeling are listed. In
user behaviour modeling, we plan to cluster users with simi-
lar internet browsing records, which is similar as clustering
documents with similar topics. The content of the internet
browsing records can be considered as words existing in a
document to some degree, although the statistic properties of
internet records are more complicated than term frequency
in a document. These findings encourage us to use tools in
document classification to classify users’ internet browsing
preferences.
Due to this similarity, tools designed for document classi-
fication may also be fit to network user behaviour modeling.
In this work, we use TF-IDF statistics and LSA to cluster
users with similar network usage behavior and preferences. TF-
IDF is a nonlinear weighting method to reveal the correlation
between words and topics. LSA is an efficient technique to
mine topics and reduce complexity at the same time.
IV. DATASETS AND CLUSTERING IMPLEMENTATION
In this section, we introduce the properties of the campus
WiFi dataset used in this paper. We also outline the implemen-
tation of our algorithm to extract user behaviour, with detailed
explanation for each algorithm step. The steps include data
pre-processing, user profile matrix generalization, generating
the feature matrix with TF-IDF, LSA and clustering.
A. Overview of Datasets
In this paper, we use the Internet browsing data extracted
from a WiFi network in a Chinese university campus. This
dataset has been collected from September, 2014 to January,
2015, and contains the browsing records of over 28,000
anonymous users.
User’s browsing activity is aggregated into network ses-
sions, which are defined to be the period in which users
utilize the network with pauses that are less than 5 minutes.
If a user stops exchanging information with the network for
more than 5 minutes, the session ends and activities from that
moment on are recorded in the following session. Each session
contains the information of network browsing activity of a
user, including user ID, session starting time, session duration,
location, first-level or second-level domains, ISP names, HTTP
request number and predefined service classes.
Except for the internet browsing dataset, a complementary
dataset containing users’ personal profile is also given. Each
row in this dataset represents for one user’s profile, including
user ID, gender, the year of birth, the year of enrolment and
type of degree. Besides, we are also provided with a dataset
containing all trading information of users’ campus cards dur-
ing the same period of time. These additional information gives
us an opportunity to interpret the results of user behaviour
clustering and learn more about users’ behaviour.
B. Data Pre-processing and Overall Statistics
To facilitate algorithm processing, we extract the network
browsing information of each user from the dataset and form
a user profile matrix. Each row represents one user and each
column represents the values of one profile dimension. Based
on the types of information available in the original dataset,
there are several ways for us to formulate the user profile,
including the domain names, time of day or week, locations
or encapsulating a multiply of these informations. In this work,
corresponded to the ratio between the total bytes consumed on
each domain to the total bytes consumed on all the domains
that appear in the dataset. Still, the traditional form of TF
cannot be directly applied to the network traffic log because
of the large dynamic range across the total communication
bytes of different domains: the largest and the smallest can be
different to 8 orders of magnitude. To cope with this problem,
we apply logarithmic operation on TF terms to narrow down
the dynamic range. Concretely, assume that there are Nu users
and Nd domains involved. Let Bij denote the total bytes of
the jth domain for the ith user, where j ∈ {1, 2, ..., Nd} and
i ∈ {1, 2, ..., Nu}. The TF weight for the jth domain and user
i, i.e. TFij can be expressed as:
Bij(cid:80)Nd
j=1 Bij
Fig. 1. Histogram of total bytes for user browsing.
TFij = 1 + log(
).
(1)
we only use the domain names of the websites that the users
access over the WiFi.
As for the values in the feature matrix, four statistics of
user behaviour are available, including the total communication
bytes, the aggregated duration, the cumulative HTTP request
number, and the cumulative number of sessions of one user
on a certain domain during these five months. In this paper,
we choose the total communication bytes as the profile matrix
entry value.
After pre-processing, we find that
there are 893 first-
level domains covered in the dataset. We investigate the basic
statistics of the resulting profile matrix. We find that
the
medians of rows (or equivalently, users) are all zeros, which
indicates that all the users only visit a highly limited range
of domains. Besides, only 5% of the domains have non-zero
median browsing activity among users. This indicates that most
of these domains are only accessed by a small amount of users
and users’ domain preferences are quite centralized. We rank
the domains with respect to their median browsing intensity
and show the histogram of browsing intensity of three of the
top-10 domains in Fig. 1. As can be seen, most of the users
would visit these domains with high traffic. The top domains
which are visited most include baidu.com, qq.com, sinaimg.cn,
etc.
C. Generation of Feature Matrix With TF-IDF
The matrix generated in the last section needs to be
normalized before being used for clustering. But with simple
normalization of each row, the weights in the matrix (i.e. TF)
cannot represent the importance of various domains to one
user precisely. This is because there are some domains that are
almost visited by everyone, such as search sites like baidu.com
and portal sites like qq.com. It is obvious that their normalized
weights for most users would dominate over other domains
and user preferences would be biased toward these dominating
domains. For this reason, we use TF-IDF as a method to reduce
the weights of this kind of popular domains and generate a new
feature matrix which will be used in the following steps.
TF-IDF is a non-linear transformation which is widely used
in document classification to unveil the true discriminative
power of a certain term to some document. It is the product of
term frequency (TF) and inverse document frequency (IDF).
In document classification tasks, TF means the frequency for a
word to appear in a document. We extend this concept to user
clustering with network traffic log. Specially, TF-IDF is now
The inverse document frequency (IDF) is introduced to
show how much information a domain provides. IDF can be
expressed as:
IDFij = log(
Nu
nj
),
(2)
where nj denotes the number of users ever visited the jth
domain.
Using the above notations, we can get the new feature
matrix F , in which each element is given by:
Fij = TFij · IDFij.
(3)
D. Dimensionality Reduction Using Truncated SVD
To analyze user preferences by clustering, the distances
between feature vectors should be computed. But the large
(row) dimension of the user feature matrix may render com-
mon distance measures, e.g. cosine distance, useless due to
the so called ”curse of dimensionality”. Besides, the large
dimensionality also makes clustering algorithms slow. To solve
this problem, we assume network activity to follow a topic
model and apply LSA to reduce the dimensionality of the
sparse feature matrix and get a dense one with much smaller
number of dimensions.
Topic modeling assumes the following generative process
for text documents: each document can be expressed as a
distribution over a collection of T topics {pt, t = 1, 2...T},
and each topic is manifested through a probability distribution
over a collection of W words {pwt, w = 1, 2, 3..., W}. The
overall probability of a word w to appear in a document is
t=1 pwtpt. In user behaviour analysis, the traffic of
each user on domains can be assumed to follow a similar
generative process.
pw = (cid:80)T
A common way to recover the hidden parameters of such
latent distribution is LSA. Specially, we can factorize the
feature matrix F using SVD. The decomposition of F is given
by:
F = U ΣV T ,
(4)
where U and V are orthogonal matrices and Σ is a diagonal
matrix. If we further assume the domain corpus contians
only a small number of topics, we can perform the truncated
SVD to extract part of the singular vectors and values. The
approximation of F can be expressed as follows:
FM = UM ΣM V T
M ,
(5)
TABLE II.
RUNNING TIME OF THE WHOLE PROCESS
M
100
200
300
400
500
600
700
800
Running Time (s)
11.66
22.37
30.13
43.06
56.82
84.07
93.15
112.17
Fig. 3. TF-IDF distribution of domains in each cluster.
different clustering results, K is chosen to be 8 as an example
to explain the clustering results in the following.
The average TF-IDF distribution of domains in each user
cluster is shown in Fig. 3. The horizontal axis lists 61 domain
names which include all the top-10 domains with the largest
TF-IDF weights of each cluster. Each cluster is marked on the
Y-axis with the summarized topic or by the domain name with
the largest TF-IDF weight within this cluster. As we can see,
there are several hot domains in each cluster, which indicates
the preferences of users within this cluster. The clusters include
preferences for automobiles, games, social networks, online
shopping websites and so on. To be clearer, we list three typical
domain names in each cluster with the largest TF-IDF weights
and the topic of each cluster is summarized based on these
domains in Table III. For clusters with no obvious topic, but
only preferring some general websites such as WeChat and
Baidu, the topic of these clusters are the services correspoding
to the largest TF-IDF weight in each of them.
As a comparison with our implementation, we list the top
three domains in each cluster without TF-IDF weighting in
Table IV. The values in the input matrix of LSA here are
the simple row normalization results of the original feature
matrix generated in Section IV-B. From the clustering results,
we find that all the top domains are some general websites
within multiple service classes. Unlike Table I, it is hard to
define a particular topic or interest for each cluster, which
indicates the process with TF-IDF raises the effectiveness of
clustering a lot.
Fig. 4 shows the percentage of males in each cluster. Note
that the overall percentage of males is 67.9 %. We find that
there are more boys than girls visiting game websites, while
there are much more girls than boys shopping online. These
findings are quite intuitive in the sense that girls pay more
attention on their appearance and most girls love shopping,
while boys are more keen on different kinds of games, from
Fig. 2. The trend of inertia changing with the number of clusters K.
where the M largest singular values in Σ and their correspond-
ing singular vectors from U and V are selected. UM can be
treated as the final feature matrix used for clustering, which is
of much lower dimensionality than the original sparse feature
matrix. In the meantime, observations would be extracted
from VM , which contains information about the relationship
between different domains.
E. K-Means Clustering
As for the clustering algorithm, we finish the user clus-
tering based on the classic K-Means algorithm. The K-Means
algorithm divides all the users into K clusters and guarantees
that the within-cluster sum of squared distances, a.k.a. inertia,
is minimized. Due to the randomness of initial seeds selection
in standard K-Means algorithm, we use K-Means++ [14]
instead, which performs multiple K-Means runs with different
random initialization and selects the best clustering results.
V. EVALUATION OF IMPLEMENTATION AND
EXPERIMENTAL RESULTS
In this section, we first evaluate and choose the parameters
of our implementation based on numerical analysis. Then,
we describe the experimental results and give corresponding
advice on campus management.
A. Evaluation of Implementation
The selection of the cluster number K is an essential issue,
as this may influence the clustering results a lot. Fig. 2 shows
the values of inertia when different values of K are applied,
from 1 to 13. As we can see, the value of inertia goes down
with the increase of K.
Except for K, the number of the selected singular values
M in LSA must be decided as well. In Table II, the running
time of the whole implementation process with different values
of M ia given. As M goes up, the complexity of the algorithm
increases, so that the running time increases. But the smaller
M is, the more information of the original feature matrix will
be ignored. Therefore, a modest M should be selected because
of the tradeoff between complexity and information integrity.
B. Experimental Results
Based on the analysis above, we select the top 80 singular
components in LSA, i.e., M = 80, to reduce the computation
complexity and get enough information for clustering at the
same time. Since different numbers of clusters K may incur
TABLE III.
LIST OF SUMMARIZED TOPICS AND TOP THREE DOMAINS IN EACH CLUSTER WITH TF-IDF WEIGHTING.
Topics
Top Three Domains
Big Games
Social Networks
Casual Games
Shopping
Recruiting
WeChat
Automobiles
Microblogging
geilicdn.com (mobile shopping), koudai.com (mobile shopping), meitu.com
yingjiesheng.com, 51job.com, zhaopin.com (recruitment sites)
duowan.com (game news), yy.com (game webcast), battlenet.com.cn
xnimg.com, renren.com, xnpic.com (all related to renren.com)
66game.com.cn, 7.qq.com (webgame), zg.qq.com (webgame)
weixin.qq.com (WeChat), apple.com, qq.com
autohome.com.cn, auto.suhu.com, auto.qq.com
sinaimg.cn, weibo.cn, blog.sina.cn (mobile blog)
TABLE IV.
LIST OF TOP THREE DOMAINS IN EACH CLUSTER WITHOUT
TF-IDF WEIGHTING.
Cluster No.
Top Three Domains
1
2
3
4
5
6
7
8
sinaimg.cn, sina.cn, sinastorage.com
qq.com, gtimg.com, speed.qq.com
baidu.com, bdimg.com, baidu-img.cn
xnimg.com, renren.com, xnpic.com
apple.com, verisign.com, autonavi.com
weixin.qq.com, apple.com, qq.com
360.cn, microsoft.com, mi.com
163.com, umeng.com, youdao.com
Fig. 5. Contour map of user birth year distributions in each cluster.
Fig. 6. Distribution of average campus card consumption in five months in
each cluster.
suburb of the city with few business areas and restaurants.
On the contrast, the graduate students are living in the urban
campus site. The restaurants and supermarkets are attractive
for them to spend more money outside the campus, while the
undergraduate students barely have chances. Reasons may also
be that the graduate students are more likely to get married
and spend less time on campus, which will cause the decrease
in the consumption. Therefore, to increase the turnover of
the university, administrators may pay efforts to improve the
attractiveness of campus dining halls, especially for professors
and graduate students.
By changing the number of clusters K, other interesting
phenomenons come out. For example, when K = 6,
the
clustering results show that users holding the same brand of
mobile devices, Apple and MI, are clustered into the same
group. The reason may be that different brands of smart
phones may tend to visit the APP domains that are within
its own ecosystem. When combining with their gender, it is
Fig. 4. Percentage of males in each cluster based on domains.
casual web games such as Plants vs. Zombies to big games
such as DotA.
Fig. 5 shows the user birth year distributions of each cluster
on a contour map. The clusters are the same as Fig. 3. There are
two highlighted regions in this figure. The upper one shows
that in the clusters of games and social networks, there are
more undergraduate students. The lower one shows that in the
cluster preferring recruiting websites, there are more graduate
students who are likely to be searching for jobs for themselves.
The results are quite straightforward that young students prefer
spending more time on entertainment, while graduate students
would like to pay more attention on job hunting and their
future direction. Combining with Fig. 4, these findings warn
the university to supervise the male undergraduates and avoid
them from being addicted to the games and abandoning their
studies. For graduate students, more recruitment information
can be targeted to them.
Fig. 6 shows the distribution of the average amount of
money consumed on the campus in five months, by users
of each cluster. The unit of the amount is RMB. Comparing
the statistics with the age distribution in Fig. 5, we can
find that undergraduate students spend more money inside
the campus than graduate students. As far as we know,
students in this university are divided into two campus sites.
The undergraduate students are living on the campus in the
IEEE 18th International Symposium on.
pp. 1–6.
IEEE, 2007,
[7] W. Paireekreng and K. Wong, “Client-side mobile
user profile for content management using data min-
ing techniques,” in Natural Language Processing, 2009.
SNLP’09. Eighth International Symposium on.
IEEE,
2009, pp. 96–100.
[8] Y. Xie and V. V. Phoha, “Web user clustering from access
log using belief function,” in Proceedings of
the 1st
international conference on Knowledge capture. ACM,
2001, pp. 202–208.
[9] S. Moghaddam and A. Helmy, “Multidimensional model-
ing and analysis of wireless users online activity and mo-
bility: A neural-networks map approach,” in Proceedings
of the 14th ACM international conference on Modeling,
analysis and simulation of wireless and mobile systems.
ACM, 2011, pp. 401–408.
[10] S. Moghaddam, A. Helmy, S. Ranka, and M. Somaiya,
“Data-driven co-clustering model of internet usage in
large mobile societies,” in Proceedings of the 13th ACM
international conference on Modeling, analysis, and sim-
ulation of wireless and mobile systems. ACM, 2010, pp.
248–256.
[11] M. ElSherief, T. ElBatt, A. Zahran, and A. Helmy, “The
quest for user similarity in mobile societies,” in Pervasive
Computing and Communications Workshops (PERCOM
Workshops), 2014 IEEE International Conference on.
IEEE, 2014, pp. 569–574.
[12] R. Giri, H. Choi, K. S. Hoo, and B. D. Rao, “User
behavior modeling in a cellular network using latent
dirichlet allocation,” in Intelligent Data Engineering and
Automated Learning–IDEAL 2014. Springer, 2014, pp.
36–44.
[13] A. Sundin, “Word space models for web user clustering
and page prefetching,” 2012.
[14] D. Arthur and S. Vassilvitskii, “k-means++: The advan-
tages of careful seeding,” in Proceedings of the eighteenth
annual ACM-SIAM symposium on Discrete algorithms.
Society for Industrial and Applied Mathematics, 2007,
pp. 1027–1035.
obvious that males prefer MI, while females prefer Apple.
Therefore, when an update for either of the brands releases,
the administrators for the campus networks can deploy cache
for Apple updates at girls’ dorms and cache for MI updates at
boys’ dorms.
VI. CONCLUSION
In this paper, we propose a method to analyze users’ inter-
net browsing behaviour and preferences. The user behaviour
modeling is based on an analogy between user behaviour pro-
filing and topic modeling in document classification. Methods
including TF-IDF and LSA are part of our process. With K-
Means++ algorithm, we are able to extract hidden browsing
habits by partitioning similar users into groups.
Combined with additional demographic information such
as age and gender of users, the clustering results reveal more
insights on user interests, which indicates the effectiveness of
our proposed algorithm. The browsing habits of users vary
with age and the differences between males and females are
obvious. This helps us to give advice for campus management,
including student management, school development and net-
work optimization.
With larger scaled dataset, e.g., the data in a district or
even a city, we may get more general user behaviour and these
findings can be used in many aspects, such as commercial rec-
ommendation and network operation management. Especially,
user behaviour may help with resource allocation and energy
saving problems.
ACKNOWLEDGMENT
This work is sponsored in part by the National Basic
Research Program of China (No. 2012CB316001), and the
Nature Science Foundation of China (No. 61201191 and
61401250),
the Creative Research Groups of NSFC (No.
61321061), the Sino-Finnish Joint Research Program of NSFC
(No. 61461136004), and Hitachi R&D Headquarter. We also
want to express our sincere appreciation for Shanghai Jiaotong
University to provide all the datasets used in this work.
REFERENCES
[1] N. Lin, G. Chen, K. Zheng, and Y. Tang, “Clusoaf:
A cluster-based semantic oriented analyzing framework
for user behaviors in mobile learning environment,” in
Human Centered Computing. Springer, 2015, pp. 340–
351.
[2] M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, “Un-
derstanding individual human mobility patterns,” Nature,
vol. 453, no. 7196, pp. 779–782, 2008.
[3] N. Bicocchi and M. Mamei, “Investigating ride sharing
opportunities through mobility data analysis,” Pervasive
and Mobile Computing, vol. 14, pp. 83–94, 2014.
[4] S. T. Dumais, “Latent semantic analysis,” Annual review
of information science and technology, vol. 38, no. 1, pp.
188–230, 2004.
[5] J. Xu and H. Liu, “Web user clustering analysis based
on kmeans algorithm,” in Information Networking and
Automation (ICINA), 2010 International Conference on,
vol. 2.
IEEE, 2010, pp. V2–6.
[6] P. N. Karamolegkos, C. Z. Patrikakis, N. Doulamis,
and E. Z. Tragos, “User-profile based communities as-
sessment using clustering methods,” in Personal, Indoor
and Mobile Radio Communications, 2007. PIMRC 2007.
|
1712.06979 | 2 | 1712 | 2018-09-05T10:31:33 | An Automorphic Distance Metric and its Application to Node Embedding for Role Mining | [
"cs.SI",
"physics.soc-ph"
] | Role is a fundamental concept in the analysis of the behavior and function of interacting entities represented by network data. Role discovery is the task of uncovering hidden roles. Node roles are commonly defined in terms of equivalence classes, where two nodes have the same role if they fall within the same equivalence class. Automorphic equivalence, where two nodes are equivalent when they can swap their labels to form an isomorphic graph, captures this common notion of role. The binary concept of equivalence is too restrictive and nodes in real-world networks rarely belong to the same equivalence class. Instead, a relaxed definition in terms of similarity or distance is commonly used to compute the degree to which two nodes are equivalent. In this paper, we propose a novel distance metric called automorphic distance, which measures how far two nodes are of being automorphically equivalent. We also study its application to node embedding, showing how our metric can be used to generate vector representations of nodes preserving their roles for data visualization and machine learning. Our experiments confirm that the proposed metric outperforms the RoleSim automorphic equivalence-based metric in the generation of node embeddings for different networks. | cs.SI | cs |
An Automorphic Distance Metric and its Application to Node Embedding for
Role Mining
V´ıctor Mart´ınez∗
Research Center for Information and Communications Technologies, University of Granada, Spain
Fernando Berzal† and Juan-Carlos Cubero‡
Department of Computer Science and Artificial Intelligence, University of Granada, Spain
Role is a fundamental concept in the analysis of the behavior and function of interacting entities
represented by network data. Role discovery is the task of uncovering hidden roles. Node roles are
commonly defined in terms of equivalence classes, where two nodes have the same role if they fall
within the same equivalence class. Automorphic equivalence, where two nodes are equivalent when
they can swap their labels to form an isomorphic graph, captures this common notion of role. The
binary concept of equivalence is too restrictive and nodes in real-world networks rarely belong
to the same equivalence class.
Instead, a relaxed definition in terms of similarity or distance
is commonly used to compute the degree to which two nodes are equivalent.
In this paper,
we propose a novel distance metric called automorphic distance, which measures how far two
nodes are of being automorphically equivalent. We also study its application to node embedding,
showing how our metric can be used to generate vector representations of nodes preserving their
roles for data visualization and machine learning. Our experiments confirm that the proposed
metric outperforms the RoleSim automorphic equivalence-based metric in the generation of node
embeddings for different networks.
I. INTRODUCTION
Role discovery is defined as the process of finding sets of nodes following similar connectivity patterns or structural
behaviors (Rossi and Ahmed, 2015). The role of a node can be understood as the function that node plays in the
network. Different studies have shown the importance of roles in different domains, including predator-prey food webs
(Luczkovich et al., 2003), international relations (Hafner-Burton et al., 2009), or the function of proteins in proteomes
(Holme and Huss, 2005).
Unfortunately, this problem has received limited attention when compared to community detection (Fortunato,
2010; Lancichinetti and Fortunato, 2009; Papadopoulos et al., 2012), despite the fact that role discovery identifies
complementary information and has found application in several useful network data mining tasks. For example,
roles can be used to model and characterize the behaviors of entities in a network to predict structural changes and
detect anomalies (Rossi et al., 2013). Since the same roles can be observed across different networks, this information
has been successfully exploited for transfer learning (Henderson et al., 2012). Role information can also be used for
enhanced visualization of interesting patterns in graphs (Xing et al., 2010). Additional applications of role discovery
are covered in more detail in (Rossi and Ahmed, 2015).
Formally, two nodes have the same role if, given an equivalence relation, they belong to the same equivalence class
(Burt, 1990; White et al., 1976). Different equivalence classes haven been studied for nodes in networks.
Structural equivalence, where two nodes play the same role if they are connected to exactly the same neighbor nodes,
has been widely studied (Lorrain and White, 1971; Sailer, 1978). These nodes will have exactly the same topological
properties, such as degree, clustering coefficient, or centrality, since they are indistinguishable from a structural point
of view. However, different authors have pointed out the limitations of structural equivalence for modeling roles or
positions (the name that roles receive in sociology), since structural equivalence is more related to the concept of
locality than the actual concept of role (Borgatti and Everett, 1992). If the constraint of needing to be connected to
exactly the same neighbors is relaxed to being connected to neighbors with exactly the same topological function,
we obtain automorphic equivalence classes, where two nodes are equivalent if they can swap their labels to form
an isomorphic graph (Friedkin and Johnsen, 1997; Pattison, 1988). Automorphically equivalent nodes will also have
exactly the same topological properties but, without the requirement of locality imposed by structural equivalence,
∗Electronic address: [email protected]
†Electronic address: [email protected]
‡Electronic address: [email protected]
2
pairs of nodes at distances larger than two can still have the same role. Therefore, automorphic equivalence is more
closely related to the intuitive concept of role, understood as the function of a node within a network.
Other equivalence classes,
less relevant than the ones previously mentioned, are not covered in this work.
Regular equivalence deserves special mention due to its importance as a relaxation of automorphic equivalence
that only requires being connected to nodes with the same function, omitting the actual count of connections
(Everett and Borgatti, 1994). Regular equivalence does not preserve topological properties and is more suited to
hierarchically-organized networks (Luczkovich et al., 2003).
These binary equivalences are strict mathematical abstractions that rarely occur in real-world networks, leading to
all nodes being assigned a different role. In practice, these equivalences are relaxed to similarities, allowing two nodes
to play the same role by partially satisfying the constraints imposed by the mathematical definition of structural,
automorphic, or regular equivalence.
In this paper, we present a novel automorphic distance metric, capturing distances between nodes in terms of
automorphic equivalence. According to the network structure, two nodes will be at a distance that is proportional
to how far they are from being automorphically equivalent. This leads to a softer definition of automorphic roles,
instead of forcing all nodes to fit in strict classes of roles. However, when needed, these distances can be used to
discover and instantiate specific role classes. Our distance function satisfies metric axioms, as we prove below, does
not require external parameters nor feature engineering, and is computable for nodes across different networks. We
also present different applications of our proposal, with special emphasis on generating node embeddings that preserve
node roles. Node embeddings are vector representations of nodes capturing relevant information in terms of pair-wise
distances (Goyal and Ferrara, 2017). Much work has been done in embedding techniques that preserve neighborhoods
or communities (Grover and Leskovec, 2016; Zheng et al., 2016), but, to the best of our knowledge, our work is the
first one on role-preserving embeddings.
Our paper is structured as follows. In Section 2, we discuss the relevant related work. In Section 3, we describe our
proposed automorphic distance metric and study its admissibility as a distance metric, as well as its computational
complexity. In Section 4, we analyze its application to the generation of node embeddings that preserve roles and
show how it outperforms previously proposed approaches. Finally, conclusions and suggestions for future research are
presented in Section 5.
II. RELATED WORK
Different metrics have been proposed to measure node similarity. One of the most popular metrics is SimRank
(Jeh and Widom, 2002), which iteratively computes similarity scores based on the hypothesis that two nodes are
similar if they link to similar nodes. Different extensions of SimRank have been proposed (Hamedani and Kim, 2016).
SimRank recursively computes similarity of two nodes according to the average similarity of all their neighbor pairs,
which can also be interpreted, as suggested by its original authors, as how soon two random walkers will meet if they
start from these nodes. Thus, this definition is not suitable as a metric of similarity capturing automorphic equivalence
because it requires the two nodes to be close to play the same role. Other similarity measures not based on SimRank
have been proposed, such as PageSim (Lin et al., 2006) and Leicht's vertex similarity (Leicht et al., 2006). These
similarities are formally rejected as valid metrics for capturing automorphic equivalence in (Jin et al., 2014).
Since automorphic equivalence ensures the same topological properties, some authors have tried to capture auto-
morphic equivalence by defining a similarity function over a set of network topological properties (Li et al., 2015).
The problem of these feature-based methods is that they require combining different complex hand-crafted features
obtained by experts, which is far from trivial in practice. In addition, they cannot guarantee which set of features
will correctly approximate automorphic equivalence, leading to a very limited approach to automorphic equivalence
discovery.
As far as we know, RoleSim (Jin et al., 2011, 2014) is the only proposed metric that tries to formally capture the
concept of automorphic equivalence without using limited approximations based on hand-crafted topological features.
Omitting the decay factor they introduce, by setting it to 0 in order to capture the global network topology, this
similarity measure is iteratively computed until convergence as
s(x, y) = max
M(x,y)
P(u,v)∈M(x,y) s(u, v)
deg(x) + deg(v) − M (x, y)
where deg(n) is the degree of a node n and M (x, y) is the optimal assignment of nodes in the neighborhood of x to
nodes in the neighborhood of y maximizing the expression; that is, the pairs of neighbors of x and y with maximal
similarity. In their work, Jin et al. prove that this function satisfies the axioms required to be considered a valid
role similarity metric. RoleSim is a form of generalized Jaccard coefficient based on a recursive definition of the
similarity of neighbor roles. Despite the admissibility of RoleSim, their approach presents several limitations. The
RoleSim similarity can be considered an automorphic distance by taking its complementary or Jaccard distance:
d(x, y) = 1 − s(x, y). The problem is that the Jaccard coefficient is a normalized metric, which leads to a normalized
distance. As will be shown in our experimentation, this normalization has a negative impact on the results obtained
by RoleSim. In addition, this similarity function exhibits serious inconsistencies. For example, in the graph shown in
Figure 1, where node d has a one-to-many relationship to xi nodes, the node pair (a, c) has the same exact similarity
than any pair (a, xi), independently of the number of xi nodes. This simple example shows the limitations of RoleSim
when trying to capture automorphic similarity.
3
a
b
d
c
x1
x2
...
xn
FIG. 1: Example graph where RoleSim yields inconsistent values. Node d has a one to many relation to xi nodes.
As far as we know, no distance metric has been proposed that is able to capture the concept of automorphic
distance in a consistent way, without relying on approximations based on extracted topological properties nor forcing
the normalization of the distance function.
III. A NOVEL AUTOMORPHIC DISTANCE METRIC
An isomorphism is a bijection between the nodes of two graphs where two nodes are adjacent in one graph if and only
if the nodes that result from applying the bijective function are also adjacent in the other graph. An automorphism
is an isomorphism from one graph to itself. Therefore, two nodes are automorphically equivalent if there exists an
automorphism creating a correspondence between them.
One form of testing for automorphic equivalence is computing the canonical form of graphs. Graph canonization
is the task of computing a labeling for nodes in a graph such that every isomorphic graph yields the same canonical
labeling. Given a canonized graph, two automorphically-equivalent nodes must have been assigned the same label. As
previously stated, automorphic equivalence is too restrictive to appear in real-world networks, leading to most nodes
having different canonical labels.
The solution that we propose to this problem is the definition of distances between labels, which ultimately allows
the definition of distances between nodes based on the concept of automorphic equivalence. This distance will be
proportional to the number of changes that need to be done in the network to transform one label or equivalence class
into another. A zero distance implies that two nodes are automorphically equivalent and play exactly the same role.
According to this distance d, we can say that nodes x and y are more automorphically similar or have a more similar
role than u and v if d(x, y) < d(u, v). In order to propose a valid distance metric, we must also prove that our metric
satisfies the distance metric axioms.
Our work is based on the 1-dimensional Weisfeiler-Lehman test of isomorphism (Furer, 2001; Weisfeiler and Lehman,
1968), also known as color refinement, which is an algorithm to compute the canonical labeling of graphs. These canon-
ical labels can be used to solve related problems, such as the computation of efficient graph kernels (Shervashidze et al.,
2011). The Weisfeiler-Lehman algorithm works by initially assigning a label to each node according to its degree, so
nodes with the same degree have the same initial label. Then, the algorithm iteratively updates these labels by the
following procedure. First, it takes the labels from neighbor nodes, concatenates them according to certain arbitrary
order (the same ordering must be applied for all nodes), and finally appends the label of the node at the beginning
of the obtained list. Each different sequence is substituted by a newly generated unique label so nodes exhibiting
exactly the same sequence are assigned the same label. This refinement process is repeated until labels stabilize, that
is, when every pair of nodes with the same label in the previous iteration have the same label in the current iteration.
Therefore, after m iterations, which depend on the network diameter, the canonical form is achieved and an additional
iteration is required for testing the stabilization condition. These final labels are the canonical form of the graph and,
4
therefore, two nodes with the same final label are automorphically equivalent. An example of running the algorithm
in a simple graph is shown in Figure 2.
2
1
5
7
3
2
4
4
(b) Initial labeling.
6
8
5
9
(a) Original graph.
32,2,4
23,4
41,2,3,4
41,1,2,4
14
14
(c) First iteration.
(d) First relabeling.
65,5,8
56,9
11
12
79
79
10
14
85,6,7,9
95,7,7,8
15
16
(e) Second iteration.
(f) Second and final relabeling.
FIG. 2: The Weisfeiler-Lehman canonization algorithm applied to a simple graph.
1
1
7
7
13
13
23,4
14
56,8
78
It can be noted that some pairs of the labels appearing in the same iteration of the Weisfeiler-Lehman algorithm
are more similar than others. The automorphic distance between two nodes can be defined as the distance between
their canonical labels. We propose a scheme to compute distances between the labels that are obtained by the
Weisfeiler-Lehman algorithm. Since distances are only defined for labels appearing in the same iteration, a special
label associated to nodes of degree 0, which we call the empty label ℓ∅, is considered for convenience. Isolated nodes
are directly assigned this label and left out of the iterative process.
Since labels created in the initial assignment are based on node degree, we define the distance of labels of nodes x
and y as the number of links that must be added to or removed from node x to transform it into node y. This can be
easily computed as their absolute degree difference:
d(ℓ0(x), ℓ0(y)) = deg(x) − deg(y),
(1)
where ℓ0(n) is the initially-assigned label to node n. This definition of distance for initial labels is also valid for
isolated nodes, with degree 0, which have been assigned the empty label.
Given these distances for initial labels, the distance between labels for the subsequent iterations can be computed
as the distance of the optimally-matched pairs of labels of their neighbors from the previous iteration. The distance
of labels from the i-th iteration can be computed as
d(ℓi(x), ℓi(y)) = min
Mi−1(x,y)
X
d(ℓi−1(u), ℓi−1(v)),
(u,v)∈Mi−1(x,y)
5
(2)
where Mi−1(x, y) is the optimal assignment of neighbors of x to neighbors of y that minimizes the expression and,
therefore, it is just the sum of distances between neighbors of x and y. If the neighborhood of one node is larger than
the neighborhood of the other, leading to unmatched nodes, these nodes are directly matched with virtual nodes,
which are labeled with ℓ∅. The distances of unmatched nodes to the empty label can be seen as the cost, in terms
of distance, of inserting and transforming a virtual isolated node to obtain a node with the label of the unmatched
node. The optimal assignment, which would consider O(n!) alternatives using a naive brute force approach, can be
computed in polynomial time using the Hungarian algorithm (Kuhn, 1955).
Initially, Equation 1 and, in subsequent iterations, Equation 2 are used to compute a distance table. At any given
time, only distances from two iterations need to be maintained: the distances currently being computed and the
distances from the most recent previous iteration.
The described iterative process is carried out for each iteration of the 1-dimensional Weisfeiler-Lehman algorithm
until label stabilization. The automorphic distance between a pair of nodes is defined as the distance between their
canonical labels. It should be noted that labels can be represented using any set of symbols. However, for simplicity,
we represent labels as positive integers.
Algorithm 1 Automorphic Distance Algorithm
procedure Automorphic Distance
Input: Set of nodes N of an undirected graph.
Initialize i = 0, stabilized = f alse, r = HashT able().
Set ℓi(x) = deg(x) ∀x ∈ N .
Set d(ℓi(x), ℓi(y)) = deg(x) − deg(y) ∀x, y ∈ N × N .
while not stabilized do
Set m = i. Iterate i = i + 1.
Set hi(x) = concatenate(sort(neighbors(x))).
Set ci(x) = concatenate(ℓi−1(x), hi(x)).
Set ℓi(x) = unique(ci(x)).
Use Hungarian algorithm to compute Mi−1(x, y) ∀x, y ∈ N × N .
Set d(ℓi(x), ℓi(y)) = minMi−1(x,y) P(u,v)∈Mi−1(x,y) d(ℓi−1(u), ℓi−1(v)) ∀x, y ∈ N × N .
Set stabilized = true.
Store in r the label of x in iteration i − 1 ∀x ∈ N as r[ℓi(x)] = ℓi−1(x).
If the entry r[ℓi(x)] was already set with a different label, set stabilized = f alse.
end while
Set d(x, y) = d(ℓm(x), ℓm(y)) for each pair of nodes x, y ∈ N × N .
Output: Pairwise automorphic distances d(x, y) for each pair of nodes x, y ∈ N × N .
end procedure
The complete algorithm is shown in Algorithm 1. The function neighbors(x) returns the set of neighbor nodes of
node x. The function sort(s) sorts a set of elements. The ordering among elements is not relevant for the algorithm,
but the same ordering must always be applied. The function concatenate(x1, . . . , xn) returns the concatenation of
elements x1, . . . , xn. Finally, the function unique(s) generates and returns a unique symbol, such an integer, for each
observed unique string s, where unique(s) = unique(s′) if and only if s = s′.
A. Case Example
In this section, we show an illustrative example applying the proposed automorphic distance metric to the network
shown in Figure 2a.
The proposed algorithm for computing the automorphic distance initially assigns a label to each node according to
its degree, as shown in Figure 2b. Therefore, two nodes will have the same label if and only if they have the same
degree. The initial distance table, represented as an upper triangular matrix due to the symmetry of distances, as will
be proved in Section III.B.3, is shown in Table I. This distance table is computed using Equation 1 according to the
initial label assignations. For example, the distance between the labels 1 and 4 is 3, since this value is the absolute
degree difference of the corresponding nodes.
After the initialization, the algorithm enters into its main loop and performs its first iteration. For each node, the
labels of its neighbors are ordered and concatenated with its own label, as shown in Figure 2c. For example, the only
6
ℓ/ℓ ℓ∅ 1 2 3 4
ℓ∅ 0 1 2 3 4
0 1 2 3
1
0 1 2
0 1
0
2
3
4
TABLE I: Initialization of the distance table.
node with label 3 has the associated string 32, 2, 4, since its neighbors have labels 2, 4, and 2. These concatenated
strings are replaced by a new label, chosen so that two nodes are assigned the same new label if and only if they had
the same concatenated string. This process generates a new labeling as shown in Figure 2d. Given these new labels,
the algorithm computes their pairwise distances using Equation 2, which are shown in Table II.
ℓ/ℓ ℓ∅ 5 6 7 8 9
ℓ∅ 0 7 8 4 10 8
0 3 3 3 3
5
0 4 4 2
0 6 4
0 2
0
7
8
9
6
TABLE II: Distance table after the first relabeling.
For example, in order to compute the distance between labels 5 and 9, the optimal assignment between their
In the
neighbors minimizing the summation of distances, according to the previous iteration, must be obtained.
previous iteration, 3 and 4 were the labels of the neighbors of nodes with label 5. Likewise, 1, 1, 2, and 4 were the
labels of the neighbors of nodes with label 9. The Hungarian algorithm matches these neighbor labels to minimize
their sum of distances: (3, 2) and (4, 4) according to Table I. Since the two neighbor labels 1 of label 9 were left
unmatched, they are both matched with the empty label as (1, ℓ∅). Given this optimal assignment, we can compute
the distance between labels 5 and 9 as:
d1(5, 9) = d0(3, 2) + d0(4, 4) + d0(1, ℓ∅) + d0(1, ℓ∅) = 1 + 0 + 1 + 1 = 3
Following this iterative process, the algorithm performs the second iteration. Concatenated strings are computed
as shown in Figure 2e and labels are updated as shown in Figure 2f. It can be easily seen that labels have stabilized,
obtaining the canonical labeling of this graph. The stabilization condition can be tested by performing an additional
iteration and observing that nodes with label 13 are assigned the same label, while the other nodes are assigned an
unique new label. This new labeling would be equivalent to the labeling obtained in this iteration, the condition
required to achieve stabilization. The pairwise distances computed in this iteration are shown in Table III.
11
ℓ/ℓ ℓ∅ 10 11 12 13 14 15 16
ℓ∅ 0 18 24 16 8 10 27 25
0 10 2 12 8 13 11
10
0 12 16 14 13 7
8 10 11 13
2 19 17
0
0 21 15
6
0
12
14
13
15
16
0
0
TABLE III: Distance table after the second and final relabeling.
For instance, let us compute the distance between labels 11 and 16. We start by finding the optimal assignment
that minimizes the pairwise distances of their neighbor labels in the previous iteration, which are 5, 5, and 8 for label
7
11 and 5, 7, 7, and 8 for label 16. The Hungarian algorithm obtains the optimal matching (5, 5), (5, 7), and (8, 8),
with an additional (ℓ∅, 7), due to the difference of the node degrees associated to labels 11 and 16. Once this optimal
matching has been obtained, we can easily compute the distance between labels 11 and 16 using Equation 2 as:
d2(11, 16) = d1(5, 5) + d1(5, 7) + d1(8, 8) + d1(ℓ∅, 7) = 0 + 3 + 0 + 4 = 7
The automorphic distance between a pair of nodes is defined as the distance between their canonical labels, which
are the final labels assigned in the iteration where stabilization is achieved. Therefore, in our example, the distance
between nodes is given by Table III. For example, we can see how nodes with canonical labels 13 and 14 are close to
being automorphically equivalent, since their automorphic distance is only 2. In contrast, nodes with canonical labels
14 and 15 have a large automorphic distance, equal to 21, which indicates that they are far from being automorphically
equivalent.
B. Metric Admissibility
In this section, we prove that the distance function that we have defined is a valid metric or distance function. In
order to assert this statement, we must prove the following four conditions: non-negativity, identity of indiscernibles,
symmetry, and triangle inequality.
To prove these conditions, we note that Equation 2 can be recursively decomposed as
d(ℓm(x), ℓm(y)) = min
Mm−1(x,y)
X
d(ℓm−1(u), ℓm−1(v))
(u,v)∈Mm−1(x,y)
d(ℓm−2(u′), ℓm−2(v′))
= min
Mm−1(x,y)
Mm−2(u,v)
X
(u,v)∈
X
(u′,v′)∈
Mm−1(x,y)
Mm−2(u,v)
= . . .
= X
(x′,y ′)∈M ′(x,y)
d(ℓ0(x′), ℓ0(y′))
= X
deg(x′) − deg(y′)
(x′,y ′)∈M ′(x,y)
(3)
where M ′(x, y) is the set of pairs of nodes that appear in the recursive summation at the deepest level of recursion
as a result of choosing the optimal assignment in each iteration.
1. Proof of Non-Negativity
Non-negativity requires that the distance function satisfies d(x, y) ≥ 0 for any possible pair of nodes x and y. Given
the decomposition of our metric as shown in Equation 3, it is straightforward to see that the summation of absolute
values is guaranteed to be always equal or greater than 0.
2. Proof of the Identity of Indiscernibles
The identity of indiscernibles implies that the distance function satisfies d(x, y) = 0 if and only if x ≡ y. The
Weisfeiler-Lehman algorithm guarantees that automorphically equivalent pairs of nodes are assigned the same canon-
ical label, and non-automorphically equivalent pairs of nodes are assigned different canonical labels.
Equation 3 is only equal to zero when deg(x′) = deg(y′) for every pair of nodes in M ′(x, y). Two nodes can
only have the same canonical label if they are automorphically equivalent, as guaranteed by the Weisfeiler-Lehman
algorithm. If two nodes are assigned the same canonical label, their neighbors must have been assigned equivalent
labels in all the iterations. Since the distance of a label to itself is 0, we can see that the summation yields 0, leading
to a zero distance for nodes when x ≡ y.
On the other side, when two nodes have different canonical labels, their neighbors must have been assigned different
labels during the execution of the algorithm. This implies that, in the recursive decomposition shown in Equation 3,
at least one pair of nodes will not match nodes with the same initial labels, leading to a distance greater than 0 for
nodes x 6≡ y.
8
3. Proof of Symmetry
The condition of symmetry requires that the proposed distance function must satisfy the property d(x, y) = d(y, x).
We can prove that Equation 3 is symmetric, as
d(ℓm(x), ℓm(y)) = X
deg(x′) − deg(y′)
(x′,y ′)∈M ′(x,y)
= X
deg(y′) − deg(x′)
(y ′,x′)∈M ′(y,x)
= d(ℓm(y), ℓm(x))
since M ′(x, y) is equal to M ′(y, x) when we swap the nodes. The order of the nodes in each pair does not affect the
result of our distance function.
4. Proof of the Triangle Inequality
The triangle inequality requires that the inequality d(x, y) ≤ d(x, z)+d(z, y) is satisfied by the proposed automorphic
distance function.
By the definition of the proposed distance, we know that
d(x, y) ≤ d(x, z) + d(z, y) =⇒
d(ℓm(x), ℓm(y)) ≤ d(ℓm(x), ℓm(z)) + d(ℓm(z), ℓm(y)) =⇒
deg(a) − deg(c) + X
deg(a) − deg(b) ≤ X
X
(a,b)∈M ′(x,y)
(a,c)∈M ′(x,z)
(c,d)∈M ′(z,y)
deg(c) − deg(d).
We know that the absolute value satisfies the triangle inequality, thus the lower value that the right side can take is
X
deg(a) − deg(b) ≤ X
deg(a) − deg(d)
(a,b)∈M ′(x,y)
(a,d)∈M ′′(x,y,z)
where M ′′(x, y, z) is the set of pairs resulting from chaining or combining M ′(x, z) and M ′(z, y) so that (a, d) ∈
M ′′(x, y, z) if and only if, (a, c) ∈ M ′(x, z) and (c, d) ∈ M ′(z, y).
For this inequality to hold, it requires the non-existence of a pairing of nodes better than the matching done in the
left side. Since the Hungarian algorithm ensures that matchings are optimal, minimizing their sum of distances, the
matching at the right side cannot be better than optimal and, therefore, the value of the right side can only be equal
to or greater than the value on the left side, satisfying the triangle inequality condition.
C. Metric Computational Complexity
In this section, we analyze the temporal and spatial computational complexity of our proposed metric.
The initialization of labels based on the degree of nodes has O(n) temporal and spatial complexity, where n is
the number of nodes in the network. The computation of the table for the initial distances has O(n2) temporal and
spatial complexity, since the distance is computed for every pair of nodes.
Each iteration of the algorithm requires computing the sorted list of labels of the neighbors for each node. This
task can be accomplished for each node with computational and spatial complexity O(k), where k is the degree of the
node, when using radix, bucket, or counting sort. Thus, computing these strings for all nodes has O(nk) temporal
and spatial complexity. Renaming these labels can be done in O(n) time using hash-based data structures. To
compute the pairwise distances between labels in the current iteration, the Hungarian algorithm, with computational
complexity O(k3), must be computed for each pair of nodes, leading to O(n2k3) temporal complexity and O(n2)
spatial complexity. Finally, checking if the labels have stabilized can be done in O(n) using a hash-based index.
The number of iterations, m, required for 1-dimensional Weisfeiler-Lehman algorithm to converge is closely related
to the diameter of the network (Furer, 2001). Even though the number of iterations is theoretically bounded by n, it
has been widely observed that real-world networks tend to exhibit the small-world phenomenon, presenting a small
9
diameter (Travers and Milgram, 1967; Watts and Strogatz, 1998) and leading to a small number of iterations required
for convergence.
Therefore, by combining these partial results, the total temporal complexity is O(n + n2 + mn2k3) ≈ O(mn2k3),
where n is the number of nodes in the graph, k is the degree of nodes, and m is the number of iterations required for
convergence. The spatial complexity of the algorithm is O(n2), since only the distances and labels from the previous
and the current iteration must be maintained at any given time. In practice, the algorithm can handle large networks,
given that m and k tend to remain small in real-world networks due to their sparse and small-world nature.
In
addition, most of these steps can be easily parallelized, since most of them are independent for each node and are
only based on the results from the previous iteration. For example, the initial labels for each node can be assigned
independently. Once we have assigned these labels, the computation of their pairwise distances can be split among
the available processors, since they are independent. The iterative assignment of labels in each loop iteration can be
also parallelized using a concurrent data structure to ensure that the new labels are properly generated. Furthermore,
the pairwise distances between these new labels can be easily computed in a parallel way, since they are completely
independent as they only rely on the distance table computed in the previous iteration.
IV. EXPERIMENTAL EVALUATION
The experimental evaluation of role discovery techniques is a complicated task due to the lack of available evaluation
datasets. Most role mining research projects use private datasets, which are not released and made publicly available
to the scientific community. To overcome this limitation and perform an illustrative comparison of automorphic
distances, we propose a novel experimental evaluation, which is presented in this section. As a collateral result of this
experimentation, a new method for representing node roles using feature vectors is presented.
A central problem in machine learning is finding representations that ease the visualization or extraction of useful
information from data (Bengio et al., 2013). A common solution is the computation of embeddings that represent
complex objects in a vector space preserving certain properties (Goldberg and Levy, 2014). Node embedding, also
known as graph embedding, is the task of mapping each node in a graph to a dimensional space trying to preserve the
similarity or distance between pairs of nodes. Therefore, similar nodes will be located in similar regions of the space.
Node embeddings have lately gained attention since they have achieved good results in different machine learning
tasks (Goldberg and Levy, 2014). Several models have been proposed for node embedding. However, these techniques
try to preserve the connectivity of the network by obtaining embeddings that preserve structural equivalence, the
neighborhood, or the community of nodes (Grover and Leskovec, 2016; Perozzi et al., 2014; Zheng et al., 2016). This
information has proven to be useful due to the presence of homophily, also known as assortativity, in real-world
networks (McPherson et al., 2001), where entities tend to be connected to similar ones, a feature that allows us to
explain certain features of the nodes. Even though the connectivity information captured by these techniques is
relevant, these techniques fail to capture information related to the role or function of the nodes in the network, which
is a highly-valuable information that is complementary to the information obtained by locality-based embedding
techniques.
We propose a new kind of embedding by exploiting this complementary information. Our node embeddings capture
the roles of nodes by placing nodes that play a similar function in the network close in the resulting vector space.
To compute these embeddings, we apply the classical multidimensional scaling (MDS) (Borg and Groenen, 2005;
Wickelmaier, 2003) to the distance matrices computed by the different approaches. In the following section, we show
how 2-dimensional embeddings can capture relevant information in different real-world networks. We compare the
results obtained by our distance metric with the results obtained by RoleSim, which can be interpreted as a distance
function as previously described.
A. Zachary's Karate Club Network
Zachary's karate club network is a popular social network representing the 34 members (as nodes) of a university
karate club and their interactions (as edges) outside the club (Zachary, 1977). During the study carried out by Wayne
W. Zachary, a conflict arose between the two club administrators, leading to the split of the club into two groups
according to the leader each member decided to follow. For this reason, this network has served as a prototypical case
study for community detection algorithms and some network analysis techniques.
If each member is assigned to a binary class according to the leader it decided to follow, Zachary observed that
this property is highly homogeneous and assortative. Therefore, nodes tend to be connected to nodes that took the
same decision. In this context, previously proposed embedding techniques generate embeddings that clearly separate
nodes according to the leader they decided to follow (Perozzi et al., 2014). This information is crucial when the task
10
is related to community detection. However, these embeddings fail, by nature, to reveal the role of each node in the
network.
To illustrate how our technique captures the roles of nodes, we assigned a class to each node according to objective
role-related properties. The two leaders are colored in red. Nodes interacting with the two leaders are colored in
green. Nodes not interacting with any of the two leaders are colored in yellow. Finally, the remaining nodes, which
interact with only one of the leaders, are colored in blue. Figure 3 shows the network drawn using the Kamada-Kaway
layout algorithm (Kamada and Kawai, 1989) and the embeddings obtained by applying our automorphic distance and
RoleSim. It can be seen the four classes of roles are linearly separated in the embedding generated using our distance
metric. In addition, it can be seen how the two leaders are clearly mapped as outliers, placed significantly apart from
the other nodes representing normal members of the club. However, RoleSim fails to clearly separate the different
role classes. The two leaders are placed pretty close to normal club members, without capturing their unique function
in the network.
(a) Kamada-Kawai layout.
(b) Automorphic embedding.
(c) RoleSim embedding.
FIG. 3: Zachary's karate club network and its node embeddings, with node role coloring.
B. World Trade Network
In network data mining, homophily is commonly exploited in node classification tasks, since nodes tend to exhibit
the same class than their neighbors (Bhagat et al., 2011). Even though this situation occurs in a large number of
networks from very different domains, homophily-based classification techniques fail when the classes of the nodes are
defined by the role they play in the network, instead of by the community they belong to.
An illustrative example of this situation is a network containing data on trade of miscellaneous manufactures of
metal among 80 countries 1, according to data gathered in 1993 and 1994 from the Commodity Trade Statistics
published by the United Nations (Nooy et al., 2011). Each country is represented by a node in the network. Each
commercial relationship is represented by an arc, which we consider an undirected edge in practice. In this case, arcs
correspond to trading high technology products or heavy manufactures between countries.
In addition, the authors of this dataset annotated countries in the network with their structural world economic
position in 1994. World economic positions are a classification of countries in the context of the world-system theory
that explains some complex dynamics observed in the real world (Chirot and Hall, 1982; Smith and White, 1992).
This classification splits countries into three possible categories: core countries (colored in green), semi-periphery
countries (colored in blue), and periphery countries (colored in red). In short, core countries have a high economical,
military, and political power, which allows them to control the world economic system. The periphery is composed
of less developed countries, owning a disproportionately small share of global wealth. Finally, the semi-periphery is
conformed by countries that do not clearly fall in the previous two categories and exhibit a more intermediate status.
Figure 4 shows the trade network drawn using the Kamada-Kaway layout algorithm and the embeddings obtained
by applying our automorphic distance and the RoleSim-based distance. It can be seen that both metrics achieve a good
separation of core and semi-periphery countries. However, our distance metric is clearly superior in the separation
of semi-periphery and periphery countries.
In addition, the embedding generated using distances computed with
1 The dataset can be downloaded from http://vlado.fmf.uni-lj.si/pub/networks/data/esna/metalWT.htm
RoleSim exhibits an artificial curved-line shape, which indicates that only a dimension would be required to represent
the information captured by RoleSim. In contrast, the embedding generated using our proposed automorphic distance
exploits the two dimensions to represent role-related node properties and achieves a better separation of the different
classes.
11
(a) Kamada-Kawai layout.
(b) Automorphic embedding.
(c) RoleSim embedding.
FIG. 4: World trade network and its corresponding node embeddings.
V. CONCLUSIONS
In this paper, we have proposed a novel distance metric for nodes that relaxes the strict concept of automorphic
equivalence. To the best of our knowledge, this is the first work to propose a consistent non-normalized distance
metric that captures the concept of automorphic equivalence without approximating it using feature engineering.
In addition, we have shown that the proposed distance function is a valid distance metric by proving the required
conditions. Finally, we have shown how our metric can be exploited to generate node embeddings that capture role
information in contrast to previously proposed embedding techniques, which capture locality-based information. We
have also shown how our metric is superior to RoleSim in the generation of automorphic node embeddings, leading
to a better separation of nodes according to their roles.
Our proposal creates new opportunities in problems related to role discovery. Future work includes exploiting our
distance metric in problems related to anomaly detection in networks and transfer learning based on roles shared by
nodes across different networks.
Acknowledgments
This work is partially supported by the Spanish Ministry of Economy and the European Regional Development
Fund (FEDER), under grant TIN2012-36951 and the program "Ayudas para contratos predoctorales para la formaci´on
de doctores 2013" (grant BES-2013-064699).
References
Yoshua Bengio, Aaron Courville, and Pascal Vincent. Representation learning: A review and new perspectives. IEEE Trans-
actions on Pattern Analysis and Machine Intelligence, 35(8):1798 -- 1828, 2013.
Smriti Bhagat, Graham Cormode, and S. Muthukrishnan. Node classification in social networks, pages 115 -- 148. Springer US,
Boston, MA, 2011. ISBN 978-1-4419-8462-3.
Ingwer Borg and Patrick JF Groenen. Modern multidimensional scaling: Theory and applications. Springer Science & Business
Media, 2005. ISBN 978-0-387-28981-6.
Stephen P Borgatti and Martin G Everett. Notions of position in social network analysis. Sociological Methodology, pages 1 -- 35,
1992.
Ronald S Burt. Detecting role equivalence. Social Networks, 12(1):83 -- 97, 1990.
Daniel Chirot and Thomas D Hall. World-system theory. Annual Review of Sociology, 8(1):81 -- 106, 1982.
Martin G Everett and Stephen P Borgatti. Regular equivalence: General theory. Journal of Mathematical Sociology, 19(1):
29 -- 52, 1994.
Santo Fortunato. Community detection in graphs. Physics Reports, 486(3):75 -- 174, 2010.
Noah E Friedkin and Eugene C Johnsen. Social positions in influence networks. Social Networks, 19(3):209 -- 222, 1997.
12
Martin Furer. Weisfeiler-Lehman refinement requires at least a linear number of iterations. In International Colloquium on
Automata, Languages, and Programming, pages 322 -- 333. Springer, 2001.
Yoav Goldberg and Omer Levy. word2vec explained: deriving Mikolov et al.'s negative-sampling word-embedding method.
arXiv preprint arXiv:1402.3722, 2014.
Palash Goyal and Emilio Ferrara. Graph embedding techniques, applications, and performance: A survey. arXiv preprint
arXiv:1705.02801, 2017.
Aditya Grover and Jure Leskovec. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining, pages 855 -- 864. ACM, 2016.
Emilie M Hafner-Burton, Miles Kahler, and Alexander H Montgomery. Network analysis for international relations. Interna-
tional Organization, 63(3):559 -- 592, 2009.
Masoud Reyhani Hamedani and Sang-Wook Kim. SimRank and its variants in academic literature data: Measures and
evaluation. In Proceedings of the 31st Annual ACM Symposium on Applied Computing, pages 1102 -- 1107. ACM, 2016.
Keith Henderson, Brian Gallagher, Tina Eliassi-Rad, Hanghang Tong, Sugato Basu, Leman Akoglu, Danai Koutra, Christos
Faloutsos, and Lei Li. Rolx: Structural role extraction & mining in large graphs. In The 18th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining, KDD '12, Beijing, China, August 12-16, 2012, pages 1231 -- 1239,
2012.
Petter Holme and Mikael Huss. Role-similarity based functional prediction in networked systems: Application to the yeast
proteome. Journal of the Royal Society Interface, 2(4):327 -- 333, 2005.
Glen Jeh and Jennifer Widom. SimRank: A measure of structural-context similarity. In Proceedings of the 8th ACM SIGKDD
international conference on Knowledge discovery and data mining, pages 538 -- 543. ACM, 2002.
Ruoming Jin, Victor E Lee, and Hui Hong. Axiomatic ranking of network role similarity. In Proceedings of the 17th ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 922 -- 930. ACM, 2011.
Ruoming Jin, Victor E Lee, and Longjie Li. Scalable and axiomatic ranking of network role similarity. ACM Transactions on
Knowledge Discovery from Data (TKDD), 8(1):3, 2014.
Tomihisa Kamada and Satoru Kawai. An algorithm for drawing general undirected graphs. Information Processing Letters, 31
(1):7 -- 15, 1989.
Harold W Kuhn. The Hungarian method for the assignment problem. Naval Research Logistics (NRL), 2(1-2):83 -- 97, 1955.
Andrea Lancichinetti and Santo Fortunato. Community detection algorithms: A comparative analysis. Physical Review E, 80
(5):056117, 2009.
Elizabeth A Leicht, Petter Holme, and Mark EJ Newman. Vertex similarity in networks. Physical Review E, 73(2):026120,
2006.
Longjie Li, Lvjian Qian, Victor E. Lee, Mingwei Leng, Mei Chen, and Xiaoyun Chen. Fast and accurate computation of role
similarity via vertex centrality, pages 123 -- 134. Springer International Publishing, 2015. ISBN 978-3-319-21042-1.
Zhenjiang Lin, Michael R Lyu, and Irwin King. PageSim: A novel link-based measure of web page aimilarity. In Proceedings
of the 15th International Conference on the World Wide Web, pages 1019 -- 1020. ACM, 2006.
Francois Lorrain and Harrison C White. Structural equivalence of individuals in social networks. The Journal of Mathematical
Sociology, 1(1):49 -- 80, 1971.
Joseph J Luczkovich, Stephen P Borgatti, Jeffrey C Johnson, and Martin G Everett. Defining and measuring trophic role
similarity in food webs using regular equivalence. Journal of Theoretical Biology, 220(3):303 -- 321, 2003.
Miller McPherson, Lynn Smith-Lovin, and James M Cook. Birds of a feather: Homophily in social networks. Annual Review
of Sociology, 27(1):415 -- 444, 2001.
Wouter De Nooy, Andrej Mrvar, and Vladimir Batagelj. Exploratory social network analysis with Pajek. Cambridge University
Press, New York, NY, USA, 2011. ISBN 0521174805, 9780521174800.
Symeon Papadopoulos, Yiannis Kompatsiaris, Athena Vakali, and Ploutarchos Spyridonos. Community detection in social
media. Data Mining and Knowledge Discovery, 24(3):515 -- 554, 2012.
Philippa E Pattison. Network models: Some comments on papers in this special issue. Social Networks, 10(4):383 -- 411, 1988.
Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. DeepWalk: Online learning of social representations. In Proceedings of the
20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 701 -- 710. ACM, 2014.
Ryan A Rossi and Nesreen K Ahmed. Role discovery in networks. IEEE Transactions on Knowledge and Data Engineering,
27(4):1112 -- 1131, 2015.
Ryan A Rossi, Brian Gallagher, Jennifer Neville, and Keith Henderson. Modeling dynamic behavior in large evolving graphs.
In Proceedings of the 6th ACM International Conference on Web Search and Data Mining, pages 667 -- 676. ACM, 2013.
Lee Douglas Sailer. Structural equivalence: Meaning and definition, computation and application. Social Networks, 1(1):73 -- 90,
1978.
Nino Shervashidze, Pascal Schweitzer, Erik Jan van Leeuwen, Kurt Mehlhorn, and Karsten M. Borgwardt. Weisfeiler-Lehman
graph kernels. Journal of Machine Learning Research, 12:2539 -- 2561, 2011.
David A Smith and Douglas R White. Structure and dynamics of the global economy: Network analysis of international trade
1965 -- 1980. Social Forces, 70(4):857 -- 893, 1992.
Jeffrey Travers and Stanley Milgram. The small -- world problem. Phychology Today, 1:61 -- 67, 1967.
Duncan J Watts and Steven H Strogatz. Collective dynamics of small -- world networks. Nature, 393(6684):440 -- 442, 1998.
Boris Weisfeiler and AA Lehman. A reduction of a graph to a canonical form and an algebra arising during this reduction.
Nauchno-Technicheskaya Informatsia, 2(9):12 -- 16, 1968.
Harrison C White, Scott A Boorman, and Ronald L Breiger. Social structure from multiple networks. I. Blockmodels of roles
and positions. American Journal of Sociology, 81(4):730 -- 780, 1976.
Florian Wickelmaier. An introduction to MDS. Sound Quality Research Unit, Aalborg University, Denmark, 46, 2003.
Eric P Xing, Wenjie Fu, Le Song, et al. A state-space mixed membership blockmodel for dynamic network tomography. The
Annals of Applied Statistics, 4(2):535 -- 566, 2010.
Wayne W Zachary. An information flow model for conflict and fission in small groups. Journal of Anthropological Research, 33
(4):452 -- 473, 1977.
Vincent W Zheng, Sandro Cavallari, Hongyun Cai, Kevin Chen-Chuan Chang, and Erik Cambria. From node embedding to
community embedding. arXiv preprint arXiv:1610.09950, 2016.
13
|
1701.08799 | 1 | 1701 | 2017-01-30T19:52:25 | Scalable Bicriteria Algorithms for the Threshold Activation Problem in Online Social Networks | [
"cs.SI"
] | We consider the Threshold Activation Problem (TAP): given social network $G$ and positive threshold $T$, find a minimum-size seed set $A$ that can trigger expected activation of at least $T$. We introduce the first scalable, parallelizable algorithm with performance guarantee for TAP suitable for datasets with millions of nodes and edges; we exploit the bicriteria nature of solutions to TAP to allow the user to control the running time versus accuracy of our algorithm through a parameter $\alpha \in (0,1)$: given $\eta > 0$, with probability $1 - \eta$ our algorithm returns a solution $A$ with expected activation greater than $T - 2 \alpha T$, and the size of the solution $A$ is within factor $1 + 4 \alpha T + \log ( T )$ of the optimal size. The algorithm runs in time $O \left( \alpha^{-2}\log \left( n / \eta \right) (n + m) |A| \right)$, where $n$, $m$, refer to the number of nodes, edges in the network. The performance guarantee holds for the general triggering model of internal influence and also incorporates external influence, provided a certain condition is met on the cost-effectivity of seed selection. | cs.SI | cs | Scalable Bicriteria Algorithms for the Threshold
Activation Problem in Online Social Networks
1
Alan Kuhnle, Tianyi Pan, Md Abdul Alim, and My T. Thai
Department of Computer & Information Science & Engineering
University of Florida
Gainesville, Florida 32611
Email: {kuhnle, tianyi, alim, thai}@cise.ufl.edu
7
1
0
2
n
a
J
0
3
]
I
S
.
s
c
[
1
v
9
9
7
8
0
.
1
0
7
1
:
v
i
X
r
a
Abstract -- We consider the Threshold Activation Problem
(TAP): given social network G and positive threshold T , find a
minimum-size seed set A that can trigger expected activation of at
least T . We introduce the first scalable, parallelizable algorithm
with performance guarantee for TAP suitable for datasets with
millions of nodes and edges; we exploit the bicriteria nature
of solutions to TAP to allow the user to control the running
time versus accuracy of our algorithm through a parameter
α ∈ (0, 1): given η > 0, with probability 1 − η our algorithm
returns a solution A with expected activation greater than
T − 2αT , and the size of
the solution A is within factor
1 + 4αT + log(T ) of the optimal size. The algorithm runs in time
O(cid:0)α−2 log (n/η) (n + m)A(cid:1), where n, m, refer to the number
of nodes, edges in the network. The performance guarantee holds
for the general triggering model of internal influence and also
incorporates external influence, provided a certain condition is
met on the cost-effectivity of seed selection.
I. INTRODUCTION
With the growth of online social networks, viral marketing
where influence spreads through a social network has become
a central research topic. Users of a social network can activate
their friends by influencing them to adopt certain behaviors
or products. In this context, the influence maximization (IM)
problem has been studied extensively [1] -- [8]: given a budget,
the IM problem is to find a seed set, or set of initially
activated users, within the budget that maximizes the expected
influence. Much recent work [3], [4], [9], [10] has developed
scalable algorithms for IM that are capable of running on
social networks with millions of nodes while retaining the
provable guarantees on the quality of solution; namely, that
the algorithm for IM will produce a solution with expected
influence within 1 − 1/e of the optimal activation.
However, a company with a specific target in mind may
adopt a more flexible approach to its budget:
instead of
having a fixed budget k for the seed set, it is natural to
minimize the size of the seed set while activating a desired
threshold T of users within the network. For example, suppose
a company desires a certain level of exposure on social media;
such exposure could boost the sales of any of its products.
Alternatively, suppose a profit goal T for a product must
c(cid:13)2017 IEEE. Personal use of this material is permitted. Permission from
IEEE must be obtained for all other uses, in any current or future media,
including reprinting /republishing this material for advertising or promotional
purposes, creating new collective works, or resale or redistribution to servers
or lists, or reuse of any copyrighted component of this work in other works.
be met with the least expense possible. Thus, we consider
the following threshold activation problem (TAP): given a
threshold T , minimize the size of the set of seed users in order
to activate at least T users of the network in expectation.
Goyal et al. [11] provided bicriteria performance guarantees
for a greedy approach to TAP based upon Monte Carlo
sampling at each iteration to select the best seed node, an
algorithm reminiscent of the greedy algorithm for IM in
Kempe et al. [1]; this approach is inefficient and impractical
for large networks. Although TAP is related to IM, scalable
solutions that already exist for IM are unsuitable for TAP: the
TIM [10] and IMM [9] algorithms require knowledge of the
size k of the seed set ahead of time; the SKIM algorithm [3]
for average reachability has been shown to be effective for IM
in specialized settings, but it is unclear how to apply SKIM to
more general situations or to TAP while retaining performance
guarantees.
Moreover, empirical studies have shown that in the viral
marketing context, it is insufficient to consider internal prop-
agation alone; external activation, i.e. activations that cannot
be explained by the network structure, play a large role in
influence propagation events [12] -- [15], and recent works on
scalable algorithms for IM [3], [9], [10] have neglected the
consequences of external
influence. For internal diffusion,
two basic models have been widely adopted, the independent
cascade and linear threshold models; Kempe et al. [1] showed
these two models are special cases of the triggering model,
a powerful, general model that has desirable properties in a
viral marketing context.
Motivated by the above observations, the main contributions
of this work are:
• We establish a new connection between the triggering
model and a concept of generalized reachability that al-
lows a natural combination of external influence with the
triggering model. We show any instance of the triggering
model combined with any model of external influence is
monotone and submodular.
• We show how to use the generalized reachability frame-
work to efficiently estimate the expected influence of
the triggering model combined with external influence,
leveraging scalable estimators of average reachability by
Cohen et al. [3], [16], [17]. This efficient estimation
results in a parallelizable algorithm (STAB) for TAP
with performance guarantee in terms of user-adjustable
trade-offs between efficiency and accuracy. The desired
accuracy is input as parameter α ∈ (0, 1) which de-
termines running time as O(cid:0)α−2 log(n/η)(n + m)A(cid:1),
where n, m are number of nodes, edges in the network,
and A is the seed set returned by STAB. With probability
1 − η, the expected activation is guaranteed to be with
2αT of threshold T , and the size of the seed set A is
guaranteed to be within factor 1 + 4αT + log(T ) of
the optimal size. If the cost-effectivity of seed selection
falls below 1, this performance bound may not hold; we
provide a looser bound for this case.
• Through a comprehensive set of experiments, we demon-
strate that on large networks, STAB not only returns a
better solution to TAP, but it runs faster than existing
algorithms for TAP and algorithms for IM adapted to
solve TAP, often by factors of more than 103 even
for the state-of-the-art IMM algorithm [9]. In addition,
we investigate the effect of varying levels of external
influence on the solution of STAB.
The rest of this paper is organized as follows: in Section
II, we introduce models of influence, including the triggering
model and our concept of generalized reachability. We prove
these two concepts are equivalent. In Section III, we formally
define TAP and first prove bicriteria guarantees in a general
setting. Next, we employ the generalized reachability concept
to show how combination of triggering model and external
influence can be estimated efficiently, and we present and
analyze STAB, our scalable bicriteria algorithm. In Section
IV, we analyze STAB experimentally and compare with prior
work. We discuss related work in Section V.
II. MODELS OF INFLUENCE
A social network can be modeled as a directed graph
G = (V, E), where V is the set of users and directed edges
(u, v) ∈ E denote social connections, such as friendships,
between the users u, v. In this work, we study the propagation
of influence through a social network; for example, say a user
on the Twitter network posts a message to her account; this
message may be reposted by the friends of this user, and
as such it propagates across the social network. In order to
study such events from a theoretical standpoint, we require
the concept of a model of influence propagation.
Intuitively, the idea of a model of influence propagation
in a network is a way by which nodes can be activated
given a set of seed nodes. In this work, we use σ to denote
a model of influence propagation. Such a model is usually
probabilistic, and the notation σ(S) will denote the expected
number of activations under the model σ given seed set
S ⊆ V . Kempe et al. [1] studied a variety of models in
their seminal work on influence propagation on a graph,
including the Independent Cascade (IC) and Linear Threshold
(LT) models. For completeness, we briefly describe these two
models. An instance of influence propagation on a graph G
follows the IC model if a weight can be assigned to each
edge such that the propagation probabilities can be computed
as follows: once a node u first becomes active, it is given
a single chance to activate each currently inactive neighbor
v with probability proportional to the weight of the edge
2
(u, v). In the LT model each network user u has an associated
threshold θ(u) chosen uniformly from [0, 1] which determines
how much influence (the sum of the weights of incoming
edges) is required to activate u. u becomes active if the total
influence from its activated neighbors exceeds the threshold
θ(u).
These well-studied models are both examples of the Trig-
gering Model, also introduced in [1]: Each node v ∈ G
independently chooses a random "triggering set" Tv according
to some probability distribution over subsets of its neighbors.
A seed set S is activated at time t = 0; a node v becomes
active at time t if any node in Tv is active at time t − 1.
Two important properties that it is desirable for a model σ
of influence propagation to satisfy are firstly the submodularity
property of the expected activation function: for any sets
S, T ⊆ V , σ(S ∪ T ) + σ(S ∩ T ) ≤ σ(S) + σ(T ), and secondly
the monotonicity property: if S ⊆ T ⊆ V , σ(S) ≤ σ(T ).
These properties together allow a greedy approach to have
a performance ratio for the influence maximization problem
(IM): given k, find a seed set A of size k such that the
expected activation of A is maximized. Kempe et al. [1]
showed that the triggering model is both submodular and
monotonic. Both properties are also important
in proving
performance guarantees for TAP, the problem studied in this
work and defined in Section III.
It is #P-hard to compute the exact influence of a single seed
node under even the restricted version of IC where each edge
is assigned the probability 0.5 [18]. Therefore, it is necessary
to estimate the value of σ(S) by sampling the probability
distribution determined by σ. Sampling efficiently such that
the estimated value σ(S) satisfies σ(S) − σ(S) < ε for
all seed sets is a difficult problem; we discuss this problem
when σ is a combination of the triggering model and external
influence in Section III-B2. Because of the errors associated
with estimating the value σ(S), we introduce slightly general-
ized versions of the above two properties. First, let us define
∆xσ(A) = σ (A ∪ {x}) − σ(A), for any model σ, and subset
A ⊂ V . The following property is equivalent to σ satisfying
submodularity and monotonicity together.
Property 1 (Submodularity and monotonicity). For all A ⊆
B, and x ∈ V , ∆xσ(A) ≥ ∆xσ(B).
Let us define a σ to be ε-approximately monotonic and
submodular if the following property is satisfied instead:
Property 2 (ε-submodularity and monotonicity). Let ε > 0.
For all A ⊆ B, and x ∈ V , ε + ∆xσ(A) ≥ ∆xσ(B).
A. Triggering model
reachability
from the perspective of generalized
Next we define a class of influence propagation models that
naturally generalize the notion of reachability in a directed
graph: that is, these models generalize the simple model that
a node is activated by a seed set S if it is reachable from the
seed set by edges in the graph. Somewhat surprisingly, the
triggering model is equivalent to this notion of generalized
reachability.
of directed graphs {(Gi = (V, Ei), pi)}l
set V , and associated probabilities such that (cid:80)l
Suppose instead of a single directed graph G, we have a set
i=1 on the same vertex
i=1 pi = 1.
Then define an influence propagation model σ in the following
way: when a seed set S is activated, graph Gi is chosen with
probability pi. Then, influence is allowed to propagate from
seed set S in Gi according to the directed edges of Gi. Let
σi(S) be defined as the number of vertices reachable from S
in Gi. Then the expected activation of a seed set S is given
i=1 piσi(S). We will term a model σ of this
form a model of generalized reachability, since it generalizes
the notion of simple reachability on a directed graph. We have
the following important proposition:
Proposition 1. Generalized reachability is equivalent to the
Triggering Model.
by σ(S) = (cid:80)l
(cid:81)
Proof: Suppose we have an instance σ of the triggering
model. For each node v, triggering set Tv is chosen indepen-
dently with probability p(Tv). If all nodes choose a triggering
set, then define graph HT for this choice by adding directed
edges (u, v) for each u ∈ Tv. Assign graph HT probability
v p(Tv) and we have instance of generalized reachability
with the same expected activation.
Conversely, suppose σ is an instance of generalized reach-
ability. For v ∈ V , let Tv be any subset of nodes excluding v
itself. Assign p(Tv) to be the sum of the probabilities of the
graphs in which the in-neighbors of v are exactly the set Tv.
Then we have an instance of the triggering model.
B. External influence
In this section, we outline our model of external influence
σext in a social network. We wish to capture the idea that
users in the network may be activated by a source external
to the network; that is, these activations do not occur through
friendships or connections within the social network. The most
general model of external influence is simply an arbitrary
probability distribution on the set of subsets of nodes. That
is, for any S ⊂ V , there is a probability pS that S is activated
from an external source. In this work, we adopt this model and
denote such a model of external influence by σext. In order
to consider both external and internal influence in our social
networks, we next define the concept of combining models of
influence together.
Definition 1 (Combination of σ1, σ2). Let σ1 and σ2 be two
models of influence propagation. We define the combination
σ of these two models in the following way: At any timestep
t, if set At ⊂ V is activated new nodes may be activated from
At according to either σ1 or σ2; that is, if in the next timestep
t+1∪
σ1 activates A1
t+1. We denote the combination model as σ1 ⊕ σ2 and write
A2
σ1 ⊕ σ2(A) for the expected number of activations resulting
from seeding A under this model.
t+1, then At+1 ≡ A1
t+1 and σ2 activates A2
In this work, we are most interested in combining external
activation with the triggering model. That is, if σext is a model
of external influence as defined above, and σtrig is an instance
of the triggering model, then we consider σtrig ⊕ σext.
3
1) Submodularity of σtrig ⊕ σext: In this subsection, we
establish the submodularity and monotonicity of Φ ≡ σtrig ⊕
σext. First, we require the following proposition.
Proposition 2. Let σ be a submodular, monotone-increasing
model of influence propagation. Define σA(T ) to be the ex-
pected influence of seeding set T when A is already activated;
that is σA(T ) = σ(A∪T ). Then, for any A, σA is submodular
and monotone increasing.
Proof: Let T1, T2 ⊆ V . We prove submodularity only,
monotonicity is similar.
σA(T1 ∪ T2) + σA(T1 ∩ T2)
= σ(T1 ∪ T2 ∪ A) + σ(T1 ∩ T2 ∪ A)
= σ((T1 ∪ A) ∪ (T2 ∪ A)) + σ((T1 ∪ A) ∩ (T2 ∪ A))
≤ σ(A ∪ T1) + σ(A ∪ T2)
= σA(T1) + σA(T2).
Theorem 1. Let σtrig be any instance of the Triggering Model,
and σext be any instance of external influence. Then, Φ ≡
σtrig ⊕ σext is submodular and monotonic.
Proof: For any A ⊆ V , let pA be the probability that
(cid:80)
A is activated via σext, the external influence. Then, Φ(S) =
A⊂V pAσtrig(A∪S). By Prop. 2, σtrig,A(S) = σtrig(A∪S)
for fixed A is monotone and submodular. Since a non-negative
combination of submodular and monotonic set functions is
also submodular and monotonic, the result follows.
III. THRESHOLD ACTIVATION PROBLEM
The framework has been established to define the problem
we consider in this work. We suppose a company wants to
minimize the number of seed users while expecting a certain
level of activation in the social network. Formally, we have
Problem 1 (Threshold activation problem (TAP)). Let G =
(V, E) be a social network, n = V . Given influence propa-
gation model σ and threshold T such that 0 ≤ T ≤ n, find a
subset A ⊆ V such that A is minimized with σ(A) ≥ T .
First, we consider performance guarantees for a greedy
approach to TAP with only the assumption that the influence
propagation σ is ε-submodular. We do not discuss how to
sample σ for these results. Subsequently, we specialize to the
case when σ is the the estimated value of the combination of
the triggering model and external influence, which is approxi-
mately submodular up to the error of estimation, and we show
how to efficiently estimate to a desired accuracy in Sections
III-B2 and III-B3b. We detail the algorithm STAB in Section
III-B1, a scalable algorithm with performance guarantees for
TAP utilizing this estimation and analysis.
A. Results when σ is ε-submodular
We analyze the greedy algorithm to solve TAP, which adds
a node that maximizes the marginal gain at each iteration to its
chosen seed set A until σ(A) ≥ T , at which point it terminates.
One might imagine in analogy to the set cover problem that
there would be a log n-approximation ratio for the greedy
algorithm for TAP -- however, this result only holds for integral
submodular functions [11]. We next give a bicriteria result for
the greedy algorithm that incorporates the error ε inherent in
ε-approximate submodularity into its bounds. In this context,
a bicriteria guarantee means that the algorithm is allowed to
violate the constraints of the problem by a specified amount,
and also to approximate the solution to the problem. In the
viral marketing context, this means that we may not activate
the intended threshold T of users, but we will guarantee to
activate a number close to T . Furthermore, we will not achieve
a solution of minimum size, but there is a guarantee on how
large the solution returned could be.
Theorem 2. Consider the TAP problem for σ when σ is ε-
approximately submodular. Then the greedy algorithm that
terminates when the marginal gain is less than 1 returns
a solution A of size within factor 1 + ε + log(cid:0) T
(cid:1) of
the optimal solution size, OP T , and the solution A satisfies
σ(A) ≥ T − (1 + ε) · OP T.
OP T
Proof: Let Ai = {a1, . . . , ai} be the greedy solution after
i iterations, and let Ag be the final solution returned by the
greedy algorithm. Let o = OP T be the size of an optimal
solution C = {c1, . . . , co} satisfying σ(C) ≥ T . Then
T − σ(Ai) ≤ σ(Ai ∪ C) − σ(Ai)
=
o(cid:88)
≤ o(cid:88)
j=1
j=1
∆cj σ (Ai ∪ {c1, . . . , cj−1})
∆cj σ(Ai) + oε
(by Property 2)
≤ o · [σ(Ai+1) − σ(Ai) + ε] .
Therefore, T − σ(Ai+1) − ε ≤(cid:0)1 − 1
(cid:19)i
(cid:19)i
T − σ(Ai) ≤ T
1 − 1
o
(cid:18)
(cid:18)
o
+ ε
(cid:1) (T − σ(Ai)). Then
(cid:18)
i−1(cid:88)
(cid:19)j
1 − 1
o
(1)
≤ T
1 − 1
o
j=0
+ εo.
From here, there exists an i such that the following differences
satisfy
T − σ(Ai) ≥ o(1 + ε), and
T − σ(Ai+1) < o(1 + ε),
Thus, by inequalities (2) and (3), o ≤ T exp(cid:0)−i
i ≤ o log(cid:0) T
o(cid:0)1 + ε + log(cid:0) T
(cid:1) , and
(cid:1) . By inequality (4) and the assumption on
(cid:1)(cid:1) . Finally, if the algorithm terminates be-
the termination of the algorithm, the greedy algorithm adds
at most o(1 + ε) more elements, so g ≤ i + o(1 + ε) ≤
fore σ(Ag) ≥ T , then the marginal gain is less than 1. Hence,
by (1), σ(A) ≥ T − (1 + ε)o.
o
o
o
Notice that the above argument requires only that σ is a
ε-submodular set function; in particular, it did not use the fact
that σ represents expected influence propagation on a social
network.
(2)
(3)
(4)
4
1) Approximation ratios: Next, we consider ways in which
the bicriteria guarantees of Theorem 2 can be improved. In
viral marketing, we may suppose a company seeks to choose
a threshold T such that the marginal gain to reach T is always
at least 1; seeding nodes with a marginal gain of less than 1
would be cost-ineffective. In other words, it would cost more
to seed a node than the benefit obtained from seeding it. There
is little point in activating T users if the marginal gain drops
too low; intuitively, the company has already activated as many
as it cost-effectively can.
We term this assumption the cost-effectivity assumption
(CEA): In an instance of TAP, if B ⊆ V such that σ(B) < T ,
there always exists a node u such that ∆uσ(B) ≥ 1. Under
CEA, the greedy algorithm in Theorem 2 would be an approx-
imation algorithm; that is, it would ensure σ(A) ≥ T , with the
same bound on solution size as stated in the theorem. To see
this fact, notice that once inequality (4) above is satisfied, the
algorithm must add at most o(1 + ε) more elements before
σ(A) ≥ T , by CEA.
More generally, each node v ∈ V has an associated
reticence rv ∈ [0, 1]; rv is the probability that v will remain
inactive even if all of the neighbors of v are activated. Then
we have the following theorem, whose proof is analogous to
Theorem 2.
Theorem 3. Let σ be ε-approximately submodular and let
r∗ = minv∈V rv. Suppose r∗ > 0. Then the greedy algorithm
for TAP is an approximation algorithm which returns solution
A within factor 1+ε
(cid:1) of optimal size.
r∗ + log(cid:0) T
OP T
B. Scalable bicriteria algorithm for σint ⊕ σext
In this subsection, we detail the scalable bicriteria Algorithm
1 for TAP when the propagation is given by an instance of
the triggering model in the presence of external influence;
that is, when σ = σtrig ⊕ σext. We describe our scalable
algorithm STAB first and then discuss the necessary sampling
and estimation techniques in the subsequent sections.
1) Description of algorithm: As input, the algorithm takes
a graph G = (V, E) representing a social network, an exter-
nal influence model σext, internal influence model σtrig, an
instance of the triggering model, and the desired threshold of
activated users T . In addition, the user specifies the fractional
error α, on which the running time of the algorithm and
the accuracy of the solution depend. Using α, in line 1 the
algorithm first determines (cid:96), the number of graph samples it
requires according to Section III-B2.
Next in the for loop on line 2, the algorithm constructs
a collection of oracles which will be used to estimate the
average reachability in the sampled graphs Hi, which is used
to approximate the expected influence. Each graph Hi
is
needed only while updating the oracle collection in iteration
i; once this step is completed, Hi may be safely discarded.
Since the samples are independent, this process is completely
parallelizable.
Once the set of oracles has been constructed, a greedy
algorithm is performed in attempt to satisfy the threshold T
of expected activation with a minimum-sized seed set. The
estimation in line 11 may be done in one of two ways: using
estimator C1 or C2; both are described in detail in Section
III-B3b. The estimator chosen has a strong effect on both the
running time and performance of the algorithm: given the same
oracles, C1 can be computed in time O(k), and in practice
is much faster to compute than C2. However, the quality of
C1 degrades with the size of seed set. On the other hand,
C2 takes time O(kB log B) time to compute, where B is
the seed set for which the average reachability is estimated;
our experimental results show that the quality of C2 is vastly
superior to C1 for larger seed set sizes B; however its
running time increases.
This algorithm achieves the following guarantees on perfor-
Then,
mance:
Theorem 4. Suppose we have an instance of TAP with σ =
σtrig ⊕ σext and that T has been chosen such that CEA holds.
the solution
returned by Alg. 1 satisfies the following two conditions, with
probability at least 1 − η:
if η > 0, by choosing δ = η/n3,
1) σ(A) ≥ T − 2αT
2) If A∗ is an optimal solution satisfying σ(A∗) ≥ T ,
A
A∗ ≤ 1 + 4αT + log(T ).
If Assumption CEA is violated, the algorithm can detect this
violation by terminating when the marginal gain drops below
1. In this case, bound 1 above becomes σ(A) ≥ T − (1 +
ε)A∗.
yields running time O(cid:0)log(n/η)(n + m)A/α2(cid:1). If estimator
Using estimator C1 for average reachability in line 11
C2 is used, a factor of A log A is multiplied by this bound.
Proof: Let A∗ be a seed set of minimum size satisfying
σ(A∗) ≥ T . Then, as discussed in Section III-B2, if δ = η/n3,
then with probability at least 1 − η, A∗ satisfies σ(A∗) ≥
T − αT by the choice of (cid:96) in Alg. 1, and the analysis in
Section III-B2. Hence A∗ ≥ B∗, where B∗ is a set of
minimum size satisfying σ(B∗) ≥ T − αT .
Notice σ is 4αT -approximately submodular on the sets
considered by the greedy algorithm with probability at least
1− η. By Section III-A1, in this case, the solution A returned
by Alg. 1 satisfies A ≤ (1+4αT +log T )B∗ ≤ (1+4αT +
log T )A∗. Furthermore, σ(A) ≥ σ(A) − α ≥ T − 2αT,
if CEA holds, otherwise the alternate bound follows from
Theorem 2.
Next, we consider the running time of Alg. 1. Let m be
the number of edges that have a nonzero probability to exist
in one of the reachability instances (m is at most the number
of edges in input graph G). Lines 2 and 3 clearly take time
(cid:96)(n + m). By Cohen et al. [3], line 4 takes time O(k(cid:96)m). The
while loop on line 9 executes exactly A times, and the for
loop on line 10 requires time O(kn) if estimator C1 is used,
and time O(kA log An) if estimator C2 by Section III-B3b.
By the choices of k and (cid:96) on line 1, we have the total running
2) Estimation of σtrig ⊕ σext(A): Let σtrig be a model of
times bounded as stated.
internal influence propagation, which in this section will be
an instance of the triggering model. Let σext be the model of
external influence activation, and let σ = σtrig ⊕ σext be the
combination of the two as defined above. We use the following
version of Hoeffding's inequality (T will be the threshold that
5
Algorithm 1: Scalable TAP Algorithm with Bicriteria
guarantees (STAB)
Data: G, σtrig, σext, T, α, δ
Result: Seed set A
1 Choose (cid:96) ≥ log(2/δ)/α2, k ≥ (2 + c) log n(αT )−2 as
discussed in Section III-B2;
2 for i = 1 to (cid:96) do
3
4
5
Sample graph Gi from σtrig;
Sample external seed set Aext
Construct Hi = Gi − σi(Aext
i
σi(Aext
Update the oracle collection {Xu : u ∈ V } for τ
according to Hi as in Section III-B3a;
), as described in Section III-B3a;
for σext;
), and store the value of
i
i
6
8 A ≡ ∅, O ≡(cid:80)(cid:96)
7 end
i=1 σi(Aext
9 while σ(A) < T − αT do
10
11
for u ∈ V do
i
) /(cid:96);
Estimate ∆u = {τ (A ∪ {u}) − τ (A)} using one
of the estimators C1 or C2 as described in
Sections III-B3b, III-B3d;
end
A = A ∪ {u∗}, where u∗ maximizes ∆u;
Compute σ(A) = τ (A) + O by Lemma 2;
12
13
14
15 end
.
T 2
(cid:17)
is input to Alg. 1).
Theorem 5 (Hoeffding's inequality). Let X1, . . . , X(cid:96) be in-
dependent random variables in [0, T ]. Let X be the empirical
mean of these variables, X = 1
i=1 Xi. Then for any t
(cid:96)
(cid:80)(cid:96)
(cid:16)− 2(cid:96)t2
P r(cid:0)(cid:12)(cid:12)X − E[X](cid:12)(cid:12) ≥ t(cid:1) ≤ 2 exp
for any seed set A, σtrig(A) = (cid:80)
Since σtrig is an instance of the triggering model, by
Theorem 1, there exists a set {(Gj, pj) : j ∈ J} such that
j∈J pjσj(A), where σj
is simply the size of the set of nodes reachable from A in
Gj. Thus, if A is fixed, then by taking independent samples
of graphs from the probability distribution on {Gj}, we get
independent samples of σi(A).
In the general model of external influence presented above,
every seed set B ⊂ V has a probability pB of being activated
by the external influence. By sampling from this distribution
(cid:80)
on subsets of nodes, and independently sampling as above
from σtrig, σ(A) could be computed exactly in the following
j∈J pjpBσj(A ∪ B). In most cases,
this sum cannot be computed in polynomial time, and certainly
it has Ω(2n) summands. Accordingly, we estimate its value
by independently sampling (cid:96) externally activated sets {Aj
ext}
from σext; we also independently sample (cid:96) reachability graphs
Gj according to σtrig and estimate by averaging the size of
the reachability from a seed set A in this context: σ(A) ≈
σ(A) ≡ 1
within error αT with probability at least 1−δ from Hoeffding's
inequality we require (cid:96) ≥ log(2/δ)
(cid:1) . To estimate σ(A) in this way
way: σ(A) = (cid:80)
(cid:0)A ∪ Aext
such samples.
(cid:80)(cid:96)
j=1 σj
B⊂V
(cid:96)
j
Now, in our analysis of the greedy algorithm in Theorem 2
only at most n3 sets were considered. All that is required for
2α2
the analysis to be correct as it that those sets were estimated
within the error αT ; if δ < η/n3, where η < 1, then by the
union bound, with probability at least 1 − η, the analysis for
Theorem 2 holds. In practice, we were able to get good results
with much higher values of δ, see Section IV.
3) Estimation of σ: In the previous section, we describe an
approach to estimate σ(A), based upon independent samples
{Gi} of graphs from the triggering model, and independent
samples of externally activated nodes {Aext
i }. Next, we need
to compute the value of the estimator σ(A). One method
would be to compute it directly using breadth-first search
from the sets A ∪ Aext
in each graph Gi. This method would
unfortunately add a factor of Ω(n + m) to the running time,
which would result in a running time of Alg. 1 of Ω(n2), too
large for our purposes. Thus, we would like to take advantage
of estimators formulated by Cohen et al. [3] for the average
reachability of a seed set over a set of graphs. However,
because the external seed sets Aext
for each graph Gi vary
with i, we must first convert the problem into an average
reachability format.
i
i
a) Conversion to an average reachability problem:
(cid:80)(cid:96)
Suppose we have sampled as above (cid:96) pairs of sample graphs
)} To compute
and external seeds: {(G1, Aext
i=1 σi(A ∪ Aext
) efficiently, we first convert
σ(A) = 1
(cid:96)
this sum to a generalized reachability problem: we construct
graph Hi from Gi by removing all nodes (and incident edges)
reachable from Aext
). The average
reachability of a set A in the graphs {Hi}, which we term
τ (A), is
1 ), . . . , (G(cid:96), Aext
i
: Hi = Gi − σi(Aext
(cid:96)
i
i
(cid:96)(cid:88)
i=1
τ (A) =
1
(cid:96)
τi(A),
(5)
where τi(A) is the size of the set reachable from A in Hi. The
estimators formulated by Cohen et al. are suitable to estimate
the value of τ, and the following two lemmas show how we
can compute σ(A) from τ (A).
Lemma 1. The size of the reachable set from A in Hi can
be computed from reachability σi in Gi as follows: τi(A) =
σi(A ∪ Aext
) − σi(Aext
).
i
i
Proof: Suppose, in Gi, x is reachable from A, but not
. This is true iff there exists a path from A to x in
), which is equivalent to the path existing
i
from Aext
Gi avoiding σi(Aext
in in Hi.
i
The next lemma shows explicitly how to get σ(A) from
τ (A):
Lemma 2. τ (A) = σ(A) − 1
(cid:80)(cid:96)
6
(cid:16){r(i)
v (v, i) ∈ τi(A)}(cid:17)
(5). For convenience, we refer to this method of estimation in
the rest of the paper as method C1.
Each pair (v, i) ∈ V × {1, . . . , (cid:96)}, consisting of a node v
in graph Hi, is assigned an independent, random rank value
r(i)
v uniformly chosen on the interval [0, 1]. The reachability
sketch for a set A is defined as follows: let k be an integer,
and consider XA = bottom-k
, where
bottom-k(S) means to take the k smallest values of the set
S, and R(i)
A is the set of nodes reachable from A in graph
Hi. The threshold rank of a set A ⊂ V is then defined to be
γA = max XA, if XA = k, and γA = 1 if XA < k. The
estimator for τ (A) is then τ (A) = (k − 1)/((cid:96)γA)
If k = (2 + c)()−2 log n, the probability that this estimator
has error greater than is at most 1/nc [3]. The bounds on k
needed for the proof of Theorem 4 are determined by taking
= αT .
c) Computation of XA: First, we compute Xu for all
u ∈ V using Algorithm 2 of [3] in time O(k(cid:96)m), where m
is the maximum number of edges in any Hi. This collection
{Xu : u ∈ V } is referred to as oracles.
Next, we discuss how to compute, for an arbitrary node
u, XA∪{u} given that XA has already been computed. This
computation will take time O(k) and is necessary for the
bicriteria algorithm: given that Xu and XA are both sorted,
we compute XA∪{u} by merging these two sets together until
the size of the new set reaches k values.
(cid:80)
z∈(cid:83)
d) Estimation of τ (A), method C2: Alternatively to
estimator C1, we can estimate τ (A) from the oracles
{Xu : u ∈ V } in the following way. Let γu be the
threshold rank as defined above for Xu. Then τ (A) =
. For convenience,
1
(cid:96)
we refer to the estimator in the rest of the paper as estimator
C2; it was originally introduced in [17].
maxu∈Az∈Xu\{γu} γu
v∈A Xv\{γv}
1
IV. EXPERIMENTAL EVALUATION
In this section, we demonstrate the scalability of STAB as
compared with the current state-of-the-art IMM algorithm [9]
and with the greedy algorithm for TAP in Goyal et al. [11].
The methodology is described in Section IV-A, comparison to
existing IM algorithms is in Section IV-B, and investigation of
the effect of external influence on the performance of STAB
is in Section IV-C. All experiments were run on an Intel(R)
Core(TM) i7-3770K CPU @ 4.0GHz CPU with 32 GB RAM.
i=1 σi(Aext
i
(cid:96)
).
A. Datasets and framework
Proof: This statement follows directly from Lemma 1 and
the definitions of τ, σ.
In Alg. 1, for each i, σi(Aext
) is computed in the con-
struction of Hi; its size can be stored as instructed on line 5,
and used in the computation of O for line 14 in the greedy
algorithm's stopping criterion.
i
b) Estimation of τ (A), method C1: In this subsection,
we utilize methods developed by Cohen et al. [3] to estimate
efficiently the average reachability problem τ (A) defined in
We evaluated the following algorithms in our experiments.
1) CELF:
the greedy algorithm by naive sampling of
Kempe et al. [1] can be modified to find a solution to TAP, as
shown in Goyal et al. [11]. The modified algorithm performs
Monte Carlo sampling at each step to select the node with the
highest marginal gain into the seed set until the threshold T is
satisfied. The Cost-Effective Lazy Forward (CELF) approach
by Leskovec et al. [19] improves the running time of this
algorithm by reducing the number of evaluations required.
2) IMM: The IMM algorithm [9] is the current state-of-
the-art algorithm to solve the IM problem, where the number
of seeds k is input. Since TAP asks to minimize the number
of seeds, this algorithm cannot be applied directly. For the
purpose of comparison to our methods, we adapt the algorithm
by performing a binary search on k in the interval [1, T ], where
T is the threshold given in TAP. At each stage of the search,
IMM utilizes the value of k in question until the minimum
k as estimated by IMM is found. Since binary search can
identify the minimum in at most log T iterations, we chose
this approach over starting at k = 1 and incrementing by one
until the minimum is found, which in the worst case would
require T iterations.
3) STAB: the STAB algorithm (Alg. 1) using estimators C1
and C2, referred to as STAB-C1, STAB-C2 respectively. Since
these are greedy algorithms with an approximately submodular
function, we also use the CELF approach to reduce the number
of evaluations performed by STAB-C2; for STAB-C1, we
found this optimization unnecessary.
Network topologies: We generated networks according to
the Erdos-Renyi (ER) and Barabasi-Albert (BA) models. For
ER random graphs, we used varying number of nodes n; the
independent probability that an edge exists is set as p = 2/n.
The BA model was used to generate scale-free synthesized
graphs; the exponent in the power law degree distribution was
set at −3 for all BA graphs.
The following topologies of real networks collected by
the Stanford Network Analysis Project [20] were utilized: 1)
Facebook, a section of the Facebook network, with n = 4039,
m = 88234; 2) Nethept, high energy physics collaboration
network, n = 15, 229, m = 62, 752; 3) Slashdot, social
network with n = 77, 360, m = 828, 161; 4) Youtube,
from the Youtube online social network, n = 1, 134, 890,
m = 2, 987, 624; and 5) Wikitalk, the Wikipedia talk (com-
munication) network, n = 2, 394, 385, m = 5, 021, 419.
ER 1000
BA 15000
Nethept
Slashdot
Youtube
Wikitalk
α = 0.1
1.0
6.4
954
25
385
1704
α = 0.2
0.4
1.6
230
6.4
91
274
α = 0.3
0.2
0.9
102
3.3
41
122
TABLE I
ORACLE COMPUTATION TIME (SEC)
ipmax
1
0.1
1
0.01
0.01
0.01
Models of internal and external influence: In all experi-
ments, we used the independent cascade model for internal
influence propagation: each edge e in the graph is assigned
a uniform probability ipe ∈ [0, ipmax]. For synthesized net-
works, we usually set ipmax = 1; for real networks, we
observed that if ipmax = 1, then in most cases a single
node can activate a large fraction of the network (often more
than 33%). However, a large number of empirical studies have
confirmed that most activation events occur within a few hops
of a seed node [12] -- [14]; these works indicate that ipmax = 1
is not a realistic parameter value for the IC model. Therefore,
we also ran experiments using lower values for ipmax.
For external influence, we adopted in all experiments the
7
model that each node u is activated externally independently
with uniformly chosen probability epu ∈ [0, epmax]. The set-
ting of epmax is discussed in the context of each experiment.
Unless otherwise stated, we set δ = 0.01, which we found
sufficient to return a solution within the guarantee provided in
Theorem 4 in most cases with estimator C1, and in all cases
with estimator C2.
B. Performance comparison and demonstration of scalability
In this section, we compare the performance of STAB-C1
and STAB-C2 to CELF and IMM as described above; we
experimented on the datasets listed in Table I, where the total
CPU time required to compute the oracles is shown. The
oracle computation is parallelizable, and in our experiments
we used 7 threads of computation. The oracles for each value
of α were computed once and stored, and thereafter when
running STAB the oracles were simply read from a file. The
running times we report for the various versions of STAB
do not include the oracle computation time unless otherwise
specified. Also in Table I are the values of ipmax used for each
dataset in this set of experiments. Since IMM and CELF do
not consider external influence, the experiments in this section
had no external influence; that is, epmax = 0 for all datasets.
To evaluate the seed set returned by the algorithms we used
the average activation from 10000 independent Monte Carlo
samples.
We show typical results in Fig. 1 on the following four
datasets: ER 1000 (n = 1000), Nethept, Youtube, and Wik-
italk. The first row of Fig. 1 shows the expected activation,
normalized by the threshold value T , of the seed set returned
by each algorithm plotted against T . Thus, a value of 1
indicates the algorithm successfully achieved the threshold of
activation. The second row of the figure shows the running
time in minutes of each algorithm against T , and the third row
shows the size of the seed set returned by each algorithm.
For the ER 1000 network results are shown in the first
column of Fig. 1; this dataset was the only one on which CELF
finished under the time limit of 60 minutes. We see that IMM
is consistently returning a larger seed set than STAB and CELF
and overshooting the threshold value in activation by as much
as a factor of 2.5. Thus, it has poor performance of minimizing
the size k of the seed set for TAP. This behavior appears to
be a result of IMM underestimating the influence of its seed
set internally. As expected, CELF performs very well in terms
of the size of the seed set and meeting the threshold T , but
is running on a timescale larger than the other algorithms by
factor of at least 100 and as large as 104. Notice that STAB-
C2 with α = 0.1 has virtually identical activation and size of
seed set to CELF, while running at a much faster speed; as
expected, the quality of solution of STAB deteriorates as α is
raised, but the running time decreases drastically. In addition,
notice that none of the versions of STAB seed too many nodes
and overshoot the threshold as IMM does; instead, STAB
errs on the side of seeding too few nodes and only partially
achieving the threshold T of activation. Finally, it is evident
that STAB-C1 runs faster than STAB-C2 and has a similar
amount of activation when the seed set required is relatively
8
(a) ER, activation
(b) Nethept, activation
(c) Youtube, activation
(d) Wikitalk, activation
(e) ER, running time
(f) Nethept, running time
(g) Youtube, running time
(h) Wikitalk, running time
(i) ER, number of seeds
(j) Nethept, number of seeds
(k) Youtube, number of seeds
(l) Legend
Fig. 1.
versus T .
First row: expected activation normalized by threshold T versus T . Second row: running time in minutes versus T . Third row: size of seed set
small. However, the larger the seed set required, the farther
is STAB-C1 from achieving the threshold T while STAB-C2
does not suffer from this drawback.
The results from Nethept are shown in the second column
of Fig. 1; with n = 15, 229, CELF was unable to run within
the time limit, and IMM was able to complete its binary
search only for T ≤ 7000; for the higher threshold values,
IMM exceeded the 32 GB memory usage limit imposed in
our setup. On this network, STAB-C2 again exhibits the best
performance. Despite an initial decrease in activation relative
to T shown in Fig. 1(b), the trend reverses around T = 8000
and seed set size 100 and the algorithm gets closer to achieving
the threshold. This behavior is explained by lower coefficient
of variation of estimator C2 as analyzed in [17]; the CV
can be lower than estimator C1 by up to a factor of (cid:112)A,
where A is the seed set. In stark contrast, STAB-C1 was
unable to proceed past T = 8000 even for α = 0.1 because
the estimator C1 appears to lose accuracy as the number of
seeds increases. By this mechanism, STAB-C1 had achieved
its maximum estimation of influence of any set and thereby
could not increase it before reaching an estimated activation
of T , for T > 8000.
Next, the Youtube network is shown in the third column
of Fig. 1. As in the ER network, IMM is underestimating the
influence of its seed set and thereby picking too many seeds
and overshooting the threshold, as shown in Fig. 1(c); IMM
picks nearly twice as many seed nodes as STAB-C1, α = 0.1,
as shown in Fig. 1(k). In Fig. 1(g), the scalability of STAB is
demonstrated as the most precise version, STAB-C2 with α =
0.1, runs faster than IMM by as much as a factor of 50. On
our largest dataset, the Wikitalk network, IMM again exceeded
32 GB memory after T = 6000; notice that the running time
of STAB in all cases is under 2 minutes and STAB-C2 with
α = 0.3 maintained activation greater than 0.6T while running
in less than 5 seconds, as shown in Fig. 1(h). With inclusion
of the parallelizable and reusable oracle computation time of
122 seconds from Table I, the total time taken by STAB-C2
is less than 3 minutes. The total running time for α = 0.1 of
STAB-C2 including the oracles at T = 10000 is less than 30
minutes.
Choice of α: The above discussion demonstrates that α =
0.1 provides the close activation to the threshold T while
maintaining high scalability. If faster running time is desired,
α may be increased, which results in a loss of accuracy shown
clearly in Fig. 1(d), for α ∈ {0.1, 0.2, 0.3}. On the other hand,
if activation closer to T is required, smaller values of α may
be used at higher computational cost.
C. External influence
In this section, we analyze the performance of STAB when
external influence is present in the network; that is, when
epmax > 0. For this section, we considered a BA network
with 100,000 nodes, with a threshold of T = 1000, and the
Facebook network with T = 1500. Results on other topologies
were qualitatively similar. For all experiments in this section,
we set α = 0.1.
9
guarantees; Goyal et al. [11] studied the TAP problem with
monotonic and submodular models of influence propagation;
their bicriteria guarantees differ from ours, and provide no
method of efficient sampling required for scalability. Chen et
al. [23] considered external influence in a viral marketing con-
text. However, their model of external influence is much less
general than ours. Furthermore, they restrict external influence
to only pass through seed consumers and have no discussion
of sampling, scalability, or the TAP problem. Nguyen et al.
[24], [25] studied methods to restrain propagation in social
networks.
VI. CONCLUSION
We establish equivalency between the triggering model
and generalized reachability, which allows incorporation of
external influence into our efficient sampling techniques. We
gave precise trade-off between accuracy and running time with
a bound on the number of samples required to solve TAP.
Our algorithm is highly scalable and outperforms adaptations
to TAP of the current state-of-the-art algorithm for the IM
problem.
This work is supported in part by the NSF grant #CCF-
ACKNOWLEDGMENT
1422116.
REFERENCES
[1] David Kempe, Jon Kleinberg, and ´Eva Tardos. Maximizing the spread
of influence through a social network. In Proceedings of the 9th ACM
SIGKDD International Conference on Knowledge Discovery and Data
Mining, pages 137 -- 146, 2003.
[2] Thang N Dinh, Huiyuan Zhang, Dzung T Nguyen, and My T Thai. Cost-
effective viral marketing for time-critical campaigns in large-scale social
networks. IEEE/ACM Transactions on Networking (TON), 22(6):2001 --
2011, 2014.
[3] Edith Cohen, Daniel Delling, Thomas Pajor, and Renato F. Werneck.
Sketch-based Influence Maximization and Computation: Scaling up with
Guarantees. In Proceedings of the 23rd ACM International Conference
on Conference on Information and Knowledge Management, pages 629 --
638, 2014.
[4] Christian Borgs, Michael Brautbar, Jennifer Chayes, and Brendan Lucier.
Maximizing Social Influence in Nearly Optimal Time. In Proceedings of
the Twenty-Fifth Annual ACM-SIAM Symposium on Discrete Algorithms,
pages 946 -- 957, 2014.
[5] Huiyuan Zhang, Thang N Dinh, and My T Thai. Maximizing the spread
of positive influence in online social networks. In Distributed Computing
Systems (ICDCS), 2013 IEEE 33rd International Conference on, pages
317 -- 326. IEEE, 2013.
[6] Huiyuan Zhang, Dung T Nguyen, Huiling Zhang, and My T Thai. Least
cost influence maximization across multiple social networks. IEEE/ACM
Transactions on Networking, 24(2):929 -- 939, 2016.
[7] Thang N Dinh, Dung T Nguyen, and My T Thai. Cheap, easy, and
massively effective viral marketing in social networks: truth or fiction?
In Proceedings of the 23rd ACM conference on Hypertext and social
media, pages 165 -- 174. ACM, 2012.
[8] Huiyuan Zhang, Huiling Zhang, Alan Kuhnle, and My T Thai. Profit
Maximization for Multiple Products in Online Social Networks. In IEEE
International Conference on Computer Communications, 2016.
[9] Youze Tang. Influence Maximization in Near-Linear Time : A Martin-
gale Approach. In Proceedings of the 2015 ACM SIGMOD International
Conference on Management of Data, pages 1539 -- 1554, 2015.
[10] Youze Tang, Xiaokui Xiao, and Yanchen Shi. Influence maximization:
Near-optimal time complexity meets practical efficiency. In Proceedings
of the 2014 ACM SIGMOD International Conference on Mangement of
Data, pages 75 -- 86, 2014.
[11] Amit Goyal, Francesco Bonchi, Laks V S Lakshmanan, and Suresh
Venkatasubramanian. On minimizing budget and time in influence
propagation over social networks. Social Network Analysis and Mining,
3(2):179 -- 192, 2013.
[12] Sharad Goel, Ashton Anderson, Jake Hofman, and Duncan J Watts. The
Structural Virality of Online Diffusion. Management Science, 62(1):180 --
196, 2016.
[13] Sandra Gonz´alez-Bail´on, Javier Borge-Holthoefer, and Yamir Moreno.
Broadcasters and Hidden Influentials in Online Protest Diffusion. Amer-
ican Behavioral Scientist, 57:943 -- 965, 2013.
(a) BA 100,000
(b) Facebook
Fig. 2. The effect of external influence on activation and size of seed set of
STAB-C2.
In 2(a), we plot the expected activation (Act) of the seed
set returned by STAB-C2 normalized by the threshold T , as
epmax varies from 0 to 0.006. As in the previous section, the
expected activation of the returned seed set A is estimated by
independent Monte Carlo sampling. We also plot the expected
fraction of T activated by the external influence, along with
the size of the seed set returned by STAB-C2, normalized by
its maximum value. As the effect of external influence in the
network increases, the algorithm requires fewer seed nodes
to ensure the expected activation is within the specified error
tolerance to threshold T .
In 2(b), we show an analogous plot for the Facebook
network; interestingly, the size of the seed set chosen by
STAB-C2 nearly doubles as epmax increase from 0 to 0.01,
before beginning to decrease to 0. This increase differs from
what we expected; it is counterintuitive that the algorithm
would require more seeds to reach the threshold as external
influence increases. One possible explanation for this effect
is that the external influence both decreases and distributes
the marginal gain more evenly among seed nodes, so that
the greedy algorithm has a more difficult time identifying the
best seed nodes, especially in the presence of the error of
estimation.
V. RELATED WORK
Kempe et al. introduced the triggering model in a seminal
work on the IM problem [1], where they exhibited a Monte
Carlo greedy sampling algorithm that achieves 1− 1/e perfor-
mance ratio for IM; this algorithm, although it runs in polyno-
mial time, is very inefficient and cannot scale well. Since the
maximum coverage problem prohibits performance guarantee
better than 1 − 1/e + o(1) under standard assumptions, the
ratio for IM likely cannot be improved, but much work has
improved the scalability of the algorithm while retaining the
guarantee. Leskovec et al. [19] introduced the CELF method to
exploit submodularity and improve the running time. Reverse
Influence Sampling (RIS) was introduced in [4] to further
improve the greedy performance; algorithms using RIS include
[4], [9], [10], [21], [22]; the current state-of-the-art are the
SSA [21] and the IMM algorithm [9] to which we compare
in this paper. Cohen et al. [3] introduced a methodology for a
highly scalable IM algorithm SKIM; in this work, we extend
this methodology to solve the TAP problem with the triggering
model and external influence.
As compared with IM, much less effort has been devoted
to scalable solutions to TAP while maintaining performance
10
[14] Seth A. Myers and Jure Leskovec.
The bursty dynamics of the
Twitter information network. In Proceedings of the 23rd International
Conference on World Wide Web, pages 913 -- 924, 2014.
[15] Seth A. Myers, Chenguang Zhu, and Jure Leskovec.
Information
In Proceedings of the
diffusion and external influence in networks.
18th ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining, pages 33 -- 41, 2012.
[16] Edith Cohen. Size-Estimation Framework with Applications to Transi-
tive Closure and Reachability. Journal of Computer and System Sciences,
55(3):441 -- 453, 1997.
[17] Edith Cohen, H Kaplan, and Tel Aviv. Leveraging discarded samples
for tighter estimation of multiple-set aggregates. ACM SIGMETRICS
Performance Evaluation Review, 37(1):251 -- 262, 2009.
[18] Wei Chen, Chi Wang, and Yajun Wang. Scalable influence maximization
for prevalent viral marketing in large-scale social networks. In Proceed-
ings of the 16th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, pages 1029 -- 1038, 2010.
[19] Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos,
Jeanne VanBriesen, and Natalie Glance. Cost-effective Outbreak De-
the 13th ACM SIGKDD
tection in Networks.
international conference on Knowledge discovery and data mining,
pages 420 -- 429, 2007.
In Proceedings of
[20] Jure Leskovec and Andrej Krevl. SNAP Datasets: Stanford large network
dataset collection. http://snap.stanford.edu/data, June 2014.
[21] H.T. Nguyen, M. T. Thai, and T. N. Dinh. Stop-and-Stare: Optimal
Sampling Algorithms for Viral Marketing in Billion-Scale Networks. In
ACM SIGMOD/POSD Conference, 2016.
[22] H. T. Nguyen, T. N. Dinh, and M. T. Thai. Cost-aware Targeted Viral
Marketing in Billion-scale Networks. In IEEE International Conference
on Computer Communications, 2016.
[23] Wei Chen, Fu Li, Tian Lin, and Aviad Rubinstein. Combining Tradi-
tional Marketing and Viral Marketing with Amphibious Influence Max-
imization. In Proceedings of the 16th ACM Conference on Economics
and Computation, pages 779 -- 796, 2015.
[24] N. P. Nguyen, Y. Xuan, and M. T. Thai. A novel method for worm
containment on dynamic social networks. In Military Communications
Conference, pages 2180 -- 2185, 2010.
[25] Nam P. Nguyen, T. N. Dinh, D. T. Nguyen, and M. T. Thai. Overlapping
community structures and their detection on social networks. In Privacy,
Security, Risk, and Trust (PASSAT) and 2011 Third International Con-
ference on Social Computing, 2011.
|
1811.01638 | 1 | 1811 | 2018-11-05T12:22:16 | Identifying influential patents in citation networks using enhanced VoteRank centrality | [
"cs.SI",
"cs.DL",
"physics.soc-ph"
] | This study proposes the usage of a method called VoteRank, created by Zhang et al. (2016), to identify influential nodes on patent citation networks. In addition, it proposes enhanced VoteRank algorithms, extending the Zhang et al. work. These novel algorithms comprise a reduction on the voting ability of the nodes affected by a chosen spreader if the nodes are distant from the spreader. One method uses a reduction factor that is linear regarding the distance from the spreader, which we called VoteRank-LRed. The other method uses a reduction factor that is exponential concerning the distance from the spreader, which we called VoteRank-XRed. By applying the methods to a citation network, we were able to demonstrate that VoteRank-LRed improved performance in choosing influence spreaders more efficiently than the original VoteRank on the tested citation network. | cs.SI | cs | Identifying influential patents in citation networks using enhanced
VoteRank centrality
Freitas, João C.S. *, Barbastefano, Rafael **, Carvalho, Diego **
* FGV -- Getulio Vargas Foundation. Praia de Botafogo, 190 -- Botafogo -- Rio de Janeiro/RJ - Brazil
[email protected]
** Cefet -- Federal Centre for Technological Education Celso Suckow da Fonseca. Av. Maracanã, 229 -
Maracanã -- Rio de Janeiro/RJ -- Brazil
[email protected]
[email protected]
Abstract
This study proposes the usage of a method called VoteRank, created by Zhang et al. (2016), to identify
influential nodes on patent citation networks. In addition, it proposes enhanced VoteRank algorithms,
extending the Zhang et al. work. These novel algorithms comprise a reduction on the voting ability of the
nodes affected by a chosen spreader if the nodes are distant from the spreader. One method uses a
reduction factor that is linear regarding the distance from the spreader, which we called VoteRank-LRed.
The other method uses a reduction factor that is exponential concerning the distance from the spreader,
which we called VoteRank-XRed. By applying the methods on a citation network, we were able to
demonstrate that VoteRank-LRed improved performance in choosing influence spreaders more efficiently
than the original VoteRank on the tested citation network.
Keywords
Social networks, centrality
Classification Codes
MSC: 91D30 , 68W01
JEL: O33, C63, C90,
1 - Introduction
Patent citations are often used as a direct means for distinguishing technologies among themselves, but
the amount of times a patent is cited is also an indicative of its value (Jang, Lo, & Chang, 2009).
Moreover, a patent citation usually represents knowledge contained in one patent and extended by a
newer one, meaning a knowledge flow (Jaffe, Trajtenberg, & Henderson, 1993). Patent citations have also
been used to detect technology diffusion and forecasting (Chang, Lai, & Chang, 2009) or knowledge
spillover (Xiang, Cai, Lam, & Pei, 2013).
Since citations establish relationships between patents (actors), social networks theory can be applied to
build patent citations networks and acquire better comprehension about citations (Chang, Lai, & Chang,
2009). Therefore, many studies have been made using patent citation networks, such as (Hung & Wang,
2010) or (Kim, Cho, & Kim, 2014). Xiang et al. (2013) applied a spillover technique to increase the
amount of relationships among patents in citation networks. The spillover technique creates an arc in the
network from an older to a newer patent if they share at least one common author, even if there was no
citation between them on the original network. The goal is to explicit the relationship between these
patents, because tacit knowledge acquired during the first work was implicitly used by the common
author on the newer patent.
Centrality is a key concept in social networks. The most important or prominent actors of a network are
said to be central (Wasserman & Faust, 2006). A node centrality can be calculated in many different
ways, the most usual being degree, closeness, and betweenness, which can be found on most social
network analysis books, such as (Wasserman & Faust, 2006) or (De Nooy, Mrvar, & Batagelj, 2005).
However, increasingly more ways of expressing the centrality of nodes, like LocalRank, ClusterRank,
PageRank, H-Index and others, have been appearing lately, as gathered by Lü et al. (2016).
Among these newer methods, lies the VoteRank algorithm (Zhang, Chen, Dong, & Zhao, 2016), known
for its swiftness and efficiency and for providing several spreaders simultaneously. In a patent citation
network, a spreader can be understood as a document that is cited throughout an innovation chain. Since
the efficient detection of important members from a network is a core need for the understanding of
knowledge flow through citations or patents values, this study discloses this new method to the field of
patent citation network analysis. It proposes some modifications on VoteRank in order to find better
spreaders.
This study is structures as follows: section 2 presents the Centrality, VoteRank, and SIR criterion; section
3 discloses two variations of VoteRank; and section 4 displays the achieved results.
2 -- Centrality
Centrality is a key concept in social network analysis. One of most important applications of graph theory
in SNA is the identification of prominent vertices (actors) in a network (Wasserman & Faust, 2006).
Networks are abstract concepts; thus, the definition of centers becomes difficult, since there is no
similarity with the physical concept of centroid.
The first centrality concept is related to the number of ties connected to a vertex. A central actor with
several connections is involved in more relations than an actor with fewer connections. This definition is
both topological and local. Other traditional centrality measures are related to the average distance from
one vertex to the others (closeness), or to network information flows (betweenness).
The relative importance of each actor within the network can be recognized through centrality metrics. In
the scope of this study, the following centrality measures were employed: degree, closeness, and
betweenness. The so-called giant component is yet another interesting variable to observe in a citation
network. The following are the centrality metrics and the giant component definitions as seen on
(Wasserman & Faust, 2006) and (De Nooy, Mrvar, & Batagelj, 2005).
Let G={V, E} be a undirected graph representing a network, where V is the set of nodes and E is the set of
edges in the network. The degree centrality Dc of a node is measured by the number of nodes directly
connected to the node v: . On directed networks, we can also have the in-degree
1
which is defined by the number of incoming arcs on the node, and also the out-degree, defined by the
number of outgoing arcs from the node.
The closeness centrality Cc of a node v is defined by the inverse of the average of all shortest paths
(geodesic paths) from v to all other n nodes on the network v:
. The shorter the sum of
distances from v to other nodes is, the higher the closeness centrality gets. Unlike the degree centrality,
which is local, the closeness centrality is a global measure, since it is defined by the entire network
topology.
The betweenness centrality Bc of a node v indicates the percentage of information flows on the network
that goes through v. It is defined as a proportion of the amount T(x,v,y) of shortest paths between every
pair of nodes in the network where v lies in the path and the amount T(x,y) of all shortest paths in the
network:
. The betweenness centrality is measurable only on directed networks
since the direction of the flow is relevant. It is also a global measure, like the closeness centrality.
On citation or co-authoring networks, it is common to verify that a node is not connected to every other
node in the network. On these cases, most analysis happens on a so-called giant component that
comprises many nodes of the network. The giant component can be defined as the largest connected
component of a network and normally it contains a significant fraction of the nodes.
2.1 - VoteRank
The VoteRank algorithm is a method to calculate the centrality of nodes on directed or undirected
networks. In this context, the centrality itself reflects the node's capacity for spreading news or influence
over a network. The VoteRank algorithm provides a better choice of influential nodes than other
comparable methods, such as PageRank or Degree, as demonstrated by Zhang, Chen, Dong & Zhao
(2016).
The VoteRank algorithm creates a concept of votes between connected nodes. Each node can be voted by
its immediate neighbors, each of these neighbors having its own voting ability. The voting score of a node
is the sum of the voting ability of its neighbors. A node with high voting score is more relevant than a
node with a low voting score.
The VoteRank algorithm begins with every node having a voting ability of 1. On each turn, the VoteRank
algorithm computes the voting score for every node in the network, and picks the node with the highest
voting score as an influence spreader. On undirected networks, the voting score is the sum of all
neighbors' voting ability within a distance to the spreader equal to one. On directed networks, the voting
score is the sum of the voting abilities only from the neighbors that receive information from the spreader,
which Zhang et al. refer to as out-neighbors.
Once a spreader is chosen, its voting ability and voting score are zeroed, and the voting ability of each of
its neighbors is reduced by a factor of
, where <k> is the average degree of the network, or the average
out-degree on directed networks. If there are more spreaders to choose from the network, the VoteRank
algorithm once again computes the voting scores for the network's nodes, excluding the spreaders that
had already been chosen, and picks the current node with the highest voting score as a spreader. Once
more, the spreader's score and voting ability are zeroed, and the voting ability of its immediate neighbors
is decreased. The method repeats this cycle until a satisfying number of spreaders is chosen.
The VoteRank method is computationally efficient. On each iteration, the method reduces the voting
ability values for a small set of nodes, and then computes the new voting scores for their neighbors alone.
The method is quite swift, since it only operates on a small section of the network at a time. Moreover,
the VoteRank algorithm provides an interactive form for choosing important nodes on the network, and it
is more efficient than other methods explored in the study, according to the SIR spreading model.
2.2 -- SIR
The methods comparison on the study by Zhang et al. was performed using the SIR spreading model. The
SIR spreading model is a de facto standard used for comparing algorithms that search for the most
2
important or central nodes on networks. It has been extensively utilized on several studies such as (Wang,
Zhang, Zhao, & Yi, 2016), (Lü, Zhou, Zhang, & Stanley, 2016), (Liu, Tang, Zhou, & Do, 2015) or
(Malliaros, Rossi, & Vazirgiannis, 2016), among others. The following information in this section is
based on the study of Pastor-Satorras et al. (2015).
The standard susceptible-infected-recovered (SIR) epidemic model is applied to simulate how fast and
extensively an infection can be spread over a network.
On this model, all nodes on the network are marked as susceptible, infected or recovered. A susceptible
node is a node that can be infected. An infected node is a node that can spread the infection to susceptible
nodes. A recovered node is a node that once was but no longer is infected, and became immune to
infection. There are variations, e.g. the recovered can be infected again (SIS), but the SIR spreading
model is more commonly used.
The method starts with a set of one or more spreaders being defined as infected. All other nodes on the
network are marked as susceptible. On each turn the infected nodes try to spread their infection to
neighbors with a success probability µ. After the spreading, and still on the same turn, the newly infected
nodes can become no longer infected with probability β and, in case of success, get marked as recovered.
This ends the current turn, and a new turn begins, with new infections occurring and infected nodes being
recovered. The simulation ends when all nodes are either susceptible or recovered.
In our scenario, the infection is the spreading of information. Clearly, the spreaders are the nodes chosen
with VoteRank or any other method. Simulations using several ratios between µ and β can be made,
determining how fast the spreading occurs and/or how extensive the spreading is. This ratio is usually
expressed as λ (λ
). If λ>0, the number of infected nodes grow exponentially, so simulations usually
have λ<0.
The methods are comparable in terms of how long the simulation took to end, or how fast the spreading
grew. But the most important factor is how extensive was the spreading, in terms of the percentage of the
network size that was affected, e.g. how many people received information broadcasted by a set of
spreaders. It can be expressed by the function R(t)
, where r is the number of recovered nodes and n
is the number of nodes on the network. When t = tend, the simulation is over and there are no infected
nodes left.
Generally, a method is considered to be more efficient than others if it determines a set of spreaders that
affects a more significant portion of the network than the set computed by the other methods, provided
the sets have a same size and the simulation parameters β and µ are equivalent. In a nutshell, the methods
compete among themselves for the best choice of spreaders, and the SIR method judges among them.
3 - Alternative VoteRank algorithms
The VoteRank algorithm, as it was originally proposed, assumes that only the nearest neighbors have
their voting ability reduced after a spreader has been chosen. On directed acyclic graphs, such as regular
citation networks, even fewer nodes are affected, because only nodes connected with arcs leaving the
spreader are computed (out-neighbors). This feature implies that a node on the network only spreads
influence on its immediate neighborhood, via direct communication, arcs or edges.
However, we consider that a node spreads influence to a larger area of the network, both indirectly and
through its closest neighbors. Assume that any given node A broadcasts information on the network. If
information broadcasted by A reaches another node B being at a distance greater than one from node A,
that is because of the spreading influence of node A anyway. Therefore, it is hypothesized that the voting
ability for node B could also be affected by A, as B was influenced by A. Thus, the VoteRank algorithm
can be somewhat extended.
We hereby propose an alternative VoteRank algorithm, where more neighbors can be affected by a
chosen spreader node A. In theory, if there is a path between nodes A and B on the network, B could also
have its voting ability reduced, regardless of how far apart they are.
3
The original VoteRank algorithm applies a reduction on the voting ability of its direct neighbors at a
factor of
, where <k> is the average degree of the network, or the average out-degree on directed
networks. We hypothesize that this reduction will also affect other, more distant neighbors, and that this
reduction will depend on the distance from the spreader. The farther a node is from a spreader, the less its
voting ability will be affected.
The first proposed alternative, called VoteRank-LRed, is applying a linear reduction on the voting ability
at a factor of
, where <k> is the average degree of the network, or the average out-degree on directed
voting ability
networks, and d is the distance from the node to the spreader. It is straightforward to verify that a node
that is very far from the spreader nearly isn't affected by it.
The second proposed alternative, called VoteRank-XRed, is applying an exponential reduction on the
where, again, <k> is the average degree of the network, or the average out-degree on
directed networks, and d is the distance from the node to the spreader. This variation applies the reduction
at a much faster pace, and the spreader's impact on distant neighbors is smaller than on VoteRank-LRed,
though higher than on the original VoteRank.
Since the reduction factor decays with distance, the algorithm applies the reduction on the voting ability
only up to a maximum distance from the spreader, in order to avoid excessive calculation. We decided to
apply the reduction factor on nodes with a distance of at most <k> from the spreader, where <k> is the
average degree node of the network, or the average out-degree on directed networks. On the next section,
we will apply VoteRank, VoteRank-LRed, and VoteRank-XRed on some patent citation networks and
compare their performances using the SIR model.
4 - Results
In order to apply and compare the VoteRank algorithms, we selected one real patent citation network
created by the authors on previous study.
3DPRN describes citations amongst patents regarding 3D printing technology; it was obtained
from Derwent World Patent Index on Aug-2014, and contains patents published until 2013.
Table 1 summarizes the main topological features of the network.
Features
3DPRN
nodes
arcs
density
average degree
653
1416
0,003321
4,336907
average out-degree
2,168453
nodes on giant component
442
% nodes on giant component
67,7%
Table 1 -- topological features of the test network
We tested the network with the Degree, Closeness, Betwenness, VoteRank, VoteRank-LRed and
VoteRank-XRed methods. For every test, we selected an arbitrary number of spreader nodes expressed in
terms of a percentage p of the number of nodes on the network. The tests were performed with p values
ranging from 0.0001 to 0.04. Many SIR simulations, with varying µ and β parameters, were performed
for each network, method and p amount of spreaders. For each choice of p, µ and β, 1.000 independent
simulations were performed. Therefore, the following graphs express average values from 1.000
simulations when p, µ and β were defined, or even more simulations when these parameters were not
4
fully detailed. On this study, we performed over 3 million SIR simulations overall. Figure 1 shows the
function R(t) for the percentage of nodes that recovered from the infection during the simulation.
Figure 1 -- Extent of infection on networks 3DPRN where p=0.02, µ=0.3 and β =0.2
Figures 1 shows that VoteRank-LRed had the best performance under these conditions.
Figure 2 shows how R(tend) varies according to different values of p, given µ and β are fixed.
Figure 2 -- Variation of infection extent due to amount of spreaders chosen, given µ =0.4 and β =0.2
Results were consistent, across several values of p, that Betweenness was the weakest method, and the
strongest were VoteRank-LRed, VoteRank-XRed, and VoteRank, in this order. On most simulations,
results were inconclusive when the number of spreaders was smaller than 15, varying a lot and pending to
Closeness as the method of choice. Above this threshold, VoteRank-LRed had the best performance, and
VoteRank-XRed came second between the leading method and VoteRank.
So far, we have only observed the behavior of the methods in the variation of time and number of
spreaders. Now we show in Figure 3 the comparison between the methods when the factor λ is changed.
We fixed p=0.01 and µ=0.5. Changing values of β, we had the following results. We show only the
VoteRank methods on this figure for better visibility due to the scale of the graphs. As expected, as λ
grows, more nodes are infected. The three methods behave equally.
5
Figure 3 -- Variation of infection extent due to changes in SIR parameter β, with p=0.01 and µ =0.5.
Table 2 shows the distribution of victories of each method along with all the tests for each value of p and
for each network. We created 66 possible combinations of values µ and β for each value of p. Again, it is
clear that networks with smaller amounts of nodes were more affected by smaller values of p. As p
increased, the usefulness of VoteRank-LRed increased as well. The EOLIC network is the largest one
tested, and with p equal to or larger than 0.001, i.e. 15 spreaders, results consistently point to VoteRank-
LRed as the best choice.
Table 2 -- Distribution of victories of each method through all tests.
VoteRank-LRed and VoteRank-XRed are somewhat more computationally intensive than original
VoteRank. In the step where voting abilities are reduced, more nodes are searched and updated. The
procedures needed to reach these other nodes up to distance <k> must be performed, and are not present
on the original method. However, using good tree implementations and caching techniques, we can
overcome the difference with no major impact. Moreover, it is a small price to pay if we are interested in
achieving better results.
5 - Conclusion
The obtained results revealed that VoteRank-LRed had better results than original VoteRank in most
scenarios. The variation hereby proposed is useful, and the hypothesis that the influence spread by the
nodes on larger areas of the network should be taken in account has proven to be valid.
6
Further investigations can be conducted regarding an extension of VoteRank-LRed. This version of the
method reduces the voting ability of nodes up to a <k> distance from the spreader, where <k> is the
average degree of the network. The <k> value was rather arbitrary, so simulations could be run to try to
determine if there are better approximations for a distance up to which the neighbors should be affected.
Other variations of the method could be tried, with other types of reductions instead of a linear one.
Lastly, the voting process for choosing a spreader by calculating its score considers only its closest
neighbors, i.e., those with a distance equal to one. Other versions of the method could be applied having
the score take into account other neighbors, as we did with the reduction of the voting ability, perhaps up
to a <k> distance as well.
We are of the opinion that the application of these new methods on patent citation networks can bring
new insights regarding the discovery of the most relevant patents in a network, and also help future
analysis of the values and influences of both patents and scientists.
References
Chang, S.-B., Lai, K.-K., & Chang, S.-M. (2009). Exploring technology diffusion and classification of
business methods: Using the patent citation network. Technological Forecasting & Social
Change, 76, 107-117; doi:10.1016/j.techfore.2008.03.014.
de Nooy, W., Mrvar, A., & Batagelj, V. (2005). Exploratory network analysis with Pajek. New York:
Cambridge University Press.
Hung, S.-W., & Wang, A.-P. (2010). Examining the small world phenomenon in the patent citation
network. Scientometrics, 82, 121-134.
Jaffe, A. B., Trajtenberg, M., & Henderson, R. (1993). Geographic Localization of Knowledge Spillovers
as Evidenced by Patent Citations. The Quarterly Journal of Economics, 108(3), 577-598.
Jang, S.-L., Lo, S., & Chang, W. H. (2009). How do latecomers catch up with forerunners?
Scientometrics, 79(3), 563-591; doi: 10.1007/s11192-007-2032-1.
Kim, E., Cho, Y., & Kim, W. (2014). Dynamic patterns of technological convergence in printed
electronics technologies: patent citation network. Scientometrics, 98, 975-998.
Liu, Y., Tang, M., Zhou, T., & Do, Y. (2015). Improving the accuracy of the k-shell method by removing
redundant links: From a perspective of spreading dynamics. Sci. Rep, 5, 13172; doi:
10.1038/srep13172.
Lü, L., Chen, D., Ren, X.-L., Zhang, Q.-M., Zhang, Y.-C., & Zhou, T. (2016). Vital nodes identification
in complex networks. Physics Reports, 650, 1-63.
Lü, L., Zhou, T., Zhang, Q.-M., & Stanley, H. E. (2016). The H-index of a network node and its relation
to degree and coreness. Nat. Commun., 7, 10168; doi: 10.1038/ncomms10168.
Malliaros, F. D., Rossi, M.-E. G., & Vazirgiannis, M. (2016). Locating influential nodes in complex
networks. Sci. Rep., 6, 19307; doi: 10.1038/srep19307.
Pastor-Satorras, R., Castellano, C., Van Mieghem, P., & Vespignani, A. (2015). Epidemic processes in
complex networks. Rev. Mod. Phys., 87(3), 925-979.
Wang, X., Zhang, X., Zhao, C., & Yi, D. (2016). Maximizing the Spread of Influence via Generalized
Degree Discount. PLoS ONE, 11(10), e0164393; doi:10.1371/journal.pone.0164393.
Wasserman, S., & Faust, K. (2006). Social network analysis: Methods and applications. New York:
Cambridge University Press.
7
Xiang, X.-Y., Cai, H., Lam, S., & Pei, Y.-L. (2013). International knowledge spillover through co-
inventors: An empirical study using Chinese assignees' patent data. Technological Forecasting
and Social Change, 80(1), 161-174; doi:10.1016/j.techfore.2012.07.003.
Zhang, J.-X., Chen, D.-B., Dong, Q., & Zhao, Z.-D. (2016). Identifying a set of influential spreaders in
complex networks. Sci. Rep., 6, 27823; doi: 10.1038/srep27823.
8
|
1603.04010 | 1 | 1603 | 2016-03-13T08:39:19 | Using Twitter to Understand Public Interest in Climate Change: The case of Qatar | [
"cs.SI",
"cs.CY"
] | Climate change has received an extensive attention from public opinion in the last couple of years, after being considered for decades as an exclusive scientific debate. Governments and world-wide organizations such as the United Nations are working more than ever on raising and maintaining public awareness toward this global issue. In the present study, we examine and analyze Climate Change conversations in Qatar's Twittersphere, and sense public awareness towards this global and shared problem in general, and its various related topics in particular. Such topics include but are not limited to politics, economy, disasters, energy and sandstorms. To address this concern, we collect and analyze a large dataset of 109 million tweets posted by 98K distinct users living in Qatar -- one of the largest emitters of CO2 worldwide. We use a taxonomy of climate change topics created as part of the United Nations Pulse project to capture the climate change discourse in more than 36K tweets. We also examine which topics people refer to when they discuss climate change, and perform different analysis to understand the temporal dynamics of public interest toward these topics. | cs.SI | cs | Using Twitter to Understand Public Interest in Climate Change:
The case of Qatar
Sofiane Abbar, Tahar Zanouda, Laure Berti-Equille, Javier Borge-Holthoefer
Qatar Computing Research Institute
Hamad Bin Khalifa University
PO 5825, Doha, Qatar
{sabbar, tzanouda, lberti, jborge}@qf.org.qa
6
1
0
2
r
a
M
3
1
]
I
S
.
s
c
[
1
v
0
1
0
4
0
.
3
0
6
1
:
v
i
X
r
a
Abstract
Climate change has received an extensive attention from pub-
lic opinion in the last couple of years, after being considered
for decades as an exclusive scientific debate. Governments
and world-wide organizations such as the United Nations are
working more than ever on raising and maintaining public
awareness toward this global issue.
In the present study,
we examine and analyze Climate Change conversations in
Qatar's Twittersphere, and sense public awareness towards
this global and shared problem in general, and its various re-
lated topics in particular. Such topics include but are not lim-
ited to politics, economy, disasters, energy and sandstorms.
To address this concern, we collect and analyze a large dataset
of 109 million tweets posted by 98K distinct users living in
Qatar – one of the largest emitters of co2 worldwide. We use
a taxonomy of climate change topics created as part of the
United Nations Pulse project to capture the climate change
discourse in more than 36K tweets. We also examine which
topics people refer to when they discuss climate change, and
perform different analysis to understand the temporal dynam-
ics of public interest toward these topics.
Introduction
In 2011, the state of Qatar was designated by the World Bank
as the highest per-capita emitters of CO2 in the world with
more than 44.02 metric tons per person [19]. This surpris-
ingly high rank is actually due to Qatar's massive energy
sector and relatively small population. With a population of
only 2.4 million in 2015 (1.8 million in 2011), Qatar was in
2013 the world's fourth-largest dry natural gas producer, and
world's first liquefied natural gas (LNG) exporter in 2014
[10]. Given the serious implications that such high emis-
sions of greenhouse gases may have on population's health
and wellbeing and on the national eco-system and biodiver-
sity equilibrium, the government of Qatar has taken many
steps toward limiting the country's ecological footprint [1].
For instance, Qatar hosted in 2012 the Conference of the
Parties (COP18) of the United Nations Framework Conven-
tion on Climate Change where an agreement was signed to
extend the life of Kyoto protocol till 2020 [15].
Qatar's mission to limit the country's carbon footprint
is part of a global movement to act on the urgent warn-
Copyright c(cid:13) 2015, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
ings emanating from the scientific communities about Cli-
mate Change. Governments and world-wide organizations
such as the United Nations are working more than ever on
raising and maintaining public awareness toward this issue.
While sensing the engagement of governments to mitigate
the causes of climate changes such as dioxide carbon emis-
sions is relatively straightforward by looking at the interna-
tional treaties and protocols ratified, it is not clear how to
achieve the same objective at citizens' scale, who are part of
the causes and consequences of this shared problem. Tra-
ditional surveys such as field interviews are costly and do
not scale for obvious reasons. To address this concern, we
analyze Twitter's content to sense the awareness of people
toward climate change and investigate their interest toward
its multiple topics. The recent multiplication of hazardous
natural disasters around the world and the news coverage
they received have helped disseminate awareness among in-
dividuals about the consequences of climate change prob-
lems, which happens to be amplified by social network plat-
forms.
Main contributions.
In this study, we are interested in
sensing the public interest in climate change of people liv-
ing in Qatar. This is achieved by analyzing a large collection
of tweets posted between 2011 and 2016. Unlike previous
studies that focused either on a limited set of climate change
related keywords or on a set of geo-coded tweets (represent-
ing only 2% of twitter traffic), our approach aims at captur-
ing most of the discourse related to climate change under
its different aspects ranging from politics and economy to
energy and disasters. Our main contributions include: (i)
We identified of 117K users (5% of the entire population)
claiming they live in Qatar and collected all their climate
change related tweets using a rich taxonomy of topics de-
veloped by the United Nations; (ii) We propose to use net-
work backbones analysis to better understand relationships
between hashtags in co-occurrence graphs; (iii) We analyze
different time series of different topics and infer the most
driving topics discussed in the context of climate change.
Challenges. The main challenge we encountered in this
study was identifying a relevant and accurate taxonomy of
terms to use in order to retrieve climate change related posts.
Many studies have focused on the usage of a single word,
i.e., climate in [4], climate change in [7], and some of them
added a handful of other terms to it such as global warm-
ing in [6, 17]. We finally decided to use a taxonomy de-
veloped by a United Nations work group including climate
change experts and social scientists [16]. The taxonomy is
composed by a set of topics, each one is defined by a set
of keywords or hashtags that should co-occur in a particular
way. The experts have tried as much as possible to keep the
set of terms that define topics disjoint. The other challenge
was to identify correctly users living in Qatar and crawl all
their tweets. We have provided a heuristic based on follow-
ing relationship and a gazetteer of locations to find relevant
users. Parsing a collection of 109 million tweets to extract
climate change related ones, and working to keep the level of
noise to its minimum possible level was a challenging task
as many manual checking was required.
Context of the study.
In this study, we focus on Twitter
conversations related to environmental issues posted by peo-
ple living in Qatar. Qatar is a small peninsula in the Arabian
Gulf. It is the home of a native population of approximately
300,000 Qataris, who live among a total population of 2.4
million [13]. Internet penetration is high in Qatar; 85% of
the population has Internet access. In addition, social me-
dia are popular and widely used among the native popula-
tion –65% of Qataris have an Instagram account, 44% are
on Facebook, and 46% use Twitter [11].
Roadmap. The rest of the paper is organized as follows.
We start by providing a literature review on related work.
Then, we define the methods used for the analysis. Next, we
describe the datasets we collected. Then, follows a section
that presents and discusses our findings. Finally, we con-
clude the paper with some insights.
Literature Review
Climate change is a major challenge facing the world, with
myriad causes and consequences. One of the leading con-
tributors to the rising levels of CO2 emissions is the activity
of humans in urban places, as a consequence, the unmanage-
able rising of CO2 emissions altered global climatic condi-
tions and indirectly harms the environmental ecosystem 1.
In order to strategically raise public awareness on climate
change issues, and protect the world's shared natural en-
vironment for sustainable and spiritual benefit, researchers
have analyzed public opinions to identify public awareness,
examine this trend on the social media sphere and investi-
gate lasting public awareness plans.
As most people have limited resources to get accurate data
on air pollution and climate change, Wang and Paul [18]
have investigated the value of social media as a sensor of
air quality and public response. Authors analyzed more than
93 million messages from Sina Weibo, China's largest mi-
croblogging service and found a high correlation with par-
ticle pollution levels, which makes the use of social media
1http://www.un.org/climatechange/
data valuable to augment existing air pollution surveillance
data, especially perception.
Alternatively, other studies have demonstrated the utility
of social media data sources to analyze public awareness
about climate change, and the influence of mass media to
interpret global climate problems from the different angles
(causes and remedies) [5]. While Veltri and Atanasova [17]
highlighted the potential opportunity of using social media
to analyze and understand public opinion dynamics. Oltre-
anu et al. [9] compared the coverage of climate change in
both, social media and mainstream news. This comparison
uncovered significant differences between triggers, actions,
and news values of events covered in both types of media.
For instance, mainstream news sources frequently feature
extreme weather events framed as being a consequence of
climate change, as well as high-profile government publica-
tions and meetings. In contrast, actions by individuals, legal
actions involving governments, and investigative journalism
feature frequently as viral events in social media.
As most of people have no deep scientific understanding
on climate change, their perceptions are most likely influ-
enced by framing strategies [20] , which leads the research
community to question public opinions over time and lo-
cation, along with the role that mass media played. Cody
et al. [4] studied user sentiment toward climate change by
analyzing environment-related tweets posted between 2008
and 2014. The study shed a light on how climate news,
events, and disasters affects people's sentiment. An et al.
[2] also conduct an opinion analysis of climate change re-
lated tweets. Authors aimed at understanding whether Twit-
ter data mining can complement and supplement insights
about climate change perceptions, especially how such per-
ceptions may change over time upon exposure to climate
related hazards. A combination of techniques drawn from
text mining, hierarchical sentiment analysis and time series
methods is employed for this purpose. At a large scale, Jang
and Hart [6] investigated how people incorporate climate
change into everyday conversation by the stream of Twitter
over two years. Their study shows geographical differences
in the use of frames and terms concerning climate change,
and how certain frames that promote skepticism about cli-
mate change are widely circulated by users within specific
regional and political contexts.
In this paper, we analyze climate change conversations
and air quality trends in Qatar through the lens of social
media data, and investigate the ability of measuring public
awareness, along with the impact of environmental factors
on public conversations.
Methods
We describe in this section the methods we used in this
study.
Building the Network of Co-occurrences
The relationship between different concepts in the dataset
can be suitably represented as a network. Nodes in the net-
work represent concepts, and a link from node i to node j
implies that the corresponding concepts of the two nodes
co-occur in the same tweet. More importantly, each node
bears an associated quantity a that stands for the proportion
of tweets in which it appears. On the other hand, each link
from i to j has an associated weight (i, j, w), which states
the fraction of tweets in which these two nodes co-occur.
Network backbone extraction
Networks can be described from different levels of analy-
sis. At the micro level, the focus lies on single nodes and
their specific positions within the overall structure; this level
can be described in terms of node degree, strength or clus-
tering coefficient, among other metrics. At the macro level,
the focus shifts to the aggregation of those metrics and the
properties of their distribution. Between these two extremes,
we have a third level of analysis, the mesoscale, which aims
at accounting for the complexity of networks between the
position of individual nodes and the relational properties of
the collectives they form. It is at this level where reduction
techniques like backbone extraction operate.
Network backbone extraction refers to the filtering tech-
niques aimed at uncovering relevant information; in general,
such techniques aim at pruning the links of a network, keep-
ing only those which are statistically relevant. Ideally, the
reduced structure is computationally more tractable while it
retains most of the interesting features of the original one.
We apply the state of the art backbone extraction algorithm
proposed in [12] to the network of hashtag co-occurrences.
In their work, Serrano et al. exploit the empirical trend by
which link weights are heavily fluctuating, i.e., only few
links carry the largest proportion of the node's strength.
Linear Correlation
We use Pearson product-moment coefficient to measure the
linear correlation between different pairs of variables (en-
vironment topics and weather conditions) of interest in this
study. Pearson correlation score ranges in [−1, 1] where 1
(resp. -1) means the existence of total positive (resp. nega-
tive) correlation and 0 means no correlation at all. Pearson
formula between two time series X and Y is given below:
ρX,Y =
E[(X − µX )(Y − µY )]
σX σY
(1)
where: µX , µY are the means of X, Y respectively, and
σX , σY are the standard deviations of the two corresponding
time series.
Datasets
To conduct this study, we need to combine data from two
different sources: Twitter and Weather Underground.
We use Twitter to collect user generated content about
environment related topics. As there is not solicitation for
users to post on Twitter, we claim that this data reflects the
actual and natural responses to users toward different envi-
ronmental topics as they get exposed to them through news
media or witness them happening during natural disasters,
heavy rains, drought, etc. Underground Weather is used
to collect daily weather conditions in Doha, the capital of
Qatar. It is worth noticing that Qatar is a relatively small
(a) Tweets
(b) Census 2010
Figure 1: Qatar Maps
country (area: 11,586 km2) with more than 80% of its pop-
ulation based in the city of Doha. Thus, the weather does
not vary that much from a location to another in the coun-
try. We explain in the following the processes by which we
collected and curated the different datasets.
Identifying users of Qatar
First, we created a gazetteer of locations in Qatar including
the names of main cities and districts in both English and
Arabic, and under different spellings. We matched this list to
a 45 day sample of the Twitter Decahose (a sample of 10% of
all Twitter traffic.) For each user whose tweet was captured,
we requested the list of their followers based on the intuition
that for an average user, followers are more likely to be from
the same country.
Then, we requested the profiles of the followers and filter
out those users who did not mention a location correspond-
ing to Qatar's gazetteer. The same process was iteratively
executed on the list of newly added users; i.e., find their fol-
lower IDs, then follower profiles, then filter out followers
with irrelevant locations, until no new users are identified.
To expand the list of users even further, a social analytics
tool (FollowerWonk.com) was used to obtain lists of users
who mention a location associated with our gazetteer. This
list was then merged with the list obtained earlier from Dec-
ahose and Twitter API. The resulting list consists of over
117K users who claim to be living in Qatar in their Twitter
profiles.
Collecting user tweets
We use Twitter Historical API2 to collect up to 3,200 tweets
posted (the maximum allowed by Twitter API) for each of
the users of Qatar identified in the previous step. This col-
lection has been conducted twice. The first time was in July
2https://dev.twitter.com/, last accessed on Feb,2016
2014 and the second time was in February 2016. Hence,
we could obtain for each user up to 6,400 tweets he posted
over a period of nine years (from 2007 to 2016). This col-
lection generated a total of 109.6 million tweets posted by
more than 98,066 different users. The remaining missing
users have either a disabled or protected account. As Twitter
was launched in 2006 only, the activity of the users of Qatar
was very marginal before 2011. Thus, we focus in this study
on the time period spanning from January 1rst, 2011 to Jan-
uary 1rst, 2016.
Weather data
We use Weather Underground (WU) API [14] to collect
data about daily weather conditions in Qatar for the same
time period. Out of the sixty different measurements WU
API returns, we were particularly interested in the ones that
are more likely to sprinkle climate change related tweets,
temperature (◦C), humidity
these measurements include:
(%), wind speed (km/h), visibility (km), and precipitation
(mm) (including: rain, snow, etc.)
Extracting environment and climate change tweets
In order to identify the climate change related content, we
use a taxonomy of keywords grouped into topics on inter-
est. Previous studies have used simple keywords to filter
climate change tweets. Cody and Reagan for instance used
only one word climate [4]. Veltri and Atanasova used two
keywords climate change and global warming [17] while
Andrei and Svetlana added translations of the aforemen-
tioned words in German, Portuguese, Russian and Spanish
[7]. Jang and Har also used the keywords climate change
and global warming paired with some specific terms related
to different frames [6].
We use in this paper a taxonomy of climate change
topics[16] developed by the UN Global Pulse team. The
taxonomy consists of set of topics, each of which is defined
with a list of terms and hashtags that should co-occur in a
particular way. According to Ren´e Clausen Nielsen – data
innovation specialist in UN Global Pulse – the taxonomy is
created by climate change experts as follows: (1) find a list
of relevant words. (2) find synonyms, plurals, and abbre-
viations by searching Twitter and dictionaries.
(3) Group
words into distinct topics. (4) Create negative filters to get
rid of occurring noise [8].
topics are carefully defined not
An important feature of the used taxonomy is the fact
that
to allow overlap-
ping. These topics are: General, Risk&Disaster ,Poli-
tics&Opinion, Economy, Energy, Oceans&Water ,Weather
,Agriculture&Forestry, Arctic , Campaigns , Negotia-
tions&Summits. For a tweet to be labeled as belonging to
a particular topic, it should satisfy a list of conditions. For
instance, a tweet is about Politics&Opinions if and only if
it CONTAINS ANY {climate, enviro, environment, carbon}
AND NOT CONTAINS ANY {monoxide, fork, copy, fiber}
AND CONTAINS ANY {politics, group of eight, . . .}.
The dusty construction sites in the middle of the city, and
the flat dusty landscape stretching out of the capital's bor-
ders, both contribute to complicated air quality conditions.
We added Air Quality topic separately to captures conver-
sations around air quality and sense how people talk about
the air they breath by tracking words that refer to air and air
pollution (e.g., air quality, air pollution ). Like Countries in
the region, Qatar has built cities in the middle of the desert.
Heavy sandstorms hit the country regularly, and keep fine
dust hanging in the air for days. Thus we added Sandstorm
topic composed of terms such as duststorm, dusty, and sand
storm. A full list of topics with their respective definitions,
terms, and matching conditions can be downloaded from [3].
Data Curation
Next, we started doing a qualitative analysis on our dataset
to determine content that might not be relevant in our analy-
sis. We have noticed that some irrelevant keywords such as
Syria, California, Colorado, etc. were appearing to the top
of co-occurrence lists. The manual inspection allowed us
to identify some bots that were re-tweeting all tweets about
Syria with by appending US state names as hashtags.
At the end of this process, we obtained a clean set of
36,612 environment relevant tweets posted by 8,470 differ-
ent users (also known as tweeps).
Figure 1 shows the geo-coded tweets related to environ-
ment that we have gathered, and a population census from
2010 for comparison. The most populated area is definitely
around the capital city of Doha, with beaches and main roads
being other popular posting sites. A shallow visual inspec-
tion reveals that posting proficiency is correlated with popu-
lation density in general.
Table 1: Description of the final set of topics related to envi-
ronment and climate changes with some basic statistics.
Negotiations/Summits
Energy
Agriculture/Forestry
Category
General
Risk/Disaster
Politics/Opinion
Economy
Ocean/Water
Campaigns
Arctic
Air quality
Sandstorm
Weather
#Tweets
3828
320
11124
2615
7576
1716
1119
458
470
132
69
13124
1139
#Users
1293
129
3192
1038
1080
722
659
289
159
112
41
5605
793
T/U
2.96
2.48
3.48
2.51
7.01
2.37
1.69
1.58
2.95
1.17
1.68
2.34
1.43
%T
10%
8%
30%
07%
20%
4%
3%
1%
1%
0.3%
0.1%
30%
0.03%
Table 1 illustrates the final set of topics related to envi-
ronment and climate changes with some basic statistics in
terms of number of tweets, number of users, ratio of tweets
per user and percentage of tweets related to each category.
Results
In this section, we present the results of different analy-
sis performed on the set of environment-related tweets de-
scribed in the previous section. First, we show the temporal
trends of people reactions to different environmental topics.
We show also the most prominent hashtags associated with
different topics. Then, we look at the co-occurrence graph of
these hashtags to unveil different hashtag relationships and
graph topologies. Finally, we analyze user profiles to check
whether users posting about environment demonstrate any
specific characteristics.
Temporal dynamics
Figure 2 shows the trends of the monthly total number of
tweets (a) and unique users (b) observed in the Qatar "twee-
tosphere". The blue curves represent the trends of all the
tweets posted while the green curves represent environment
related tweets only. To ease the reading, the y-axis is plotted
in log scale. The first striking observation is that even in log
scale, users' activity around environmental topics fluctuates
a lot compared to the smooth general discussions on Twitter.
Most of the spikes observed in Fig 2(a) can be explained by
looking at the tweets posted around the spike period. For in-
stance, one of the most noticeable burst, the one happening
in November-December 2012 is a response to the Confer-
ence of the Parties (COP18) that took place at Qatar late in
2012. That conference to which more than 50 presidents
from around the world took part received a large news cov-
erage locally and internationally. Yet, people living in the
small peninsula of Qatar have extensively experienced the
conference as it has directly impacted their everyday life in
terms of commute deviations, security enforcement, and ac-
cess limitations to some hotels. All this has generated an
unprecedented excitement on Twitter for the event. This ob-
servation is corroborated by Fig 2(b) in which it is easy to
see the important burst of the number of unique users who
took part of discussions and debates around COP18 con-
ference. The second sharper spike that takes place around
March 2015 is due to a sudden strong sandstorm that hap-
pened in Qatar in that same period, causing schools and in-
stitutions to close doors on that day as it was almost impos-
sible to drive. As an example, the below-mentioned tweet
is posted by Qatar's Ministry of Interior on 1st April 2015
3: "Visibility is almost zero in all roads inside and on high-
ways. Motorists are requested to follow safety instructions.
#MoI Qatar."
Continuing further with the temporal analysis of our set
of tweets, we plot in Figure 3 the breakdown of this trend
into different topics by providing the daily time series of
the number of tweets associated with each topic. The first
figure to the left (Global) plots the daily time series of all
environment-related tweets. Some observations can be done
here. First, the different topics vary a lot in terms of volume
and trends. As highlighted in Table 1, the sandstorm topic
seems to overtake all other topics. It is clear that this topic
constitute the most discussed environment related topic on
Twitter by the people of Qatar as this has a direct and imme-
diate impact on their lives. The figure shows also that when
the people of Qatar discuss about environment on Twitter, it
is mostly about Politics&Opiniom, Negotiations&Summits,
and climate change in general. The less covered topics in-
clude Oceans&Water, Arctic and surprisingly Air Quality.
3https://twitter.com/MOI_QatarEn/status/
583359974278967296
(a) Tweets
(b) Users
Figure 2: Monthly volume of the total number of tweets
and unique users in log scale in Qatar from January 2011
to January 2016. We see that climate change curves present
a noticeable variance over time unlike the general smoother
Twitter pattern.
Second, one can easily see that topic time series follow dif-
ferent trends. Indeed, while some topics such as Economic
and Energy maintain a decent level of activity throughout
the years, other topics such as Negotiations&Summits and
Arctic are sparse and only acquire users' attention when a
related event happens.
Content Analysis
In order to visually inspect the content of tweets in differ-
ent topics, we plot Figure 4 in for each topic, we gener-
ate its word cloud of the most frequent hashtags mentioned
in the corresponding tweets. The font size of hashtags is
proportional to their frequencies in different topics. These
word clouds reveal for instance that the hashtag #COP18
is dominating in our dataset of tweets (global word cloud)
and is obviously dominating in tweets belonging to Nego-
tiations&Summits. We also found the hashtags #environ-
ment, #climate, and #carbon to be dominating in Economy
and Energy as #carbon is relevant to both topics (the carbon
economy). #environment dominates also Ocean&Water and
Agriculture&Forestry, #climate dominates in Weather, #ac-
tonclimate dominates in Campaigns, #climatechange domi-
nates in Arctic, and #airpollution dominates in Air Quality.
To further analyze the content, we focused on the relation-
ships between hashtags within topics and we built the co-
occurrence networks of hashtags for the tweets of each topic.
Because the generated networks were dense, it was not pos-
sible to perform any kind of visual observations on them.
Thus, we apply the backbone extraction algorithm explained
in the method section on all generated graphs. The algorithm
201120122013201420152016Time0246810121416Number of tweets (log scale)All tweetsEnvironment related tweets201120122013201420152016Time024681012Number of users (log scale)General Twitter usersEnvironment-aware usersFigure 3: Daily distributions of the total number of tweets for different climate change related topics ordered by volume from
top left to bottom right. Notice that y-axises are not normalized across the figures.
removes all noisy edges from the input graph and retains
only relevant once. Figure 6 plots the backbone networks
of each topic. We use Gephi4 tool to draw the graphs. Col-
ors in the graphs correspond to the different communities of
hashtags identified by Gephi's internal modularity detection
algorithms. The first graph (Global) is generated using all
the climate change related hashtags. We clearly see the ex-
istence of four big communities of hashtags around: #envi-
ronment, #climatechange, #qatar. Interestingly, we see that
the #climatechange community includes two heavy nodes:
#cop18 and #cop21. While #cop18 is heavily connected to
the community around #qatar just as the other hashtag #doha
(the capital), #cop21 (which happened this year in Paris)
does not seem to be connected to Qatar. As the other COP
editions didn't attract media's attentions comparing to the
above-mentioned ones, our study dataset reflects the same
pattern.
The backbone network corresponding to general topic is
nicely clustered too.
In fact, it has a giant component of
hashtags around #climatechange and a small yet accurate
one around #drought containing hashtags such as: Califor-
nia, Haiti, Somelia, rain, and water. All these hashtags
are related in a way or another to drought. The absence
of rain and water are the main causes of drought, and the
mentioned countries and cities are the ones that are strug-
4http://gephi.org, last accessed on Feb, 2016
gling with ongoing drought. Negotiations&Summits net-
work is also very informative. The modularity detection
algorithm used was able to partition the network into four
main communities: #cop17, #cop18, #cop19, and #cop21,
with a high polarization around #cop18 (Doha) and #cop21
(Paris) which are both associated with some distinctive hash-
tags.
Interestingly one can easily see that COP17 (Dur-
ban, South Africa), COP19 (Warsaw, Poland) and COP20
(Lima, Peru) did not attract as much attention as COP18
(Doha, Qatar) and COP21 (Paris, France) if not at all. While
COP18 is heavily covered for obvious reasons, we believe
that the Paris' COP21 local attention is mainly due to the
fact that Paris was already catching the worldwide attention
for the sad Paris attacks event that happened two weeks be-
fore the start of COP21 5, thus benefiting from a large in-
ternational media coverage that was already in place. It is
also interesting to see that both conferences are associated
with distinctive sets of hashtags. For instance, COP18 is as-
sociated with hashtags such as #climatelegacy, #kyoto, #no-
justicenodeal, #ethiopia, and #philippines whereas COP21
is associated with hashtags such as #climatejustice, #car-
bon, # renewables, #climatefinance, #energy, #morocco, and
#china. Interestingly, the hashtag #Aljazeera which refers to
the name of the famous Qatar-based media network appears
5November 2015 Paris attacks: https://en.wikipedia.
org/wiki/November_2015_Paris_attacks
2011201220132014201520160100200300400500600700800900global2011201220132014201520160100200300400500600700800900sand_storm2011201220132014201520160100200300400500600negotiations_summits201120122013201420152016020406080100120140160180politics_opinion201120122013201420152016010203040506070general201120122013201420152016010203040506070weather20112012201320142015201605101520economy201120122013201420152016024681012141618energy201120122013201420152016024681012risk_disaster2011201220132014201520160246810121416campaigns201120122013201420152016024681012agriculture_forestry201120122013201420152016012345ocean_water2011201220132014201520160.00.51.01.52.02.53.0arctic2011201220132014201520160.00.51.01.52.02.53.0air_qualityon the COP21 side. Politics&Opinion backbone network
presents an interesting topology with a strong emphasize on
#environment which is linked to three smaller communities:
#qatar, #climate, and #waste (represented in blue). The re-
maining graphs are self-explanatory. However, it is worth
notice that the relatively small networks of Oceans&Water
and Risk&Disaster have only one community. Arctic and
Air Quality networks are not represented here because the
former returned an empty backbone graph whereas the latter
had only two nodes, namely: #airpollution and #health.
Figure 4: Word clouds of hashtags corresponding to differ-
ent environment-related topics. The first word cloud to the
left is generated from all environment-related tweets.
Environment-aware users
After our content-centered analysis, we work on analyzing
users. We use Users endpoint of Twitter API to request the
profiles of 8K users who posted at least one tweet about en-
vironment. Each user profile comes with basic information
such as id, screen name, full name, bio and some statistics
about the number of posts, followers, and friends. We an-
alyze the profiles of users, particularly their self-identified
biographies. Notice that while not all users provide a biog-
raphy in their profiles, most of them do. Our objective is to
get insights into the interests of users who tweet about envi-
ronment and climate change. Thus, we merged all users' bi-
ographies into one file and perform some cleaning tasks such
as the removal of Arabic and English stop words. We show
in Figure 5 the most frequent 50 terms found in the biogra-
phies of top 1% (a), top 5% (b) most tweeting users, and that
of all users (c). Unsurprisingly, the more users who tweets
about climate change, the more likely they mention a climate
change related term in their biographies. In other words, this
means that prolific users in our dataset (top 1%) are defi-
nitely environmental activists who identify themselves with
words such as: climate, change, development, environment
and sustainable. The second tier of users (top 5%), present
a media and news oriented profiles. These users mention
in their biographies words such as: news, views, journalist,
aljazeera (which is one of the biggest news groups in the
world). When all the users are taken together, all signals re-
(a) Top 1% most prolific users.
(b) Top 5% most prolific users.
(c) All users.
(d) Complementary cumulative
distribution function.
Figure 5: Results for users analysis.
(a) through (c) rep-
resent word clouds of terms found in user biographies re-
trieved from Twitter. We see that the more a user tweets
about climate change, the more likely she is to have climate
change related terms in her profile. (d) shows the skewed
distribution of number of climate change related posts per
users, with more than half users posting only once.
ferring to climate change fade out. In fact, at scale, we found
that more than half of user users (51.08%) have tweeted only
once about climate change in a course of 5 years (2011 -
2015). These users tend to mention broader topics in their
biographies such as: love, life, world, etc. Notice that the
word Qatar has been removed from all three word clouds
as it dominated all of them. Figure 5(d) plots the comple-
mentary cumulative distribution function for the probabil-
ity (y-axis, log scale) that a random user would post more
than a given number of tweets (x-axis). The figure shows a
rapidly decreasing trends with most users posting only one
tweet, and very few (p=0.005) who posted a hundred tweets
or more.
Correlations
The correlation analysis performed on the 18 variables (11
UN climate change topics, 2 Qatar specific topics, and 5
weather measurements) revealed the existence of a signif-
icant dependency between some of them. Figure 7 shows
the Pearson correlation score computed over the daily time
series of all the pairs.
Looking solely at correlations between climate change
topics, we find that Politics&Opinion and Negotia-
tions&Summits achieve the highest correlation score of ρ =
0.73. This definitely makes sense as many political activities
and "pourparlers" take place during the negotiations. The
second and third highest correlation scores are achieved be-
tween Politics&Opinion and Economy (ρ = 0.62) and Poli-
tics&Opinion and Energy (ρ = 0.61). This is also expected
100101102103Number of posted tweets10-410-310-210-1100CCDF(a) Global
(b) General
(c) Risk&Disaster
(d) Summits&Negotiations
(e) campaigns
(f) Politics&Opinion
(g) Sandstorm
(h) Energy
(i) Economy
(j) Agriculture&Forestry
(k) Oceans&Water
(l) Weather
Figure 6: Graphs representing hashtag co-occurrence backbones of different climate change topics (b) through (l). (a) is the
global backbone graph computed from the whole set of climate change related tweets.
globalwindyunepfollowdohanewsparisopportunitiesenvironmentsotuqnfsprecyclesafetykahramaawomenclimatemarchcmp8oceansdmkrworldbankelectronicsearthdayqfradioinstadohahawaiigreenbuildingsandsaudisciencedemocratsmyqatarinstagramriyadhbiomassstreetwastemanagementbusinessinvestingroadtoparismiddleeastquranearthtoparissomaliabritish_columbiaspecialistiranwaterchinasustainabledevelopmentchangebiodiversityforumdustyomanalaskasocialactionglfcop19loveegyptafricanowreadingreddlimasanantonioworkinggotvlevantfranceliveiphoneperuindianaactonclimateclimatelegacyindiaoregonestedamaqatarconnecticutqeeriyourpowercharitymeanimalscardohaexhibitioncenterworksandstormnebraskabeautifulbeijingcrazyclimatsdgsworldenvironmentdaycleantechuaeinstaqatargccunitedwinterzchizzerzhotasmfanimaldust_stormidahoeconomyfitnbeautysustainabilityfbcop18volunteerssb42climatefinanceearthhourpost2015coalgreennew_mexicowindhelpdrivesafelyyoungohellbirdsislamclimatechangeclimatechangeconferencesocialmediarhode_islandwalesfinancefoodcop18photoicymiinvestorqgbcunfccccountmeinajclimatesaopaulocsrphilippinesenergyestedamaeuagriculturesandycanadakuwaitoklahomalossanddamageresearchhealthsmogarizonadurbanecowcsj2011fridayabudhabinew_jerseyzerovisibilityundpcaliforniapapersmartmarineorganicdoha2012dohadisasterfloridaplaceaspiresyriakccwgtarsheedfeaturedwestbaydohasandstormantarcticcityplasticsouth_carolinawarmingstormpalestineadp2015wastesenvironmentaladvancedglobaltradingjordaninyteftobamaipad50by30treeyouthfuturehotnewsglobalwarmingnojusticenodealwarsaw1o5cairpollutionbiogassomalilandnova_scotig7summithealthy_tipscomedyhourchangeclimatechangemontanadroughtayiccclimateactiondrivekpministry_of_environmentpartofthesolutionindcfacthungerdesertlivingaycmearthindcsexpo2015gulfngo14febksacop20menaawarenessbahraindotreeshaitiqumorningbadqfsustainableohioviewinstapicfamineseasportbestbrazilco2nhpoliticsarkansaseuropejobsar5naturejobjowtfqfrecruitmentcarboncitiesifnotusthenwhoaljazeeraenergyefficiencyclimatesandstormsgogreenpovertypakistanduststormrecyclingcommunitytennesseeadaptationnewsipadgamesconferenceislamicmitigationcop15cop17cop18cop19wasterenewableslifeprotectlpaahmcgeorgiagameinsightairhealthyeidseemydohaalmatydohayearinspaceadp2alsaddbagsthepearlqatard12smokefreeauspoleventsdaydevelopmentoillatviacop18fossilfuelgocop21arcticrainiondustrenewableqatarfoundationaction2015pennsylvaniapolandindonesiaccsclimate2014alabamasummerparisagreementcop21photoforeststhinklandscapehumandohagreenupmoi_qatarwefadpskycornichealkhorsavepublichealthaustraliasif15virginiaarabtrafficlcaecosystemsdubaiiphone5instagramqataralamointeqbigblockofcheesedaygivesyouwingsecologypeopleroad2dohaunfaoqnfspqatartransportqatarqnccdelawareglfcop21foginnovationpowerkyotocfcc15qatarsandstormrenewableenergycop21pariswildlifelifestyleusaworldentrepreneursqsciencerecognizedafternoonfoodsecuritypollutionfreefoodcoloradogarbagewashingtoninterstellarweatherresiliencebangladeshcdnpoliconservationlowboliviaclimatejusticeparis2015stealthrangerwbgyouthsummitheatsolaragchatozusplanetmoroccounemissionsukageducationwed2015solarenergypeacefrackingillinoisecotipcoy8dohaoasisqatarlivingcleanweekenddesertbuildingipccsamsungdtff12summitroadtodohaagthungercop21cop20globalthinklandscapedemocratsearthhourfollowclimatechangewefparisngoenvironmentmenanhpoliticsbahraindoaustraliafoodarabicymiecosystemshaitiunfcccphilippinesohioeconomyenergyestedamafamineearthagriculturebrazilplanetqataroklahomaroadtoparismiddleeastglfcop21sotuhealthsomaliairanwcsj2011waterchinarenewableenergycarboncitiesifnotusthenwhochangecop21parisclimateworldislamicfloridasocialcaliforniafoodsecuritypollutionpakistancoloradoafricanowreadingweatherreddantarcticresilienceaglevantfrancecop17cop18cop19renewablesactonclimateparis2015wbgyouthsummitjordaninyteftobamageorgiaagchatozusyouthunemissionsglobalwarmingdohasdgsindiaeducationpovertycsrsomalilandoilfossilfuelarcticraindeforestationsustainabilitydroughtcdnpolirenewableipccaction2015climateactionindonesiagreenpartofthesolutionfactqatarclimatechangedohacop21climateestedamaenvironmentgreencop18citiesglobalwarmingparisagreementcop21cop20youngoaycmdohagreenupearthhelpindcsclimatechangeadpparisngoenvironmentqnfspcdmwomendofinanceclimatemarchcmp8sif15dmkrarabcop18photolcaworldunfcccthinklandscapephilippinescountmeinajclimateqfinteqenergyeuqnfspqatarclimatechangeconferenceqatarlimakuwaitlossanddamageglfcop21nhpoliticsar5durbankyotowaterchinapapersmartcarboncitiesaljazeeracop21pariscopclimatedoha2012dohadisasterqscienceactionsb42glfcop19freefoodkccwgreddqnccconferenceclimatfrancelivechangeperucop17cop18cop1950by30renewablesadp2015cop15actonclimateclimatejusticeclimatelegacyparis2015lpaasolarayiccinyteftobamacomedyhourdohaexhibitioncenteryouthmoroccounpolandglobalwarmingnojusticenodealdohasdgsindiaadp2warsawgccunited1o5cd12forestsethiopiakpauspolcoy8latviacop18gocop21sustainabilitycop18volunteerscdnpolirenewableclimatefinanceipccqatarfoundationaction2015climateactiondtff12coalclimate2014greenpartofthesolutionindcroadtodohaactonclimateearthdayclimatechangefitncop21climatecleanenergydemdebatenhpolitics50by30gotvbigblockofcheesedayparisagreementcop21globalthinklandscapeearthhourearthislamclimatechangepariscoy8ngosocialmediaopportunitiesdayenvironmentrecyclewalessavemenaawarenessdofinancefoodoceansearthdaytreesarabgeorgiacommunityworldbankworldinvestorqgbcunfcccdubaiajclimategreenbuildingqfsustainableeconomydcef2013myqatarinstagrampeopleenergyroad2dohaestedamaunfaowastemanagementsportagricultureqnfspqatarbestsustainabledevelopmentqatarpost2015investingentrepreneursmiddleeastresearchglfcop21foghealthnhpoliticsinnovationelectronicsspecialistjobsar5businessnatureecoagreementwaterjobchinaqfrecruitmentnewscitieschangeenergyefficiencyprotectbiodiversitylifestylehealthyomanfloridaqsciencerecognizedplaceactionsb42foodsecuritypollutionlovecoloradogarbageegyptrecyclingafricatarsheedfeaturedweathercarbonfsdlconferenceplasticconservationcaliforniacop18indianawasterenewablesgogreenactonclimatelifeclimatelegacyparis2015worldenvironmentdaywildlifeestedamaqatarenvironmentaljordansolarcop19qeeriinyteftobama50by30animalsscienceworktreeunusyouthmoroccofutureemissionsukhotnewsglobalwarmingbeautifuldohatalkdirtyqaindiacleantechadp2thepearlqataruaewed2015bagsgcceducationclimatepeacegreenillinoisasmfecotipeventscsrdevelopmentoilmangrovessustainabilitycdnpoliwarmingbuildingipccqatarfoundationsummitministry_of_environmentpartofthesolutionindcinstagramqatarwindgivesyouwingssummerdohariyadhsandstormsdrivesafelyinterstellardesertlivingwindystreetwestbaydohasandstormhellmoi_qatardohanewsuaealsaddsandyqatarduststormgulfzchizzerzsandmiddleeasthothealthiphonestormalkhorksadust_stormbahrainqatarlivinghealthy_tipsfridayabudhabigccrainzerovisibilityaspireqatarsandstormdustnewsweekenddesertipaddubaisamsungdustycarinstadohadrivemorningsandstormbadweathersaudiseemydohawindviewdohacop21energyindiabiomassdcef2013qatarco2climatechangeinvestingcdnpolifrackingmiddleeastresearchenvironmentconservationrenewablecop18waleswasterenewablesmenaeuropeoilpowerfoodwatersustainabilitysolarcarboninyteftinvestorchangearabclimategreenemissionsukqfsusdevdohaqfcop21energythinklandscapefeaturednewsuaetransportqatarclimatechangeinvestingenvironmentbiogashealthcop18waleswasteeconomyoilfinancebusinessnatureparis2015stealthrangerdubaiwatersustainabilityadvancedglobaltradingchinasolarcop19carboncitiesinvestorchangeunfcccwbgyouthsummitclimateioniphone5greenukhotnewsagtpollutionecologydohacop21energybiomassislamqatarclimatechangemiddleeastenvironmentconservationcop18saverenewablescsrnatureecowildlifetreeswatersustainabilitysolarcarbonarabclimatebiodiversitytreegreenqfwaterqatardohaenergyoceansclimatemiddleeastenvironmentsustainabilitygreenseasummerclimateclimatechangewinterdohanaturecop21arcticglobalqatarairenvironmentsustainabilityweathergreenwarmingchangethe conference, suggesting that organizing big events is not
enough to raise any lasting public awareness toward climate
change. The backbone graph analysis on the other side, has
shown that hashtag co-occurrence is not random and leads
in most of the cases to meaningful connected communities
(clusters of hashtags).
The findings of this paper did not just highlight interesting
answers on public's opinion about climate change in Qatar,
but also raise questions for future research to explore. First,
we would like to alleviate the limitation of keyword based
filtering by designing a better classifier that accounts for se-
mantics of tweets. Second, we aspire to complement this
work with a longitudinal analysis of causality between dif-
ferent climate change topics using transfer of entropy tech-
nique. Finally, we would like to extend this study to other
countries in the region and examine the geographical influ-
ences on public's opinion about climate change.
References
[1] Alhorr, Y.; Eliskandarani, E.; and Elsarrag, E. 2014. Ap-
proaches to reducing carbon dioxide emissions in the built envi-
ronment: Low carbon cities. International Journal of Sustain-
able Built Environment 3(2):167 – 178.
[2] An, X.; Ganguly, A. R.; Fang, Y.; Scyphers, S. B.; Hunter,
A. M.; and Dy, J. G. 2014. Tracking climate change opin-
ions from twitter data. In Workshop on Data Science for Social
Good.
[3] Authors. 2016. Qatar Environment Taxonomy. http://
bit.ly/1Qms5eM. [Online; accessed 15-Feb-2016].
[4] Cody, E. M.; Reagan, A. J.; Mitchell, L.; Dodds, P. S.; and
Danforth, C. M. 2015. Climate change sentiment on twitter: An
unsolicited public opinion poll. PloS one 10(8):e0136092.
[5] Hart, P. S., and Feldman, L. 2014. Threat without efficacy?
climate change on us network news. Science Communication
36(3):325–351.
[6] Jang, S. M., and Hart, P. S. 2015. Polarized frames on cli-
mate change and global warming across countries and states:
Evidence from twitter big data. Global Environmental Change
32:11–17.
[7] Kirilenko, A. P., and Stepchenkova, S. O. 2014. Public mi-
croblogging on climate change: One year of twitter worldwide.
Global Environmental Change 26:171 – 182.
[8] Nielsen, R. C. 2016. RE:UN global pulse taxonomy. Message
to author. 22 Feb, 2016. [Email].
[9] Olteanu, A.; Castillo, C.; Diakopoulos, N.; and Aberer, K.
2015. Comparing events coverage in online news and social
media: The case of climate change. In Proceedings of the Ninth
International AAAI Conference on Web and Social Media, num-
ber EPFL-CONF-211214.
[10] QNB.
2015.
Qatar National Bank, Qatar Eco-
http://www.qnb.com/cs/
(p 12).
nomic Insight
Satellite?blobcol=urldata&blobheader=
application%2Fpdf&blobkey=
id&blobtable=MungoBlobs&blobwhere=
1355526969220&ssbinary=true.
15-Feb-2016].
[Online; accessed
[11] Radcliffe, D.
2015.
Middle East:
//damianradcliffe.files.wordpress.
2014.
of
The
Story
Social Media
the
in
https:
Figure 7: Matrix of pairwise correlations between different
climate change and weather variables. The highest p-value
score observed in this matrix is 4.64e− 07 which means that
all reported correlations are statistically significant.
as politics is tightly related to the two aforementioned topics.
Overall, one could easily see that the topics General, Negoti-
ations&Summits, Politics&Opinion, Economy, and Energy
constitute a well correlated group. Expending our analysis to
include the weather variables, we find that Sandstorm topic
showed some significant positive dependencies with mean
wind speed (ρ = 0.21) and a negative correlation with visi-
bility (ρ = −0.14). Thus, the lower the visibility, the more
likely a sandstorm is going on, which means more people are
tweeting about it. The other low yet statistically significant
correlation is observed between Negotiations&Summits and
mean temperature (ρ = −0.1) which is simply explained
by the fact that the most important summits captured in our
collection (COP18, COP21) took place in winter time.
Conclusions and Future Work
In our study, we start by monitoring, collecting, filtering, and
analyzing a large dataset of 109 millions tweets posted by
98K distinct users, in a course of 9 years in order to capture
the public interest in climate change. We use a taxonomy of
climate change to classify a significant amount of relevant
tweets into different topics covering a wide range of issues
such as politics, economy, and air quality. We perform dif-
ferent types of analysis to understand and reveal the timely
distribution of public interest toward different topics.
In our examination of the relevant sub set of tweets, the
results revealed that people's interest is mainly driven by
widely covered events (e.g., Paris COP21), or local events
that have a direct impact on users' daily life (e.g., sand-
storms, Doha COP18). The number of users who engage
in climate change discourse does not seem to be on a in-
creasing trend. Our analysis revealed that the burst in users'
activity observed during COP18 has quickly fade out after
generalrisk_disasterpolitics_opinioneconomynegotiations_summitsweatherenergyagriculture_forestryocean_watercampaignsarcticair_qualitysand_stormmeanvismprecipmhumiditymeantempmmeanwindspdmmeanwindspdmmeantempmhumidityprecipmmeanvismsand_stormair_qualityarcticcampaignsocean_wateragriculture_forestryenergyweathernegotiations_summitseconomypolitics_opinionrisk_disastergeneral 0.052 0.029 0.00026 0.0093 0.0140.00250.00080.03 0.018 0.066 0.0230.00140.21 0.0620.031 0.380.0191 0.022 0.068 0.079 0.025 0.1 0.008 0.0780.0110.0230.0440.04 0.0310.0087 0.16 0.079 0.5310.0190.0230.0340.0550.0180.0830.0360.046 0.047 0.02 0.0210.0110.024 0.087 0.0830.111 0.53 0.380.0690.080.0690.0190.0190.0590.0460.011 0.013 0.012 0.0160.043 0.0015 0.01910.11 0.0790.0310.0820.0540.0550.0410.00550.0180.0910.00250.0520.059 0.00330.036 0.141 0.019 0.083 0.16 0.0620.017 0.0130.0240.0056 0.0160.00740.0180.0290.0032 0.0083 0.00580.00941 0.14 0.0015 0.0870.00870.210.0450.00490.120.069 0.00480.050.040.0440.0590.0480.01310.00940.0360.0430.024 0.0310.00140.110.0520.110.120.0940.0510.0840.0420.0640.1410.013 0.0058 0.0033 0.0160.0110.04 0.0230.330.240.320.310.240.0930.330.180.06810.140.048 0.00830.059 0.012 0.0210.044 0.0660.140.0760.210.220.130.0910.230.1410.0680.0640.0590.00320.052 0.013 0.020.023 0.0180.210.190.390.40.20.0950.3210.140.180.0420.0440.0290.00250.011 0.0470.0110.030.380.270.610.570.490.1610.320.230.330.0840.040.0180.0910.0460.046 0.0780.00080.140.110.360.160.1310.160.0950.0910.0930.0510.050.00740.0180.0590.036 0.0080.00250.560.440.730.5210.130.490.20.130.240.094 0.0048 0.0160.00550.0190.083 0.1 0.0140.430.320.6210.520.160.570.40.220.310.120.0690.00560.0410.0190.018 0.025 0.00930.540.4510.620.730.360.610.390.210.320.110.120.0240.0550.0690.055 0.079 0.000260.5610.450.320.440.110.270.190.0760.240.0520.0049 0.0130.0540.080.034 0.068 0.02910.560.540.430.560.140.380.210.140.330.110.0450.0170.0820.0690.023 0.022 0.0520.60.30.00.30.6com/2015/01/damian-radcliffe-social-\
media-in-the-middle-east-the-story-of-2014.
pdf. [Online; accessed 15-Aug-2016].
[12] Serrano, M. ´A.; Bogun´a, M.; and Vespignani, A. 2009.
Extracting the multiscale backbone of complex weighted net-
works. National academy of sciences 106(16):6483–6488.
[13] Snoj, J. 2013. Qatar's Population - by Nationality. BQ Mag-
https://www.bq-magazine.com/economy/
azine.
2013/12/population-qatar. [Online; accessed 15-Feb-
2016].
[14] Underground, W.
2016. History API. http://www.
wunderground.com/weather/api/. [Online; accessed
15-Feb-2016].
[15] UNFCCC. 2012. United Nations Framework Convention
on Climate Change, 2012. http://unfccc.int/2860.
php#decisions. [Online; accessed 15-Feb-2016].
[16] 2014. United Nations Global Pulse Taxonomy for climate
change. unglobalpulse.net/climate/taxonomy/.
[17] Veltri, G. A., and Atanasova, D. 2015. Climate change on
twitter: Content, media ecology and information sharing be-
haviour. Public Understanding of Science 0963662515613702.
[18] Wang, S.; Paul, M. J.; and Dredze, M. 2015. Social media as
a sensor of air quality and public response in china. Journal of
medical Internet research 17(3).
[19] WB. 2015. CO2 emissions (metric tons per capita). http:
//data.worldbank.org/indicator/EN.ATM.
CO2E.PC?order=wbapi_data_value_2011+wbapi_
data_value+wbapi_data_value-first&sort=
desc. [Online; accessed 15-Feb-2016].
[20] Weber, E. U., and Stern, P. C. 2011. Public understanding
of climate change in the united states. American Psychologist
66(4):315.
|
1610.06703 | 1 | 1610 | 2016-10-21T08:47:38 | Revisiting Link Prediction: Evolving Models and Real Data Findings | [
"cs.SI",
"physics.soc-ph"
] | The explosive growth of Web 2.0, which was characterized by the creation of online social networks, has reignited the study of factors that could help us understand the growth and dynamism of these networks. Various generative network models have been proposed, including the Barabasi-Albert and Watts-Strogatz models. In this study, we revisit the problem from a perspective that seeks to compare results obtained from these generative models with those from real networks. To this end, we consider the dating network Skout Inc. An analysis is performed on the topological characteristics of the network that could explain the creation of new network links. Afterwards, the results are contrasted with those obtained from the Barabasi-Albert and Watts-Strogatz generative models. We conclude that a key factor that could explain the creation of links originates in its cluster structure, where link recommendations are more precise in Watts-Strogatz segmented networks than in Barabasi-Albert hierarchical networks. This result reinforces the need to establish more and better network segmentation algorithms that are capable of clustering large networks precisely and efficiently. | cs.SI | cs |
Revisiting Link Prediction: Evolving Models and Real
Data Findings
Marcelo Mendozaa,∗, Mat´ıas Estradab
aUniversidad T´ecnica Federico Santa Mar´ıa, Santiago, Chile
bSkout Inc., Santiago, Chile
Abstract
The explosive growth of Web 2.0, which was characterized by the creation of
online social networks, has reignited the study of factors that could help us
understand the growth and dynamism of these networks. Various generative
network models have been proposed, including the Barab´asi-Albert and Watts-
Strogatz models. In this study, we revisit the problem from a perspective that
seeks to compare results obtained from these generative models with those from
real networks. To this end, we consider the dating network Skout Inc. An
analysis is performed on the topological characteristics of the network that
could explain the creation of new network links. Afterwards, the results are
contrasted with those obtained from the Barab´asi-Albert and Watts-Strogatz
generative models. We conclude that a key factor that could explain the cre-
ation of links originates in its cluster structure, where link recommendations are
more precise in Watts-Strogatz segmented networks than in Barab´asi-Albert hi-
erarchical networks. This result reinforces the need to establish more and better
network segmentation algorithms that are capable of clustering large networks
precisely and efficiently.
Keywords: Link Prediction, Network Evolving Models, Discrete Dynamics in
Networks
∗Corresponding author
Email addresses: [email protected] (Marcelo Mendoza),
[email protected] (Mat´ıas Estrada)
Preprint submitted to ArXiV
June 17, 2021
1. Introduction
The explosive growth of Web 2.0, which is characterized by its consolidation
of online social networks, has brought millions of users into participating in
these networks, sharing their life experiences and establishing new relationships
through these platforms. The relationships created in these networks can be
modeled as large graphs. Their evolution and dynamism represent an interesting
challenge for the complex network community; this community is dedicated
to proposing and discussing the significance of generative models that could
precisely explain the growth of these networks.
The most widely discussed generative models are those developed by Barab´asi-
Albert [2] and Watts-Strogatz [23]; each of these models has their own strengths
and weaknesses in their ability to explain topological characteristics of real net-
works. Specifically, the Watts-Strogatz model is able to model large but small-
diameter networks, which are properties that can be effectively observed in real
networks, whereas the Barab´asi-Albert networks follow an evolving model of
preferential attachment with a tendency to generate networks with few vertices
that contain a high number of links, where the majority of vertices have low con-
nectivity. This approach has been used as a very effective model for biological
networks [17].
A growing interest in establishing better methods for link predictions is using
a microscale approximation of the network evolution problem. This approxima-
tion has driven investigations by the complex network community in their efforts
to not only find models that effectively fit the dynamic laws of social networks
but can also provide the possibility of link recommendation, which is also known
as link prediction and is particular useful in online social networks.
In this study, we perform analyses on link prediction methods based on the
topological characteristics of real data from the dating network Skout. Subse-
quently, we contrast the results obtained with those observed from the Barab´asi-
Albert and Watts-Strogatz generative models. A number of experimental config-
urations were evaluated, including intra-cluster recommendations in segmented
2
networks. The contribution of this study is the evaluation of the effectiveness of
these models in light of the results observed from data of a real network. The
problem is analyzed from a purely topological standpoint, which contrasts the
classical standpoint of FOAF (friend-of-a-friend) recommendations with those
based on segmented networks.
This article is organized as follows. In Section 2 we discuss related work.
Background is summarized in Section 3. The case study is presented in Sec-
tion 4. Results from synthetic data are presented in Section 5 and discussed in
Section 6. Finally, we conclude in Section 7 with a brief discussion about some
open questions and future work.
2. Related Work
Link prediction is mainly addressed using transitivity properties of the graph
also known as friend-of-a-friend approaches [20]. The rationale of this kind of
approaches is the following: If a user A is friend of a user B and a user B is friend
of a user C, then A and C probably will be friends [9]. However, the success of
link prediction approaches is limited because real online social networks tend to
be very sparse [4], meaning that the total amount of potential links to be created
is much greater than the links that are actually created. Sparsity turns the link
prediction problem into a very dificult problem returning success improvements
over a random predictor from 3% to 54% [10].
A number of different types of features are available for this problem [11].
By exploiting locality we do not require the full graph from being stored. One of
the simplest locality features is the Common Neighboors index [16]. This index
considers the amount of common neighboors that two nodes have. When the
number of common neighboors is high, then is more likely that those nodes will
create a link in the future [9]. However, this feature is biased by the number of
neighboors that a given node registers. A more robust feature is the Jaccard in-
dex [5] which compares the common neighboors cardinality with the cardinality
of the union of both neighboors, getting a value that represents the proportion
3
between the cardinality of these two sets. Other features used are the Salton
index [19] and the Sorensen index [21] that are mainly used in ecological net-
works [12]. Finally, another well known locality measure is the Adamic & Adar
index [1].
Graph-based features considers the whole network to be calculated. Sim-
Rank index [6] is calculated using a random walk process which is propagated
through the graph with a decay factor. It is an expensive feature because it
needs several passes through the whole network. Then, unexpensive and con-
ventional graph-based features as degree or transitivity are more recommended
for link prediction [12]. Finally, the combination of global/local scope is also
explored for this task, using approaches as HITS (Hypertext Induced Topic
Search) which comes from the information retrieval community, proposed by
Kleinberg [8] for web page ranking. An undirected version of HITS can be ex-
plored for link prediction purposes in undirected graphs, giving us an authority
feature for each node of the graph.
There are more information sources that are useful for link prediction tasks.
For instance, by recovering text from user messages, it is possible to create more
sophisticated user descriptors [18]. It is also possible to characterize neighboors
by recovering text and then using this information for user description [26].
Transactional registers has been also explored for link prediction [24]. These
methods tend to involve high computational costs due to the necessity of main-
tain content-based indexes or log-repositories. These methods are out of the
scope of this study.
Regarding network segmentation methods, there has been recent interest in
the exploration of spectral clustering methods for link prediction. [22] explored
the use of segmented networks for link prediction, proving in synthetic networks
that this approach is feasible. The study is close in aim to our article but it
does not consider an evaluation regarding evolving graph models. In addition
the comparison is constrained only to the top-1 recommended node.
Link prediction has been explored in several domains, showing that is still a
relevant task. For instance, different algorithms has been developed to predict
4
new links in protein networks [13], energy grid networks [15], medical co-author
networks [25], disease networks [7], among others. Further details about this
topic can be read in the survey of L´u [14].
3. Background
Link prediction is the problem of inferring whether potential edges between
pairs of vertices in a graph will be present or absent in the near future. In a
link prediction task, we first assume the existence of an original observed graph,
with a completely known set of vertices and a partially known set of edges.
Accordingly, the link prediction task is to infer the rest of the edges.
Let G = (V, E) be an undirected graph. At a given point in time t0, we
assume that all vertices v ∈ V are known but only a subset of E is known. Let
E obs be the subset of edges e ∈ E that is known at t0, and let Emiss be the
subset of unobserved edges at t0, such that Emiss = E \ E obs. Link prediction
is to predict the edges in Emiss from G = (V, E obs).
A natural way to address link prediction is to use a ranking-based strategy.
A ranking-based strategy considers two steps to rank links. For a given vertex
u, a vertex retrieval step is conducted, using a locality constraint to recover
a list of proximal vertices to u. Then, the list is sorted according to a given
scoring measure.
A number of graph-based measures can be used for scoring. We explore the
perfomance of three of them: Normalized degree, authority, and transitivity.
These features are query independent, that is to say, these measures define a
collection of pointwise estimations at vertex level. The value of a measure of this
collection is the same for the whole graph. The definitions of these measures
are given below.
Degree coefficient. Let Γ(u) be the neighborhood of a vertex u and let Γ(u)
be the cardinality of this set, also known as the degree of u. We define a degree
coefficient by normalizing Γ(u) with the maximum degree of G. Formally:
5
Degree(u) =
Γ(u)
Maxv∈G Γ(v)
.
Transitivity coefficient. Let Γ(u) be the neighborhood of a vertex u. The tran-
sitivity coefficient Transitivity(u) (a.k.a. clustering coefficient) is the ratio
between the number of links in Γ(u) and the maximum number of such links.
If Γ(u) has eu links, we have:
Transitivity(u) =
eu
Γ(u)·(Γ(u)−1)
2
.
Authority. HITS (Hypertext Induced Topic Search) coefficients come from the
information retrieval community and were proposed by [8] for web page rank-
ing. The idea is that pages that have many links pointing to them are called
authorities and pages that have many outgoing links are called hubs. Good hubs
point to good authority pages, and vice-versa. Lets hub(u) and auth(u) be hub
and authority coefficients for a vertex u. The following equations can be solved
through an iterative algorithm that addresses the fixed point problem defined
by:
hub(u) = X
auth(v),
v∈Gu→v
auth(u) = X
hub(v).
v∈Gv→u
In undirected graphs, both coefficients have the same value. In this study,
we denote this feature as authority, given that a dating network is an undirected
graph.
4. Link prediction in a real network: the Skout Inc. case
We explore properties of the problem of link prediction in a real network
provided directly by Skout Inc.. After recording each link created until January
1st 2014, we generated a network with 3,855,389 links among 1,920,015 active
6
users. We define an active user as one that, after creating their account, has
added at least one friend during the period.
Afterwards, we recorded links created during the first 25 days of January
2014 between active users. A total of 582,119 new links were recorded solely
from users who were active during 2013. A total of 76,848 users added at least
one new friend during the observation period. The distribution of new friends
per user is shown in Figure 1.
s
r
e
s
U
f
o
r
e
b
m
u
N
100000
10000
1000
100
10
1
1
New Friends Distribution
New Friends Bins
10
100
1000
New Friends
Figure 1: Number of links created per active user during the observation period.
As shown in Figure 1, the distributions of new friends per user follow the law
of the rich get richer: only a few users added a high number of new friends; the
majority of users added only a few new friends, confirming that link prediction
is a very difficult task due to the imbalance between potential friends and actual
friends.
The collection of links that could have potentially been created during this
period corresponds to the group of links that was not created until January
1st 2014 among active users. Then, we analyzed the properties of separability
that exist between the group of potential links created versus the group of not-
created links; the logic of the methodology used in this study is explained in
the scheme shown in Figure 2.
7
1/1
t
0
1/25
t
1
Links at t
0
Links created
between t
0
and t
1
Potential links
at t
1
Nodes at t0
Figure 2: Case study methodology. Blue links and nodes depict the graph at
t0. Red links depict links created during the observation period. Links depicted
with dashed lines indicates potential unobserved links. In our strategy, dashed
links are labeled as false link instances and red links as real link instances.
Each link in the group of potential links is classified as either real (created)
or not (not created), where the authority, degree, and transitivity scores for
both the target user and the candidate user are calculated. In this experiment,
the target user is the user who is looking for a new friend, and the candidate
user is the potential new friend that could be recommended to the target user.
Table 1 shows the results of information gain from separating the two classes.
As shown in Table 1, the most relevant characteristic for this problem is
the authority of the candidate user. Because the first vertex corresponds to the
target user (the one who accepts or declines the new relationship), the authority
of the candidate user is a measure of the visibility (and therefore popularity) of
the user for the rest of the network. However, the characteristics of the target
user are not extremely relevant, which indicates that the present connectivity of
the user is not necessarily an indicator of how connected the user will be in the
8
Table 1: Information Gain values for each feature considered in our data set.
Target users features are depicted with a subindex equals to one. Candidate
users are depicted with a subindex equals to two.
Feature
Authority 2
Authority 1
Transitivity 2
Degree 2
Transitivity 1
Degree 1
Information Gain
0.9155
0.5367
0.1192
0.1054
0.0392
0.0227
future. We should note that an algorithm that predicts links should be capable
of making recommendations to newly target users in the network, i.e., users
with few neighbors and a short user history; this challenge is also referred to as
a cold start. Because of this, the characteristics of the target user are not as
relevant as those of the candidate user. In this strategy, we always consider that
it is the user with fewer friends who gets the most recommendations to equalize
the size of the network neighborhoods. This focus is paralleled with information
retrieval, where the query (the target user) is considered as a document with
few descriptors, and therefore, the descriptors of the candidate documents are
primarily exploited on being recommended in the list of answers.
5. Results from synthetic data
Networks with 10,000 vertices were generated based on three generative link
models: random-based graphs models, also known as Erd´os-R´enyi graphs [3],
Watts-Strogatz [23], with a rewired probability equal to 0.1, and Barab´asi-
Albert [2]. For each of these models, we performed a pruning process according
to a factor taken as an experimental parameter that could control the ratio
9
of links eliminated to all the links in the network. Later, link prediction was
performed on the eliminated links, where a recommended and eliminated link
was considered a success, and a recommended but kept (not-eliminated) link is
considered a failure. In this way, the pruning factor controls the ratio of real
solutions to the total candidates. A low pruning factor, which corresponds to
a smaller ratio of links to be predicted over the total candidates, makes the
problem more difficult.
Each of the networks was segmented with a directed k-clustering algorithm
(k-means for list of arcs), with k values ranging between 3 and 7. Then, using
one of the three candidate ranking functions performed on the Skout network
(authority, degree, and transitivity), an intra-cluster ranking process was per-
formed. We were thus able to evaluate the impact of network segmentation on
the quality of the recommendations.
Tables 2 and 3 show the average precision and recall results for the first
ten recommendations, which are micro-averages, i.e., the results correspond
to averages for all the nodes in a network. Table 2 shows the results for a
pruning factor of 0.1, and Table 3 shows the results for a pruning factor of 0.25.
More configurations were examined in these experiments, which incorporated a
greater number of small networks and different pruning factors. The P@N and
R@N curves, with N values ranging between 1 and 10 for all configurations, can
be seen in greater detail for some small networks (up to 1,000 nodes) at the
following url [http://104.236.107.4:17264] 1.
6. Discussion
In this study, we addressed the problem of link prediction, which segments
networks to later analyze each resulting partition in terms of degree, authority,
and transitivity. Several of the results from the experiments using model data
demonstrated certain relevant characteristics. One characteristic is related to
1We will replace the ip number by a .org url in the camera ready version
10
1
1
k
Erd´os-R´enyi
Barab´asi-Albert Watts-Strogatz
Erd´os-R´enyi
Barab´asi-Albert Watts-Strogatz
y
t
i
r
o
h
t
u
A
e
e
r
g
e
D
y
t
i
v
i
t
i
s
n
a
r
T
3
4
5
6
7
3
4
5
6
7
3
4
5
6
7
P@10
0.0126
0.0121
0.0121
0.0110
0.0104
0.0110
0.0110
0.0110
0.0112
0.0112
0.0050
0.0120
0.0102
0.0126
0.0114
P@10
0.0604
0.0462
0.0467
0.0328
0.0424
0.0612
0.0464
0.0465
0.0326
0.0412
0.0406
0.0412
0.0405
0.0333
0.0384
P@10
0.0516
0.0798
0.1114
0.1310
0.1552
0.0312
0.0513
0.0400
0.0746
0.1066
0.0236
0.0311
0.0400
0.0441
0.0472
R@10
0.0001
0.0005
0.0005
0.0005
0.0008
0.0001
0.0004
0.0005
0.0005
0.0008
0.0001
0.0005
0.0005
0.0005
0.0008
R@10
0.0022
0.0015
0.0010
0.0007
0.0010
0.0026
0.0012
0.0010
0.0007
0.0010
0.0026
0.0014
0.0010
0.0007
0.0010
R@10
0.0081
0.0169
0.0174
0.0232
0.0298
0.0072
0.0143
0.0143
0.0212
0.0268
0.0074
0.0143
0.0122
0.0204
0.0212
Table 2. Precision and recall results with pruning rate = 0.10.
1
2
k
Erd´os-R´enyi
Barab´asi-Albert Watts-Strogatz
Erd´os-R´enyi
Barab´asi-Albert Watts-Strogatz
y
t
i
r
o
h
t
u
A
e
e
r
g
e
D
y
t
i
v
i
t
i
s
n
a
r
T
3
4
5
6
7
3
4
5
6
7
3
4
5
6
7
P@10
0.0272
0.0241
0.0280
0.0282
0.0276
0.0264
0.0224
0.0264
0.0270
0.0272
0.0244
0.0212
0.0270
0.0292
0.0264
P@10
0.0712
0.0688
0.0612
0.0575
0.0510
0.0791
0.0689
0.0616
0.0579
0.0520
0.0512
0.0522
0.0614
0.0507
0.0472
P@10
0.0988
0.1548
0.2028
0.2616
0.2901
0.0744
0.1135
0.1486
0.2235
0.2735
0.0485
0.0603
0.0850
0.1015
0.1177
R@10
0.0018
0.0021
0.0022
0.0014
0.0017
0.0018
0.0020
0.0022
0.0014
0.0017
0.0016
0.0022
0.0022
0.0014
0.0017
R@10
0.0033
0.0025
0.0019
0.0018
0.0013
0.0033
0.0024
0.0018
0.0018
0.0013
0.0033
0.0026
0.0019
0.0018
0.0013
R@10
0.0144
0.0254
0.0255
0.0339
0.0399
0.0122
0.0178
0.0231
0.0336
0.0377
0.0102
0.0124
0.0146
0.0147
0.0141
Table 3. Precision and recall results with pruning rate = 0.25.
the link pruning parameter because it is also related to the network evolution
time. That is, a low pruning factor emulates a short period of observation and
thus, a more difficult problem because worse results would be obtained compared
with that of higher pruning factors. This result is due to predictability improv-
ing as the limits of observation increase for prediction problems. Specifically for
our experiments, increasing the pruning ratio raises the number of possible links
that are candidates for selection; each of the candidate links added corresponds
to occurrences of links already existing in the original network, and thus, it is
expected that the results would improve when they are selected.
The results demonstrate that the process of segmenting the networks is key
to link prediction because dissimilar results are obtained from different segmen-
tation routines. Such is the case with the Watts-Strogatz generative model,
which achieved a precision of approximately 0.1 with three clusters and approx-
imately 0.3 with seven clusters. The optimum number of clusters depends on the
nature of the network, the number of vertices, and the density of the network,
among other factors.
Most of the methods of link prediction use locality from a FOAF (friend-of-
a-friend) standpoint. However, the results obtained in this research based on
transitivity exhibited worse results than those based on authority and degree. It
is possible that when using locality, transitivity restricts the predictions to the
graph of nearest neighbors, whereas clustering uses global network characteris-
tics, which are only partially approximated by a FOAF standpoint. Barab´asi-
Albert-type networks give worse results from segmentation, where prediction
results worsen as the number of clusters increases. Barab´asi-Albert networks
are essentially hierarchical, and a flat clustering segmentation method is there-
fore not extremely suitable for this type of structure.
The measures used to characterize and select candidates that behave best
depend on the network type.
In Barab´asi-Albert-type networks, predictions
based on degree are slightly better than those based on authority. The opposite
is observed in Watts-Strogatz-type networks; predictions based on authority are
somewhat better than those based on degree. In both network types, the worst
13
precision is achieved using transitivity.
When comparing these results to those obtained from Skout Inc., we should
remember that in the latter case, the best properties of prediction were shown
in the authority, degree, and transitivity scores (in that order). These results
are similar to those obtained from a Watts-Strogatz-type generative model,
which suggests that this model could approximate the structure of the Skout
network, provide a means to perform link prediction on a segmented network,
and complement FOAF strategies with ranking strategies based on intra-cluster
authority.
7. Conclusions
This study revisited the problem of link prediction from a perspective that
aims to unify results obtained from real networks and those from generative
models. We conclude that the recommendations provided from FOAF are over-
valued because nearest-neighbor structures are unable to explain the growth
and dynamism of a network on their own. Instead, the use of network segmen-
tation methods can explain the creation of links between users that might not
be among the nearest-neighbors, which highlights how the dynamism and evolu-
tion of a network is explained via a combination of local (nearest neighbor) and
global (clusters) factors. These results emphasize the need for more and better
network segmentation algorithms capable of working on large data collections.
There is also a need to consolidate link prediction models capable of effectively
combining local and global factors.
Acknowledgment
Marcelo Mendoza was supported by project FONDECYT 11121435 and by
FB0821 Centro Cient´ıfico Tecnol´ogico de Valpara´ıso.
14
References
[1] Adamic, L. A., Adar, E. (2003) Friends and neighbors on the Web, Social
Networks, 25(3), 211-230.
[2] Barab´asi, A. L., Albert, R. (1999) Emergence of scaling in random
networks. Science, 286, 509-512.
[3] Erd´os, P., R´enyi, A. (1960) On the evolution of random graphs, Publica-
tions of the Mathematical Institute of the Hungarian Academy of Sciences,
5, 17-61.
[4] Genio, C. I. Del, Gross, T., Bassler, K. E. (2011) All scale-free networks
are sparse, Physical Review Letters, 107, 178701, 1-4.
[5] Jaccard, P. (1912) The distribution of the flora in the alphine zone, The
New Phytologist, XI, 37-50.
[6] Jeh, G., Widom, J. (2002) SimRank: a measure of structural-context
similarity, In Proceedings of the ACM International Conference on Infor-
mation and Knowledge Management, KDD, 1-11.
[7] Kaya, B., Poyraz, M. (2014) Supervised link prediction in symptom
networks with evolving case, Measurement, 56, 231-238.
[8] Kleinberg, J. (1998) Authoritative Sources in a Hyperlinked Environment,
in Proceedings of the Symposium on Discrete Algorithms, SODA, 668-677.
[9] Kossinets, G. (2006) Effects of missing data in social networks, Social Net-
works, 28(3), 247-268.
[10] Liben-Nowell, D., Kleinberg, J. (2003) The link prediction problem for
social networks, In Proceedings of the ACM Conference on Information
Knowledge and Management, CIKM, 556-559.
[11] Lin, D. (1998) An Information-Theoretic Definition of Similarity, in Pro-
ceedings of the International Conference on Machine Learning, ICML, 296-
304.
15
[12] Linyuan, L. (2011) Link Prediction in Complex Networks : A Survey. Phys-
ica A: Statistical Mechanics and its Applications, 390(6), 1150-1170.
[13] L´u, L., Jin, C.-H., Zhou, T. (2009) Similarity index based on local paths
for link prediction of complex networks, Physical Review. E, Statistical,
Nonlinear, and Soft Matter Physics, 80, 046122.
[14] L´u, L., Zhou, T. (2011) Link prediction in complex networks: A survey,
Physica A: Statistical Mechanics and its Applications, 390(6), 1150-1170.
[15] Murata, T., Moriyasu, S. (2008) Link Prediction based on Structural
Properties of Online Social Networks, New Generation Computing, 26(3),
245-257.
[16] Newman, M. E. (2001) Clustering and preferential attachment in growing
networks, Physical Review. E, Statistical, Nonlinear, and Soft Matter
Physics, 64, 025102.
[17] Ravasz, E., Somera, A. L., Mongru, D. A., Oltvai, Z. N., Barab´asi, A.
L. (2002) Hierarchical organization of modularity in metabolic networks.
Science, 297, 1551-1555.
[18] Roth, M., Flysher, G., Matias, Y., Leichtberg, A., Merom, R. (2010) Sug-
gesting Friends Using the Implicit Social Graph Categories and Subject De-
scriptors. In Proceedings of the ACM International Conference on Knowl-
edge Discovery and Data Mining, KDD, 233-242.
[19] Salton, G., McGill, M. J. (1983) Introduction to Modern Information
Retrieval, New York (Vol. 22, p. xv, 448 p.).
[20] Silva, N. B., Tsang, I.-R., Cavalcanti, G. D. C., Tsang, I.-J. (2010) A
graph-based friend recommendation system using Genetic Algorithm, In
Proceedings of the IEEE Congress on Evolutionary Computation, 1-7.
[21] Sorensen, T. (1948) A method of establishing groups of equal amplitude in
plant sociology based on similarity of species content and its application to
16
analyses of the vegetation on Danish commons, Kongelige Danske Viden-
skabernes Selskab, 5(4), 1-34.
[22] Symeonidis, P., Iakovidou, N., Mantas, N., Manolopoulos, Y. (2013) From
biological to social networks: Link prediction based on multi-way spectral
clustering, Data & Knowledge Engineering, 87, 226-242.
[23] Watts, D., Strogatz, S. (1998) Collective dynamics of
'small-world'
networks, Nature, 393, 6684, 440-442.
[24] Xiang, R., Neville, J., Rogati, M. (2010) Modeling relationship strength
in online social networks, In Proceedings of the ACM World Wide Web
Conference, WWW, 981-990.
[25] Yu Q., Long C., Lv Y., Shao H., He P. (2014) Predicting Co-Author
Relationship in Medical Co-Authorship Networks, PLoS ONE 9(7):
e101214.
[26] Zhou, T., L, L., Zhang, Y.-C. (2009) Predicting missing links via local
information. The European Physical Journal B, 71(4), 623-630.
17
|
1602.01107 | 1 | 1602 | 2016-02-02T21:01:04 | Do Cascades Recur? | [
"cs.SI",
"physics.soc-ph",
"stat.ML"
] | Cascades of information-sharing are a primary mechanism by which content reaches its audience on social media, and an active line of research has studied how such cascades, which form as content is reshared from person to person, develop and subside. In this paper, we perform a large-scale analysis of cascades on Facebook over significantly longer time scales, and find that a more complex picture emerges, in which many large cascades recur, exhibiting multiple bursts of popularity with periods of quiescence in between. We characterize recurrence by measuring the time elapsed between bursts, their overlap and proximity in the social network, and the diversity in the demographics of individuals participating in each peak. We discover that content virality, as revealed by its initial popularity, is a main driver of recurrence, with the availability of multiple copies of that content helping to spark new bursts. Still, beyond a certain popularity of content, the rate of recurrence drops as cascades start exhausting the population of interested individuals. We reproduce these observed patterns in a simple model of content recurrence simulated on a real social network. Using only characteristics of a cascade's initial burst, we demonstrate strong performance in predicting whether it will recur in the future. | cs.SI | cs | Do Cascades Recur?
Justin Cheng1, Lada A Adamic2, Jon Kleinberg3, Jure Leskovec4
1,4Stanford University, 2Facebook, 3Cornell University
1,4{jcccf, jure}@cs.stanford.edu, [email protected], [email protected]
6
1
0
2
b
e
F
2
]
I
S
.
s
c
[
1
v
7
0
1
1
0
.
2
0
6
1
:
v
i
X
r
a
ABSTRACT
Cascades of information-sharing are a primary mechanism by which
content reaches its audience on social media, and an active line of
research has studied how such cascades, which form as content is
reshared from person to person, develop and subside. In this paper,
we perform a large-scale analysis of cascades on Facebook over
significantly longer time scales, and find that a more complex pic-
ture emerges, in which many large cascades recur, exhibiting mul-
tiple bursts of popularity with periods of quiescence in between.
We characterize recurrence by measuring the time elapsed between
bursts, their overlap and proximity in the social network, and the
diversity in the demographics of individuals participating in each
peak. We discover that content virality, as revealed by its initial
popularity, is a main driver of recurrence, with the availability of
multiple copies of that content helping to spark new bursts. Still,
beyond a certain popularity of content, the rate of recurrence drops
as cascades start exhausting the population of interested individu-
als. We reproduce these observed patterns in a simple model of
content recurrence simulated on a real social network. Using only
characteristics of a cascade's initial burst, we demonstrate strong
performance in predicting whether it will recur in the future.
Keywords: Cascade prediction; content recurrence; information
diffusion; memes; virality.
1.
INTRODUCTION
In many online social networks, people share content in the form
of photos, videos, and links with one another. As others reshare
this content with their friends or followers in turn, cascades of re-
sharing can develop [14]. Substantial previous work has studied
the formation of such information cascades with the aim of charac-
terizing and predicting their growth [7, 23, 47]. Cascades tend to
be bursty, with a spike of activity occurring within a few days of
the content's introduction into the network [34, 37]. This property
forms the backdrop to a line of temporal analyses that focus on the
basic rising-and-falling pattern that characterizes the initial onset
of a cascade [2, 10, 36, 48].
However, the temporal patterns exhibited by cascades over sig-
nificantly longer time scales is largely unexplored. Do successful
cascades display a long monotonic decline after their initial peak,
.
Figure 1: An example of a image meme that has recurred, or resur-
faced in popularity multiple times, sometimes as a continuation of
the same copy, and sometimes as a new copy of the same meme (ex-
ample copies are shown as thumbnails). This recurrence appears as
multiple peaks in the plot of reshares as a function of time.
or do they exhibit more complex behavior in which they can re-
cur, experiencing renewed bursts of popularity long after their ini-
tial introduction? Anecdotally, many of us have experienced déjà
vu when a friend shared content we had seen weeks or months ago,
but it is not clear whether these are isolated occurrences or glimpses
into a robust phenomenon. Resolving these basic distinctions in the
long-time-scale behavior of cascades is crucial to understanding the
longevity of content beyond its initial popularity, and points toward
a more holistic view of how content spreads in a network.
The present work: Cascade recurrence. We perform a year-
long large-scale analysis of cascades of public content on Face-
book, measuring them over significantly longer time scales than
previously investigated. Our first main finding is that recurrence
is widespread in the temporal dynamics of large cascades. Among
large cascades appearing in 2014, over half come back in one or
more subsequent bursts. While reshare activity does peak and then
drop to very low or even zero levels relatively soon after introduc-
tion, the same content can recur after a short or extended lull.
The prevalence of recurrence prompts several questions about
how and why content recurs. Is more broadly or narrowly appealing
content more likely to recur? Does a larger initial burst indicate a
greater likelihood of recurrence, or does it inhibit subsequent bursts
by exposing and thus satiating many people in the initial wave? Do
different bursts of the same content spread in different parts of the
network? Is the second burst a continuation of the initial cascade,
or a fresh re-introduction of the content into the network? Does the
media type of the reshared content matter - for example, whether
2.5K5K7.5K10KFebMarAprMayJunJulAugSepOctNovDec# ResharesHow to be skinny1. Notice that your body is coveredin skin2. Say "Wow I'm skinny"Congratulations you are now skinnyImage Meme(a)
(b)
(c)
(d)
Figure 2: (a) The diffusion cascade of the example meme from Figure 1 as it spreads over time, colored from red (early) to blue (late). Only
reshares that prompted subsequent reshares are shown. (b) The cascade is made up of separately introduced copies of the same content; in
this drawing of the cascade from (a), each copy is represented in a different color. (c) Sometimes, individual copies experience a resurgence
in popularity; again we draw the cascade from (a), but now highlight a single resurgent copy in red with the spread of all other copies depicted
in black. (d) A different network on the same set of users who took part in the cascade, showing friendship edges rather than reshare edges.
These edges span reshares across copies and time, showing that multiple copies of the meme are not well-separated in the friendship network.
it is a photo or a video? Finally, how well can one combine such
features to predict whether a piece of widely reshared content is
likely to experience additional bursts in popularity later on?
We motivate our discussion with an example of content recur-
rence. Figure 1 shows an image meme that first became popular
on Facebook at the end of February 2014, and it depicts how the
number of reshares of that meme changed over time. Here, while
an initial burst in resharing activity is followed by a gradual de-
crease, this meme recurred, experiencing multiple resurgences in
popularity - first in mid-March, then several times over the next
few months. Perhaps surprisingly, there is little to no resharing
between consecutive bursts. Additionally, multiple near-identical
copies of this image meme, represented in different colors, are
shared in the network. This distinction between different copies of
the same content will prove important in our later analyses: when
a user reshares content through the reshare mechanism provided by
the site, the content continues onward as the same copy; in contrast,
when a user reposts or re-uploads the same content and thus shares
it afresh, this is a new copy.
Figure 2 sketches the diffusion cascade of this meme, or its prop-
agation over edges in the social network. As shown in (a), bursts
in activity are connected through the same large long-lived cascade
and can be traced through the network, from the initial bursts in
March (shown in red), to the smaller bursts nearer the end of 2014
(shown in blue). In (b), where the same network is now colored ac-
cording to the copy of the image being reshared, different copies of
the same content appear at different times, sometimes correspond-
ing to when bursts occur, suggesting that recurrence sometimes oc-
curs from the introduction of new copies. However, recurrence may
also occur as a continuation of a previous copy:
the copy high-
lighted in red in (c) experiences an initial burst in March, but then
resurfaces in popularity later in the year. Further, we see in (d) that
friendship ties exist between even the earliest and latest reshares -
the meme appears to be diffusing rapidly, but also revisits parts of
the network through which it had earlier diffused.
While the meme in our example recurred several times, are such
memes the exception or the norm? And if such memes are in fact
typical, what are the bases for such robust patterns of recurrence?
To answer these questions, we use a dataset of reshare activity of
publicly viewable photos and videos on Facebook in 2014.
Characterizing recurrence. First, we develop a simple definition
of a burst, corresponding informally to a spike in the number of
reshares over time, that we can use to quantify when recurrence
occurs (via multiple observed bursts), and when it does not (a single
burst). We show that a significant volume of popularly reshared
content recurs (59% of image memes and 33% of videos), and that
recurring bursts tend to take place over a month apart from each
other. Recurrence is itself relatively bursty - rarely do we observe
long sustained periods of resharing.
Studying the temporal patterns of recurrence, user characteristics
of the resharing population, and the network structure of cascades,
we find that the recurrence of a piece of content is moderated to a
large extent by its virality, or broadness of appeal: cascades with
initial bursts of activity that are larger, last longer, and have a more
diverse population of resharers are more likely to recur. Nonethe-
less, it is not the cascades that start out the largest or most viral
that recur, but those that are moderately appealing. Specifically, a
moderate number of initial reshares, as well as a moderate amount
of homophily (or diversity) in the initial resharing population is
correlated with higher rates of recurrence. This lies in contrast to
more appealing (or popular) content, where one is likely to see a
single large outbreak which results in a large single burst, as well
as less appealing content, where one is likely to only see a sin-
gle small outbreak and thus a smaller single burst. In the former
case, we show evidence that a large initial burst inhibits subsequent
recurrence by effectively "immunizing" a large proportion of the
susceptible population.
While individual copies of content already recur in the network
(18% for image memes and 30% for videos), the presence of mul-
tiple copies catalyzes recurrence, allowing that content to spread
rapidly to different parts of the network, significantly boosting the
rate of recurrence. To a smaller extent, the principle of homophily,
suggesting that people are more likely to share content received
from users similar to themselves, also plays a role in recurrence,
with user similarity positively correlated with the rate of spreading.
Modeling recurrence. Motivated by the above picture of recur-
rence, and inspired by classic epidemiological models of diffusion
[39] and disease recurrence [3, 25, 40], we present a simple model
of cascading behavior that is primarily driven by content virality
and the availability of multiple copies, and is able to reproduce the
observed recurrence features. A simulation of this model, which
introduces multiple copies of the same content into the network,
can cause independent cascades that peak at different times and in
aggregate are observed as recurring. As the virality of the content
increases, the shape of a plot of overall reshares in the network over
time transforms from a shorter independent single burst, to multiple
bursts of differing sizes, to a single large burst of a longer duration.
Replicating our previous findings, increasing virality increases re-
currence, up to a point: once a meme has exposed a large part of
the network, further recurrence is inhibited.
Predicting recurrence. Finally, we show how temporal, network,
demographic, and multiple-copy features may be used to predict
whether a cascade will recur, if the recurrence will be smaller or
larger than the original burst, and when the recurrence occurs. We
demonstrate strong performance in predicting whether the same
content will recur after observing its initial burst of popularity (ROC
AUC=0.89 for image memes), as well as in predicting the relative
size of the resulting burst (0.78). The time of recurrence, on the
other hand, appears to be more unpredictable (0.58). Features re-
lating to content virality and multiple copies perform best. Though
multiple-copy features account for significant performance in pre-
dicting the recurrence of content, we obtain similarly strong perfor-
mance (0.88) when predicting the recurrence of an individual copy
of a piece of content.
Together, these results not only provide the first large-scale study
of content recurrence in social media, but also begin to suggest
some of the factors that underpin the process of recurrence.
2. TECHNICAL PRELIMINARIES
Studying cascade recurrence requires both sufficiently rich data
that accurately measures activity throughout a network over long
periods of time, as well as a robust definition of what recurrence is.
2.1 Dataset Description
In this paper, we use over a year of sharing data from Facebook.
All data was de-identified and analyzed in aggregate. Facebook
presents a particularly rich ecosystem of users and pages (entities
that can represent organizations or brands) sharing a large amount
of content over long periods of time.
Reliably measuring the spread of content in a network over time
is challenging because multiple copies of the same content may
exist at any time. As we will later show, the presence of multi-
ple copies in a cascade is an important catalyst for recurrence. On
Facebook, users and pages may introduce a new copy of the same
content by re-posting or re-uploading it; resharing an existing copy
instead creates an attribution back to that same copy. Content may
be reintroduced, instead of reshared, for various reasons - multi-
ple users may have independently discovered the same content, or
downloaded and then re-uploaded an image.
To construct a dataset of popularly shared content, we initially
selected a seed set of reshared content uploaded to Facebook in
March 2014. We selected the top 200,000 most reshared images,
which were publicly viewable, counting only reshares within the
180 days since the image was uploaded, then used a neural net-
work classifier [28] to identify images with overlaid text (i.e., im-
age memes). One advantage of studying image memes in par-
ticular is that the information that these memes transmit is un-
likely to change, as opposed to unembellished images which may
be used differently (e.g., if the same photo is used to support sepa-
rate causes).
Next, we tried to identify other copies of content that exist in
this seed set. Beyond exact copies of the same image, many near-
identical images, which have slightly different dimensions or intro-
duce compression artifacts or borders, also exist (as seen in Figure
1). As such, a binary k-means algorithm [21] was used to iden-
tify clusters of near-identical images to which each of these can-
didates belonged, including images beyond the original set. For
each cluster, we then obtained all reshares of images in that clus-
ter that were made in 2014. To verify the quality of the clustering,
we manually examined the top 100 most-reshared copies in each of
Figure 3: Recurrence occurs when we observe multiple peaks (p0,
p1, red crosses) in the number of reshares over time. Bursts (b0, b1)
capture the activity around each peak.
Figure 4: Examples of time series of recurring and non-recurring
cascades over a year, colored by copy. Identified peaks are marked
with red crosses; the number of reshares is normalized per cascade.
100 randomly sampled clusters. In 94 clusters, all 100 copies were
near-identical. The remaining clusters mainly comprised the same
image overlaid with different text.
This sample of resharing activity in 2014 that we use consists of
395,240,736 users and pages that made 5,167,835,292 reshares of
105,198,380 images. These images were aggregated into 76,301
clusters. Repeating the process above for videos shared on Face-
book, we obtain a sample comprising 323,361,625 users and pages
that made 2,187,047,135 reshares of 6,748,622 videos, aggregated
into 156,145 clusters. Images, videos, users, and pages that were
deleted were excluded from analysis. On average, each image clus-
ter is made up of 1379 copies of the same content. Video clusters
were smaller, with 43 copies in each cluster on average.
As we only measured reshares for a year, we may only be ob-
serving part of a cascade's spread if it began prior to 2014. Thus,
we also considered subsets of each dataset containing only clus-
ters that began in 2014. We identified these subsets by additionally
measuring reshares of content in the three months prior to 2014
(October to December 2013) and excluding clusters where activity
was observed during this period.
Though we mainly analyze recurrence at the cluster level, we
also investigate the recurrence of individual copies by studying the
top 100,000 individually most reshared copies in each dataset.
2.2 Defining Recurrence
In this work, we define recurrence relative to peaks and bursts
in popularity over time. In practice, almost all popular content on
t# Reshareshwrp0p1b0b1Recurring CascadesNon-RecurringImage Memes
Videos
# Clusters
51,415 (76,793)
149,253 (156,145)
Copies/Cluster
523 (1378)
13 (43)
Prop. Recurrence
0.40 (0.59)
0.30 (0.33)
# Peaks
2.3 (4.6)
1.6 (2.0)
Days Observed
202 (280)
170 (182)
Days betw. 1st/2nd Burst
31 (32)
47 (44)
Table 1: Recurrence occurs in a large proportion of popular image memes and videos shared on Facebook. We note in parentheses statistics
computed on all cascades, as opposed to the cascades that began in 2014 whose initial spread we can observe.
Facebook experiences at least one peak in popularity. If content
peaks in popularity more than once, we say that it recurs.
To identify these peaks, and thus whether a cascade recurs, we
measure the number of reshares of content over time. Figure 4
shows several examples of recurring memes. Empirically, reshare
activity is varied across different content but is generally bursty,
with long periods of inactivity between peaks. As recurrence oc-
curs over a long amount of time, we discretize time into days.
Intuitively, a recurrence occurs when a peak is observed in the
time series. Not only should these peaks be relative outliers on a
timeline, but they should also last for a significant amount of time.
Further, we should be able to tell these peaks apart from each other.
Motivated by this intuition, suppose we observe a meme for t days.
Let ri, i ∈ {1, 2, ..., t} be the number of reshares observed on day
i. We parameterize recurrence using four variables - h0, m, and
w place constraints on identified peaks, and v places a constraint on
the "valley" between peaks. Specifically, the height h of each peak
must be at least h0 and at least m times the mean reshares per day
¯r (Figure 3). Additionally, a peak day must be a local maximum
within ±w days. Finally, between any two adjacent peaks pi and
pi+1, the number of reshares must drop below v · min{rpi , rpi+1}.
We call the area around the peak a burst (b0, b1 respectively for p0,
p1 in Figure 3), whose duration or width w, is defined as the sum of
the number of days the number of reshares is increasing before pi
and falling after pi, while remaining above ¯r. There is a one-to-one
correspondence between peaks and bursts.
In practice, we set h0=10, m=2, w=7, and v=0.5 so that each
burst is relatively well-defined. The red crosses in Figure 4 show
the identified peaks under this regime. While this definition does
not strictly minimize activity between bursts, empirically, activity
does drop significantly (and in many cases, falls to zero) in be-
tween bursts. Stricter definitions that reduce the number of iden-
tified peaks (e.g., requiring a well-defined "valley floor" between
two peaks, or increasing h0 or m) also resulted in qualitatively
similar findings. The approach we take is fairly rudimentary; fu-
ture work may involve developing more specific definitions of re-
currence which take into account the shape of resulting bursts.
3. CHARACTERIZING RECURRENCE
moderate number of reshares, are more likely to recur.
We first introduce recurrence at a high level, showing that it is
both common and bursty, with the same content sometimes resur-
facing multiple times. We then discuss four important classes of
observations that we later draw on to model and predict recurrence:
• Temporal patterns: cascades with longer initial bursts, but a
• Sharer characteristics: recurring and non-recurring cascades
differ in demographic makeup, and moderate diversity in the
initial sharing population encourages recurrence. Further,
changes in homophily in the network affect the speed at which
content spreads, and hence burstiness.
• Network structure: bursts in a cascade occur in different, but
nonetheless connected parts of the network. Also, large ini-
tial bursts tend to exhaust the supply of susceptible users, po-
tentially accounting for why moderate, but not high cascade
volume or diversity results in greater recurrence.
• Catalysts of recurrence: the availability of multiple copies
in the network may catalyze recurrence. Still, neither does
the presence of multiple copies suggest that recurrence is en-
tirely an externally-driven phenomenon, nor is it a necessary
condition for recurrence.
In the remainder of this paper, we report results primarily on
image memes, and note any salient differences with videos. All
differences reported are significant at p<10-10 using a t-test unless
otherwise noted.
3.1 Recurrence is common
Once introduced on Facebook, popular content continues spread-
ing for a long time. On average, the maximum time between re-
shares of the same content is 280 days. But rather than being shared
at a constant rate (among popularly reshared content, less than 1%
of memes have no discernible peak), resharing tends to be bursty,
with bursts typically separated by substantial periods of relative in-
activity. A mean of 32 days separates the initial and subsequent
bursts for image memes (Figure 5b).
Previously, we defined recurrence as observing multiple peaks
in the number of reshares observed over time, and non-recurrence
as observing only a single peak. Over these long periods of time,
59% of popular image memes recur. In fact, a significant propor-
tion of these cascades experience resurgences in popularity (Figure
5a), and may even have experienced bursts prior to our observation
window. If we limit the sample to the set of image memes which
began spreading in 2014, 40% of these memes recur (Table 1).
3.2 Temporal patterns
Cascades with larger initial bursts of activity that last longer are
more likely to recur, suggesting that more viral, or appealing cas-
cades are more likely to recur. However, it is not the most popular
cascades that recur the most, but those that are only moderately
popular - while recurrence initially increases with the size of the
initial peak, it subsequently decreases.
Recurring cascades have larger, longer-lived initial bursts. The
initial burst of a cascade is already indicative of recurrence. Recur-
ring cascades start out larger (15,547) and initially last longer (9.3
days) than non-recurring cascades (6128 reshares, 6.9 days), spend-
ing more time "building up" (Figure 5c) and "winding down". The
greater initial popularity of recurring cascades suggests that more
viral cascades are more likely to recur, but is this the case?
Recurring content is moderately popular. Plotting the total num-
ber of reshares in the initial burst against the subsequent number
of bursts observed, rather than the number of reshares monotoni-
cally increasing or decreasing the rate of recurrence, we observe a
striking interior maximum at approximately 105 reshares for both
image memes and videos (Figure 7a). Neither the initially best-
performing (or most viral), nor poorest-performing (or least viral)
cascades tend to resurface. In the former case, a single large burst
tends to dominate with smaller bursts after; in the latter case, a
small number of small bursts is typically observed.
They keep coming back! While most of our analyses focus on the
initial burst and subsequent recurrence, several general trends arise
as more recurrence is observed:
(a) Number of Peaks
(b) Days Between Bursts
(c) Cascade Duration
Figure 5: (a) 40% of cascades that began in 2014 came back, and (b) over 30% of recurring cascades only resurfaced after a month or more.
(c) Further, the initial burst of a recurring cascade tends to last longer than that of a non-recurring cascade.
The latter observation corroborates previous work that showed a
correlation with eventual cascade size [14].
(b) # Reshares in Each Burst
(a) Probability of Subsequent Bursts
Figure 6: (a) The probability of subsequent recurrences increases
after the initial recurrence. (b) Cascades that recur less tend to have
bursts that diminish in size over time, while those that recur more
tend to have a stable burst size.
• Once a cascade has recurred, it is more likely to resurface
again. The probability of recurrence jumps from 0.40 ini-
tially, to 0.60 for subsequent recurrences before gradually
decreasing (Figure 6a). This observation parallels prior work
showing that the prior popularity of Youtube videos predicts
their future popularity [11].
In fact, for 26% of all image
meme cascades, we observe resharing activity on the first and
last day of our observation period. These image memes may
be "evergreen", tending to continuously recur.
• For cascades that recur less, subsequent bursts tend to be
smaller; for cascades that recur more, subsequent bursts are
more similar in size (Figure 6b), suggesting that they depend
less on external factors (e.g., breaking news) to spread.
• Subsequent recurrences are briefer than their predecessors.
Burst duration monotonically decreases from a mean of 7.6
days for the first burst to 6.3 for the tenth.
• On average, the lull between recurrences is substantial, with
bursts happening an 28 to 32 days apart for image memes,
and 30 to 44 days apart for videos. Again, these long periods
between bursts suggest that recurrence can only be observed
over substantial periods of time.
3.3 Sharer characteristics
People who participate in recurring cascades differ significantly
from those who participate in non-recurring cascades. While a di-
verse user population encourages recurrence, moderately diverse
cascades recur the most. Homophily, the concept that similar peo-
ple are likely to share the same content, also affects how quickly
content spreads, suggesting that it modulates recurrence.
Demographics vary with recurrence. For recurring cascades, the
average age of people participating in the initial burst is lower (40
vs. 42), but the proportion of women is higher (65% vs. 58%).
Demographics also change across bursts. In the case of image
meme cascades, the mean age changes by 2.7 years, and the pro-
portion of women by 6.1 percentage points (in absolute terms). The
same content may become popular in different parts of the world at
different times, resulting in recurrence: 13% of the time, the major-
ity of people in the initial two bursts come from different countries.
Diversity encourages recurrence. We now turn our attention to
the diversity (or homophily) of people who take part in a cascade.
We quantify homophily in the network by measuring the entropy
of the distribution of demographic characteristics. A low entropy
in the distribution of countries users are from (or country-entropy)
corresponds to high homophily, suggesting that a majority of shar-
ers belong to a small number of countries. On the other hand, a
high country-entropy suggests that the countries sharers belong to
are more diverse and distributed more evenly.
It is not a priori clear whether homophily encourages or inhibits
recurrence. Homophily within a community, meaning that con-
nected users are receptive to sharing the same content, may help a
cascade gain the initial traction it needs to spread, but may also re-
sult in the content getting "trapped" in a local part of the network.
In contrast, diversity in the users sharing that content suggests it
has wider appeal and might come back, but may also result in only
a single burst if the initial spread overwhelms the network.
We find that diversity in the country distribution is predictive
of recurrence. Controlling for the duration (w), peak height (h),
and the number of reshares in the initial bursts of recurring and
non-recurring cascades [42], a Wilcoxon Signed-rank test shows
that a higher country-entropy is indicative of recurrence (W>108,
p<10-10, effect size r=0.19). Thus, if the initial burst of a cascade
occurs in more countries, it is more likely to recur. Higher gender-
entropy (i.e., greater gender-balance) also predicts recurrence, but
its effect is weaker (W>108, p<10-2, r=0.02). The effect of age is
inconsistent across image memes and videos.
Recurring content is moderately diverse. Again, it is not the
most diverse populations that bring about recurrence: a moderate
country-entropy of approximately 3.0 in the initial burst of a cas-
cade results in the most recurrence (Figure 7b). An interior maxi-
mum can also be observed with respect to the gender-entropy of the
initial burst (Figure 7c). These results, combined with the previous
observation of a similar interior maximum with respect to the ini-
tial number of reshares, suggests that the virality of content plays a
significant role in recurrence.
Cascades spread quickly in pockets of homophily. The viral-
ity of a cascade and homophily in the network are closely related,
lllllllllllllll0.000.250.500.751.00051015# BurstsEmpirical CCDF0.000.250.500.751.00050100150200Days Between 1st/2nd BurstEmpirical CCDFllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0.000.250.500.751.000102030Duration of Initial Burst (Days)Empirical CCDFllNon−RecurringRecurringlllllllllllllll0.30.40.50.60.70.8051015# BurstsProbability of Subsequent Burstlllllllllllllllllllllllllllllllllllllllllllllllllllllll10K15K20K25K0246810Burst Index# Reshares# Burstsllllllllll12345678910(a) # Bursts vs. # Reshares
(b) # Bursts vs. Country-Entropy
(c) # Bursts vs. Gender-Entropy
Figure 7: (a) A moderate number of reshares results in more recurrence. (b), (c) Similarly, recurrence is more likely when the entropy of the
distribution of users across countries, as well as gender, is moderate.
ities of 0.02 (i.e., 2% of people share the same content in both
bursts) and 0.03 mean that bursts have very little direct overlap.
and perhaps represent two perspectives on the spread of content.
Greater virality enables content to appeal to a larger population;
more homophily suggests that receptive users are closer in the net-
work. In fact, homophily in the network modulates the speed of
resharing (and thus bursts in a cascade). If we measure the aver-
age country-entropy of a sliding window of 100 reshares ordered
in time and the time elapsed, and then compute the average corre-
lation, we find a slight positive correlation between the two (0.08),
suggesting that homophily among those sharing results in faster re-
sharing, and hence burstiness. Gender-entropy and age-entropy are
also positively, but more weakly correlated with burstiness (0.06
and 0.04 respectively). One potential cause of this is that pages,
with their substantial and homophilous followings, are driving re-
sharing. The more pages that share content, the more homophilous
the set of potentially reachable people, and thus the quicker content
is reshared. However, as the proportion of reshares attributable to
pages increases, the entropy in these demographic characteristics
instead increases, an effect opposite to what we observe.
3.4 Network structure
The initial bursts of recurring cascades tend to be better con-
nected. Further, successful recurrence tends to occur in different,
but not disconnected parts of the network. Considering the peo-
ple potentially exposed in each burst beyond the resharers, large
initial cascades may exhaust the population of susceptible people
in the network, a fact that will subsequently become important in
explaining the mechanism of recurrence.
Bursts of recurring cascades are internally more connected.
More people and pages share in the initial burst of recurring cas-
cades than non-recurring cascades (15,050 users and 59 pages, and
5855 users and 24 pages respectively). To measure connectivity
within a burst, we used the induced subgraph G0 of the Facebook
network made up of the people and pages resharing in the initial
burst. The subgraph includes two kinds of edges: friend edges be-
tween people, and follow edges between people and the pages they
like. On this subgraph, people in the initial burst of recurring cas-
cades have an average of 3.4 connections to other people and pages
in the same burst, relative to 3.1 connections in non-recurring cas-
cades, suggesting that the initial bursts of recurring cascades are
slightly more connected.
Subsequent bursts happen in different parts of the network.
Bursts of a cascade are separate in time, but may overlap in terms
of sharers, or be connected via friend and follow edges.
To start, the sharer overlap between bursts is small. For recurring
cascades, an average of 15,050 people and 59 pages make up the
initial burst, and 8892 people and 28 pages the subsequent burst.
Comparing people and pages across these bursts, Jaccard similar-
We also find evidence of community structure within bursts by
considering whether the second burst is proximate in the network to
the first. Even if individuals in the second burst do not repost con-
tent a second time, they may not be far removed in the social net-
work from someone in the first burst. Here, we instead consider the
induced subgraph G0+1 of the individuals and pages who reshared
in the initial two bursts for each cascade. If these bursts correspond
to communities within the network, we would expect more edges
within bursts than between them. An average of 17,457 friend and
17,242 follower edges exist in the first burst; 10,094 friend and
6,310 follower edges exist in the second. Note that these commu-
nities are very sparse. A person within a burst has a connection to
an average of 3.2 friends or pages within the same burst, indicat-
ing that memes tend to diffuse out through the network rather than
stay within a narrow community. Still, across bursts, we observe
an average of 8,273 friend and 4,755 follower edges, resulting in
an average of 1.4 connections to friends and pages in a different
burst, indicating that these bursts are somewhat separated.
Large initial bursts exhaust the supply of susceptible people. As
noted above, the second burst in a cascade has fewer sharers. Intu-
itively, people may tire of content they have seen before, but is this
the case? Studying overlap a third way, we look at the susceptible
populations of the initial and subsequent bursts of a cascade. We
approximate these populations by considering people who could
have been exposed through their connections (friend and follow
edges) to those who shared content in these two bursts.
On average, 6.4 million unique individuals are potentially ex-
posed in the initial burst, with recurring cascades, having a greater
number of initial resharers, having greater reach (8.2 million vs.
4.0 million for non-recurring cascades). For recurring cascades,
the potential reach of the second burst is smaller, but still sizable at
6.8 million. Comparing the sets of individuals exposed in the first
two bursts of recurring cascades, we obtain a Jaccard similarity of
0.15, indicating this second burst is mostly reaching a different set
of people, but where some people will have seen the same content
twice, creating a sense of déjà vu for many.
In particular, 28% of people who are potentially exposed in the
second peak would have also been exposed in the first. This high
overlap could be a contributing factor to the second peak being
smaller. Further, the proportion of exposed individuals in the sec-
ond peak is positively correlated (ρ=0.39) with the size of the first
peak, meaning that the larger the initial peak, the more likely that
those exposed in the second peak have previously seen the content.
In other words, in the case of large initial bursts, subsequent bursts
are likely reaching a similar part of the network.
lllllllll1.52.02.53.03.54.0103104105106# Reshares in Initial Burst# Burstslllllllllll2.02.53.03.5012345Country Entropy in Initial Burst# Burstsllllllllll1.52.02.50.20.40.60.81.0Gender Entropy in Initial Burst# Bursts3.5 Catalyzing recurrence
As shown in Figures 1 and 2, cascades are made up of reshares
of multiple copies of the same content, and the presence of these
copies can help catalyze recurrence. Still, neither are copies the
only cause of recurrence (recurrence is substantial even with a sin-
gle copy), nor must they be independently or externally introduced
(many later copies are attributable to previously seen copies).
Cascades whose reshares are divided across multiple copies tend
to recur. Recurring cascades are made up of more copies than non-
recurring cascades (2277 vs. 93). Reshares are also more spread
out across multiple copies in the former case (841 and 3445 re-
shares per copy for recurring and non-recurring cascades respec-
tively), suggesting recurrence may be characterized by multiple
smaller outbreaks. The most reshared copy accounts for 72% of
reshares in the initial burst for recurring cascades, and 93% for
non-recurring cascades. Altogether, the substantial differences here
suggest the strong predictive power of these characteristics.
The appearance of new copies correlates with recurrence. Fur-
ther, the introduction of new copies and the number of reshares over
time is significantly correlated (Pearson's r=0.66), suggesting that
the appearance of new copies causes bursts, and thus recurrence.
On a related note, prior work showed that reposting content helps
make it popular [44].
Copies are not the only cause of recurrence. Nonetheless, not all
copies burst (only 6% are reshared at least 10 times on any single
day), and not all bursts are caused by new copies, as we will later
show. And while correlations between the number of copies and
other characteristics such as duration and country-entropy also ex-
ist, when we control for the number of copies in the initial bursts of
recurring and non-recurring cascades [42], all previously observed
differences in the temporal, sharer, and network characteristics of
these cascades still hold (W>108, p<10-10, mean effect size r=0.08).
Comparing recurring and non-recurring cascades with similar num-
bers of copies in their initial bursts, the initial bursts of recurring
cascades are still larger, longer-lived, and more diverse. In all, this
suggests that recurrence is not simply caused by distinct copies of
the same content spreading through the network, but is a result of a
more complex phenomenon which we explain in Section 4.
A majority of copies are internal to the network. Still, where do
these copies come from, and are they internal or external to the net-
work? By using the network to identify friends and pages who may
have previously shared a different copy of some content, we can
attribute 75% of newly uploaded copies to previously seen copies
in the network (this approach roughly estimates content-copying
that occurs within Facebook, as users who share a new copy may
not have seen a friend's shared copy). This suggests a nuanced ap-
proach to studying recurrence - external sources may drive some
of the introduction of new copies to a social system, but a large pro-
portion of activity, which we can study, occurs within the network.
Pages may also catalyze recurrence. Pages are responsible for a
large proportion of highly-reshared copies (over 70% of reshares
are attributable to page-created copies in the second burst of re-
curring cascades). In recurring cascades, pages tend to re-upload,
rather than reshare content, doing so 50% of the time, as opposed
to 2% for users. Further, the most popular copy in the second burst
is likely to have been created by a page (70%). Given the relatively
higher degree of pages, which tend to have tens of thousands of
followers, as opposed to users who typically only have hundreds of
friends, pages may spark recurrence by posting a new copy of the
same content, rapidly exposing a number of followers to it.
Individual copies recur too! Recurrence of the individually most
popular copies in our datasets, while lower than when copies are
studied in clusters, is still substantial (18%). These individual copies
last a significant amount of time (261 days), with bursts further
apart (41 days). Like cascades of multiple copies, the initial bursts
of recurring individual-copy cascades are larger and longer-lived
than those of non-recurring cascades, with later bursts occurring in
different parts of the network. Recurrence of the same copy can
also be observed within clusters - 22% of the time, the most re-
shared copy in a burst was also most reshared in a previous burst.
4. MODELING RECURRENCE
Tying our observations together, we present an overall picture of
the mechanisms of recurrence, then suggest a model of recurrence
which we evaluate through simulations on a real social network.
4.1 Why do cascades recur?
Our findings as a whole suggest a model of recurrence where
virality is a primary factor, and where the availability of multiple
copies can help spark recurrence.
Virality plays a primary role in recurrence. Virality, or broad-
ness of appeal, affects recurrence: cascades with initial bursts that
are larger, last longer, and are more demographically diverse are
more likely to recur. Specifically, moderately popular and diverse
cascades are most likely to recur. While recurrence typically oc-
curs in different parts of the network, the larger the initial burst
of a cascade, the larger the proportion of the potentially exposed
population in the subsequent burst that was already previously ex-
posed. This observation, coupled with the fact that users tend not
to reshare the same content multiple times, suggests that large ini-
tial bursts inactivate a significant portion of the network, inhibiting
a cascade's future spread. Our subsequent simulations show more
clearly that this may indeed happen as the initial burst grows large.
Multiple copies in the network help spark recurrence. Bursts
in a cascade are separated by relatively long periods of inactivity.
By studying the availability of multiple copies of the same con-
tent, we find that these copies can act as catalysts for recurrence
in different parts of the network. Indeed, multiple introductions of
the same content correlate with recurrence. However, while more
copies initially increases the chance of recurrence, they are not the
only cause of it; recurring and non-recurring cascades with similar
numbers of copies differ significantly in virality. Moreover, mul-
tiple copies do not explain the substantial recurrence of individual
copies. To a lesser extent, we also discover that homophily in the
network affects the speed of the spread of a cascade in a network.
Together, moderate content virality and the presence of multiple
copies results in recurrence. While the likelihood of recurrence
does increase with the number of copies (or potential "sparks"), we
can still observe an interior maximum in how recurrence varies with
the number of reshares after fixing the number of copies, where a
moderate number of reshares results in the most recurrence.
4.2 A simple model of recurrence
Motivated by these findings, we suggest a simple model of cas-
cading behavior where recurrence depends on content virality:
• If the virality of a cascade is low, it may only appeal to a
small group of people, and is thus unable to spread far in
the network. Thus, a single, small peak results, with many
attempts to propagate in the network failing (Figure 8a).
• As virality increases, the cascade is able to spread substan-
tially further in the network, and may occasionally even jump
to other local communities in the network, spreading faster
When the virality of the contagion is high (pc
of infections (or reshares) in each time step, and identify bursts as
defined in Section 2.2.
Results. Within certain ranges of virality (6×10-4≤ pc
0 <8×10-4),
we can consistently reproduce recurring cascades. Figure 9a shows
several examples of the time series of these simulations. In aggre-
gate, we can obtain a distribution of number of peaks similar in
shape to Figure 5. Plotting the number of peaks against number
0), we observe an
of reshares in the initial burst (or alternatively, pc
interior maximum - a moderate amount of virality results in the
most recurrence (Figure 9b), replicating our previous findings.
0≥8×10-4), a large
fraction of the highly connected portion of the graph becomes in-
fected by a single copy in the initial burst, suppressing subsequent
bursts as many nodes are now resistant. To show this happening,
we consider for each simulation, in addition to our original model,
an alternate-universe setting where the resistances of nodes are re-
set following the initial burst. We can then measure how much
the initial burst inhibited the second by observing the likelihood
of a second burst in the alternate case, as well as the overlap of
nodes infected in the second burst with nodes in the initial burst.
A significant difference in the total number of peaks when virality
is high (1.0 vs. 2.0, t=92, p<10-10), but not when virality is low
0≤7×10-4, n.s.) suggests that the supply of susceptible nodes
(pc
is indeed being used up in the former case, but not the latter. A
significant positive correlation of initial peak size with the size of
the overlap of the second peak in the alternate setting (0.76) further
supports this hypothesis and our prior observations.
Likewise, the connectivity of graph deteriorates significantly af-
0≥8×10-4). Here, we measure the al-
ter a large initial burst (pc
gebraic connectivity [18] of the graph if all the nodes involved in
the initial burst are removed, and compare this to a baseline that
removes the same number of nodes at random. Connectivity is sig-
nificantly lower in the former case (579 vs. 1065, t>17, p<10-10),
especially in comparison to the graph's initial connectivity (1105).
These results together suggest that under such a model of recur-
rence, a large initial burst does indeed inhibit subsequent bursts,
as we previously hypothesized (Figure 8c). Also in support of our
prior observations, increasing the number of introduced copies m
monotonically increases recurrence.
Limitations and alternatives.
Importantly, our model assumes
that recurrence is sparked primarily by independent copies intro-
duced to the network. However, the reality of recurrence is subtler:
individual copies recur significantly in the network, and homophily
may also moderate recurrence. Allowing virality to vary with time
[24] or having nodes wait according to a power-law distribution
[17, 35] may also reproduce recurrence with only a single copy.
Decision-based queuing processes [8] may also help model the long
periods of inactivity between bursts.
5. PREDICTING RECURRENCE
Is it possible to predict if a cascade will resurface in the future?
Observing just the initial burst of a cascade, we use features re-
lated to the temporality, network structure, user demographics, and
presence of multiple copies to determine a) whether recurrence oc-
curs, b) if the recurrence will be relatively smaller or larger, and
c) when the recurrence occurs. Overall, we find that cascades with
longer initial bursts that consist of multiple small outbreaks tend to
recur, supporting the hypothesis that content virality and multiple
copies play a significant role in recurrence. Nonetheless, we obtain
similarly strong performance predicting recurrence for individual
copies of content. Predicting recurrence may enable us to better
forecast content longevity in a network.
Figure 8: When virality is low, only a small number of attempts at
infection succeed. When virality is moderate, more attempts suc-
ceed, which aggregate into observable recurrence. When virality
is high, rather than a large number of bursts aggregating to form a
single large peak, the first successful burst infects a large portion of
the network, making it difficult for other copies to spread.
within them. As several bursts occur in the network, they
may be observed as recurring in aggregate (Figure 8b).
• However, as virality increases beyond some threshold, any
individual burst is likely to spread through a large portion
of the susceptible population, inhibiting the transmission of
subsequent copies (Figure 8c). This last point lies in contrast
to the trivial hypothesis that more independent copies leads
to more independent bursts that aggregate to form a single
large burst, which does not appear to be the case, as most
reshares in initial bursts can be attributed to a single copy.
4.3 Simulating recurrence
To see if such a model of recurrence can reproduce characteris-
tics of recurrence observed in the data, we now simulate recurrence
on a real social network. Our observations and model suggest the
use of an SIR model, where nodes in a network are initially sus-
ceptible (S) to a contagion, and then may become infected (I) when
exposed. Infected nodes subsequently recover (R) and become re-
sistant to the contagion. These models have been used to study the
spread of disease [6] and information [9, 13, 39] in a network.
Setup. Our simulation thus consists of an SIR model with multiple
outbreaks introduced at different times, and with resistant nodes re-
infectable at a lower rate. We parameterize our model as follows:
For a given contagion c, its virality, or equivalently, the susceptibil-
0. In other words, if exposed
ity of every node in the network, is pc
to the contagion, the probability that the node will be infected is
0. Infected nodes attempt to infect all neighbors in the subsequent
pc
time step, and then become resistant. As users sometimes share the
same content multiple times, resistant nodes have a constant lower
probability pc
0 of being re-infected. The introduction of each
copy of a contagion is normally distributed in time (N (µ, σ)).
1 < pc
Here, we make a simplifying assumption that independent copies
of the same content are introduced into the network at different
points in time. Following the intuition that more connected entities
(e.g., pages) are likely to start outbreaks, the target nodes to infect
are sampled, with replacement, proportional to the node's degree.
m copies are introduced in total.
We simulate this model for 1000 discrete time steps with µ=500,
0 between 5×10-4 and 10-3 and where
σ=250, and m=50, varying pc
1=0.5·pc
1. We run our simulation on the network of a country with
pc
approximately 1.4 million nodes and 160 million friendship edges,
repeating the simulation 5000 times. We measure the total number
# Resharesa. Low Viralityb. Moderate Viralityc. High ViralityOverallIndividual Burststcascades (N=40,912 for image memes, 89,368 for videos) so that
guessing results in a baseline accuracy of 0.5. Given the non-linear
relation of several features to recurrence (e.g., that a moderate num-
ber of reshares results in the most recurrence), we use a random
forest classifier. In all cases, we perform 10-fold cross-validation
and report the classification accuracy, F1 score, and area under the
ROC curve (AUC).
Results. Overall, we find strong performance in predicting recur-
rence (Accuracy=0.82, F1=0.81, AUC=0.89). A logistic regression
classifier results in slightly worse performance (AUC=0.78). Ta-
ble 2 shows how performance improves as features are added to
the model, as well as individual feature set performance. While
multiple-copy features perform best, temporal and network fea-
tures, and to a lesser extent demographic features, also individually
exhibit robust performance, suggesting that each significantly con-
tributes to recurrence. In the absence of strong multiple-copy fea-
tures (fewer copies of any one video exist), we obtain worse perfor-
mance in predicting the recurrence of videos (Acc=0.69, F1=0.66,
AUC=0.76), with temporal features instead performing best.
For image meme cascades, the most predictive features of re-
currence relate to cascades having multiple small outbreaks (fewer
reshares per copy (0.78) and a higher entropy in the distribution
of reshares across copies (0.72)), and longer initial bursts (more
days before (0.63) and after (0.63) the peak). These features re-
main important for video cascades. Mirroring the dual importance
of multiple-copy and temporal features, just the number of reshares
per copy and the average gradient of the initial burst after its peak
alone achieve strong performance (0.81). Though the initial burst
of a recurring cascade is on average significantly larger, size-related
features are weaker signals of recurrence (≤0.59).
5.3 Will the recurrence be smaller/larger?
Prediction task. Assuming that we know that a cascade will recur,
how much smaller or larger will the second burst be? Knowing the
relative size of the next recurrence can differentiate bursty cascades
that are rising or falling in popularity. Given the initial burst of a
cascade, we aim to predict if the relative size of the second burst, or
the ratio of the size of the second burst to that of the first, is above or
below the median (0.28). As the median evenly divides the dataset,
we again have a balanced binary classification task with a random
guessing baseline accuracy of 0.5.
Results. We also find strong performance in predicting the rela-
tive size of the subsequent burst (Acc=0.72, F1=0.69, AUC=0.78
for image memes, AUC=0.85 for videos). Temporal features here
outperform all other feature sets, with the most predictive features
relating to the cascade having a long initial burst.
5.4 When does it recur?
Prediction task.
If a cascade will recur, when will we observe
the next burst? With a cascade's initial burst, can we predict if the
duration between bursts will be greater than the median (14 days)?
Results. We find that the timing of recurrence is far less predictable
(Acc=0.56, F1=0.51, AUC=0.58 for image memes, AUC=0.60 for
videos). Nevertheless, longer initial bursts are most indicative of
recurrence happening earlier.
5.5 Predicting recurrence for individual copies
Given the correlation of the appearance of multiple copies with
bursts, multiple-copy features perform strongest in predicting re-
currence. But what if we want to predict recurrence of a single
instance of some content, where multiple copies do not exist by
(a) Simulated Time Series
(b) # Peaks vs. Reshares, Simulated
Figure 9: (a) By varying content virality, a model of recurrence that
assumes independent introductions of copies of the same content
can simulate recurrence. (b) It also replicates the observation that a
moderate number of reshares results in more recurrence.
AUC on Feature Sets
Temporal
+ Demographic
+ Network
+ Multiple-Copy
0.74
0.78 (0.63)
0.81 (0.72)
0.89 (0.82)
0.76
0.76 (0.58)
0.77 (0.66)
0.78 (0.70)
0.55
0.56 (0.52)
0.57 (0.53)
0.58 (0.54)
Table 2: We obtain strong performance in predicting whether recur-
rence occurs and if the subsequent burst will be smaller or larger,
but not in predicting when recurrence occurs. Individual feature set
performance is in parentheses. The column headers refer to Sec-
tions 5.2, 5.3, and 5.4 respectively.
5.1 Factors driving recurrence
Based on our observations, we develop several features that help
predict recurrence, and group them into four categories:
Temporal features (7). Initially longer-lived bursts are suggestive
of recurrence, motivating the importance of the number of days be-
fore and after the peak is reached, as well as the number of reshares
before and after, and the height of the initial peak. The average
gradient of the initial burst before and after the peak further char-
acterize the shape of the initial burst.
Demographic features (5). The differences in user characteris-
tics and diversity we previously observed suggest the importance
of age, gender, as well as the entropy in the distribution of age,
gender and country of the initial burst.
Network features (6). Recurring cascades appear to be more con-
nected in their initial bursts, having more friendship and follower
edges, in addition to having a larger potentially exposed popula-
tion. The number of users, pages, and proportion of pages in the
initial burst also vary.
Multiple-copy features (8). The availability of multiple copies
plays a significant role in recurrence, motivating the use of the num-
ber of copies observed in the initial peak, the entropy in the distri-
bution of reshares of each copy, the mean reshares per copy, and
the proportion of reshares attributable to the most popular copy.
Pages also play a role in recurrence, suggesting that the proportion
of copies created by pages, the proportion of all reshares made by
pages or attributable to page-created copies, and whether the most
popular copy was created by a page are useful features.
5.2 Does it recur?
Prediction task. We formulate our prediction task as a binary clas-
sification problem: given only the initial burst of a cascade, we aim
to predict if a second burst will be observed (i.e., if the cascade will
recur). We use a balanced dataset of recurring and non-recurring
Recurring CascadesNon-Recurringllllllll1.01.52.02.53.0101102103104# Reshares in Initial Burst# Burstsdefinition? Surprisingly, we obtain similarly strong performance in
predicting the recurrence of individual copies (N=28,454, Acc=0.80,
F1=0.79, AUC=0.88 for image memes, AUC=0.82 for videos). Net-
work features are strongest (AUC=0.84), with fewer edges between
users and pages (0.68) in the initial peak the most predictive of
recurrence. As individual copies have a single point of origin,
fewer edges between pages and users and more edges between
users (0.61) suggests that the burst may have resulted more from
users sharing content from other users than high-degree pages shar-
ing that content with their followers. This observation, together
with the fact that longer initial bursts continue to be strongly pre-
dictive of recurrence (>0.65), suggests the continued significance
of virality with respect to individual copies.
The relative size of the subsequent burst is similarly predictable
for individual copies (0.83 for image memes, 0.84 for videos), but
interestingly, the time of recurrence is more predictable (0.68 and
0.63 respectively), which may be because any recurrence must be
a continuation of the initial copy, as opposed to possibly being
sparked by a new, less related copy.
6. RELATED WORK
Significant prior work has studied information diffusion in on-
line social media [7, 14, 37] - with respect to memes, work has
demonstrated the effect of meme similarity [16] and competition
for limited attention on subsequent popularity [46]. Most relevant
is previous work that looked at the temporal dynamics of diffusion
and developed epidemiological models of recurrence.
Among work that aims to predict the future popularity of on-
line content [12, 32, 44], one relevant line of research has involved
modeling the temporal patterns of the diffusion of information in
social media [2, 36, 49] or using these patterns to predict future
popularity or forecast trends [4, 9, 10, 14, 15, 24]. Perhaps driven
by the general shape of the initial burst of a cascade, many of these
models implicitly assume that the temporal shape of a cascade con-
sists primarily of a rising and falling period, and focus on modeling
the initial activity around a peak [2, 36, 48] or the overall popular-
ity discounting subsequent spikes [10]. Beyond the initial burst of
activity, we studied the long-term temporal dynamics of content on
Facebook over a year.
In prior work, when multiple bursts are observed in a time se-
ries, they tend to be of a topic or hashtag rather than an individual
piece of content, and are commonly attributed to external stimuli
[23, 29, 33, 38] (e.g., news related to that topic). While knowing
about external events can help forecast the temporal pattern of the
resulting spike [36], there has been little work in predicting if new
spikes will appear in the future lacking such knowledge. In partic-
ular, rumor recurrence is bursty, with or without external stimuli,
and sometimes with embellishments and other mutations [1, 31,
19], but there is little understanding of this phenomenon. Patterns
of human activity can also explain periodicity in popularity [5, 22,
34], but the vast majority of recurrence we observe in this paper
is aperiodic. While external stimuli explains some instances of re-
currence, we discover other factors that influence recurrence. In
contrast to most work that has observed multiple bursts in topics,
we observed recurrence even at the level of an individual copy.
Finally, substantial work has studied how bursts in streams or
time series can be detected [26, 27, 41]. In this paper, we adopted
a simple definition of burstiness, parameterizing peaks and bursts
relative to the mean activity observed.
Recurrence has also been studied in the context of epidemiology,
though primarily from a modeling perspective. Many base their
analysis on SIR models [39], simulating recurrence through intro-
ducing dormant periods [25], seasonality effects [3], or changes in
contagion fitness [20], which may be periodic [40]. More recently,
some work studied content popularity using these models, while ac-
counting for user login dynamics and content aging [13]. The struc-
ture of the network can also cause periodicity in epidemics [30,
45]. Many focus on modeling specific types of recurrence (e.g.,
historical disease epidemics [3]). In contrast, many recurrences we
observe are aperiodic, and findings on synthetic networks may not
easily generalize. Inspired by this line of work, we adapted an SIR
model assuming multiple points of infection on a real social net-
work, and show that key characteristics of recurrence we observed
can be reproduced.
7. DISCUSSION AND CONCLUSION
Our results start to shed light on the mechanism of content re-
currence - studying a large dataset of popularly reshared content,
we find that recurrence is common, and that content can come back
not just once, but several times. Strikingly, content may nearly
cease to circulate for days, weeks or even months, prior to experi-
encing another surge in popularity. Such a phenomenon may seem
highly unpredictable, but we find trends in how recurring cascades
behave, and can predict whether content will come back. The vi-
rality, or appeal of a cascade plays a role in recurrence: cascades
whose initial bursts are long-lasting, moderately popular, and mod-
erately diverse are most likely to recur. The presence of multiple
copies of the same content sparks recurrence, though homophily in
the network may also influence recurrence.
One limitation of our work is that we only analyze content within
a single network. Though most copies of the same content were
made within the network, a minority appeared without a prior path.
Analyzing the transfer of content between different social networks
may reveal different mechanisms of recurrence. Separately, while
the appearance of multiple copies correlates with recurrence, this
does not hold in the case of individual-copy recurrence. Under-
standing recurrence in the absence of multiple copies (e.g., through
studying homophily in more detail) remains future work.
Based on our observations, we presented a simple model that
exhibits some features of recurrence (e.g., pronounced bursts with
little activity in-between, and an internal maximum in the number
of bursts as a function of the number of reshares). Future work
could extend such models to account for homophily and commu-
nity structure in the network.
While the temporal shape, network structure, and user attributes
are already highly predictive of resharing behavior, other factors
may improve prediction accuracy further: sentimentality or humor
may make content evergreen, while content tied to current events
may have an expiration date. Seasonality effects may also cause pe-
riodic recurrence: we did observe an instance of a daylight-savings
image meme which appeared, as expected, exactly at the two points
during the year when people needed to adjust their clocks. Also,
other types of content may exhibit different properties of recur-
rence (e.g., link sharing may be more externally driven); the in-
teractions of users with shared content (e.g., comments) may also
reveal the reasons why some content came back; the societal con-
text of memes, as well as their interactions (or competition) with
other content, may also reveal more insight into their popularity
[43]. Perhaps most suggestive that much remains to be studied is
that while we can predict if recurrence will happens, it remains a
significant challenge to predict when recurrence will happen.
Acknowledgments. This work was supported in part by a Mi-
crosoft Research PhD Fellowship, a Simons Investigator Award,
NSF Grants CNS-1010921 and IIS-1149837, and the Stanford Data
Science Initiative.
8. REFERENCES
[1] L. A. Adamic, T. M. Lento, E. Adar, and P. C. Ng.
Information evolution in social networks. WSDM, 2016.
[2] M. Ahmed, S. Spagna, F. Huici, and S. Niccolini. A peek
into the future: Predicting the evolution of popularity in user
generated content. WSDM, 2013.
[3] S. Altizer, A. Dobson, P. Hosseini, P. Hudson, M. Pascual,
and P. Rohani. Seasonality and the dynamics of infectious
diseases. Ecol. Lett., 2006.
[4] S. Asur, B. Huberman, et al. Predicting the future with social
media. WI-IAT, 2010.
[5] S. Asur, B. Huberman, G. Szabo, and C. Wang. Trends in
social media: Persistence and decay. ICWSM, 2011.
[6] N. T. Bailey et al. The mathematical theory of infectious
diseases and its applications. 1975.
[7] E. Bakshy, I. Rosenn, C. Marlow, and L. A. Adamic. The role
of social networks in information diffusion. WWW, 2012.
[8] A.-L. Barabasi. The origin of bursts and heavy tails in human
dynamics. Nature, 2005.
[9] C. Bauckhage, F. Hadiji, and K. Kersting. How viral are viral
videos? ICWSM, 2015.
[10] C. Bauckhage, K. Kersting, and F. Hadiji. Mathematical
models of fads explain the temporal dynamics of internet
memes. ICWSM, 2013.
[11] Y. Borghol, S. Ardon, N. Carlsson, D. Eager, and
A. Mahanti. The untold story of the clones: content-agnostic
factors that impact Youtube video popularity. KDD, 2012.
[12] Y. Borghol, S. Mitra, S. Ardon, N. Carlsson, D. Eager, and
A. Mahanti. Characterizing and modelling popularity of
user-generated videos. Perform. Eval., 2011.
[13] M. Cha, F. Benevenuto, Y.-Y. Ahn, and K. P. Gummadi.
Delayed information cascades in Flickr: Measurement,
analysis, and modeling. Computer Networks, 2012.
[14] J. Cheng, L. A. Adamic, P. A. Dow, J. M. Kleinberg, and
J. Leskovec. Can cascades be predicted? WWW, 2014.
[15] H. Choi and H. Varian. Predicting the present with Google
Trends. Econ. Rec., 2012.
[16] M. Coscia. Average is boring: How similarity kills a meme's
success. Sci. Rep., 2014.
[17] R. Crane and D. Sornette. Robust dynamic classes revealed
by measuring the response function of a social system.
PNAS, 2008.
[18] M. Fiedler. Algebraic connectivity of graphs. Czech. Math.
J., 1973.
[19] A. Friggeri, L. A. Adamic, D. Eckles, and J. Cheng. Rumor
cascades. ICWSM, 2014.
[20] M. Girvan, D. S. Callaway, M. E. Newman, and S. H.
Strogatz. Simple model of epidemics with pathogen
mutation. Phys. Rev. E, 2002.
[21] Y. Gong and S. Lazebnik. Iterative quantization: A
procrustean approach to learning binary codes. CVPR, 2011.
[22] N. Grinberg, M. Naaman, B. Shaw, and G. Lotan. Extracting
diurnal patterns of real world activity from social media.
ICWSM, 2013.
[23] D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins.
Information diffusion through blogspace. WWW, 2004.
[24] A. Guille and H. Hacid. A predictive model for the temporal
dynamics of information diffusion in online social networks.
WWW Companion, 2012.
[25] A. Johansen. A simple model of recurrent epidemics. J.
Theor. Biol., 1996.
[26] D. Kifer, S. Ben-David, and J. Gehrke. Detecting change in
data streams. VLDB, 2004.
[27] J. Kleinberg. Bursty and hierarchical structure in streams.
Data Min. Knowl. Discov., 2003.
[28] A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet
classification with deep convolutional neural networks.
NIPS, 2012.
[29] R. Kumar, J. Novak, P. Raghavan, and A. Tomkins. On the
bursty evolution of blogspace. WWW, 2005.
[30] M. Kuperman and G. Abramson. Small world effect in an
epidemiological model. Phys. Rev. Lett., 2001.
[31] S. Kwon, M. Cha, K. Jung, W. Chen, and Y. Wang.
Prominent features of rumor propagation in online social
media. ICDM, 2013.
[32] H. Lakkaraju, J. J. McAuley, and J. Leskovec. What's in a
name? understanding the interplay between titles, content,
and communities in social media. ICWSM, 2013.
[33] J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-tracking
and the dynamics of the news cycle. KDD, 2009.
[34] J. Leskovec, M. McGlohon, C. Faloutsos, N. S. Glance, and
M. Hurst. Patterns of cascading behavior in large blog
graphs. SDM, 2007.
[35] D. Liben-Nowell and J. Kleinberg. Tracing information flow
on a global scale using internet chain-letter data. PNAS,
2008.
[36] Y. Matsubara, Y. Sakurai, B. A. Prakash, L. Li, and
C. Faloutsos. Rise and fall patterns of information diffusion:
model and implications. KDD, 2012.
[37] S. A. Myers and J. Leskovec. The bursty dynamics of the
twitter information network. WWW, 2014.
[38] S. A. Myers, C. Zhu, and J. Leskovec. Information diffusion
and external influence in networks. KDD, 2012.
[39] M. E. Newman. Spread of epidemic disease on networks.
Phys. Rev. E, 2002.
[40] L. F. Olsen, G. L. Truty, and W. M. Schaffer. Oscillations and
chaos in epidemics: a nonlinear dynamic study of six
childhood diseases in Copenhagen, Denmark. Theor. Popul.
Biol., 1988.
[41] G. Palshikar et al. Simple algorithms for peak detection in
time-series. ICADABAI, 2009.
[42] P. R. Rosenbaum and D. B. Rubin. The central role of the
propensity score in observational studies for causal effects.
Biometrika, 1983.
[43] B. H. Spitzberg. Toward a model of meme diffusion (M3D).
Communication Theory, 2014.
[44] G. Stoddard. Popularity dynamics and intrinsic quality in
reddit and hacker news. ICWSM, 2015.
[45] J. Verdasca, M. T. Da Gama, A. Nunes, N. Bernardino,
J. Pacheco, and M. Gomes. Recurrent epidemics in small
world networks. J. Theor. Biol., 2005.
[46] L. Weng, A. Flammini, A. Vespignani, and F. Menczer.
Competition among memes in a world with limited attention.
Sci. Rep., 2012.
[47] J. Yang and S. Counts. Predicting the speed, scale, and range
of information diffusion in twitter. ICWSM, 2010.
[48] J. Yang and J. Leskovec. Modeling information diffusion in
implicit networks. ICDM, 2010.
[49] J. Yang and J. Leskovec. Patterns of temporal variation in
online media. WSDM, 2011.
|
1706.09297 | 5 | 1706 | 2018-08-10T01:49:10 | Optimal Investment Strategies for Competing Camps in a Social Network: A Broad Framework | [
"cs.SI",
"physics.soc-ph"
] | We study the problem of optimally investing in nodes of a social network in a competitive setting, wherein two camps aim to drive the average opinion of the population in their own favor. Using a well-established model of opinion dynamics, we formulate the problem as a zero-sum game with its players being the two camps. We derive optimal investment strategies for both camps, and show that a random investment strategy is optimal when the underlying network follows a popular class of weight distributions. We study a broad framework, where we consider various well-motivated settings of the problem, namely, when the influence of a camp on a node is a concave function of its investment on that node, when a camp aims at maximizing competitor's investment or deviation from its desired investment, and when one of the camps has uncertain information about the values of the model parameters. We also study a Stackelberg variant of this game under common coupled constraints on the combined investments by the camps and derive their equilibrium strategies, and hence quantify the first-mover advantage. For a quantitative and illustrative study, we conduct simulations on real-world datasets and provide results and insights. | cs.SI | cs | Optimal Investment Strategies for Competing
Camps in a Social Network: A Broad Framework
Swapnil Dhamal, Walid Ben-Ameur, Tijani Chahed, and Eitan Altman
1
8
1
0
2
g
u
A
0
1
]
I
S
.
s
c
[
5
v
7
9
2
9
0
.
6
0
7
1
:
v
i
X
r
a
Abstract -- We study the problem of optimally investing in nodes
of a social network in a competitive setting, wherein two camps
aim to drive the average opinion of the population in their own
favor. Using a well-established model of opinion dynamics, we
formulate the problem as a zero-sum game with its players
being the two camps. We derive optimal investment strategies
for both camps, and show that a random investment strategy
is optimal when the underlying network follows a popular class
of weight distributions. We study a broad framework, where we
consider various well-motivated settings of the problem, namely,
when the influence of a camp on a node is a concave function of
its investment on that node, when a camp aims at maximizing
competitor's investment or deviation from its desired investment,
and when one of the camps has uncertain information about the
values of the model parameters. We also study a Stackelberg
variant of this game under common coupled constraints on the
combined investments by the camps and derive their equilibrium
strategies, and hence quantify the first-mover advantage. For a
quantitative and illustrative study, we conduct simulations on
real-world datasets and provide results and insights.
Index Terms -- Social networks, opinion dynamics, election,
zero-sum games, common coupled constraints, decision under
uncertainty, Stackelberg game.
I. INTRODUCTION
Opinion dynamics is a natural phenomenon in a system of
cognitive agents, and is a well-studied topic across several
disciplines. It is highly relevant to applications such as elec-
tions, viral marketing, propagation of ideas and behaviors, etc.
In this paper, we consider two competing camps who aim to
maximize the adoption of their respective opinions in a social
network. In particular, we consider a strict competition setting
where the opinion value of one camp is denoted by +1 and
that of the other camp by −1; we refer to these camps as good
and bad camps respectively. Opinion adoption by a population
can be quantified in a variety of ways; here we consider a well-
accepted way, namely, the average or equivalently, the sum of
opinion values of the nodes in the network [1], [2]. Hence the
good camp's objective would be to maximize this sum, while
the bad camp would aim to minimize it.
The average or sum of opinion values of the nodes or
individuals is of relevance in several applications. In a fund
collection scenario, for instance, the magnitude of the opinion
value of an individual can be viewed as the amount of funds
and its sign as the camp towards which he or she is willing to
S. Dhamal is with INRIA Sophia Antipolis, France, working at Laboratoire
Informatique d'Avignon; he was with Samovar, T´el´ecom SudParis, CNRS,
Universit´e Paris-Saclay, when most of this work was done.
W. Ben-Ameur and T. Chahed are with Samovar, T´el´ecom SudParis, CNRS,
E. Altman is with INRIA Sophia Antipolis and Laboratoire Informatique
Universit´e Paris-Saclay.
d'Avignon.
contribute. Another example is that of a group of sensors or
reporting agents, who are assigned the job of reporting their
individual measurements of a particular parameter or event;
the resulting measurement would be obtained by averaging
the individual values. In this case, two competitors may aim
to manipulate the resulting average (one perhaps for a good
cause of avoiding panic, and another for elevating it).
While the opinion values can be unbounded in the above
examples, there are scenarios which can be modeled aptly
by bounded opinion values. In elections, for instance, an
individual can vote at most once. Here one could view bounded
opinion value of an individual as a proxy for the probability
with which the individual would vote for a camp. For instance,
an opinion value of v ∈ [−1, +1] could imply that
the
probability of voting for the good camp is (1 + v)/2 and
that of voting for the bad camp is (1 − v)/2. Hence the
good (or respectively bad) camp would want to maximize (or
respectively minimize) the sum of opinion values, since this
sum would indicate the expected number of votes in favor of
the good camp. Product adoption is another example where
bounded opinion values are well justified; the opinion value
of an individual would indicate its probability of purchasing
the product from the company that corresponds to good camp.
Social networks play a prime role in determining the opin-
ions, preferences, behaviors, etc. of the constituent individuals
[3]. There have been efforts to develop models which could
determine how the individuals update their opinions based on
the opinions of their connections, and hence study the dynam-
ics of opinions in the network [4]. With such an underlying
model of opinion dynamics, a camp would aim to maximize
the adoption of its opinion in a social network, in presence
of a competitor. A camp could act on achieving this objective
by strategically investing on selected individuals in a social
network who could adopt its opinion; these individuals would
in turn influence the opinions of their connections, who would
then influence the opinions of their respective connections, and
so on. Based on the underlying application, this investment
could be in the form of money, free products or discounts,
attention, convincing discussions, etc. Given that both camps
have certain budget constraints, the strategy of the good camp
hence comprises of how much to invest on each node in the
network, so as to maximize the sum of opinion values of the
nodes, while that of the bad camp comprises of how much to
invest on each node, so as to minimize this sum.
This setup results in a game, and since we consider a
strict competition setting with constraints such as budget (and
other constraints as we shall encounter), the setup fits into the
framework of constrained zero-sum games [5].
A. Motivation
There have been studies to identify influential nodes and
the amounts to be invested on them, specific to analytically
tractable models of opinion dynamics (such as DeGroot) [6],
[7], [2]. Such studies are important to complement the empiri-
cal and experimental studies, since they provide more concrete
results and rigorous reasonings behind them. However, most of
the studies are based in a very preliminary setting and a limited
framework. This paper aims to consider a broader framework
by motivating and analyzing a variety of settings, which could
open interesting future directions for a broader analytical study
of opinion dynamics.
Throughout the paper, we study settings wherein the invest-
ment per node by a camp could be unbounded or bounded.
Bounded investments could be viewed as discounts which
cannot exceed 100%, attention capacity or time constraint of a
voter to receive convincing arguments, company policy to limit
the number of free samples that can be given to a customer,
government policy of limiting the monetary investment by a
camp on a voter, etc. As we will see, bounded investments
in our model would result in bounded opinion values, which
as explained earlier, could be transformed into probability
of voting for a party or adopting a product, and hence the
expected number of votes or sales in the favor of each camp.
We first study in Section III, the cases of unbounded and
bounded investment in a fundamental setting where a camp's
influence on a node is a linear function of its investment.
While the linear influence function is consistent with the
well-established Friedkin-Johnsen model, the influence of a
camp on a node might not increase linearly with the corre-
sponding investment. In fact, several social and economic set-
tings follow law of diminishing marginal returns, which says
that for higher investments, the marginal returns (influence in
this context) are lower for a marginal increase in investment.
An example of this law is when we watch a particular product
advertisement on television; as we watch the advertisement
more number of times, its marginal influence on us tends to
get lower. A concave influence function naturally captures this
law. We study such an influence function in the settings of both
unbounded and bounded investment per node, and relate it to
the skewness of investment in optimal strategies as well as
user perception of fairness. We study this in Section IV.
There are scenarios where a camp may want to maximize
the total investment of the competing camp, so as to upset the
latter's broad budget allocation, which might lead to reduction
in its available budget for future investments or for other
channels such as mass media advertisement. The latter may
also be forced to implement unappealing actions such as
increasing the product cost or seek further monetary sources
in order to compensate for its investments. Alternatively, the
camps may have been instructed a desired investment strategy
by a mediator such as government or a central authority,
and deviating from this strategy would incur a penalty. For
instance,
the mediator itself would have its own broader
optimization problem (which could be for the benefit for it or
the society), whose optimal solution would require the camps
to devise their investment strategies in a particular desired
2
way. The mediator would then instruct the camps to follow
the corresponding desired investment strategies, and in case
of violation, the mediator could impose a penalty so as to
compensate for the suboptimal outcome of its own optimiza-
tion problem. For similar reasons as mentioned before, a camp
may want to maximize the penalty incurred by the competing
camp. We study these settings which capture the adversarial
behavior of a camp towards another camp, in Section V.
For all of the aforementioned settings, we show in this
paper that it does not matter whether the camps strategize
simultaneously or sequentially. We use Nash equilibrium as
the equilibrium notion to analyze the game in these settings.
However,
there could be settings where a sequential play
would be more natural than a simultaneous one, which would
result in a Stackelberg game. The sequence may be determined
by a mediator or central authority which, for example, may
be responsible for giving permissions for campaigning or
scheduling product advertisements to be presented to a node.
We use subgame perfect Nash equilibrium as the equilibrium
notion for the game in such sequential play settings. Moreover,
since we are concerned with a zero-sum game, we express the
equilibrium in terms of maxmin or minmax. Assuming the
good camp plays first (without loss of analytical generality),
the bad camp would choose a strategy that minimizes the sum
of opinion values as a best response to the good camp's strat-
egy. Knowing this, the good camp would want to maximize
this minimum value. We motivate two such settings.
It would often be the case that the total attention capacity
of a node or the time it could allot for receiving campaigning
from both camps combined, is bounded. This leads us to
study the game under common coupled constraints (CCC)
that the sum of investments by the camps on any node is
bounded. These are called common coupled constraints since
the constraints of one camp are satisfied if and only if the
constraints of the other camp are satisfied, for every strategy
profile. We study this setting in Section VI.
Another sequential setting is one that results in uncertainty
of information, where the good camp (which plays first) may
not have exact information regarding the network parameters.
However, the bad camp (which plays second) would have
perfect
information regarding these parameters, which are
either revealed over time or deduced based on the effect of
the good camp's investment. Forecasting the optimal strategy
of bad camp, we derive a robust strategy for the good camp
which would give it a good payoff even in the worst case. We
study this setting in Section VII.
It can be noted that the common coupled constraints setting
captures the first mover advantage, while the uncertainty
setting captures the first mover disadvantage.
B. Related Work
A principal part of opinion dynamics in a population is how
nodes update their opinions over time. One of the most well-
accepted and well-studied approaches of updating a node's
opinion is based on imitation, where each node adopts the
opinion of some of its neighbors with a certain probability.
One such well-established variant is DeGroot model [8] where
Acemoglu and Ozdaglar [4] review several other models of
opinion dynamics. Lorenz [11] surveys modeling frameworks
concerning continuous opinion dynamics under bounded con-
fidence, wherein nodes pay more attention to beliefs that do
not differ too much from their own. Xia, Wang, and Xuan
[12] give a multidisciplinary review of the field of opinion
dynamics as a combination of the social processes which are
conventionally studied in social sciences, and the analytical
and computational tools developed in mathematics, physics
and complex system studies. Das, Gollapudi, and Munagala
[13] show that the widely studied theoretical models of opinion
dynamics do not explain their experimental observations, and
hence propose a new model as a combination of the DeGroot
model and the Voter model [14], [15]. Parsegov et al. [16]
develop a multidimensional extension of Friedkin-Johnsen
model, describing the evolution of the nodes' opinions on
several interdependent topics, and analyze its convergence.
Ghaderi and Srikant [17] consider a setting where a node
iteratively updates its opinion as a myopic best response to
the opinions of its own and its neighbors, and hence study
how the equilibrium and convergence to it depend on the
network structure, initial opinions of the nodes, the location
of stubborn agents (forceful nodes with unchanging opinions)
and the extent of their stubbornness. Ben-Ameur, Bianchi, and
Jakubowicz [18] analyze the convergence of some widespread
gossip algorithms in the presence of stubborn agents and
show that the network is driven to a state which exclusively
depends on the stubborn agents. Jia et al. [19] propose an
empirical model combining the DeGroot and Friedkin models,
and hence study the evolution of self-appraisal, social power,
and interpersonal influences for a group of nodes who discuss
and form opinions. Halu et al. [20] consider the case of
two interacting social networks, and hence study the case of
political elections using simulations.
each node updates its opinion using a weighted convex com-
bination of its neighbors' opinions. The model developed by
Friedkin and Johnsen [9], [10] considers that, in addition to
its neighbors' opinions, a node also gives certain weightage
to its initial biased opinion.
Yildiz, Ozdaglar, and Acemoglu [21] study the problem of
optimal placement of stubborn agents in the discrete binary
opinions setting with the objective of maximizing influence,
given the location of competing stubborn agents. Gionis, Terzi,
and Tsaparas [1] study from an algorithmic and experimental
perspective, the problem of identifying a set of target nodes
whose positive opinions about an information item would
maximize the overall positive opinion for the item in the
network. Ballester, Calv´o-Armengol, and Zenou [22] study
optimal targeting by analyzing a noncooperative network game
with local payoff complementarities. Sobehy et al. [23] pro-
pose strategies to win an election using a Mixed Integer Linear
Programming approach.
The basic model we study is similar to that considered by
Grabisch et al. [2], that is, a zero-sum game with two camps
holding distinct binary opinion values, aiming to select a set
of nodes to invest on, so as to influence the average opinion
that eventually emerges in the network. Their study, however,
considers non-negative matrices and focuses on the existence
3
and the characterization of equilibria in a preliminary setting,
where the influence and cost functions are linear, camps have
network information with certainty, and there is no bound on
combined investment by the camps per node. Dubey, Garg,
and De Meyer [6] study existence and uniqueness of Nash
equilibrium, while also considering convex cost functions. The
study, however, does not consider the possibility of bounded
investment on a node, and the implications on the extent of
skewness of investment and user perception of fairness owing
to the convexity of cost functions. Bimpikis, Ozdaglar, and
Yildiz [7] provide a sharp characterization of the optimal
targeted advertizing strategies and highlight their dependence
on the underlying social network structure, in a preliminary
setting. Their study emphasizes the effect of absoption cen-
trality, which is encountered in our study as well.
The problem of maximizing information diffusion in social
networks under popular models such as Independent Cas-
cade and Linear Threshold, has been extensively studied [3],
[24], [25]. The competitive setting has resulted in several
game theoretic studies of this problem [26], [27], [28]. There
have been preliminary studies addressing interaction among
different informations, where the spread of one information
influences the spread of the others [29], [30].
There have been studies on games with constraints. A
notable study by Rosen [31] shows existence of equilibrium
in a constrained game, and its uniqueness in a strictly concave
game. Altman and Solan [32] study constrained games, where
the strategy set available to a player depends on the choice
of strategies made by other players. The authors show that,
in constrained zero-sum games, the value of the game need
not exist (that is, maxmin and minmax values need not be the
same) and contrary to general functions, maxmin value could
be larger than minmax.
The topic of decision under uncertainty has been of interest
to the game theory and optimization communities. An estab-
lished way of analyzing decision under uncertainty is using
robust optimization tools. Ben-Tal, El Ghaoui, and Nemirovski
[33] present a thorough review of such tools.
C. Contributions of the Paper
A primary goal of this work is to provide a broad framework
for optimal investment strategies for competing camps in a
social network, and propose and explore several aspects of
the problem. In particular, we study several well-motivated
variants of a constrained zero-sum game where two competing
camps aim to maximize the adoption of their respective
opinions, under the well-established Friedkin-Johnsen model
of opinion dynamics. Following are our specific contributions:
• We show that a random investment strategy is optimal
when the underlying network follows a particular popular
class of weight distributions. (Section III-C)
• We investigate when a camp's influence on a node is
a concave function of its investment on that node, for
the cases of unbounded and bounded investment per
node. We hence provide implications for the skewness
of optimal investment strategies and user perception of
fairness. (Section IV)
• We look at the complementary problem where a camp
acts as an adversary to the competing camp by aiming
to maximize the latter's investment. We also look at the
problem where a camp aims to maximize the deviation
from the desired investment of the competing camp.
(Section V)
• We study the Stackelberg variant under common coupled
constraints, that the combined investment by the good and
bad camps on any given node cannot exceed a certain
limit. We study the maxmin and minmax values and
present some interesting implications. (Section VI)
• We analyze a setting where one of the camps would need
to make decision under uncertainty. (Section VII)
• Using simulations, we illustrate our analytically derived
results on real-world social networks, and present further
insights based on our observations. (Section VIII)
v0
i
w0
ii
wig
wib
wij
xi
yi
kg
kb
vi
II. MODEL
where
Consider a social network with N as its set of nodes and
E as its set of weighted, directed edges. Two competing
camps (good and bad) aim to maximize the adoption of
their respective opinions in the social network. We consider a
strict competition setting where the opinion value of the good
camp is denoted by +1 and that of the bad camp by −1.
In this section, we present the parameters of the considered
model of opinion dynamics, and the update rule along with
its convergence result. We first provide an introduction to
the well-established Friedkin-Johnsen model, followed by our
proposed extension.
A. Friedkin-Johnsen Model
As per Friedkin-Johnsen model [9], [10], prior to the process
of opinion dynamics, every node holds a bias in opinion which
could have been formed owing to various factors such as the
node's fundamental views, its experiences, past information
from news and other sources, opinion dynamics in the past,
etc. We denote this opinion bias of a node i by v0
i and the
weightage that the node attributes to it by w0
ii.
connections is (cid:80)
The network effect is captured by how much a node is
influenced by each of its friends or connections, that is, how
much weightage is attributed by a node to the opinion of each
of its connections. Let vj be the opinion held by node j and
wij be the weightage attributed by node i to the opinion of
node j. The influence on node i owing to node j is given
by wijvj, thus the net influence on i owing to all of its
j∈N wijvj (where wij (cid:54)= 0 only if j is a
connection of i). It is to be noted that we do not make any
assumptions regarding the sign of the edge weights, that is,
they could be negative as well (as justified in [34], [35]). A
negative edge weight wij can be interpreted as some form of
distrust that node i holds on node j, that is, i would be driven
towards adopting an opinion that is opposite to that held or
suggested by j.
Since in Friedkin-Johnsen model, each node updates its
opinion using a weighted convex combination of its neighbors'
opinions, the update rule is given by
∀i ∈ N : vi ← w0
iiv0
i +
(cid:88)
j∈N
4
TABLE I
NOTATION TABLE
the initial biased opinion of node i
weightage given to the initial opinion by node i
weightage given by node i to the good camp's opinion
weightage given by node i to the bad camp's opinion
weightage given by node i to the opinion of node j
investment made by good camp to directly influence node i
investment made by bad camp to directly influence node i
budget of the good camp
budget of the bad camp
the resulting opinion of node i
∀i ∈ N : w0
ii +
(cid:88)
j∈N
wij ≤ 1
B. Our Extended Model
We extend Friedkin-Johnsen model
to incorporate the
camps' investments and the weightage attributed by nodes
to the camps' opinions. The good and bad camps attempt to
directly influence the nodes so that their opinions are driven
towards being positive and negative, respectively. This direct
influence depends on the investment or effort made by the
camps, and also on how much a node weighs the camps'
opinions. A given amount of investment may have different
influence on different nodes based on how much these nodes
weigh the camps' recommendations. We denote the investment
made by the good and bad camps on node i by xi and yi
respectively, and the weightage that node i attributes to them
by wig and wib respectively. Since the influence of good camp
on node i would be an increasing function of both xi and wig,
we assume the influence to be wigxi so as to maintain the
multilinearity of Friedkin-Johnsen model. Similarly, wibyi is
the influence of bad camp on node i. Also note that since the
good and bad camps hold the opinions +1 and −1 respectively,
the net influence owing to the direct recommendations from
these camps is (wigxi − wibyi).
The camps have budget constraints stating that the good
camp can invest a total amount of kg across all the nodes,
while the bad camp can invest a total amount of kb.
Table I presents the required notation. Consistent with the
standard opinion dynamics models, we have the condition
on the influence weights on any node i that they sum to
at maximum 1 (since a node updates its opinions using a
weighted 'convex' combination of the influencing factors).
∀i ∈ N :
w0
ii +
wij + wig + wib ≤ 1
A standard assumption for guaranteeing convergence of the
dynamics is
wij < 1
(cid:88)
(cid:88)
j∈N
j∈N
wijvj
This assumption is actually well suited for our model where
we would generally have non-zero weights attributed to the
influence outside of the network, namely, the influence due to
bias (w0
ii) and campaigning (wig, wib).
Nodes update their opinions in discrete time steps starting
with time step 0. With the aforementioned factors into consid-
eration, each node i updates its opinion at each step, using the
following update rule (an extension of the Friedkin-Johnsen
update rule):
∀i ∈ N : vi ← w0
(cid:104)τ(cid:105)
i
iiv0
i +
wijvj + wigxi − wibyi
(cid:104)0(cid:105)
i .
i = v0
be the opinion of node i at time step τ, and v
Let v
The update rule can hence be written as
(cid:104)τ−1(cid:105)
wijv
j
∀i ∈ N : v
(cid:104)τ(cid:105)
i = w0
(cid:88)
iiv0
i +
+ wigxi − wibyi
(1)
(cid:88)
j∈N
j∈N
i (weighed
For any node i, the static components are xi, yi, v0
by wig, wib, w0
ii), while the dynamic components are vj's
(weighed by wij's). The static components remain unchanged
while the dynamic ones get updated in every time step.
i and w0
Let w be the matrix consisting of the elements wij for each
pair (i, j) (note that w contains only the network weights
and not wig, wib, w0
ii). Let v be the vector consisting of the
opinions vi, v0 and w0 be the vectors consisting of the
elements v0
ii respectively, x and y be the vectors
consisting of the investments xi and yi respectively, wg and
wb be the vectors consisting of the weights wig and wib
respectively. Let the operation ◦ denote Hadamard product
(elementwise product) of vectors, that is, (a ◦ b)i = aibi.
Let Hadamard power be expressed as (a◦p)i = ap
i .
Assuming v(cid:104)τ(cid:105) to be the vector consisting of the opinions
(cid:104)τ(cid:105)
, the update rule (1) can be written in matrix form as
i
v
(cid:104)τ(cid:105)
v
= wv
(cid:104)τ−1(cid:105)
+ w0 ◦ v0 + wg ◦ x − wb ◦ y
(2)
Proposition 1. The dynamics defined by the update rule in
(2) converges to v = (I− w)−1(w0 ◦ v0 + wg ◦ x− wb ◦ y).
Proof. The recursion in (2) can be simplified as
(cid:16)
(cid:104)τ(cid:105)
v
= wv
(cid:104)τ−1(cid:105)
= w
wv
+ w0 ◦ v0 + wg ◦ x − wb ◦ y
(cid:104)τ−2(cid:105)
+ w0 ◦ v0 + wg ◦ x − wb ◦ y
(cid:17)
+ w0 ◦ v0 + wg ◦ x − wb ◦ y
= w2v
= w3v
(cid:104)τ−2(cid:105)
(cid:104)τ−3(cid:105)
+ (I + w)(w0 ◦ v0 + wg ◦ x − wb ◦ y)
+ (I + w + w2)(w0 ◦ v0 + wg ◦ x − wb ◦ y)
= wτ v
(cid:104)0(cid:105)
+
wη
(w0 ◦ v0 + wg ◦ x − wb ◦ y)
η=0
substochastic matrix, since ∀i ∈ N : (cid:80)
limτ→∞ wτ v0 = 0. Furthermore, limτ→∞(cid:80)τ−1
Now, the initial opinion: v(cid:104)0(cid:105) = v0. Also, w is a strictly
j∈N wij < 1;
its spectral radius is hence less than 1. So when τ → ∞,
we have limτ→∞wτ = 0. Since v0 is a constant, we have
η=0 wη = (I −
w)−1, an established matrix identity [36]. This implicitly
means that (I − w) is invertible. Hence,
(cid:104)τ(cid:105)
= (I − w)
−1(w0 ◦ v0 + wg ◦ x − wb ◦ y)
lim
τ→∞ v
which is a constant vector, that is, the dynamics converges to
this steady state of opinion values.
(cid:32)τ−1(cid:88)
(cid:33)
5
III. THE FUNDAMENTAL PROBLEM
We now present the fundamental problem of competitive
opinion dynamics under the Friedkin-Johnsen model.
A. Introduction of the Fundamental Problem
The problem of maximizing opinion adoption can be mod-
eled as an optimization problem. In particular, considering
perfect competition, this problem can be modeled as a maxmin
problem as we now present. Here our objective is to determine
the strategies of the good and bad camps (the values of xi and
yi such that they satisfy certain constraints), so that the good
camp aims to maximize the sum of opinion values of the nodes
while the bad camp aims to minimize it. Considering linear
constraints for setting the problem in the linear programming
framework, we represent these constraints by Ax ≤ b and
Cy ≤ d, respectively, where A, C are matrices and b, d are
vectors, in general.
Owing to xi and yi being investments, we have the natural
constraints: xi, yi ≥ 0,∀i ∈ N. We can hence write the
maxmin optimization problem in its general form as
max
Ax≤b
x≥0
s.t. ∀i ∈ N : vi = w0
iiv0
i +
min
Cy≤d
y≥0
i∈N
wijvj + wigxi − wibyi
(cid:88)
(cid:88)
j∈N
vi
From Proposition 1, we have
v = (I − w)
−1(w0 ◦ v0 + wg ◦ x − wb ◦ y)
Let
=⇒ 1T v = 1T (I − w)
−1(w0 ◦ v0 + wg ◦ x − wb ◦ y)
the constant 1T (I − w)−1 = (cid:0)((I − w)−1)T 1(cid:1)T
(cid:0)(I − wT )−11(cid:1)T
(cid:88)
(cid:88)
(cid:88)
(cid:88)
riwigxi −(cid:88)
riwigxi −(cid:88)
(cid:88)
= rT . So the above is equivalent to
So our objective function becomes
riwibyi
riwibyi
riw0
riw0
iiv0
vi =
i∈N
i∈N
iiv0
i +
i∈N
i∈N
i +
max
Ax≤b
x≥0
min
Cy≤d
y≥0
i∈N
i∈N
i∈N
=
(3)
This can be achieved by solving two independent optimization
problems, namely,
max
Ax≤b
x≥0
riwigxi
and min
Cy≤d
y≥0
riwibyi
which can be easily solved.
1) The Specific Case: Overall Budget Constraints: For
studying the problem in a broader framework, we consider
the case, specific to our model that we introduced in Section
II. This case that considers overall budget constraints kg and
kb for the good and bad camps respectively, corresponds
i∈N yi ≤ kb. That is, we have
A = C = 1T , b = kg, d = kb. It is clear that the solution
to this specific optimization problem is
i∈N xi ≤ kg and (cid:80)
to (cid:80)
(cid:88)
i = 0 , ∀i /∈ arg max
∗
x
∗
x
i = kg ,
i∈N
if max
i∈N
riwig
riwig > 0
(4)
i∈arg maxi riwig
x∗
i ≥0
(cid:88)
i∈N
(cid:88)
i∈N
and
(cid:88)
i∈arg maxi riwib
y∗
i ≥0
i = 0 , ∀i /∈ arg max
∗
y
∗
i = kb ,
i∈N
if max
i∈N
y
riwib
riwib > 0
(5)
Note that if maxi∈N riwig ≤ 0, then x∗
i = 0,∀i ∈ N.
maxi∈N riwib ≤ 0, then y∗
i = 0,∀i ∈ N and if
Equations (4) and (5) lead to the following result.
Proposition 2. In Setting III-A1, it is optimal for the good
and bad camps to invest their entire budgets in node i with
maximum value of riwig and riwib respectively, subject to the
value being positive.
Insight 1. Parameter ri could be interpreted as the influencing
power of node i on the network, while wig and wib are
respectively the influencing powers of the good and bad camps
on node i. So it is clear why these parameters factor into the
result. Furthermore, the strategies of the camps are mutually
independent, which arises from the sum of steady state values
of nodes as derived in (3). The multilinearity of the model
and unconstrained investment on nodes allow the camps to
exhaust their budgets by concentrating their entire investments
on a node possessing the highest value of riwig or riwib
respectively. Also, the camps' strategies are independent of the
initial opinions, since they aim to optimize the sum of opinion
values without considering their relative values.
1 =(cid:0)I − αAT(cid:1)−1
(cid:16)(cid:0)I − αAT(cid:1)−1− I
(cid:17)
r =(cid:0)I − wT(cid:1)−1
Actually, ri can be viewed as a variant of Katz centrality
[37] in that, Katz centrality of node i measures its relative
influence in a social network (say having adjacency matrix
A) with all edges having the same weight (say α), while ri
measures its influence in a general weighted social network.
Katz centrality of node i is defined as the ith element of vector
1 − 1, for 0 < α < 1ρ
where ρ is the largest eigenvalue of A. In our case where
1, A is replaced by the weighted adjacency
matrix w, for which ρ < 1 (since w is strictly substochastic),
and we have α = 1. The subtraction of vector 1 is common
for all nodes, so its relative effect can be ignored. ri can also
be viewed as a variant of absorption centrality of node i [7],
which captures the expected number of visits to node i in
a random walk starting at a node other than i uniformly at
random, with transition probability matrix w (assuming all
elements of w to be non-negative).
Furthermore, recall that
rT = 1T (I − w)
−1 = 1T(cid:16)
I +
wη(cid:17)
∞(cid:88)
η=1
So if we have wij ≥ 0 for all pairs of nodes (i, j), we will
have that all elements of vector r are at least 1. That is, wij ≥
0,∀(i, j) =⇒ ri ≥ 1,∀i ∈ N.
2) The Case of Bounded Investment Per Node: This setting,
includes an additional bound on the
as motivated earlier,
investment per node by a camp. We assume this bound to be
1 unit without loss of generality, that is, xi, yi ≤ 1,∀i ∈ N.
With respect to the generic constraints Ax ≤ b and Cy ≤ d,
(cid:18) kb
this case corresponds to A = C =
, d =
(cid:18) 1T
(cid:18) kg
, b =
(cid:19)
(cid:19)
(cid:19)
1
I
.
1
6
From Equation (3), an optimal x can be obtained as follows.
Let Iriwig>0 = 1 if riwig > 0, and 0 otherwise. Let
ω1, ω2, . . . , ωn be the ordering of nodes in decreasing values
of riwig with any tie-breaking rule. So (3) is maximized with
respect to x when
xi = 1 · Iriwig >0, for i = ω1, . . . , ω(cid:98)kg(cid:99)
xi = (kg − (cid:98)kg(cid:99)) · Iriwig >0, for i = ω(cid:98)kg(cid:99)+1
xi = 0, for i = ω(cid:98)kg(cid:99)+2, . . . , ωn
An optimal y is analogous, hence the following result.
Proposition 3. In Setting III-A2, it is optimal for the good
camp to invest in nodes one at a time, subject to a maximum
investment of 1 unit per node, in decreasing order of values
of riwig until either the budget kg is exhausted or we reach a
node with a non-positive value of riwig. The optimal strategy
of the bad camp is analogous.
Also, from Proposition 1, if a camp's investment per node is
bounded by 1 unit, the opinion value of every node would be
bounded between −1 and +1. As stated earlier, such bounded
opinion value is relevant to elections and product adoption
scenarios, where the bounded opinion value of a node could
be translated into the probability of the node voting for a camp
or adopting a particular product.
B. Maxmin versus Minmax Values
With no bounds on investment per node, it is clear that the
maxmin and minmax values are the same, since the strategies
of the camps are mutually independent, that is,
max
x≥0
min
y≥0
vi = min
y≥0
max
x≥0
vi
(6)
The equality would hold even with mutually independent
bounds on the camps' investment on a node, that is,
max
0≤x≤1
min
0≤y≤1
vi = min
0≤y≤1
max
0≤x≤1
vi
(7)
seen using Equation (3); the value of(cid:80)
would stay the same while the value of(cid:80)
It is to be noted that we cannot compare the values in (6) and
(7), in general. For instance, if all i's have equal values of
riwib and only one i has good value of riwig, then for kg > 1,
the value in (6) would be greater than that in (7). This can be
i − wibyi)
i∈N riwigxi would
be higher in (6) than in (7). On the other hand, if all i's have
equal values of riwig and only one i has good value of riwib,
then for kb > 1, the value in (7) would be greater than that in
(6).
i∈N ri(w0
iiv0
C. Result for a Popular Class of Weight Distributions
We now present a result concerning a class of distribution
of edge weights in a network, which includes the popular
weighted cascade (WC) model.
Proposition 4. Let Ni = {j : wij (cid:54)= 0}, di = Ni, and
j ∈ Ni ⇐⇒ i ∈ Nj. If ∀i ∈ N , wig = wib = w0
ii = 1
=
wij,∀j ∈ Ni, where α > 0, then riwig = riwib = 1
α ,∀i ∈ N.
α+di
(cid:88)
i∈N
(cid:88)
i∈N
(cid:88)
i∈N
(cid:88)
i∈N
Proof. We know that
(cid:0)I − wT(cid:1)r = 1
⇐⇒ r = 1 + wT r
⇐⇒ ∀i ∈ N : ri = 1 +
(cid:88)
j∈Ni
wjirj = 1 +
(cid:18) 1
α + dj
(cid:19)
rj
(cid:88)
j∈Ni
Let us assume ri = γ(α + di), where γ is some constant. If
this satisfies the above equation, the uniqueness of ri ensures
that it is the only solution. Hence we have
∀i ∈ N : γ(α + di) = 1 +
⇐⇒ γ =
1
α
(cid:88)
j∈Ni
γ = 1 + γdi
∴ ∀i ∈ N : riwig = riwib =
α + di
α
·
1
α + di
=
1
α
ii = 1
The above result implies that models which assign weights
= wij,∀j ∈ Ni,
for all i such that wig = wib = w0
are suitable for the use of a random strategy, since the decision
parameter for either camp (riwig, riwib) holds the same value
for all nodes. That is, in these models, a random strategy that
exhausts the entire budget is optimal. This class of models
includes the popular weighted cascade model, which would
assign the weights with α = 3.
α+di
IV. EFFECT OF CONCAVE INFLUENCE FUNCTION
The linear influence function (1) without any bound on
investment per node, leads to an optimal strategy that con-
centrates the investment on a single node (Proposition 2). As
motivated in Section I-A, several social and economic settings
follow law of diminishing marginal returns, which says that
for higher investments, the marginal returns (influence in our
context) are lower for a marginal increase in investment. A
concave influence function would account for such diminish-
ing marginal influence of a camp with increasing investment
on a node which, as we shall see, would advise against
concentrated investment on a single node. For the purpose of
our analysis so as to arrive at precise closed-form expressions
and specific insights, we consider a particular form of concave
functions: x1/t
i when the investment is xi. It is to be noted,
however, that it can be extended to other concave functions
since we use a common framework of convex optimization,
however the analysis could turn out to be more complicated
or intractable.
A. The Case of Unbounded Investment per Node
min(cid:80)
i yi≤kb
yi≥0
i − wiby1/t
wijvj + wigx1/t
s.t. ∀i ∈ N : vi = w0
max(cid:80)
i xi≤kg
xi≥0
(cid:88)
iiv0
i∈N
i +
vi
i
(cid:88)
j∈N
t
Proposition 5. In Setting IV-A, for t > 1, it is optimal for
the good and bad camps to invest in node i proportional to
t−1 , subject to positivity of riwig and
(riwig)
riwib respectively.
A proof of Proposition 5 is provided in Appendix A.
t−1 and (riwib)
t
7
Remark 1 (Skewness of investment). When we compare
the results for lower and higher values of t, the investment
made by the good camp has an exaggerated correlation with
the value of riwig for lower values of t. In particular, the
investment made is very skewed towards nodes with high
values of riwig when t is very low, while it is proportional
to riwig when t is very high. Note that t = 1 corresponds
to the linear case in Setting III-A1 where the investment is
extremely skewed with each camp investing its entire budget
on only one node.
Remark 2 (User perception of fairness). The skewness can
be linked to user perception of fairness [38]. Suppose a node
p is such that rpwpg = maxi riwig, and it is the unique
node with this maximum value. Suppose a node q is such that
rqwqg = rpwpg − , where is positive and infinitesimal.
From the perspective of node q, the strategy would be fair
if the investment in q is not much less than that in p, since
they are almost equally valuable. However, t = 1 leads to a
highly skewed investment where p receives kg and q receives
0, which can be perceived as unfair by q. As t increases, the
investment becomes less skewed; in particular, t → ∞ leads
to investment on a node i to be proportional to riwig, which
could be perceived as fair by the nodes.
B. The Case of Bounded Investment Per Node
With the additional constraints xi ≤ 1 and yi ≤ 1,∀i ∈ N,
the optimal investment strategies are given by Proposition 6.
We provide its proof in Appendix B.
Proposition 6. In Setting IV-B, if the number of nodes with
riwig > 0 is less than kg, it is optimal for good camp to invest
1 unit on each node i with riwig > 0 and 0 on all other nodes.
If the number of nodes with riwig > 0 is at least kg, let γ > 0
be the solution of(cid:88)
(cid:18) riwig
(cid:19) t
t−1
(cid:88)
i:riwig∈(0,tγ]
tγ
+
1 = kg
i:riwig >tγ
It can be shown that γ exists and is unique; it is then optimal
for the good camp to follow the investment strategy:
x
x
i = 0, if riwig ≤ 0
∗
∗
i = 1, if riwig > tγ
kg − (cid:88)
∗
i =
x
1
i:riwig >tγ
(cid:80)
,
t
t−1
(riwig)
t
t−1
i:riwig∈(0,tγ](riwig)
if riwig ∈ (0, tγ]
(cid:16) riwig
(cid:17) t
The optimal strategy of the bad camp is analogous.
tγ
Note that for riwig ∈ (0, tγ], we can alternatively write
x∗
t−1 , which would be between 0 and 1. So the
i =
nodes with positive values of riwig should be classified into
two sets, one containing nodes with riwig ∈ (0, tγ] (for which
i ∈ (0, 1]) and the other containing nodes with riwig > tγ
x∗
(x∗
i forcefully limited to 1). So we can effectively start with
all nodes in the former set (meaning tγ ≥ maxi∈N riwig) and
then transfer nodes to the latter set as per descending values
of riwig (as we reduce tγ), until we have two sets, one with
(cid:33)
(cid:16) riwig
(cid:17) t
(cid:32)
(cid:80)
t
t
tγ
=
t−1
t−1
t−1
(riwig)
≤ 1 and the
i:riwig∈(0,tγ](riwig)
i forcefully limited to 1.
x∗
i =
other with x∗
Insight 2. The solution suggests that the optimal strategy
can be obtained using a trial-and-error iterative process. A
camp could use the optimal strategy for the unbounded case
suggested in Proposition 5. If we get x∗
i > 1 for any node, we
assign x∗
i = 1 to node i with the highest value of riwig, and
use Proposition 5 again by excluding node i and decrementing
the available budget by 1. This process would be repeated until
i ≤ 1,∀i ∈ N.
x∗
V. ACTING AS COMPETITOR'S ADVERSARY
In this setting, a camp explicitly acts to maximize the
competitor's investment or deviation from its desired invest-
ment, that is required to drive the sign of the average opinion
value of the population in the latter's favor. Without loss of
analytical generality, we consider that the good camp acts as
the adversary.
A. The Case of Unbounded Investment per Node
max(cid:80)
s.t. (cid:88)
i xi≤kg
xi≥0
min
yi≥0
i∈N
vi ≤ 0
i∈N
yi
(cid:88)
i ) −(cid:88)
i∈N
ri(wigxi + w0
iiv0
riwibyi
(cid:88)
i∈N
vi =
(cid:88)
i∈N
8
(cid:88)
i∈N
(cid:88)
(yi − ¯yi)2
(cid:80)
i(xi−¯xi)2≤kg
max
xi≥0
min
yi≥0
s.t. (cid:88)
i∈N
vi ≤ 0
(cid:88)
(cid:18) riwig
(cid:88)
i∈N
i∈N
(cid:19)2
i ) −(cid:88)
(cid:88)
i∈N
+
(¯xi)2 = kg
2γ
i:riwig
≥−2γ ¯xi
i:riwig
<−2γ ¯xi
vi =
ri(wigxi + w0
iiv0
riwibyi
Let γ > 0 be the solution of
2
2
(¯xi)2
(cid:32)
(riwig)2
i:riwig
<−2γ ¯xi
1
= ¯xi + sgn (riwig)
kg − (cid:88)
Then the good camp's optimal strategy is the following:
i = 0, if riwig < −2γ ¯xi
∗
x
(cid:33) 1
(cid:80)
If there does not exist a γ > 0 (because(cid:80)
(cid:33)
(riwig)2
i:riwig
≥−2γ ¯xi
if riwig ≥ −2γ ¯xi
i:riwig<0(¯xi)2 < kg
and no node with riwig > 0), we invest 0 on any node with
riwig < 0 and ¯xi on any node with riwig = 0.
This can be proved on similar lines as Proposition 6. Here,
kg − (cid:88)
i − ¯xi)2 =
∗
(riwig)2
(cid:32)
(¯xi)2
(x
(cid:80)
i:riwig
<−2γ ¯xi
(riwig)2
i:riwig
≥−2γ ¯xi
and the optimal square root is determined by sgn (riwig)
(since a positive riwig would mean a higher optimal invest-
ment as opposed to a negative riwig). Here, it is possible that a
node i is invested on by the good camp even if it has negative
riwig, so as to have the investment close to ¯xi.
B. The Case of Bounded Investment per Node
The optimal strategies of the camps can be easily obtained
for this setting on similar lines as Proposition 3.
Proposition 8. In Setting V-B, it is optimal for the good camp
to invest in nodes one at a time, subject to a maximum invest-
ment of 1 unit per node, in decreasing order of values of riwig
until either the budget kg is exhausted or we reach a node
with a non-positive value of riwig. Say the so derived optimal
investment on node i is x∗
i . The optimal strategy of the bad
camp is to invest in nodes one at a time, subject to a maximum
investment of 1 unit per node, in decreasing order of values
of riwib until(cid:80)
(cid:80)
(cid:80)
Note that
j∈N rj(wjgx∗
j + w0
i∈N vi ≤ 0, when x∗
i∈N riwibyi ≥(cid:80)
the terminating condition (cid:80)
j∈N rj(wjgx∗
j + w0
i∈N riwibyi ≥
j ) is same as the required condition
jjv0
j is the optimal investment by the good
j ).
jjv0
camp on node j.
VI. COMMON COUPLED CONSTRAINTS RELATING
BOUNDS ON COMBINED INVESTMENT PER NODE
As motivated in Section I-A, a sequential play would be
more natural than a simultaneous one in certain scenarios, for
instance, in presence of a mediator or central authority which
Proposition 7. In Setting V-A, it is optimal for the good camp
to invest its budget in node i with the maximum value of riwig,
subject to it being positive. For the bad camp, it is optimal
to invest in node i with maximum value of riwib, subject to
its positivity. (If there does not exist any node i with positive
value of riwib, it is optimal for the bad camp to not invest at
all). The optimal amount of investment made by the bad camp
is
(cid:40)
(cid:32)
(cid:26)
max
1
maxj∈N wjbrj
kg max
max
i∈N
riwig, 0
+
riw0
iiv0
i
, 0
(cid:27)
(cid:88)
i∈N
(cid:33)
(cid:41)
A proof of Proposition 7 is provided in Appendix C.
iiv0
It is to be noted that, contrary to the previous settings, the
amount of investment made by the bad camp in this setting is
dependent on the good camp's parameters (riwig and kg) as
well as the opinion bias parameters (w0
i ). This is because
in the previous settings, the bad camp's objective was to mini-
mize the sum of opinion values without considering the actual
value of this sum, while the current setting necessitates the
bad camp to ensure that this sum is non-positive; this requires
taking into account the effects of good camp's influence and
the initial biases on this sum.
Remark 3 (Maximizing competitor's deviation). Let the de-
sired investments for the good and bad camps be ¯xi and ¯yi,
respectively. Thus the optimization problem is
may be responsible for giving permissions for campaigning
or scheduling product advertisements to be presented to an
individual. We hence consider two sequential play settings,
which result in Stackelberg variants of the considered game.
We use subgame perfect Nash equilibrium as the equilibrium
notion; also since it is a zero-sum game, we refer to the
equilibrium as either maxmin or minmax, based on which
camp plays first. Without loss of analytical generality, we
conduct our analysis while assuming the good camp plays first.
The bad camp would hence choose a strategy that minimizes
the sum of opinion values as a best response to the good
camp's strategy. Foreseeing this, the good camp would want
to maximize this minimum value; this is popularly known
as the backward induction approach. We hence derive the
subgame perfect Nash equilibrium strategy profile and the
corresponding maxmin value. The minmax profile and value
can be obtained symmetrically.
In this section, we consider a setting in which the combined
investment on a node by both camps is bounded by a certain
limit. Without loss of generality, we assume this limit to be
1 unit. This leads to the introduction of common coupled
(cid:88)
constraints (CCC): xi + yi ≤ 1,∀i ∈ N.
max(cid:80)
i xi≤kg
xi≥0
vi
i∈N
min(cid:80)
i yi≤kb
0≤yi≤(1−xi)
(cid:88)
j∈N
s.t. ∀i ∈ N : vi = w0
iiv0
i +
wijvj + wigxi − wibyi
(cid:88)
The inner term is
(cid:88)
yi ≤ kb or −(cid:88)
i∈N
min
vi
s.t. y ≥ 0
yi ≥ −kb ← α
∀i ∈ N : vi −(cid:88)
i∈N
wijvj + wibyi = wigxi + w0
i ← zi
∀i ∈ N : xi + yi ≤ 1 or − yi ≥ −(1 − xi) ← γi
iiv0
j∈N
i∈N
Its dual problem can be written as
max −αkb +
(cid:88)
(cid:0)zi(wigxi + w0
s.t. ∀i ∈ N : zi −(cid:88)
i∈N
i ) − γi(1 − xi)(cid:1)
iiv0
wjizj = 1 ← vi
∀i ∈ N : wibzi − γi − α ≤ 0 ← yi
α ≥ 0
∀i ∈ N : zi ∈ R, γi ≥ 0
j∈N
As earlier, from (9), we have zi =(cid:0)(I − wT )−11(cid:1)
satisfying Constraint (10), it is required that
(8)
(9)
(10)
i = ri. For
∀i ∈ N : riwib − γi − α ≤ 0 or γi ≥ riwib − α
To maximize objective function (8), it is required that γi
should be as low as possible (knowing that 1 − xi ≥ 0). So
the above condition γi ≥ riwib − α along with γi ≥ 0 gives
(11)
∀i ∈ N : γi = max{riwib − α, 0}
9
So we need to maximize the objective function with respect
to γi, xi,∀i ∈ N and α. For this purpose, let us define a set
with respect to α, namely,
Jα = {j : rjwjb − α ≥ 0}
So the objective function to be maximized is
(rjwjb − α)(1 − xj) +
ri(wigxi + w0
iiv0
i ) (12)
−αkb − (cid:88)
(cid:16)(cid:88)
j∈Jα
which is equal to
(1−xj) − kb
α
j∈Jα
(cid:17) −(cid:88)
j∈Jα
(cid:88)
i∈N
(cid:88)
i∈N
(1−xj)rjwjb +
ri(wigxi +w0
iiv0
i )
(13)
to search the values of α ∈
It
is sufficient
Claim 1.
{rjwjb}j:rj wjb>0 ∪ {0} to find an optimal solution.
Proof. Since α ≥ 0, we have α (cid:54)= rjwjb for any rjwjb < 0.
Consider a range [rlwlb, ruwub] for a consecutive pair of
distinct values of rjwjb. If a range has both these values
negative, we do not search for α in that range, since α ≥ 0.
If a range has rlwlb ≤ 0 and ruwub > 0, we search for α in
[0, ruwub]. We will now determine an optimal value of α in
the valid searchable subset of [rlwlb, ruwub], for a given x.
We have Jα = {j : rjwjb ≥ rlwlb}. The value of the objective
function (12) becomes
Case 1: If α = rlwlb (where rlwlb ≥ 0):
(cid:88)
(rjwjb − rlwlb)(1 − xj) +
ri(wigxi + w0
iiv0
i )
i∈N
j∈Jα
−rlwlbkb − (cid:88)
Case 2a: If (cid:80)
Case 2b: Instead, if(cid:80)
j∈Jα
Case 2: If α ∈ (rlwlb, ruwub]:
We have Jα = {j : rjwjb ≥ ruwub}.
j∈Jα
(1 − xj) − kb ≥ 0, we have an optimal
α = ruwub (from (13)).
(1−xj)−kb < 0, we have optimal
α → rlwlb if rlwlb ≥ 0, and the optimal value is the same as
that for α = rlwlb (Case 1). Note here that if rlwlb < 0 and
ruwub ≥ 0, we would have optimal α = 0.
Case 3: If rlwlb = maxi∈N riwib, that is, when we are look-
ing for α ≥ maxi∈N riwib. For α = maxi∈N riwib, we have
(rjwjb −
α)(1− xj) in (12) vanishes. For α > maxi∈N riwib, we have
(rjwjb − α)(1 − xj) in
(12) vanishes in this case too. So the objective function to
be maximized becomes
−αkb +
Jα = {arg maxi∈N riwib} and so the term (cid:80)
Jα = {} and so the term (cid:80)
(cid:88)
ri(wigxi + w0
j∈Jα
j∈Jα
iiv0
i )
i∈N
for which the optimal α = maxi∈N riwib (the lowest value of
α such that α ≥ maxi∈N riwib).
The above cases show that it is sufficient to search the values
of α ∈ {rjwjb}j:rj wjb>0 ∪ {0} to determine an optimal value
of the objective function.
Now that we have established that the only possible values
of optimal α are {rjwjb}j:rj wjb>0 ∪ {0}, we can assume
optimal α = rjwjb for j ∈ {j : rjwjb > 0} ∪ {d}, where
the dummy node d is such that rdwdb = 0.
Recalling the objective function in (13),
ri(wigxi +w0
iiv0
i ) + α
(1−xj) − kb
(1−xj)rjwjb
α = rjwjb, objective function (12) becomes
i∈N
(cid:88)
(cid:88)
(cid:88)
(cid:34)(cid:88)
i∈N
=
=
(cid:16)(cid:88)
(cid:34)(cid:88)
j∈Jα
j∈Jα
j∈Jα
(cid:17) −(cid:88)
(cid:16)
kb −(cid:88)
(cid:35)
j∈Jα
(cid:17)(cid:35)
The term(cid:80)
(cid:88)
max
x,j
i∈N
(cid:104)
⇐⇒ max
j
ri(wigxi +w0
iiv0
i ) −
(1−xj)rjwjb + α
(1−xj)
ri(wigxi +w0
iiv0
i )
j∈Jα
(1−xj)rjwjb +
i∈N
−
Let Iα = {j : rjwjb > α}, Pα = {j : rjwjb = α = rjwjb}.
(cid:88)
So the objective function is
rjwjb
ri(wigxi +w0
iiv0
i ) −
(cid:17)
j∈Jα
(1−xj)
(cid:16)
kb − (cid:88)
(cid:34) (cid:88)
(1−xj)rjwjb − (cid:88)
(cid:17)
(cid:16)
kb − (cid:88)
(cid:16)
kb − (cid:88)
(1−xj)
(1−xj)
j∈Pα
(cid:17)
j∈Iα
j∈Pα
rjwjb
rjwjb
j∈Iα
(cid:35)
i∈N
=
+
(cid:88)
(cid:88)
(cid:34)(cid:88)
i∈N
−
j∈Iα
(1−xj)rjwjb +
j∈Iα
ri(wigxi +w0
iiv0
i )
(1−xj)rjwjb +
(1−xj)rjwjb
(cid:35)
ii, v0
j∈Iα
j∈Iα
Comparing this with generic objective function (3) and since
it should hold for any ri, wig, wib, w0
i , it is necessary that
the coefficients of non-zero values of riwib are the same in
both forms of the objective function. This along with the fact
yj =
j∈Iα
yj = kb −
yj =
j /∈Jα
that ∀j ∈ Iα : rjwjb > 0 (since α ≥ 0), gives (cid:80)
(1 − xj). Also if rjwjb > 0, then (cid:80)
(cid:80)
(1− xj). And for all other terms, we have(cid:80)
(cid:80)
yj = kb −(cid:88)
(cid:88)
0. Since ∀j ∈ N : 0 ≤ yj ≤ 1 − xj, these are equivalent to
∀j ∈ Iα : yj = 1−xj ,∀j /∈ Jα : yj = 0 ,
(1−xj)
(14)
To check for the consistency of budget of the bad camp,
yj ≤ kb. This gives the constraint
j∈Pα
j∈Pα
j∈Iα
j∈Iα
j∈Iα
j∈Iα
xj ≥ Iα − kb
(1 − xj) ≤ kb or equivalently,
it is necessary that (cid:80)
(cid:80)
(cid:88)
necessary that (cid:80)
yj ≤ (cid:80)
kb −(cid:80)
(1 − xj) ≤(cid:80)
(cid:88)
(cid:88)
is necessary that(cid:80)
xj ≤ kg and(cid:80)
j∈Pα
j∈Iα
j∈Pα
j∈Iα
xj +
Also if rjwjb > 0, for the consistency of investment on
the nodes in Pα (that is, ∀j ∈ Pα : xj + yj ≤ 1), it is
(1 − xj) or equivalently,
j∈Pα
(1 − xj) or equivalently,
j∈Pα
xj ≤ Iα + Pα − kb
(16)
To check for the consistency of budget of the good camp, it
xj ≥
j∈Iα
0. These along with Inequalities (15) and (16) give Iα−kb ≤
kg and Iα + Pα − kb ≥ 0, or equivalently,
j∈Pα
j∈Iα
Iα ≤ kg + kb
and
Iα + Pα ≥ kb
(17)
The sets Iα and Pα depend only on j. So let the set of j's
that satisfy the constraints in (17) be denoted by J, that is,
J = {j : Iα ≤ kg + kb and Iα + Pα ≥ kb}
xj +(cid:80)
(15)
i∈N riw0
iiv0
i being a constant, and substituting
(cid:88)
xj(rjwjb − rjwjb)
riwigxi +
− (cid:88)
(cid:88)
−(cid:88)
i∈N
x
i∈N
max
j:rj wjb≥rj wjb
j:rj wjb≥rj wjb
(rjwjb − rjwjb) − rjwjbkb
xi(riwig + max{riwib − rjwjb, 0})
(cid:105)
max{riwib − rjwjb, 0} − rjwjbkb
10
(18)
Hence the good camp's optimal strategy can be obtained
by maximizing (18) with respect to x and j ∈ J, subject to
Constraints (15) and (16), and xi∈ [0, 1],∀i ∈ N.
A Greedy Approach for Determining Optimal Strategy
(cid:80)
For a given j, it can be seen from (18) that the optimal
strategy of the good camp is to determine x which maximizes
i∈N xi(riwig + max{riwib − rjwjb, 0}). Since Constraint
(15) should be satisfied, the minimum total investment by the
good camp on nodes belonging to set Iα should be Iα −
kb. Hence it should invest in nodes belonging to Iα one at a
time (subject to a maximum investment of 1 unit per node) in
decreasing order of values of (riwig +max{riwib−rjwjb, 0}),
until a total investment of Iα − kb is made. Let xi be the
good camp's investment on node i after this step; its remaining
budget is kg − (Iα − kb) and the maximum amount that it
could henceforth invest on a node i is 1− xi (since each node
has an investment capacity of 1 unit).
Now since Constraint (16) should also be satisfied, the max-
imum total investment by the good camp on nodes belonging
to set Iα ∪ Pα should be Iα + Pα − kb. Hence it should
now invest in nodes one at a time (maximum investment of
1 − xi in node i) in decreasing order of values of (riwig +
max{riwib − rjwjb, 0}) until one of the following occurs: (a)
the remaining budget (kg − Iα + kb) is exhausted or (b) a
node with a negative value of (riwig +max{riwib−rjwjb, 0})
is reached or (c) the investment made on nodes belonging to
Iα∪ Pα reaches Iα +Pα− kb. If condition (a) or (b) is met,
the so obtained strategy x∗
) is the optimal x for the
j
given j. However, if condition (c) is met, good camp should
continue investing the remaining available amount on nodes
belonging to N\(Iα∪Pα) one at a time (subject to a maximum
investment of 1 unit per node) in decreasing order of values
of (riwig + max{riwib − rjwjb, 0}). The so obtained strategy
x∗
= (x∗
ji
j
The absolute optimal strategy of the good camp can now
be computed by iterating over all j ∈ J and taking the one
that maximizes (from Expression (18))
) would hence be the optimal x for the given j.
= (x∗
ji
max
j∈ J
ji(riwig + max{riwib − rjwjb, 0})
∗
x
max{riwib − rjwjb, 0} − rjwjbkb
(19)
For the bad camp's optimal strategy, recall that
vi =
riw0
iiv0
i +
riwibyi
(cid:88)
i∈N
riwigxi −(cid:88)
i∈N
(cid:88)
i∈N
i∈N
(cid:88)
−(cid:88)
(cid:88)
i∈N
i∈N
Since yi ∈ [0, 1 − xi],∀i ∈ N, the optimal strategy of the
bad camp is to invest in nodes one at a time (subject to a
maximum investment of 1 − xi per node) in decreasing order
of values of riwib until either its budget kb is exhausted or
we reach a node with a negative value of riwib.
It can also be seen that if kg and kb are integers, it is an
optimal investment strategy of the good and bad camps to
invest one unit or not invest at all in a node.
Insight 3. Assuming a j, the strategy of the good camp is
to choose nodes with good values of (riwig + max{riwib −
rjwjb, 0}). That is, it chooses nodes with not only good values
of riwig, but also good values of riwib. This is expected since
the budget constraint per node allows the good camp (which
plays first) to block those nodes on which the bad camp would
have preferred to invest. Also, based on (14) and the definitions
of Jα, Iα, Pα, node j can be viewed as a boundary for the bad
camp's investment, that is, the bad camp would not invest in
any node i such that riwib < rjwjb.
Time Complexity of the Greedy Approach
For a given j, the above greedy approach would require
the good camp to select a total of O(kg) nodes to invest on.
This could be done by either (a) iteratively choosing a node
with the maximum value of (riwig + max{riwib − rjwjb, 0})
according to the greedy approach or (b) presorting the nodes
as per decreasing values of (riwig + max{riwib − rjwjb, 0})
and then choosing nodes according to the greedy approach.
The time complexity of (a) would be O(nkg) and that of (b)
would be O(n log n + kg) = O(n log n). Hence, following (a)
would be more efficient if kg << log n, while (b) would be
better if kg >> log n (else, asymptotically indifferent between
the two). So its time complexity is O(n · min{kg, log n}).
Now, the absolute optimal strategy is computed by iterating
over all j ∈ J. Based on (14) and the definitions of Jα, Iα, Pα,
node j can be viewed as a boundary for the bad camp's
investment since it would not invest in any node i such that
riwib < rjwjb. So if the nodes are ordered in decreasing
order of riwib values, such a node j would be in a position
no later than (cid:100)kg + kb(cid:101) (this limiting case is met if the good
camp invests kg in nodes with the highest values of riwib, and
then the bad camp invests kb in nodes with the highest values
of riwib which are not exhaustively invested on by the good
camp). So the possible j's are at most the top (cid:100)kg + kb(cid:101) nodes
in the sorted order of riwib, hence determining the possible
j's requires O(min{nkb, n log n}) time and the number of
possible j's is O(kg + kb).
Since the absolute optimal strategy of the good camp is
computed by iterating over all j ∈ J,
time
complexity of the greedy approach is O(min{nkb, n log n} +
(kg + kb) · n · min{kg, log n}), which is same as O(n(kg +
kb) · min{kg, log n}).
Maxmin versus Minmax Values
the overall
Here, we compare the maxmin and minmax values of the
game in the fundamental setting (Section III-B) with that in the
common coupled constraints setting. The introduction of the
total budget constraints per node disturbs the equality between
(cid:88)
(cid:88)
i∈N
i∈N
(cid:88)
i∈N
(cid:88)
(cid:88)
i∈N
i∈N
vi
vi
(cid:88)
i∈N
11
maxmin and minmax, as we show now. Let (x(cid:48), y(cid:48)) be an
optimal maxmin strategy profile in (7). Adding the constraint
0 ≤ y ≤ 1−x restricts the set of feasible strategies for the bad
camp, and this set of feasible strategies and hence its optimal
strategy now depends on x. So we have
max
0≤x≤1
min
0≤y≤1
Similarly,
min
0≤y≤1
max
0≤x≤1
vi ≤ max
0≤x≤1
min
0≤y≤1−x
vi ≥ min
0≤y≤1
max
0≤x≤1−y
These two inequalities, along with (7), result in the following
inequality,
max
0≤x≤1
min
0≤y≤1−x
vi ≥ min
0≤y≤1
max
0≤x≤1−y
vi
(20)
This result, which is contrary to general functions (for which
maxmin is less than or equal to minmax), has also been derived
in [32]. In our problem, this is a direct consequence of the first
mover advantage, which restricts the strategy set of the second
mover. In the maxmin case as analyzed earlier, the good camp
invests in nodes with good values of (riwig + max{riwib −
rjwjb, 0}) (assuming a j). That is, it is likely to invest in nodes
with good values of riwib which are the preferred investees
of the bad camp. Owing to total investment limit per node,
the bad camp may not be able to invest in its preferred nodes
(those with high values of riwib). It can be shown on similar
lines that, in the minmax case where the bad camp plays first,
it would play symmetrically opposite, thus limiting the ability
of good camp to invest in nodes with good values of riwig.
Remark 4 (CCC under simultaneous play). If
instead of
sequential play, the two camps play simultaneously under CCC
setting, it can be seen that the uniqueness of Nash equilibrium
is not guaranteed (an immediate example is that the maxmin
and minmax values could be different). We address this precise
question in [39] for general resource allocation games, albeit
assuming strict preference ordering of the camps over nodes.
Therein, however, we do not derive an equilibrium strategy
profile since there could be infinite number of Nash equilibria.
In order to derive a precise strategy profile which would be of
practical and conceptual interest, we considered a sequen-
tial play in this paper and computed the subgame perfect
Nash equilibrium. For the case where the Nash equilibrium
is unique, the sequence of play would not matter (that is,
the maxmin and minmax values would be the same), and
our derived subgame perfect Nash equilibrium would be the
unique pure strategy Nash equilibrium.
VII. DECISION UNDER UNCERTAINTY
In this section, we look at another sequential play setting
which considers the possibility that the good camp, which
plays first, may not have complete or exact
information
regarding the extrinsic weights, namely, wig, wib, w0
ii. The bad
camp, however, which plays second, has perfect information
regarding the values of these parameters, and hence it is known
that it would act optimally. Forecasting the optimal strategy
of the bad camp, the good camp aims at choosing a robust
u1
...
w0
. That is, u =
, where ui =
(cid:1)T .
strategy which would give it a good payoff even in the worst
case.
(cid:0)w0
un
ii
wig
wib
nn wng wnb
Let u =
11 w1g w1b ··· w0
Let U be a polytope defined by Eu ≤ f (that is, u ∈ U). It
can be viewed as the uncertainty set, which in this case, is a
convex set. The polytope would be based on the application at
hand and could be deduced from observations, predictions, etc.
We use the framework of robust optimization [33] for solving
this problem.
ii ≥ 0,∀i ∈ N.
(cid:88)
For the purpose of this section, let us assume that all the
elements of u are non-negative. This is to ensure bounded
values of the parameters. For instance, if we have a constraint
ii ≤ θi, the
in the linear program such as wig + wib + w0
ii can be unbounded. So for this
individual values wig, wib, w0
current setting (under uncertain parameters), we will assume
wig, wib, w0
min
Eu≤f
riwigxi +
(cid:88)
min(cid:80)
i yi≤kb
yi≥0
i −(cid:88)
Since the good camp aims to optimize in the worst case of
parameter values, while the bad camp has knowledge of these
values with certainty, the optimization problem is
max(cid:80)
i xi≤kg
xi≥0
one feasible node to invest on, then we have(cid:80)
kb maxj∈N rjwjb, else we have (cid:80)
If maxj∈N rjwjb > 0, that is, the bad camp has at least
i∈N riwibyi =
such that rdwdb = 0. So now we have (cid:80)
i∈N riwibyi = 0. For
let d be a dummy node
i∈N riwibyi =
max(cid:80) xi≤kg
kb maxj∈N∪{d} rjwjb. The optimization problem thus is
arriving at a concise solution,
i − kb max
j∈N∪{d} rjwjb
(cid:88)
(cid:88)
riwigxi +
riw0
riw0
iiv0
iiv0
i∈N
i∈N
min
u
i∈N
riwibyi
xi≥0
i∈N
i∈N
s.t. Eu ≤ f
Note that
there are in general n + 1 possibilities for
maxj∈N∪{d} rjwjb. We could write a linear program for
each possibility of i0 = arg maxj∈N∪{d} rjwjb. For a fixed
i0 ∈ N ∪ {d}, the inner term is
riw0
(cid:88)
(cid:88)
riwigxi +
min
i∈N
iiv0
i − kbri0 wi0b
s.t. Eu ≤ f ← αi0
∀i ∈ N : riwib ≤ ri0 wi0b ← βi0i
u
i∈N
For this problem to be feasible, the constraint set should be
non-empty. Let Nf be the subset of N ∪ {d} consisting of
nodes i0 such that the constraint set satisfying Eu ≤ f and
∀i ∈ N : riwib ≤ ri0wi0b is non-empty. Its dual is:
s.t. ∀i ∈ N \ {i0} : −αT
if i0 (cid:54)= d : −αT
i0 Ei0b +
max−αT
i0 f
i(cid:54)=i0
(cid:88)
i0 Eib − βi0iri ≤ 0 ← wib
βi0iri0 ≤ −kbri0 ← wi0b
i0 Eig ≤ rixi ← wig
i0 Eii ≤ riv0
i ← w0
αi0 ≥ 0
∀i ∈ N : βi0i ≥ 0
ii
∀i ∈ N : −αT
∀i ∈ N : −αT
12
We need to find a common x for all possibilities of i0 ∈ Nf .
So we have a constraint on the value of the dual, say ρ,
f,∀i0. We hence obtain a solution to the
namely, ρ ≤ −αT
optimization problem by solving the following LP.
i0
s.t. (cid:88)
max ρ
xi ≤ kg
∀i ∈ N : xi ≥ 0
i∈N
∀i0 ∈ Nf :
∀i ∈ N \ {i0} : −αT
if i0 (cid:54)= d : −αT
i0 Ei0b +
i(cid:54)=i0
∀i ∈ N : −αT
∀i ∈ N : −αT
ρ + αT
i0 f ≤ 0
(cid:88)
i0 Eib − βi0iri ≤ 0
βi0iri0 ≤ −kbri0
i0 Eig − rixi ≤ 0
i0 Eii ≤ riv0
αi0 ≥ 0
∀i ∈ N : βi0i ≥ 0
i
We solve the above LP for a specific example in our
simulation study, so as to derive insights on the effect of
uncertainty on the optimal strategy of the good camp.
VIII. SIMULATIONS AND RESULTS
Throughout this paper, we analytically derived the optimal
investment strategies of competing camps in a social network
for driving the opinion of the population in their favor. We
hence presented either closed-form expressions or algorithms
with polynomial running time. With the aim of determining
implications of the analytically derived results on real-world
networks and obtaining further insights, we conducted a sim-
ulation study on two popular network datasets. In this section,
we present the setup and observed results, and provide insights
behind them.
A. Simulation Setup
We consider an academic collaboration network obtained
from co-authorships in the "High Energy Physics - Theory"
papers published on the e-print arXiv from 1991 to 2003. It
contains 15,233 nodes and 31,376 links among them, and is
popularly denoted as NetHEPT. This network exhibits many
structural features of large-scale social networks and is widely
used for experimental justifications, for example, in [24], [40],
[41]. For the purpose of graphical illustration, we use the
popular Zachary's Karate club dataset consisting of 34 nodes
and 78 links among them [42].
Our analyses throughout the paper are valid for any distribu-
tion of edge weights satisfying the general constraints in Sec-
tion II-B. However, in order to concretize our simulation study,
we need to consider a particular distribution of edge weights.
Proposition 4 showed that some popular models of distributing
edge weight in a graph would result in random strategy being
optimal, and so are not suited for our simulations. Hence in
order to transform an undirected unweighted network dataset
into a weighted directed one for our simulations, we consider
that for any node i (having di number of connections), the
tuple (w0
ii, wig, wib) is randomly generated such that
13
(a) The value of wig
(b) The value of wib
(d) The value of ri
Fig. 1. Details about the Karate club dataset used in our simulations. The size and color saturation of a node i represent the value of the parameter.
(a) τ = 1 (maxxminy
(cid:80)
i v
(cid:104)τ(cid:105)
i =−0.0342)
(b) τ = 2 (maxxminy
(cid:80)
(cid:104)τ(cid:105)
i = 0.2058)
i v
(d) τ = 4 (maxxminy
(cid:80)
i v
(cid:104)τ(cid:105)
i = 0.1566)
Fig. 2. Progression of opinion values for Karate club dataset with kg = kb = 5 under linear influence function with unbounded investment per node. Opinions
of nodes are signified by their shapes, sizes, color saturations (circular blue nodes: positive opinions, square red nodes: negative opinions)
∀i ∈ N : w0
ii + wig + wib)
1−(w0
ii + wig + wib = 0.5, and
wij =
di
, if there is an edge between i and j.
A primary reasoning for considering w0
ii + wig + wib = 0.5
is to have a natural first guess that nodes give equal weightage
to intra-network influencing factors ({wij}j∈N ) and extra-
network influencing factors (w0
ii, wig, wib). We provide results
for the extreme cases in Appendix D, namely, when the value
of w0
ii+wig+wib is 0.1 or 0.9 (with the values of the individual
parameters scaled proportionally). We also highlight some key
effects of this value on the obtained results, throughout this
section.
Figure 1 presents the values of the parameters used for our
experimentation on the Karate club dataset, considering our
weight distribution with w0
ii + wig + wib = 0.5. The size
and color saturation of a node i represent the value of the
parameter mentioned in the corresponding caption (bigger size
and higher saturation implies higher value). Unless otherwise
specified, we consider kg = kb = 5 for this dataset. Also,
unless otherwise specified, we start with an unbiased network,
that is, v0
i = 0,∀i ∈ N.
Progression with time: Throughout this paper, our analyses
were based on the steady state opinion values. However for
the purpose of completion, we now provide a brief note on
the progression of opinion values with time, which occurs
according to our update rule given by (1).
vestment per node, where (cid:80)
Figure 2 illustrates the progression of opinion values with
time under the linear influence function and unbounded in-
is the sum of opinion
(cid:104)τ(cid:105)
i
i∈N v
values of nodes in time step τ. The network starts with
i = 0,∀i ∈ N, and then at τ = 1, the good and bad camps
v0
invest their entire budgets on their respective target nodes
having maximum values of riwig and riwib, respectively.
Hence the opinion values of these nodes change to being
highly positive and negative respectively, while other nodes
still hold an opinion value of 0 (Figure 2(a)). At τ = 2, nodes
which are directly connected to these target nodes, update their
opinions; as seen from Figure 2(b), nodes in the left region
hold positive opinions while the ones in the right region hold
negative opinions. Few nodes like the ones on the top, center,
and extreme right regions, still hold an opinion value of 0. By
τ = 3, all nodes hold a non-zero opinion value and at τ = 4,
the individual opinion values and hence the sum of opinion
values almost reach the convergent value. The sum of opinion
values at τ = 4 is 0.1566 (Figure 2(c)), while the convergent
sum is 0.1564 (Table II). In general, assuming the threshold
of convergence to be 10−4, the convergence is reached in 8-10
time steps for the Karate club dataset, and in 12-15 time steps
for the NetHEPT dataset.
An important insight is that any significant changes in the
opinion value of a node occur in the earlier time steps. For in-
stance, a node which is geodesically closer to the target nodes
receive influence from them in the earlier time steps, and also
the influence is strong since the entries of the substochastic
weight matrix wτ are significantly higher for lower values of
τ. Hence, owing to the substochastic nature of wτ , the change
in a node's opinion value is insignificant at a later time step.
We could also observe that the rate of convergence depends
on the investment strategies, for instance, the convergence
RESULTS FOR KARATE CLUB AND NETHEPT DATASETS
TABLE II
14
Karate club
NetHEPT
maxx miny
100 maxx miny
100
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
kb
100
-
-
100
400
100
400
kg
100
200
100
100
100
100
400
100
400
100
400
100
400
100 maxx miny
400 maxx miny
100 maxx miny
400 maxx miny
100
100
maxx miny
miny maxx
Setting
Aspect
Case
Section
Fundamental
Adversary
Concave (t = 2)
Concave (t = 10)
Unbounded
III-A1
Bounded
III-A2
Unbounded
Bounded
V-A
V-B
Unbounded
IV-A
Bounded
IV-B
Unbounded
IV-A
Bounded
IV-B
CCC
Bounded
VI
kg
5
10
5
5
5
5
20
5
20
5
20
5
20
5
kb
5
5
5
-
-
5
20
5
20
5
20
5
20
5
Results
(cid:80)
(cid:80)
i∈N vi = 0.1564
(cid:80)
i∈N vi = 5.8811
(cid:80)
i∈N vi = −0.0538
(cid:80)
i∈N yi = 5.1404
(cid:80)
i∈N yi = 4.8936
(cid:80)
i∈N vi = 0.4581
(cid:80)
i∈N vi = 0.9163
(cid:80)
i∈N vi = 0.4612
(cid:80)
i∈N vi = 1.2653
(cid:80)
i∈N vi = 1.1180
(cid:80)
i∈N vi = 1.2842
(cid:80)
i∈N vi = 1.1180
(cid:80)
i∈N vi = 1.3104
(cid:80)
i∈N vi = 1.5399
i∈N vi = −0.8900
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
miny maxx
Results
(cid:80)
(cid:80)
i∈N vi = 73.2539
(cid:80)
i∈N vi = 347.0770
(cid:80)
i∈N vi = 2.8513
(cid:80)
i∈N yi = 136.5231
(cid:80)
i∈N yi = 102.7266
(cid:80)
i∈N vi = −0.8446
(cid:80)
i∈N vi = −1.6892
(cid:80)
i∈N vi = −0.8446
(cid:80)
i∈N vi = −1.7117
(cid:80)
i∈N vi = −12.4212
(cid:80)
i∈N vi = −14.2682
(cid:80)
i∈N vi = −12.4212
(cid:80)
i∈N vi = −14.2682
(cid:80)
i∈N vi = 7.4843
i∈N vi = −3.6795
is almost
immediate under the concave influence function
setting where the investment is already distributed over nodes
(see Figures 11-12 in Appendix D); since this investment is
made in the earliest time step, it plays a significant role in
determining the nodes' convergent opinion values. Also, it is
usually observed that the individual opinion values as well as
sum of opinion values are, more often than not, monotone
increasing or decreasing with time (see Figures 11-14 in
Appendix D).
B. Simulation Results
Table II presents the quantitative results of our simulations
on Karate club and NetHEPT datasets. (The results for w0
ii +
wig + wib = 0.1 and 0.9 are provided in Tables III and IV of
Appendix D.)
1) The fundamental setting: For both the datasets,
the
overall opinion value is positive in the fundamental unbounded
setting (III-A1) when both camps had the same budget (first
row of Table II), which implies that the maximum value of
riwig in the network was higher than the maximum value
of riwib (as clear from Equation (3) and Proposition 2). The
results of the good camp doubling its budget can also be seen
(second row of Table II). When both camps had the same
budget, their overall influences tend to nullify each other to
a great extent and so the sum of opinion values is neither
exceedingly positive nor exceedingly negative. However, with
the good camp doubling its budget, this additional budget
could be used to have a large surplus of positive influence
in the network. Actually, owing to close competition, even
a slight imbalance in the camps' budgets would result in
significant skewness in the overall opinion of the network.
The effect of bounded investment (Setting III-A2) can also
be seen (third row of Table II); for these particular datasets,
the maxmin value decreases implying that the value of riwig is
probably concentrated on one node, while that of riwib is well
distributed, thus giving the bad camp an advantage in bounded
(and hence distributed) investment. This can be seen from
Proposition 3. Figure 4(a) illustrates the case with bounded
investment per node (xi, yi ≤ 1,∀i ∈ N) for the Karate club
dataset. Here, the label 'c' means that, that node is invested
on by both the camps with 1 unit, while 'g' or 'b' mean that
the node is invested on by the good or bad camp, respectively.
2) The adversary setting: Considering the adversary setting
of maximizing the competitor's (bad camp's) investment, we
could see how much budget the bad camp required to draw the
overall opinion in its favor. As expected from the results of the
above setting where the overall opinion value turns out to be
positive when the camps have the same budget, the investment
required in the unbounded case of Setting V-A (5.1404 for
Karate club and 136.5231 for NetHEPT) is more than the
budget available in Setting III-A1 (5 for Karate club and 100
for NetHEPT). In the bounded setting (V-B), for Karate club
dataset, we can see that the bad camp could have driven
the overall opinion in its favor by expending 4.8936 instead
of its entire budget of 5. For NetHEPT dataset, as expected
from the results of the fundamental setting where the overall
opinion in the bounded setting (III-A2) was less than that in
the unbounded setting (III-A1), the investment required by the
bad camp in the bounded setting (V-B), which is 102.7266, is
less than that required in the unbounded setting (V-A), which
is 136.5231.
3) Concave influence function: Results under the concave
influence function are presented for both unbounded (IV-A)
and bounded (IV-B) cases for t = 2 and t = 10, in Table II.
Figure 3 shows the effect of the value of t on the distribution
of investment and final opinion values for the Karate club
dataset, in the unbounded case. In Figures 3(a),(b),(d),(e), the
size and color saturation of a node represent the amount of
15
(a) Investment made by good camp
on nodes signified by their sizes
and color saturations for t = 2
(b) Investment made by bad camp
on nodes signified by their sizes
and color saturations for t = 2
(c) Final opinion values of nodes signified
by shapes, sizes, color saturations for t = 2
(Circular blue nodes: positive opinions,
square red nodes: negative opinions)
(d) Investment made by good camp
on nodes signified by their sizes
and color saturations for t = 10
Fig. 3. Simulation results for the Karate club dataset with kg = kb = 5 when the influence function is concave (Setting IV-A)
(e) Investment made by bad camp
on nodes signified by their sizes
and color saturations for t = 10
(f) Final opinion values of nodes signified
by shapes, sizes, color saturations for t = 10
(Circular blue nodes: positive opinions,
square red nodes: negative opinions)
investment on it by the camp mentioned in the corresponding
caption. With careful observation,
it can be seen that for
t = 2, the investments are more skewed, while for t = 10,
the investments by the good and bad camps on a node i are
close to being proportional to the values of riwig and riwib,
respectively (as suggested in Proposition 5 and Remark 1). In
Figures 3(c) and 3(f), the shape and color of a node represent
its opinion sign (blue circle implies positive, red square implies
negative), while its size and color saturation represent
its
opinion magnitude.
In the unbounded case, for some values of budgets, there
exist nodes for which either xi or yi or both exceed 1 unit.
So for the bounded case, the camps are directed to have
different investment strategies than in the unbounded case
(as can be understood from Insight 2). The effects can be
seen in Table II where the values are different in Settings
IV-A and IV-B for the same values of budgets. In some
scenarios such as NetHEPT with kg = kb = 100, however, the
investment strategies inadvertently assured xi, yi ≤ 1,∀i ∈ N
even for the unbounded case; so the investment strategies
remain the same in both settings and hence resulted in the
same overall opinion value (−0.8446 for t = 2 and −12.4212
for t = 10). A careful analysis of the values would indicate
that the constraints xi, yi ≤ 1 are likely to come into picture
for some nodes, for lower values of t and higher values of
budgets. Lower values of t lead to skewed investment and so
a higher likelihood of some nodes having investment more
than 1 unit in the unbounded case. Similarly, higher values of
budgets scale up the investments on the nodes, resulting in a
higher likelihood of some nodes having investment more than
1 unit in the unbounded case. This can also be inferred from
our analytically derived investment strategies.
For w0
ii + wig + wib = 0.1 (see Figure 9 of Appendix D),
ii, wig, wib = 0.1)
the values of extra-network parameters (w0
get scaled down proportionally, while the intra-network ones
(wij's) scale up; that is, the network influence plays a stronger
role than the camps' recommendations. Because of the weak
impact of the camps' recommendations, that is, the nodes
being unwilling to accept opinions that are external to the net-
work, and since all nodes started with a zero initial opinion, the
magnitudes of their opinion values are very low. Furthermore,
because of the strong impact of the intra-network influence,
the camps invest greatly on the most influential nodes (and
not so much on the lesser influential ones), and allow the
network to spread its influence. Owing to the low magnitudes
of opinion values and a strong network effect which aids in
distributing the influence evenly, the opinion values in the
network are less skewed. For w0
ii + wig + wib = 0.9 (see
Figure 10 of Appendix D), the above reasoning gets reversed,
and so the magnitudes of individual opinion values are high,
the camps' investments are more evenly distributed, and the
opinion values are highly skewed.
4) Common coupled constraints: Figures 4 (b-c) illustrate
the effect of common coupled constraints xi +yi ≤ 1,∀i ∈ N,
for the Karate club dataset. The advantage of playing first is
clearly visible from the overall opinion value as well as the
16
(maxx miny
xi, yi ≤ 1,∀i
(cid:80)
(a) Bound on investment per node
i vi = −0.0538)
(cid:80)
(c) Common coupled constraints
i vi = −0.8900)
Fig. 4. Results in presence of additional constraints for the Karate club dataset with kg = kb = 5 ; The nodes are labeled 'g/b/c' to signify if invested on
by good/bad/both camps respectively. The sign of the opinion value of a node is signified by its shape and color (circle and blue for good, square and red for
bad), while the absolute value of its opinion is signified by its size and color saturation.
(b) Common coupled constraints
xi + yi ≤ 1,∀i
xi + yi ≤ 1,∀i
i vi = 1.5399)
(miny maxx
(maxx miny
(cid:80)
For w0
(cid:80)
(cid:80)
distribution of opinion values. Specifically, the overall opinion
value is the highest in Figure 4(b) with a healthy distribution
of positive opinion values, followed by the value in Figure
4(a), followed by that in Figure 4(c) which is dominated by
negative opinions.
ii + wig + wib = 0.9,∀i ∈ N on NetHEPT
dataset, we observed that maxx miny≤1−x
i∈N vi =
i∈N vi = 1.5930 (see Table IV of Ap-
miny maxx≤1−y
pendix D). So the camps did not have the first mover advan-
tage; and it would not matter if the camps played sequentially
or simultaneously (Remark 4). Hence the camp which plays
first, could devise its investment strategy without having to
consider the best response investment strategy of the camp
which plays second. Also, as reasoned earlier, the opinion
values are less skewed for w0
ii + wig + wib = 0.1, while highly
skewed for w0
ii + wig + wib = 0.9.
5) Decision under uncertainty: For studying the effects of
decision under uncertainty as analyzed in Section VII, we
consider that the good camp (first mover) is uncertain about
parameters wig and wib up to a certain limit. In particular,
there is a fractional uncertainty of l regarding the values of
these parameters, while there is a fractional uncertainty of o
regarding the values of the sums of these parameters over the
entire network. l can be hence viewed as local uncertainty and
o as global uncertainty. Let wig and wib be the underlying
ground truth values for a node i (the actual values destined to
be realized).
(cid:88)
(cid:88)
i∈N
i∈N
wig
wib
wib ≤ (1 + o)
(1 − l) wig ≤ wig ≤ (1 + l) wig
(1 − l) wib ≤ wib ≤ (1 + l) wib
wig ≤ (1 + o)
(cid:88)
(cid:88)
i∈N
i∈N
wig ≤(cid:88)
wib ≤(cid:88)
i∈N
i∈N
(1 − o)
(1 − o)
It is clear that the latter two constraints would come into
picture only if o < l (this would usually be the case since,
though there may be significant relative deviation for the
individual parameters, the relative deviation of their sum is
usually low owing to significant balancing of positive and
negative deviations of the individual parameters). For different
values of l and o, Figure 5 presents the maxmin values:
(a) as computed by the good camp (first mover) as its worst
Fig. 5. The worst case and realized values of the maxmin value for different
values of l and o for the Karate club dataset with kg = kb = 5
Fig. 6. Investment made by good camp on nodes signified by their sizes and
color saturations for the Karate club dataset with kg = kb = 5 (under high
uncertainty)
case value using our robust optimization approach and (b) as
realized based on the ground truth. We assume the ground
truth values as depicted in Figure 1. It can be seen that for a
large enough range of values of l and o, though the good
camp computes the worst case maxmin value to be very low,
the corresponding realized value is the same as when the good
camp is certain about parameter values. The uncertainty factor
starts affecting the good camp only for very high l and o.
As clear from our linear program formulation in Sec-
the good camp under
the optimal strategy of
tion VII,
uncertainty is a pessimistic one, that is, ensuring that the
good camp performs well even in the worst case. Hence it
is fundamentally different from the optimal strategy under
certainty, where there is no requirement of being pessimistic
or optimistic since all the information required to solve the
optimization problem is known with certainty. As pointed
above, the uncertainty factor plays a role only for very high
values of l and o. Specifically, for values of l upto 0.6, the
good camp's investment is concentrated on one node, like in
the certainty setting (Proposition 2). For l in excess of 0.6,
the distribution of investment showed a very similar nature
across different values of l and o; Figure 6 illustrates how
the good camp distributes its investment over nodes. Thus,
the investment is distributed under high levels of uncertainty,
while it is concentrated on one node under certainty as well
as under low levels of uncertainty. Furthermore, one could
notice a clear correlation between the values of wig (Figure
1(a)) and the investment amounts on the corresponding nodes
under high uncertainty (Figure 6).
IX. CONCLUSION
Using a variant of Friedkin-Johnsen model for opinion
dynamics, we studied a zero-sum game framework for optimal
investment strategies for two competing camps in a social
network. We derived closed form expressions and efficient al-
gorithms for a number of well-motivated settings. We showed
all the results quantitatively as well as illustratively using
simulations on network datasets.
Our analysis arrived at a decision parameter analogous
to Katz centrality. We also showed that for some of the
popular models of weighing edges, a random strategy is indeed
optimal. We further looked at a setting where the influence of
a camp on a node is a concave function of the amount of
investment, and derived that a more concave function results
in a less skewed investment strategy, which could be perceived
as a fairer strategy by the nodes. We studied an adversarial
problem where a camp aims to maximize its competitor's
investment required to drive the average opinion value of the
population in its favor, and saw that the optimal strategies
fundamentally remain the same, albeit with different forms of
the exact optimal strategies.
We studied Stackelberg variant of the game, under common
coupled constraints stating the bound on combined investment
by the two camps on any node. We analytically derived the
subgame perfect Nash equilibrium strategies of the camps, and
hence quantified the first-mover advantage. We derived a linear
program for obtaining optimal strategy for a camp to whom the
parameters' values are uncertain, while playing against a camp
having exact information. In our simulations, we observed that
a camp is likely to get affected only under considerably high
levels of uncertainty. Here, the optimal strategy is to have a
distributed investment over nodes, as against the concentrated
investment in the exact information setting.
Future Work
This work has several interesting directions for future work;
we mention a few. The two camps setting can be extended to
multiple camps where each camp would attempt to drive the
17
opinion of the population towards its own. With more than
two camps, we would need to have the camps hold opinions
in a multidimensional plane rather than on the real number
line (+1/− 1). We explain one way in which this could be
done. Let each camp (say h) have a vector associated with its
opinion (say (cid:126)ch). Let its investment on node i be denoted by
zhi and the weightage attributed by i to the camp's opinion
be wih. Analogous to Equation (3), the vector-sum of nodes'
opinions could be written as
(cid:126)vi =
riw0
ii(cid:126)v 0
i +
riwihzhi(cid:126)ch
(cid:88)
i∈N
(cid:88)
i∈N
(cid:88)
(cid:88)
i∈N
h
and its own opinion vector (that is, (cid:126)ch ·(cid:80)
A camp's objective would be to drive this vector-sum towards
the direction of its own opinion vector, that is, to maximize
the inner product between the vector-sum of nodes' opinions
i∈N (cid:126)vi). This paper
studied the special case where we have two camps: h = g, b
with (cid:126)cg = +1, (cid:126)cb = −1 and zgi = xi, zbi = yi. Since the
optimization terms for different camps get decoupled under
the settings in Sections 3 and 4, the optimization strategies of
all camps would be analogous to those derived in this paper.
However, our set of equations will not be directly adaptable
for the CCC and uncertainty settings, and is an interesting
direction for future work.
One could study other models of opinion dynamics with
respect to optimal investment strategies of competing camps
and investigate if it is possible to arrive at closed form expres-
sions under them. One such type of models could be where
the investment parameters get coupled in the optimization
problem, and the sum of opinion values is no longer a multilin-
ear function in the investment parameters {xi}i∈N ,{yi}i∈N .
Another possible future direction is to study the setting of
common coupled constraints under more complex constraints,
while maintaining analytical tractability; our analysis in this
paper could act as a conceptual base for solving such a
problem. In general, it would be interesting to consider hybrid
settings which combine the individually studied settings in this
paper, for instance, a concave influence function with the cost
function accounting for deviation from the desired investment.
It would also be interesting to study the tradeoff between the
advantages and disadvantages of playing first, since playing
first would allow a camp to block certain investments of the
competing camp (like in common coupled constraints) but it
may also force it to take decision under uncertainty.
REFERENCES
[1] A. Gionis, E. Terzi, and P. Tsaparas, "Opinion maximization in social
networks," in Proceedings of the 2013 SIAM International Conference
on Data Mining. SIAM, 2013, pp. 387 -- 395.
[2] M. Grabisch, A. Mandel, A. Rusinowska, and E. Tanimura, "Strategic
influence in social networks," Mathematics of Operations Research,
2017.
[3] D. Easley and J. Kleinberg, "Networks, crowds, and markets," Cam-
bridge Univ Press, vol. 6, no. 1, pp. 6 -- 1, 2010.
[4] D. Acemoglu and A. Ozdaglar, "Opinion dynamics and learning in social
networks," Dynamic Games and Applications, vol. 1, no. 1, pp. 3 -- 49,
2011.
[5] A. Charnes, "Constrained games and linear programming," Proceedings
of the National Academy of Sciences, vol. 39, no. 7, pp. 639 -- 641, 1953.
[6] P. Dubey, R. Garg, and B. De Meyer, "Competing for customers in a
social network: The quasi-linear case," in WINE. Springer, 2006, pp.
162 -- 173.
18
[33] A. Ben-Tal, L. El Ghaoui, and A. Nemirovski, Robust optimization.
Princeton University Press, 2009.
[34] C. Altafini, "Consensus problems on networks with antagonistic inter-
actions," IEEE Transactions on Automatic Control, vol. 58, no. 4, pp.
935 -- 946, 2013.
[35] A. V. Proskurnikov, A. S. Matveev, and M. Cao, "Opinion dynamics in
social networks with hostile camps: Consensus vs. polarization," IEEE
Transactions on Automatic Control, vol. 61, no. 6, pp. 1524 -- 1536, 2016.
[36] J. H. Hubbard and B. B. Hubbard, Vector calculus, linear algebra, and
differential forms: a unified approach. Matrix Editions, 2015.
[37] L. Katz, "A new status index derived from sociometric analysis,"
Psychometrika, vol. 18, no. 1, pp. 39 -- 43, 1953.
[38] R. Jain, D.-M. Chiu, and W. R. Hawe, A quantitative measure of fairness
and discrimination for resource allocation in shared computer system,
1984, vol. 38.
[39] S. Dhamal, W. Ben-Ameur, T. Chahed, and E. Altman, "Resource
allocation polytope games: Uniqueness of equilibrium, price of stability,
and price of anarchy," in Proceedings of the 32nd AAAI Conference on
Artificial Intelligence. AAAI, 2018, pp. 997 -- 1006.
[40] W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in
social networks," in Proceedings of the 15th ACM SIGKDD Interna-
tional Conference on Knowledge Discovery and Data Mining. ACM,
2009, pp. 199 -- 208.
[41] W. Chen, C. Wang, and Y. Wang, "Scalable influence maximization for
prevalent viral marketing in large-scale social networks," in Proceedings
of the 16th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining. ACM, 2010, pp. 1029 -- 1038.
[42] W. W. Zachary, "An information flow model for conflict and fission in
small groups," Journal of anthropological research, vol. 33, no. 4, pp.
452 -- 473, 1977.
[7] K. Bimpikis, A. Ozdaglar, and E. Yildiz, "Competitive targeted adver-
tising over networks," Operations Research, vol. 64, no. 3, pp. 705 -- 720,
2016.
[8] M. H. DeGroot, "Reaching a consensus," Journal of
the American
Statistical Association, vol. 69, no. 345, pp. 118 -- 121, 1974.
[9] N. E. Friedkin and E. C. Johnsen, "Social influence and opinions,"
Journal of Mathematical Sociology, vol. 15, no. 3-4, pp. 193 -- 206, 1990.
[10] -- -- , "Social positions in influence networks," Social Networks, vol. 19,
no. 3, pp. 209 -- 222, 1997.
[11] J. Lorenz, "Continuous opinion dynamics under bounded confidence: A
survey," International Journal of Modern Physics C, vol. 18, no. 12, pp.
1819 -- 1838, 2007.
[12] H. Xia, H. Wang, and Z. Xuan, "Opinion dynamics: A multidisciplinary
review and perspective on future research," in Multidisciplinary Studies
in Knowledge and Systems Science.
IGI Global, 2013, pp. 311 -- 332.
[13] A. Das, S. Gollapudi, and K. Munagala, "Modeling opinion dynamics
in social networks," in Proceedings of
the 7th ACM International
Conference on Web Search and Data Mining. ACM, 2014, pp. 403 -- 412.
[14] P. Clifford and A. Sudbury, "A model for spatial conflict," Biometrika,
vol. 60, no. 3, pp. 581 -- 588, 1973.
[15] R. A. Holley and T. M. Liggett, "Ergodic theorems for weakly interact-
ing infinite systems and the voter model," The annals of probability, pp.
643 -- 663, 1975.
[16] S. E. Parsegov, A. V. Proskurnikov, R. Tempo, and N. E. Friedkin,
"Novel multidimensional models of opinion dynamics in social net-
works," IEEE Transactions on Automatic Control, vol. 62, no. 5, pp.
2270 -- 2285, 2017.
[17] J. Ghaderi and R. Srikant, "Opinion dynamics in social networks: A local
interaction game with stubborn agents," in American Control Conference
(ACC), 2013.
IEEE, 2013, pp. 1982 -- 1987.
[18] W. Ben-Ameur, P. Bianchi, and J. Jakubowicz, "Robust distributed con-
sensus using total variation," IEEE Transactions on Automatic Control,
vol. 61, no. 6, pp. 1550 -- 1564, 2016.
[19] P. Jia, A. MirTabatabaei, N. E. Friedkin, and F. Bullo, "Opinion
dynamics and the evolution of social power in influence networks," SIAM
review, vol. 57, no. 3, pp. 367 -- 397, 2015.
[20] A. Halu, K. Zhao, A. Baronchelli, and G. Bianconi, "Connect and win:
The role of social networks in political elections," EPL (Europhysics
Letters), vol. 102, no. 1, p. 16002, 2013.
[21] E. Yildiz, A. Ozdaglar, D. Acemoglu, A. Saberi, and A. Scaglione,
"Binary opinion dynamics with stubborn agents," ACM Transactions
on Economics and Computation, vol. 1, no. 4, p. 19, 2013.
[22] C. Ballester, A. Calv´o-Armengol, and Y. Zenou, "Who's who in net-
works. wanted: The key player," Econometrica, vol. 74, no. 5, pp. 1403 --
1417, 2006.
[23] A. Sobehy, W. Ben-Ameur, H. Afifi, and A. Bradai, "How to win
elections," in International Conference on Collaborative Computing:
Networking, Applications and Worksharing. Springer, 2016.
[24] D. Kempe, J. Kleinberg, and ´E. Tardos, "Maximizing the spread of
influence through a social network," in Proceedings of the ninth ACM
SIGKDD International Conference on Knowledge Discovery and Data
Mining. ACM, 2003, pp. 137 -- 146.
[25] A. Guille, H. Hacid, C. Favre, and D. A. Zighed, "Information diffusion
in online social networks: A survey," ACM SIGMOD Record, vol. 42,
no. 1, pp. 17 -- 28, 2013.
[26] S. Bharathi, D. Kempe, and M. Salek, "Competitive influence maximiza-
tion in social networks," in International Workshop on Web and Internet
Economics. Springer, 2007, pp. 306 -- 311.
[27] S. Goyal, H. Heidari, and M. Kearns, "Competitive contagion in net-
works," Games and Economic Behavior, 2014.
[28] S. R. Etesami and T. Bas¸ar, "Complexity of equilibrium in competitive
diffusion games on social networks," Automatica, vol. 68, pp. 100 -- 110,
2016.
[29] S. A. Myers and J. Leskovec, "Clash of the contagions: Cooperation
and competition in information diffusion," in Proceedings of the Twelfth
International Conference on Data Mining (ICDM).
IEEE, 2012, pp.
539 -- 548.
[30] Y. Su, X. Zhang, L. Liu, S. Song, and B. Fang, "Understanding
information interactions in diffusion: an evolutionary game-theoretic
perspective," Frontiers of Computer Science, vol. 10, no. 3, pp. 518 --
531, 2016.
[31] J. B. Rosen, "Existence and uniqueness of equilibrium points for concave
n-person games," Econometrica: Journal of the Econometric Society, pp.
520 -- 534, 1965.
[32] E. Altman and E. Solan, "Constrained games: The impact of the attitude
to adversary's constraints," IEEE Transactions on Automatic Control,
vol. 54, no. 10, pp. 2435 -- 2440, 2009.
APPENDIX A
PROOF OF PROPOSITION 5
s.t. ∀i ∈ N : vi −(cid:88)
(cid:88)
(cid:88)
j∈N
Proof. We make the following one-to-one transformation:
yi = Y t
i . So the above optimization problem
is equivalent to
i and xi = X t
(cid:88)
max(cid:80)
i ≤kg
i X t
Xi≥0
min(cid:80)
i ≤kb
i Y t
Yi≥0
i∈N
wijvj + wibYi = wigXi + w0
vi
iiv0
i
i ) −(cid:88)
Similar to the derivation of Equation (3) in main text, we get
riwibYi
ri(wigXi + w0
i∈N
i∈N
i∈N
vi =
iiv0
Owing to the mutual
(21)
independence between ¯X and ¯Y
(where ¯X and ¯Y are the vectors with components Xi and
Yi respectively), we can write
max(cid:80)
(cid:88)
(cid:88)
i ≤kg
i X t
Xi≥0
(cid:88)
(cid:88)
min(cid:80)
i ≤kb
i Y t
Yi≥0
i + max(cid:80)
iiv0
i ≤kg
i X t
Xi≥0
riwigXi − max(cid:80)
i ≤kb
i Y t
Yi≥0
riwibYi
riw0
i∈N
i∈N
i∈N
i∈N
vi
=
We now solve for the first optimization term with respect to
¯X , which can be written as the following convex optimization
problem
min −(cid:88)
s.t. (cid:88)
riwigXi
i∈N
X t
i − kg ≤ 0 ← γ
i∈N
∀i ∈ N : −Xi ≤ 0 ← βi
The modified objective function with the Lagrangian mul-
tipliers is
g = −(cid:88)
i∈N
(cid:32)(cid:88)
i∈N
(cid:33)
−(cid:88)
i∈N
riwigXi + γ
X t
i − kg
βiXi
The KKT conditions with the modified objective function g
give the following additional constraints
i − βi = 0
∀i ∈ N :
∂g
∂Xi
= −riwig + tγX t−1
γ ≥ 0
∀i ∈ N : βi ≥ 0
X t
i − kg
(cid:33)
(cid:32)(cid:88)
γ
= 0
∀i ∈ N : βiXi = 0
i
Constraint (22) gives
Xi =
(cid:18) βi + riwig
(cid:19) 1
t−1
tγ
(22)
(23)
(24)
(25)
(26)
(27)
Note that if γ = 0, Constraint (22) gives βi + riwig =
0,∀i ∈ N. Since βi ≥ 0, this can hold only when riwig ≤
0,∀i ∈ N. For nodes with riwig = 0, the value of riwigXi
stays 0 for any Xi and so Xi = 0 is an optimal solution. For
nodes with riwig < 0, we must have βi > 0 and hence Xi = 0
(from (26)).
19
Henceforth we assume γ > 0 and so Equation (27) is valid.
X t
i = kg
i∈N
This, with (25) and (23), gives(cid:88)
(cid:18) βi + riwig
From (27), we get(cid:88)
(cid:19) 1
(cid:18) 1
(cid:16)(cid:80)
This, with (27) gives
X ∗
i = k
⇐⇒
i∈N
t−1
tγ
tγ
1
t
g
=
(cid:16)(cid:80)
(cid:19) t
t−1
= kg
1
t
g
k
i∈N (βi + riwig)
t
t−1
t
(cid:17) 1
(βi + riwig)
1
t−1
j∈N (βj + rjwjg)
t
t−1
(cid:17) 1
t
(28)
Now, the following cases are possible depending on the sign
of riwig.
Case 1:
Case 2: If riwig = 0, we must have X ∗
constraint X ∗
i ≥ 0). This with (26) gives X ∗
If riwig < 0, we must have βi > 0 (from the
i = βi = 0 (from
i = 0.
(26) and (27)).
Furthermore in both Case 1 and Case 2, from (27), we have
βi + riwig = 0. So the i-terms for which riwig ≤ 0 vanish
from the denominator of (28) and it transforms into
X ∗
i = k
1
t
g
(cid:16)(cid:80)
(βi + riwig)
1
t−1
j:rj wjg >0 (βj + rjwjg)
t
t−1
(cid:17) 1
t
, if riwig ≥ 0
and X ∗
i = 0, if riwig < 0
(29)
Case 3: If riwig > 0, we get X ∗
i > 0 (from (24)). This
with (26) gives βi = 0, and hence from (29), we get
(cid:16)(cid:80)
X ∗
i = k
1
t
g
(riwig)
j:rj wjg >0 (rjwjg)
The above cases can be concisely written as
X ∗
i = k
1
t
g
⇐⇒ x
∗
i = kg
(riwig)
1
t−1
j:rj wjg >0 (rjwjg)
(riwig)
t
t−1
t
t−1
j:rj wjg >0(rjwjg)
t
t−1
t
t
t−1
1
t−1
(cid:17) 1
· Iriwig >0
(cid:17) 1
· Iriwig >0
· Iriwib>0
t
(30)
(31)
(cid:16)(cid:80)
(cid:80)
(cid:80)
where Iriwig>0 = 1 if riwig > 0, and 0 otherwise.
Similarly, it can be shown that
∗
y
i = kb
(riwib)
t
t−1
j:rj wjb>0(rjwjb)
t
t−1
From the optimization problem, it can be directly seen that,
i = 0,∀i ∈ N. Similarly, if
if ∀i ∈ N , riwig ≤ 0, then x∗
∀i ∈ N , riwib ≤ 0, then y∗
i = 0,∀i ∈ N.
APPENDIX B
PROOF OF PROPOSITION 6
Proof. This proof goes as an extension to the proof of Propo-
sition 5, with the additional constraint
∀i ∈ N : Xi ≤ 1 ← ξi
Equation (22) changes to
∀i ∈ N : −riwig + tγX t−1
i − βi + ξi = 0
and Equation (27) changes to
(cid:18) βi − ξi + riwig
(cid:19) 1
t−1
tγ
Xi =
(32)
(33)
(34)
The complementary slackness conditions for the additional
constraints are
∀i ∈ N : ξi(Xi − 1) = 0
(35)
Further note that the constraints Xi ≥ 0 and Xi ≤ 1 cannot
both be tight, and so at least one of βi or ξi must be 0. That
is,
∀i ∈ N : βiξi = 0
(36)
When γ = 0, Equation (33) transforms into βi−ξi+riwig =
0,∀i ∈ N. Now if riwig = 0, we must have βi − ξi = 0 and
hence βi = ξi = 0 (from Equation (36)). It is further clear
from the objective function that if riwig = 0, it is optimal to
have Xi = 0 and hence x∗
i = 0. If riwig < 0, we must have
βi > 0 (since βi − ξi + riwig = 0) and so Xi = x∗
i = 0 (from
Equation (26)). If riwig > 0, we must have ξi > 0 and so
Xi = x∗
i = 1 (from Equation (35)). That is, when γ = 0, we
invest an amount of 1 on all nodes i with positive values of
riwig and 0 on all other nodes.
i = 1 · Iriwig >0
γ = 0 =⇒ x
∗
(37)
(cid:88)
(cid:18) 1
i∈Jγ
tγ
⇐⇒
(cid:18) riwig
(cid:19) t
t−1
tγ
=
+
t−1
(cid:19) t
kg −(cid:80)
(cid:80)
20
(cid:88)
i /∈Jγ
1 = kg
(38)
i:riwig >0
i /∈Jγ ,i:riwig >0 1
(riwig)
t−1
t
i∈Jγ
Note that if i ∈ Jγ, then any j for which rjwjg < riwig
belongs to Jγ. So Jγ and hence γ can be determined by adding
nodes to Jγ, one at a time in increasing order of riwig, subject
to riwig > 0. Let γ be the value of γ so obtained. It can be
seen that as γ decreases, the left hand side of (38) increases.
Since the right hand side is a constant, we would obtain a
unique γ satisfying the equality. Furthermore, for γ > 0, this
budget constraint is tight and so we are ensured the existence
of γ. Once γ and hence Jγ are obtained, an optimal solution
for the good camp can be expressed as follows (recall that
xi = X t
i ):
i = 0.
i = 1.
If riwig ≤ 0, x∗
If riwig > tγ, x∗
If 0 < riwig ≤ tγ,
(cid:32)
kg − (cid:88)
∗
i =
x
(cid:33) (riwig)
(cid:80)
1
t
t−1
i∈Jγ
(riwig)
t
t−1
i /∈Jγ
i:riwig >0
(cid:88)
(cid:18) riwig
(cid:19) t
t−1
i∈Jγ
tγ
(cid:88)
+
1 < kg
i /∈Jγ
i:riwig >0
However, if Equation (38) is not satisfied for any γ, that is,
when
hence (cid:80)
even for the lowest value of γ > 0, we have Jγ = {} and
i:riwig>0 1 < kg. Here, the number of nodes with
riwig > 0 is less than kg, meaning that the budget constraint
is not tight and so γ = 0 (from Equation (25)). The investment
is thus as per Equation (37).
For γ > 0, we have(cid:88)
⇐⇒ (cid:88)
i∈N
X t
i = kg
(cid:18) βi − ξi + riwig
(cid:19) t
t−1
= kg
Proof.
i∈N
tγ
(cid:18)−ξi + riwig
When βi > 0, we have ξi = 0 (from (36)) and Xi = 0 (from
(26)). From the above equation, this corresponds to riwig < 0.
Further note that for riwig = 0, Xi = 0 is an optimal solution.
So we have (cid:88)
(cid:26)(cid:16) riwig
We can have Xi = 1 or if not, we should have ξi =
0. So for any i such that riwig > 0, we have Xi =
. Let Jγ = {i : 0 < riwig ≤ tγ}. So
min
the above equation results in
(cid:17) 1
(cid:19) t
(cid:27)
i:riwig >0
= kg
t−1
t−1
, 1
tγ
tγ
APPENDIX C
PROOF OF PROPOSITION 7
max(cid:80)
s.t. (cid:88)
i xi≤kg
xi≥0
min
yi≥0
i∈N
vi ≤ 0
i∈N
yi
(cid:88)
i ) −(cid:88)
(cid:88)
i∈N
min
ri(wigxi + w0
iiv0
riwibyi
(cid:88)
i∈N
vi =
(cid:88)
i∈N
The inner term of this optimization problem is
s.t. (cid:88)
i∈N
riwibyi ≥(cid:88)
if (cid:80)
i∈N
yi
i∈N
ri(wigxi + w0
iiv0
∀i ∈ N : yi ≥ 0
i ) ← π
It
is clear that
is
optimal for the bad camp to have yi = 0,∀i ∈ N, that is,
i∈N ri(wigxi + w0
iiv0
it
i ) ≤ 0,
RESULTS FOR KARATE CLUB DATASET FOR DIFFERENT VALUES OF w0
ii + wig + wib
TABLE III
21
Setting
Aspect
Case
Section
Fundamental
Unbounded
3.1.1
Bounded
3.1.2
Adversary
Concave (t = 2)
Concave (t = 10)
Unbounded
Bounded
Unbounded
Bounded
5.1
5.2
4.1
4.2
Unbounded
4.1
Bounded
4.2
CCC
Bounded
6
kg
5
10
5
5
5
5
20
5
20
5
20
5
20
5
Value of
w0
ii + wig + wib
0.1
0.5
0.9
0.3545
5.0768
0.1141
7.6575
0.7089
0.3931
4.8542
0.1564
0.9163
0.4581
4.8936
i∈N vi
i∈N vi
5.8811
i∈N vi −0.0678 −0.0538
i∈N yi
5.1404
i∈N yi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
1.5399
i∈N vi −1.8655 −0.8900
0.4612
1.2653
1.1180
1.2842
1.1180
1.3104
1.4950
1.2512
1.4373
1.2512
1.5027
2.8105
0.1723
3.5673
0.3309
5.2674
5.6844
0.5435
1.0870
0.5435
1.0714
1.0120
1.1625
1.0120
1.1633
0.3951
0.2581
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
kb
5
5
5
-
-
maxx miny
maxx miny
maxx miny
maxx miny
maxx miny
5
maxx miny
20 maxx miny
5
maxx miny
20 maxx miny
5
maxx miny
20 maxx miny
5
maxx miny
20 maxx miny
5
maxx miny
miny maxx
(cid:80)
(cid:80)
(cid:80)
(cid:80)
i∈N yi = 0. So we need to only consider the case where
i ) > 0. In this case, for the constraint
i∈N ri(wigxi + w0
i∈N vi ≤ 0 to be satisfied, it is necessary that there exists
The dual problem of the above optimization problem can
a node j with positive value of rjwjb.
iiv0
be written as
max π
ri(wigxi + w0
iiv0
i )
s.t. ∀i ∈ N : πriwib ≤ 1 ← yi
π ≥ 0
From the dual constraints, we have π ≤
(recall
that maxj∈N rjwjb > 0 in this considered case). Since we aim
to maximize the dual objective function, we have
maxj∈N rj wjb
1
(cid:88)
i∈N
π =
1
maxj∈N wjbrj
The optimization problem now becomes
max(cid:80) xi≤kg
xi≥0
= π
π
(cid:88)
max(cid:80) xi≤kg
i∈N
xi≥0
1
(cid:88)
(cid:32)
i∈N
ri(wigxi + w0
iiv0
i )
riwigxi +
(cid:27)
riw0
iiv0
i
(cid:88)
(cid:26)
i∈N
(cid:33)
riw0
iiv0
i
(cid:88)
i∈N
=
maxj∈N wjbrj
kg max
max
i∈N
riwig, 0
+
(cid:80)
The above expression thus gives the total investment made by
the bad camp in the case where (kg max{maxi∈N riwig, 0} +
iiv0
i ) > 0.
i∈N riw0
Accounting for the case that it optimal for the bad camp
to have yi = 0,∀i ∈ N when (kg max{maxi∈N riwig, 0} +
i∈N riw0
iiv0
camp is
(cid:40)
i ) ≤ 0, the total investment made by the bad
(cid:41)
(cid:33)
(cid:32)
1
max
maxj∈N wjbrj
kg max{max
i∈N
riwig, 0} +
riw0
iiv0
i
, 0
(cid:88)
i
APPENDIX D
FURTHER SIMULATION RESULTS
The following pages present simulation results not included
in the main text.
• The quantitative results for Karate club and NetHEPT
ii + wig + wib are
datasets for different values of w0
presented in Tables III and IV, respectively.
• The illustrative results for Karate club dataset under ad-
ditional constraints such as bounded investment per node
and common coupled constraints, when w0
ii +wig +wib =
0.1 and 0.9 are presented in Figures 7 and 8, respectively.
• The illustrative results for Karate club dataset under
concave influence function when w0
ii + wig + wib = 0.1
and 0.9 are presented in Figures 9 and 10, respectively.
• The illustrations for progression of opinion values in
Karate club dataset under different settings are presented
in Figures 11-14.
RESULTS FOR NETHEPT DATASET FOR DIFFERENT VALUES OF w0
ii + wig + wib
TABLE IV
22
Setting
Aspect
Case
Section
kg
kb
Value of
w0
ii + wig + wib
0.1
0.5
0.9
Fundamental
Unbounded
3.1.1
Bounded
3.1.2
Adversary
Concave (t = 2)
Concave (t = 10)
Unbounded
Bounded
Unbounded
Bounded
5.1
5.2
4.1
4.2
Unbounded
4.1
Bounded
4.2
100
200
100
100
100
100
400
100
400
100
400
100
400
100 maxx miny
100 maxx miny
100 maxx miny
-
-
maxx miny
maxx miny
100 maxx miny
400 maxx miny
100 maxx miny
400 maxx miny
100 maxx miny
400 maxx miny
100 maxx miny
400 maxx miny
CCC
Bounded
6
100
100
maxx miny
miny maxx
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
2.8513
5.7026
7.6865
105.1987
143.6201
626.5203
145.9562
i∈N vi
i∈N vi
i∈N vi
i∈N yi
i∈N yi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
i∈N vi
28.5077
i∈N vi −19.2724
2.3493
−7.3610
−8.4556
−7.3610
−8.4556
2.8513
73.2539
13.5988
347.0770
131.4902
2.8513
1.5930
136.5231
113.0391
101.9037
102.7266
−1.7849
−0.8446
−3.5698
−1.6892
−1.7849
−0.8446
−1.7117
−3.5698
−12.4212 −13.9045
−14.2682 −15.9721
−12.4212 −13.9045
−14.2682 −15.9721
7.4843
−3.6795
1.5930
1.5930
(maxx miny
xi, yi ≤ 1,∀i
(cid:80)
(a) Bound on investment per node
i vi = −0.0678)
(cid:80)
(c) Common coupled constraints
i vi = −1.8655)
Fig. 7. Results in presence of additional constraints for the Karate club dataset with kg = kb = 5 ; The nodes are labeled 'g/b/c' to signify if invested on
by good/bad/both camps respectively. The sign of the opinion value of a node is signified by its shape and color (circle and blue for good, square and red for
bad), while the absolute value of its opinion is signified by its size and color saturation. (w0
(b) Common coupled constraints
xi + yi ≤ 1,∀i
xi + yi ≤ 1,∀i
i vi = 2.8105)
(miny maxx
(maxx miny
(cid:80)
ii + wig + wib = 0.1)
(a) Bound on investment per node
(b) Common coupled constraints
(maxx miny
i vi = 0.3309)
(maxx miny
i vi = 0.3951)
xi, yi ≤ 1,∀i
(cid:80)
xi + yi ≤ 1,∀i
(cid:80)
(c) Common coupled constraints
xi + yi ≤ 1,∀i
(miny maxx
i vi = 0.2581)
(cid:80)
Fig. 8. Results in presence of additional constraints for the Karate club dataset with kg = kb = 5 ; The nodes are labeled 'g/b/c' to signify if invested on
by good/bad/both camps respectively. The sign of the opinion value of a node is signified by its shape and color (circle and blue for good, square and red for
bad), while the absolute value of its opinion is signified by its size and color saturation. (w0
ii + wig + wib = 0.9)
23
(a) Investment made by good camp
on nodes signified by their sizes
and color saturations for t = 2
(b) Investment made by bad camp
on nodes signified by their sizes
and color saturations for t = 2
(c) Final opinion values of nodes signified
by shapes, sizes, color saturations for t = 2
(Circular blue nodes: positive opinions,
square red nodes: negative opinions)
(d) Investment made by good camp
on nodes signified by their sizes
and color saturations for t = 10
(e) Investment made by bad camp
on nodes signified by their sizes
and color saturations for t = 10
(f) Final opinion values of nodes signified
by shapes, sizes, color saturations for t = 10
(Circular blue nodes: positive opinions,
square red nodes: negative opinions)
Fig. 9. Simulation results for the Karate club dataset with kg = kb = 5 when the influence function is concave (w0
ii + wig + wib = 0.1)
(a) Investment made by good camp
on nodes signified by their sizes
and color saturations for t = 2
(b) Investment made by bad camp
on nodes signified by their sizes
and color saturations for t = 2
(c) Final opinion values of nodes signified
by shapes, sizes, color saturations for t = 2
(Circular blue nodes: positive opinions,
square red nodes: negative opinions)
(d) Investment made by good camp
on nodes signified by their sizes
and color saturations for t = 10
(e) Investment made by bad camp
on nodes signified by their sizes
and color saturations for t = 10
(f) Final opinion values of nodes signified
by shapes, sizes, color saturations for t = 10
(Circular blue nodes: positive opinions,
square red nodes: negative opinions)
Fig. 10. Simulation results for the Karate club dataset with kg = kb = 5 when the influence function is concave (w0
ii + wig + wib = 0.9)
24
(a) τ = 1 (maxxminy
(cid:80)
i v
(cid:104)τ(cid:105)
i = 0.3037)
(b) τ = 2 (maxxminy
(cid:80)
i v
(cid:104)τ(cid:105)
i = 0.3681)
(d) τ = 4 (maxxminy
(cid:80)
i v
(cid:104)τ(cid:105)
i = 0.4353)
Fig. 11. Progression of opinion values for the Karate club dataset with kg = kb = 5 when the influence function is concave (t = 2)
(a) τ = 1 (maxxminy
(cid:80)
i v
(cid:104)τ(cid:105)
i = 0.4956)
(b) τ = 2 (maxxminy
(cid:80)
i v
(cid:104)τ(cid:105)
i = 0.7986)
(d) τ = 4 (maxxminy
(cid:80)
i v
(cid:104)τ(cid:105)
i = 1.0362)
Fig. 12. Progression of opinion values for the Karate club dataset with kg = kb = 5 when the influence function is concave (t = 10)
(a) τ = 1 (maxxminy
(d) τ = 4 (maxxminy
Fig. 13. Progression of opinion values for the Karate club dataset with kg = kb = 5 under common coupled constraints (maxmin value)
(b) τ = 2 (maxxminy
i v
i v
(cid:104)τ(cid:105)
i =−0.2375)
(cid:104)τ(cid:105)
i = 0.8117)
(cid:80)
i v
(cid:104)τ(cid:105)
i = 1.3420)
(a) τ = 1 (minymaxx
(d) τ = 4 (minymaxx
Fig. 14. Progression of opinion values for the Karate club dataset with kg = kb = 5 under common coupled constraints (minmax value)
(b) τ = 2 (minymaxx
i v
i v
(cid:104)τ(cid:105)
i =−0.4655)
(cid:104)τ(cid:105)
i = 0.1775)
(cid:104)τ(cid:105)
i =−0.7709)
i v
(cid:80)
(cid:80)
(cid:80)
(cid:80)
(cid:80)
|
1905.09945 | 1 | 1905 | 2019-05-23T21:50:55 | Multifaceted Privacy: How to Express Your Online Persona without Revealing Your Sensitive Attributes | [
"cs.SI",
"cs.CR"
] | Recent works in social network stream analysis show that a user's online persona attributes (e.g., gender, ethnicity, political interest, location, etc.) can be accurately inferred from the topics the user writes about or engages with. Attribute and preference inferences have been widely used to serve personalized recommendations, directed ads, and to enhance the user experience in social networks. However, revealing a user's sensitive attributes could represent a privacy threat to some individuals. Microtargeting (e.g.,Cambridge Analytica scandal), surveillance, and discriminating ads are examples of threats to user privacy caused by sensitive attribute inference. In this paper, we propose Multifaceted privacy, a novel privacy model that aims to obfuscate a user's sensitive attributes while publicly preserving the user's public persona. To achieve multifaceted privacy, we build Aegis, a prototype client-centric social network stream processing system that helps preserve multifaceted privacy, and thus allowing social network users to freely express their online personas without revealing their sensitive attributes of choice. Aegis allows social network users to control which persona attributes should be publicly revealed and which ones should be kept private. For this, Aegis continuously suggests topics and hashtags to social network users to post in order to obfuscate their sensitive attributes and hence confuse content-based sensitive attribute inferences. The suggested topics are carefully chosen to preserve the user's publicly revealed persona attributes while hiding their private sensitive persona attributes. Our experiments show that adding as few as 0 to 4 obfuscation posts (depending on how revealing the original post is) successfully hides the user specified sensitive attributes without changing the user's public persona attributes. | cs.SI | cs |
MULTIFACETED PRIVACY: HOW TO EXPRESS YOUR ONLINE
PERSONA WITHOUT REVEALING YOUR SENSITIVE ATTRIBUTES
A PREPRINT
Victor Zakhary
Ishani Gupta
Rey Tang
Department of Computer Science
Department of Computer Science
Department of Computer Science
UC Santa Barbara
Santa Barbara, CA 93106
[email protected]
UC Santa Barbara
Santa Barbara, CA 93106
[email protected]
UC Santa Barbara
Santa Barbara, CA 93106
[email protected]
Amr El Abbadi
Department of Computer Science
UC Santa Barbara
Santa Barbara, CA 93106
[email protected]
May 27, 2019
ABSTRACT
Recent works in social network stream analysis show that a user's online persona attributes (e.g.,
gender, ethnicity, political interest, location, etc.) can be accurately inferred from the topics the
user writes about or engages with. Attribute and preference inferences have been widely used to
serve personalized recommendations, directed ads, and to enhance the user experience in social
networks. However, revealing a user's sensitive attributes could represent a privacy threat to some
individuals. Microtargeting (e.g., Cambridge Analytica scandal), surveillance, and discriminating
ads are examples of threats to user privacy caused by sensitive attribute inference. In this paper,
we propose Multifaceted privacy, a novel privacy model that aims to obfuscate a user's sensitive
attributes while publicly preserving the user's public persona. To achieve multifaceted privacy, we
build Aegis, a prototype client-centric social network stream processing system that helps preserve
multifaceted privacy, and thus allowing social network users to freely express their online personas
without revealing their sensitive attributes of choice. Aegis allows social network users to control
which persona attributes should be publicly revealed and which ones should be kept private. For
this, Aegis continuously suggests topics and hashtags to social network users to post in order to
obfuscate their sensitive attributes and hence confuse content-based sensitive attribute inferences.
The suggested topics are carefully chosen to preserve the user's publicly revealed persona attributes
while hiding their private sensitive persona attributes. Our experiments show that adding as few as 0
to 4 obfuscation posts (depending on how revealing the original post is) successfully hides the user
specified sensitive attributes without changing the user's public persona attributes
Keywords Attribute Privacy, Online-Persona, Content-Based Inference
1
Introduction
Over the past decade, social network platforms such as Facebook, Twitter, and Instagram have attracted hundreds of
millions of users [11 -- 13]. These platforms are widely and pervasively used to communicate, create online communi-
ties [26], and socialize. Social media users develop, over time, online persona [45] that reflect their overall interests,
activism, and diverse orientations. Users have numerous followers that are specifically interested in their personas and
their postings which are aligned with these personas. However, due to the rise of machine learning and deep learning
A PREPRINT - MAY 27, 2019
techniques, user posts and social network interactions can be used to accurately and automatically infer many user
persona attributes such as gender, ethnicity, age, political interest, and location [33, 38, 46, 47]. Recent work shows that
it is possible to predict an individual user's location solely using content-based analysis of the user's posts [19, 20].
Zhang et al. [46] show that hashtags in user posts can alone be used to precisely infer a user's location with accuracy of
70% to 76%. Also, Facebook likes analysis was successfully used to distinguish between Democrats and Republicans
with 85% accuracy [33].
Social network giants have widely used attribute inference to serve personalized trending topics, to suggest pages to like
and accounts to follow, and to notify users about hyper-local events. In addition, social networks such as Facebook use
tracking [9] and inference techniques to classify users into categories (e.g. Expats, Away from hometown, Politically
Liberal, etc.). These categories are used by advertisers and small businesses to enhance directed advertising campaigns.
However, recent news about the Cambridge Analytica scandal [6] and similar data breaches [14] suggest that users
cannot depend on the social network providers to preserve their privacy. User sensitive attributes such as gender,
ethnicity, and location have been widely misused in illegally discriminating ads, microtargeting, and surveillance. A
recent ACLU report [5] shows that Facebook illegally allowed employers to exclude women from receiving their job
ads on Facebook. Also, several reports have shown that Facebook allows discrimination against some ethnic groups in
housing ads [10]. News about the Russian-linked Facebook Ads during the 2016 election suggests that the campaign
targeted voters in swing states [2] and specifically in Michigan and Wisconsin [3]. In addition, location data collected
from Facebook, Twitter, and Instagram has been used to target activists of color [1].
An online-persona can be thought of as the set of user attributes that can be inferred about a user from their online
postings and interactions. These attributes fall into two categories: public and private persona attributes. Users should
decide which attributes fall in each category. Some attributes (e.g., political orientation and ethnicity) should be publicly
revealed as a user's followers might follow her because of her public persona attributes. Other attributes (e.g., gender
and location) are private and sensitive, and the user would not like them to be revealed. However, with the above
mentioned inference methods, the social media providers, as well as any adversary receiving the user posting can reveal
a user's sensitive attributes.
To remedy this situation, in this paper, we propose multifaceted privacy, a novel privacy model that aims to obfuscate
a user's sensitive attributes while revealing the user's public persona attributes. Multifaceted privacy allows users to
freely express their online public personas without revealing any sensitive attributes of their choice. For example, a
#BlackLivesMatter activist might want to hide her location from the police and from discriminating advertisers while
continuing to post about topics specifically related to her political movement. This activist can try to hide her location
by disabling the geo-tagging feature of her posts and hiding her IP address using an IP obfuscation browser like Tor [4].
However, recent works have shown that content-based location inferences can successfully and accurately predict a
user's location solely based on the content of her posts [19, 20, 46]. If this activist frequently posts about topics that
discuss BLM events in Montpelier, Vermont, she is most probably a resident of Montpelier (Montpelier has a low
African American population).
To achieve multifaceted privacy, we build Aegis1, a prototype client-centric social network stream processing system that
enables social network users to take charge of protecting their own privacy, instead of depending on the social network
providers. Our philosophy in building Aegis is that social network users need to introduce some noisy interactions
and obfuscation posts to confuse content based attribute inferences. This idea is inspired from Rivest's chaffing
and winnowing privacy model in [39]. Unlike in [39] where the sender and receiver exchange a secret that allows
the receiver to easily distinguish the chaff from the wheat, in social networks, a user (sender) posts to an open world
of followers (receivers) and it is not feasible to exchange a secret with every recipient. In addition, a subset of the
recipients could be adversaries who try to infer the user's sensitive attributes from their postings. Choosing this noise
introduces a challenging dichotomy and tension between the utility of the user persona and her privacy. Similar notions
of dichotomy between sensitive and non sensitive personal attributes have been explored in sociology and are referred
to as contextual integrity [37]. Obfuscation posts need to be carefully chosen to achieve obfuscation of private attributes
without damaging the user's public persona. For example, a #NoBanNoWall activist loses persona utility if she writes
about #BuildTheWall to hide her location. Multifaceted privacy represents a continuum between privacy and persona
utility. Figure 1 captures this continuum, where the x-axis represents the persona attributes that need to be obfuscated or
kept private while the y-axis represents the persona attributes that should be publicly preserved or revealed. Figure 1
shows that privacy is the reciprocal of the persona utility. Any attribute that needs to be kept private cannot be preserved
in the public persona. As illustrated, the more attributes are kept private, the more obfuscation overhead is needed to
achieve their privacy. A user who chooses to publicly reveal all her persona attributes achieves no attribute privacy and
hence requires no obfuscation posting overhead.
1Aegis: a shield in the Greek mythology.
2
A PREPRINT - MAY 27, 2019
Figure 1: The dichotomy of multifaceted privacy: persona vs. privacy.
As illustrated in Figure 1, a user chooses a point on the diagonal line of the multifaceted privacy that determines which
persona attributes should be publicly revealed (e.g., political interest, ethnicity, etc) and which ones should be kept
private (e.g., location, gender, etc). Note that users can reorder the attributes on the axes of Figure 1 in order to achieve
their intended public/private attribute separation. Unlike previous approaches that require users to change their posts
and hashtags [46] to hide their sensitive attributes, Aegis allows users to publish their original posts without changing
their content. Our experiments show that adding obfuscation posts successfully preserves multifaceted privacy. Aegis
considers the added noise as the cost to pay for achieving multifaceted privacy. Therefore, Aegis targets users who are
willing to write additional posts to hide their sensitive attributes.
Aegis is user-centric, as we believe that users need to take control of their own privacy concerns and cannot depend on
the social media providers. This is challenging as it requires direct user engagement and certain sacrifices. However,
we believe Aegis will help better understand the complexity of privacy as well as the role for individual engagement
and responsibility. Aegis represents a first step in the long path to better understand the tensions between user privacy,
the utility of social media, and trust in public social media providers. This is an overdue discussion that needs to be
discussed by the scientific community, and we believe Aegis will facilitate the medium for this discussion.
Our contributions are summarized as follows:
• We propose multifaceted privacy, a novel privacy model that represents a continuum between the privacy of
sensitive private attributes and public persona attributes.
• We build Aegis, a prototype user-centric social network stream processing system that preserves multifaceted
privacy. Aegis continuously analyzes social media streams to suggest topics to post that are aligned with the
user's public persona but hide their sensitive attributes.
• We conduct an extensive experimental study to show that Aegis can successfully achieve multifaceted privacy.
The rest of the paper is organized as follows. We explain the models of user, topic, and security in Section 2. Topic
classification algorithms and data structures that achieve multifaceted privacy are described in Section 3 and Aegis's
system design is explained in Section 4. Afterwards, an experimental evaluation is conducted in Section 5 to evaluate
the effectiveness of Aegis in achieving the multifaceted privacy. The related work is presented in Section 6 and future
extensions are presented in Section 7. The paper is concluded in Section 8.
2 Models
In this section, we present the user, topic, and security models. The user and topic models explain how users and topics
are represented in the system. The security model presents both the privacy and the adversary models.
3
2.1 User Model
A PREPRINT - MAY 27, 2019
Our user model is similar to the user model presented in [27]. The set U is the set of social network users where
U = {u1, u2, ...}. A user ui is represented by a vector of attributes Vui (e.g., gender Vui[g], ethnicity Vui[e], age Vui [a],
political interest Vui[p], location Vui[l], etc). Each attribute a has a domain a.d and the attribute values are picked
from this domain. For example, the gender attribute g has domain g.d = {male, female}2 and ∀ui∈U Vui[g] ∈ g.d. An
example user ux is represented by the vector Vux where Vux = (g: female, e: African American, a: 23, p: Democrat, l:
New York). Attribute domains can form a hierarchy (e.g., location: city → county → state → country) and an attribute
can be generalized by climbing up this hierarchy. A user who lives in Los Angeles is also a resident of Orange County,
California, and the United States. Other attributes can form trivial hierarchies (e.g., gender: male or female → * (no
knowledge)).
The user attribute vector Vui is divided into two main categories: 1) the set of public persona attributes V p
set of private sensitive attributes V s
hiding all sensitive attributes in V s
are the complement of the attributes in V s
ui. Multifaceted privacy aims to publicly reveal all persona attributes in V p
ui. Each user defines her V s
ui and 2) the
ui while
a priori. As shown in Figure 1, attributes in V p
ui
ui. Therefore, each attribute either belongs to V p
ui and V p
ui
ui.
ui or V s
2.2 Topic Model
i , t2
i , ..., tn
i = {t1
i ⊂ T represents the
The set T represents the set of all topics that are discussed by all the social network users in U. T τ
i }. Social network topics are characterized
set of all the topics posted by user ui's till time τ where T τ
by the attributes of the users who post about these topics. Unlike user attributes, which are discrete values, topic
attributes are represented as distributions. For example, an analysis of the ethnicity of the users who post about the
topic #BlackLivesMatter can result in the distribution 10% Asian, 25% White, 15% Hispanic, and 50% Black. This
distribution means that Asians, Whites, Hispanics, and Blacks post about the topic #BlackLivesMatter and 50% of the
users who post about this topic are Black. A topic ti is represented by a vector of attribute distributions Vti where Vti[g],
Vti[e], Vti[p], and Vti[l] are respectively the gender, the ethnicity, the political party, and the location distributions of
the users who post about ti.
To extract the gender, ethnicity, and political interest attribute distributions of different topics, we use the language
models introduced in [26, 41]. However, any other available model could be used to infer user attributes. The location
distribution of a topic is inferred using the geo-tagged public posts about this topic, where the location of the publisher
is explicitly attached to the post.
2.3 Security Model
An approach that is commonly used for attribute obfuscation is generalization. The idea behind attribute generalization
is to report a generalized value of a user's sensitive attribute in order to hide the actual attribute value within. Consider
location as a sensitive attribute example. Many works [36, 46] have used location generalization in different contexts.
Mokbel et al. [36] use location generalization to hide a user's exact location from Location Based Services (LBS). A
query that asks "what is the nearest gas station to my exact location in Stanford, CA?" should be altered to "list all gas
stations in California". Notice that the returned result of the altered query has to be filtered at the client side to find the
answer of the original query. Similarly, Andres et al. [17] propose geo-indistinguishability, a location privacy model
that uses differential privacy to hide a user's exact location in a circle of radius r from LBS providers. The wider the
generalization range, the more privacy achieved, and the more network and processing overhead are added at the client
side. Similarly, in the context of social networks, Zhang et al. [46] require Twitter users to generalize their location
revealing hashtags in order to hide their exact location. For example, a user whose post includes "#WillisTower" should
be generalized to "#Chicago" to hide a user's exact location. Notice that generalization requires users to alter their
original posts or queries.
To overcome these limitations and to allow users to write their posts using their own words, we adopt the notion of
k-attribute-indistinguishability privacy that is defined as follows. For every sensitive attribute s ∈ V s
ui, the user defines
an indistinguishability parameter ks. ks determines the number of attribute values among which the real value of
parameter s is hidden. For example, a user who lives in CA sets kl = 3 in order to hide her original state location, CA,
among 3 different states (e.g., CA, IL, and NY). This means that a content-based inference attack should not be able to
distinguish the user's real location among the set {CA, IL, NY}. As explained in 2.1, attribute domains either form
multi-level hierarchies (e.g., location) or trivial hierarchies (e.g., gender and ethnicity). Unlike in attribute generalization
where a user's attribute value is generalized by climbing up the attribute hierarchy, k-attribute-indistinguishability
2Due to the limitation of the inference models, the gender attribute is considered only binary. However, better models can be used
to infer non binary gender attribute values.
4
A PREPRINT - MAY 27, 2019
achieves the privacy of an attribute value by hiding it among k − 1 attribute values chosen from the siblings of the actual
attribute value in the same hierarchy level (e.g., a user's state level location is hidden among k − 1 other states instead
of generalizing it to the entire country). The following inference attack explains when k-attribute-indistinguishability is
achieved or violated.
The adversary assumptions: the adversary model and the inference attacks are similar to the ones presented in [46].
However, unlike in [46], our inference attack is not only limit to the location attribute but also can be extended to infer
every user sensitive attribute in V s
ui. The adversary has access to the set of all topics T and all the public posts related
to each topic. This assumption covers any adversary who can crawl or get access to the public posts of every topic
in the social network. As proposed in Section 1, the target user ui does not reveal her sensitive attribute values to the
public (e.g., a user who wants to hide her location must obfuscates her IP address and disable the geo-tagging feature
for her posts). Therefore, the adversary can only see the content of the public posts published by ui. The adversary uses
their knowledge about the set of all topics T and the set of topics T τ
i discussed by ui to infer her sensitive attributes.
Multifaceted privacy protects users against an adversary who only performs content-based inference attacks. Therefore,
multifaceted privacy assumes that the adversary does not have any side channel knowledge that can be used to reveal a
user's sensitive attribute value (e.g., another online profile that is directly linked to the user ui where sensitive attributes
such as gender, ethnicity, or location are revealed).
Inference attack: the adversary's ultimate goal is to reveal or at least have high confidence in the knowledge of the
sensitive attribute values of the target user ui. For this, the adversary runs a content-based attack as follows. First, the
that user ui wrote about. For each topic, the adversary infers the demographics of
adversary crawls the set of topics T τ
i
the users who wrote about this topic. Then, the adversary aggregates the demographics of all the topics in T τ
i . The
adversary uses the aggregated demographics to estimate the sensitive attributes of user ui. The details of the inference
attack is explained as follows.
i , an adversary crawls the set of posts Ptj that discusses topic tj and for each post pi ∈ Ptj , the
For each topic tj ∈ T τ
adversary uses some models to infer the gender, ethnicity, political interest, and location of the user who wrote this
post. Then, the adversary uses the inferred attributes of each post in topic tj to populate tj's distribution vector Vtj .
For example, Vtj [g] is the gender distribution of all users who wrote about topic tj. Similarly, Vtj [e], Vtj [p], and Vtj [l]
are the ethnicity, political interest, and location distributions of the users who posted about topic tj. We define V ∗
ui as
a vector of attribute distributions that is used to estimate the attributes of user ui. V ∗
ui is the result of aggregating the
normalized Vtj for every topic tj ∈ T τ
i as shown in Equation 1.
(cid:80)
V ∗
ui
=
i
tj∈T τ
T τ
i
Vtj
Ptj
(1)
ui
i . V ∗
ui
i divided by the number of topics in T τ
ui is the summation of the normalized Vtj for every topic tj ∈ T τ
Equation 1 shows that the topic's attribute distribution vector Vtj is first normalized by dividing Vtj by the number of
posts in topic tj. This normalization equalizes the effect of every topic tj ∈ T τ
i on the user's attribute estimations in
V ∗
ui. V ∗
[a]
is the distribution of attribute a for user ui. For example, a user might have a gender distribution V ∗
[g] = {female:0.8,
male:0.2}. This means that the inference attack using ui's posted topics suggests that the probability ui is a female is
80% while ui is a male is only 20%. For every attribute a, an attacker uses the maximum attribute value max(V ∗
[a])
as an estimation of the actual value Vui[a]. In the previous example, an attacker would infer V ∗
[g] = female as an
estimate of the gender of user ui. An inference attack succeeds in estimating an attribute a if the attacker can have
sufficient confidence in estimating the actual value Vui[a]. This confidence is achieved if the difference between the
maximum estimated attribute value of a and the top-kth estimated attribute value of a is greater than ∆a. For example,
if ∆g = 0.1 and kg = 2 (assuming gender is a binary attribute and it needs to be hidden among the 2 gender attribute
values), then an attacker successfully estimates ui's gender if the max(V ∗
[g]) is distinguishable from the 2nd highest
value in V ∗
[g] = {female:0.8, male:0.2}, an attacker succeeds
to estimate ui's gender = female as the difference between V ∗
Figure 2 show an example of a successful inference attack and another of a failed inference attack on attribute a of user
ui. As shown in Figure 2.a, the maximum estimated attribute value V ∗
[a]1 is distinguishable from the top-kth (ka for
attribute a) attribute values in V ∗
[a] by more than ∆a. In this scenario, an attacker can conclude with high confidence
that V ∗
[a]1 is indistinguishable from the top-kth attribute
values in V ∗
The parameter k is used to determine the number of attribute values within which the user's actual attribute value is
hidden. The bigger the k, the less the attacker's confidence about the user's actual attribute value. As a result, increasing
k introduces uncertainty in the attacker's inference and hence boosts the adversary cost to micro-target users who hide
[a]. In this scenario, the attack is marked failed and k-attribute-indistinguishability is achieved.
[a]1 is a good estimate for Vui[a]. However, in Figure 2.b, V ∗
[g] by more than 10%. In the previous example where V ∗
ui
ui
ui
[g].f emale − V ∗
[g].male ≥ ∆g.
ui
ui
ui
ui
ui
ui
ui
ui
ui
5
A PREPRINT - MAY 27, 2019
Figure 2: Illustrating k-attribute-indistinguishability
their actual attribute values among k different attribute values. For example, an adversary who wants to target a user
in location CA has to pay 3 times the advertisement cost to reach the same user if the user equally hides her location
among 3 other locations (e.g., CA, IL, and NY).
We understand that the requirement to determine the sensitive attributes and an indistinguishability parameter value ks
for every sensitive attribute s ∈ V s
ui could be challenging for many users. Users might not have a sense of the number
of attribute values to obfuscate the actual value of a particular attribute. One possible solution to address this usability
challenge is to design a questionnaire for Aegis's first time users. This questionnaire helps Aegis understand which
persona attributes are sensitive and how critical the privacy of every sensitive attribute is to every user. This allows
Aegis to auto-configure ks of every sensitive attribute s for every user. The details of such an approach is out of the
ui and for every attribute s ∈ V s
scope of this paper. In this paper, we assume that Aegis is preconfigured with the set V s
ui,
the value of ks is determined.
3 Multifaceted Privacy
Multifaceted privacy aims to obfuscate a user's sensitive attributes for every attribute in V s
ui. This has to be done
while publicly revealing every attribute in the user's public persona in V p
ui. Various approaches have been used to
obfuscate specific sensitive attributes, in particular, Tagvisor [46] protects users against content-based inference attacks
by requiring users to alter their posts by changing or replacing hashtags that reveal their sensitive attributes, in their
case location. Our approach is different, as it is paramount to not only preserving the privacy of the sensitive attributes,
but also to preserve the on-line persona of the user, and hence reveal their public attributes. It is critical for a user to
post their posting in their own words that reflect their persona. We therefore preserve multifaceted privacy by hiding a
specific post among other obfuscation posts. Our approach needs to suggest posts that are aligned with the user's public
persona but linked to alternative attribute values of their sensitive attributes in order to obfuscate them. This requires
a topic classification model that simplifies the process of suggesting obfuscation posts. For example, consider State
level location as a sensitive attribute. To achieve k-location indistinguishability, a user's exact State should be hidden
among k − 1 other States. This requires suggesting obfuscation postings about topics that are linked to these other
k − 1 States. Users in NY state can use topics that are mainly discussed in IL to obfuscate their location among NY
and IL. To discover such potential topics, all topics that are discussed on a social network need to be classified by the
sensitive attributes that need to be obfuscated, State level location in this example. A topic is linked to some State if the
maximum estimated State location of this topic, max(Vti[l]), is distinguishable from other State location estimates in
Vti[l] by more than ∆l. For example, if ∆l = 10%, a topic that has a State location distribution of {NY=0.6, IL=0.2,
CA=0.1, Others=0.1} is linked to NY State while a topic that does not have a distinguishable State location inference
by more than ∆l is not linked to any State. In this section, we first explain a simple but incorrect topic classification
model that successfully suggests obfuscation posts that hide a user's sensitive attributes but does not preserve her public
persona. Then, we explain how to modify the topic classification model to suggest obfuscation posts that do achieve
multifaceted privacy.
A simple incorrect proposal:
in this proposal, topics are classified independently by every sensitive attribute. As
shown in Figure 3, each attribute forms an independent hierarchy. The root of the hierarchy has the topics that are not
linked to a specific attribute value. Topics that are strongly linked to some attribute value fall down in the hierarchy
node that represents this attribute value. For example, State level location attribute forms a hierarchy of two levels. The
first level, the root, has all the topics that do not belong to a specific State. A topic like #Trump is widely discussed in all
the States and therefore it resides on the root of the location attribute. However, #cowboy is mainly discussed in TX and
6
A PREPRINT - MAY 27, 2019
Figure 3: Each attribute independently forms a hierarchy
therefore it falls down in the hierarchy to the TX node. To obfuscate a user's State location, topics need to be selected
from the sibling nodes of the user's State in the State level location hierarchy. These topics belong to other locations and
can be used to achieve k-location-indistinguishability privacy. Although this proposal successfully achieves location
privacy, the suggested posts are not necessarily aligned with the user's public online persona. For example, this
obfuscation technique could suggest the topic #BuildTheWall (from TX) to an activist (from NY) who frequently posts
about #NoBanNoWall in order to hide her location. This misalignment between the suggested obfuscation posts and the
user's public persona discourages users from seeking privacy fearing the damage to their public online persona.
Figure 4: A dependent topic tree where public attributes are at the top while private attributes are at the bottom
A persona preserving proposal: To overcome the independent classification shortcomings, obfuscation postings need
to be suggested from a tree hierarchy that captures relevant dependencies among all user attributes including both public
persona and private sensitive attributes. Public attributes need to reside on the upper levels of the classification tree while
private ones reside on the bottom levels of the tree as shown in Figure 4. To achieve k-attribute-indistinguishability,
sibling values of the sensitive attributes are used to hide the actual value of these sensitive attributes. By placing
the public attributes higher up on the tree, we ensure that the suggest topics adhere to the public persona. Finally,
multifaceted privacy only requires all the public attributes, regardless of their order, to reside on the upper levels of the
tree while all the private attributes, regardless of their order, to reside on the lower levels of the tree.
Social network topics are dependently classified in the tree by the attribute domain values at each level. For example,
if the top most level of the tree is the political party attribute, topics that are mainly discussed by Democrats are placed
in the left green child while topics that are mainly discussed by Republicans are place in the right green child. Note
that topics that have no inference reside in the root of the hierarchy. Now, if the second public persona attribute is
ethnicity (shown as blue nodes in Figure 4), topics in both the Democratic and Republican nodes are classified by the
ethnicity domain attribute values. For example, topics that are mainly discussed by White Democrats are placed under
7
A PREPRINT - MAY 27, 2019
the Democratic node in the White ethnicity node while topics that are mainly discussed by Asian Republicans are
put under the Republican node in the Asian ethnicity node. This classification is applied at every tree level for every
attribute. Now, assume a user is White, Female, Democrat, who lives in CA and wants to hide her location (shown as
red nodes in Figure 4) while publicly revealing her ethnicity, gender, and political party. In this case, topics that reside in
the sibling nodes of the leaf of her persona path, e.g., topics that are mainly discussed by White Female Democrats who
live in locations other than CA (e.g., NY and IL) can be suggested as obfuscation topics. This dependent classification
guarantees that the suggested topics are aligned with the user's public persona but belong to other sensitive attribute
values (different locations in this example). Note that this technique is general enough to obfuscate any attribute and
any number of attributes. Each user defines her sensitive attribute(s) and the classification tree would be constructed
with these attributes to the bottom thus guaranteeing that the suggested posts do not violate multifaceted privacy.
4 Aegis System Design
This section presents Aegis, a prototype social network stream processing system that implements multifaceted privacy
and overcomes the adversarial content-based attribute inference attacks discussed in Section 2.3. Aegis achieves
k-attribute-indistinguishability by suggesting topics to post that are aligned with the social network user's public persona
while hiding the user's sensitive attributes among their other domain values. To achieve this, Aegis uses the classification
and suggestion models discussed in Section 3. Aegis is designed in a user-centric manner which is configured on the
user's local machine. In fact, Aegis can be developed as a browser extension where all the user interactions with the
social network are handled through this extension. Every local deployment of Aegis only needs to construct a partition
of the attribute-based topic classification hierarchy developed in Figure 4. This partition (or sub-hierarchy) include the
user's attribute path from the root to a leaf in addition to the sibling nodes of the user's sensitive attribute nodes. For
example, a user whose attributes are Female, White, Democrat, and CA and wants to obfuscate her State location only
requires Aegis to construct the Female, White, Democrat, CA path in addition to k − 1 other paths with the shared
prefix Female, White, Democrat but linked to k − 1 other States. These k − 1 States are used to hide the user's true state
in order to achieve k-location-indistinguishability. Note that if another user's public persona is specifically associated
with their location while they consider their ethnicity to be sensitive, then the hierarchy needs to be reordered to reflect
this criteria.
Although Aegis can be integrated with different online social network platforms, our prototype implementation of Aegis
only supports Twitter to illustrate Aegis's functionality. Twitter provides developers with several public APIs [8] that
allow them to stream tweets that discuss certain topics. In addition, Twitter streaming APIs allow developers to sample
1% of all the tweets posted on Twitter. In Twitter, a topic is represented by either a hashtag or a keyword. Aegis is built
to work for new Twitter profiles in order to continuously confuse an adversary about a profile's true sensitive attribute
values from the genesis of this profile. Aegis is not designed to work with existing old profiles as an adversary could
have already used their existing posts to reveal their sensitive attribute values. Even though Aegis suggests obfuscation
posts, an adversary can distinguish the old original posts from the newly added original posts accompanied by their
obfuscation posts and hence reveals the user's sensitive attributes true values.
Aegis is designed to achieve the following goals:
1. to automate the process of streaming and classifying Twitter topics according to their attributes,
2. to construct and continuously maintain the topic classification sub-hierarchy,
3. and finally to use the topic classification sub-hierarchy to suggest topics to the user that achieve multifaceted
privacy.
To achieve these goals, Aegis consists of two main processes:
• a Twitter analyzer Process T P and
• a topic Suggestion Process SP .
T P continuously analyzes the topics that are being discussed on Twitter and for each topic ti, T P uses the topic
attribute inference models to infer ti's attribute distribution vector Vti. The accuracy of the topic attribute inference
increases as the number of posts that discuss topic tj, Ptj, increases. T P uses a local key-value store as a topic
repository where the key is the topic id tj ∈ T and the value is the topic attribute distribution vector Vti. In addition,
T P constructs and continuously maintains the topic classification sub-hierarchy that classifies the topics based on
their attributes. This topic classification sub-hierarchy is used for suggesting obfuscation topics. For this, the user
provides T P with both their attribute vector values Vui and their sensitive attribute vector V s
ui determine
ui. Figure 5 shows the interactions
the sub-hierarchy that T P needs to maintain in order to obfuscate the attributes in V s
ui. Vui and V s
8
A PREPRINT - MAY 27, 2019
Figure 5: Aegis System Design and User Interaction Flow
s inferred attribute value by more than 10%.
among the user, Aegis, and the social network. As shown, step 0 represents the continuous Twitter stream analysis
performed by T P . As T P analyzes Twitter streams, it continuously updates the topic repository and the classification
sub-hierarchy.
The topic suggestion process SP mainly handles user interactions with Twitter. SP uses the topic classification
sub-hierarchy constructed and maintained by T P to suggest obfuscation topics. For every sensitive attribute s ∈ V s
ui,
the user provides the indistinguishability parameter ks that determines how many attribute values from the domain of s
should be used to hide the true value of s. Aegis allows users to configure the privacy parameter ∆s for every attribute
s. However, to enhance usability, Aegis maintains a default value for the privacy parameter ∆s = 10%. This means
that the privacy of attribute s is achieved if the inference attack cannot distinguish the maximum inferred attribute value
from the kth
SP uses ks, and ∆s for every attribute s ∈ V s
ui to generate the topic suggestion set Si. Note that SP is locally deployed
at the user's machine. Therefore, the user does not have to trust any service outside of her machine. Aegis is designed
to transfer user trust from the social network providers to the local machine. For every sensitive attribute s, SP selects
a fix set of ks − 1 attribute domain values. These ks − 1 attribute values are used to obfuscate the true value of attribute
s, Vui[s].
As shown in Figure 5, in Step 1, the user writes a post to publish on Twitter. SP receives this post and queries T P
about the attributes of all the topics mentioned in this post. SP uses these topic attributes to simulate the adversarial
attack. If T P 's topic inference indicates that k-attribute-indistinguishability is violated for any attribute s ∈ V s
ui, SP
ui but linked to the other attribute values of s in the set of ks − 1 attribute
queries T P for topics with public persona V p
values. For every returned topic, SP ensures that writing about this topic enhances the aggregated inference of the
original post and the obfuscation posts towards ks-attribute-indistinguishability. SP adds these topics to the set Si and
returns them to the user (Step 2). The user selects a few topics from Si to post in Step 3 and submits the posts to SP .
Note that users are required to write the obfuscation posts using their personal writing styles to ensure that the original
posts and the obfuscation posts are indistinguishable [16, 30]. Afterwards, SP ensures that the aggregated inference of
submitted obfuscation posts in addition to the original post lead to k-attribute-indistinguishability. Otherwise, SP keeps
suggesting more topics. As every original post along with its obfuscation posts achieve k-attribute-indistinguishability,
the aggregated inference over the whole user's posts achieve k-attribute-indistinguishability. In Step 4, SP queues the
original and the obfuscation posts and publishes them on the user's behalf in random order and intervals to prevent
timing attacks (Step 5). An adversary can perform a timing attack if the original posts and the obfuscation posts are
distinguishable. Queuing and randomly publishing the posts prevents the adversary from distinguishing original posts
from the obfuscation posts and hence prevents timing attacks.
We understand that the obfuscation writing overhead might alienate users from Aegis. As a future extension, Aegis
can exploit deep neural network language models to learn the user's writing style [21]. Aegis can use such a model
to generate [31] full posts instead of hashtags and users can either directly publish these posts or edit them before
publishing.
5 Experimental Evaluation
In this section, we experimentally evaluate the effectiveness of Aegis in achieving multifaceted privacy. We first present
the experimental setup and analyze some properties of the used dataset in Section 5.1. Then, Sections 5.2 and 5.3
present illustrative inference and obfuscation examples that show the functionality of Aegis using real Twitter topics.
We experimentally show how Aegis can be used to hide user location in Section 5.4 and measure the effect of changing
the indistinguishability parameter k on the obfuscation overhead in Section 5.5. Finally, Section 5.6 illustrates the
efficiency of Aegis on hiding the user gender while preserving other persona attributes.
9
5.1 Experimental Setup
A PREPRINT - MAY 27, 2019
(a) #GiveAway (Negligible Connection)
(b) #2a (Weak Connection)
(c) #Disney (Strong Connection)
Figure 6: Examples of negligible, weak, and strong connection distribution topics for top-20 personas
Although Aegis can be integrated with different social network platform, our prototype implementation is integrated
only with the Twitter social network. Twitter provides developers with several public APIs [8] including the streaming
API that allows developers to crawl 1% of all the postings on Twitter. For our experiments, we use the 1% random
sampling of the Twitter stream during the year 2017. The attributes gender, ethnicity, and location are used to build a
three level topic classification hierarchy that classifies all topics according to their attribute distribution. For simplicity
and without loss of generality, we use the language models in [41] to infer both gender and ethnicity attributes of a post
writer. In addition, we infer the location distribution of different topics using the explicitly geo-tagged posts about these
topics. In the 1% of Twitter's 2017 postings, our models were able to extract 2,126,791 unique topics. Our classification
hierarchy suggests that 66% of the dataset tweets are posted by males. This analysis is consistent with the statistics
published in [7]. In addition, the dataset has 6,864,300 geo-tagged posts, 15% of which originated in California. Finally,
the predominant ethnicity extracted from the dataset is White.
As the classification hierarchy is built using only gender, ethnicity, and state location attributes, this results in a hierarchy
of 500 different paths from the root to a leaf of the hierarchy. These 500 paths result from all the possible combinations
of gender (male, female), ethnicity (White, Black, Asian, Hispanic, Native American), and state location (50 States).
The 500 paths represent the different 500 personas considered in our experiments. Our topic classification hierarchy
suggests that topics vary significantly in their connection to a specific persona path (a gender, ethnicity, and location
combination). For example, #GiveAway is widely discussed among the 500 personas across the 50 States with very
little skew towards specific personas over others. For topics that are widely discussed across all different persona, their
skew is usually proportional to the population density of different States. For example, the top five highly populated
states (CA, TX, FL, NY, and PA) usually appear as the top locations where widely discussed topics are posted. On
the other hand, other topics show strong connection to specific personas. For example, 33.93% of the personas who
write about #Disney are Male, Asian, and live in Florida where Disney World is located. Figure 6 shows 3 examples of
topics that have trivial, weak, and strong connection to specific personas. In Figure 6, the x-axis represents the top-20
personas who post about a topic and the y-axis represents the percentage of postings for each persona. As shown in
Figure 6a, #GiveAway has slight skew (negligible connection) towards some personas over other personas. Also, the
top most persona who post about #GiveAway represent only 3.94% of the overall postings about the topic. On the other
hand, Figure 6b shows that the persona distribution for #2a (refers to the second amendment) has more skew (weak
connection) towards some personas over others. As shown, the top posting persona on the topic #2a contributes 14.03%
of the overall postings of this topic. Finally, a topic like #Disney has remarkable skew (strong connection) towards
some personas over others. As shown in Figure 6c, the top posting persona on the topic #Disney contributes 33.93% of
the overall postings of this topic.
Strength Minimum δ Maximum δ
Negligible
Weak
Mild
Strong
10%
20%
30%
100%
0%
10%
20%
30%
Table 1: Topic to persona connection strength categories and their corresponding δ ranges
We define a topic to persona connection strength parameter δ. δ is defined as the difference in posting percentage
between the top-1 posting persona and the top-k posting persona. For #2a and k = 3, δ = 14.03 − 3.45 = 10.6 while
for #Disney and for k=3, δ = 33.93 − 6.19 = 27.74. We categorize topics into 4 categories according to their δ value.
As shown in Table 1, a topic to persona connection that ranges from 0% to 10% represents a negligible connection and
hence this topic does not reveal the persona attributes of the users who write about it. As the topic to persona connection
10
0 5 10 15 20 25 30 351234567891011121314151617181920Topic postings per persona (%)Top 20 Personas#GiveAway Distribution 0 5 10 15 20 25 30 351234567891011121314151617181920Topic postings per persona (%)Top 20 Personas#2a Distribution 0 5 10 15 20 25 30 351234567891011121314151617181920Topic postings per persona (%)Top 20 Personas#Disney DistributionA PREPRINT - MAY 27, 2019
Topic
#teen
#hot
#etsy
#diy
#actor
#cowboys
Freq M W Ca F W Ca M W Tx F W Tx
7094
7478
2739
1987
725
797
15
13
27
11
9
1
Table 2: Topic Analysis By Persona
4
3
1
1
11
2
7
5
6
3
1
5
1
1
5
7
2
16
increases, the potential of revealing the attributes of the users who write about this topic increases. In our experiments,
we measure the overhead of obfuscation for three different distributions with weak, mild and strong connections having
a topic to persona strength connection ranges that are shown in Table 1
5.2
Illustrative Inference Example
Using our tree data structure we can infer interesting information about different topics on Twitter in our dataset,
specifically regarding correlations between persona and topics. In Table 2 we analyze 7 topics and their connection to 4
of the most prominent personas in our dataset (Male-White-CA, Female-White-CA, Male-White-TX, Female-White-
TX). Frequency denotes the number of times the topic was observed and the number under a persona for a particular
topic denotes the order or rank in which a persona discusses this topic most. For example, among all the persona we
analyze in our dataset, #actor is most discussed by White Male Californians (rank 1) closely followed by White Female
also from California (rank 2). This is followed by other persona out of the focus of Table 2, until White Female Texans
are reached at rank 9 and White Male Texans at rank 11. Also, Table 2 shows that both #teen and #hot are discussed the
most by Female White Californians and that overall Females (in both CA and TX) who discuss this topic are more than
Males in both CA and TX. We can also observe correlations across topics that have semantic connections like #etsy and
#diy. Etsy is an online platform for users to sell DIY (Do It Yourself) projects. Female White Texans are much more
interested in such DIY specific topics than any other of the personas. Lastly, high correlations of certain topics can be
observed with specific locations such as #actor with California and #cowboys with Texas. As Table 2 reveals, the topics
you post on social media significantly reveal your attributes, even private sensitive attributes you are unwilling to share.
As such, we need a tool like Aegis to prevent adversaries from inferring private attributes while preserving others.
5.3
Illustrative Obfuscation Example
Figure 7: Illustrative Gender Obfuscation Example.
In this section, we provide an illustrative obfuscation example that shows how Aegis achieves multifaceted privacy.
This example begins with a newly created Twitter profile of a Male, White user who lives in California. The user
wants to obfuscate his gender among the gender domain values {male, female} achieving 2-gender-indistinguishably.
Indistinguishability holds if the privacy parameter ∆g = 0.1 is achieved. ∆g is set to 0.1 (or 10%) to ensure that users
who write topics with only negligible topic to persona strength connection do not have to add any obfuscation posts to
their timelines as the topics they post do not reveal their sensitive attributes. In addition, the user wants to preserve
his ethnicity and location attributes as his public persona. Now, assume that the user tweets #gowarriors to show his
support for his favorite Californian basketball team, the Golden State Warriors.
11
0 10 20 30 40 50 60 70 80#gowarriors#womenintech#organicfood#bodybuildingGender Inference (%)The Tweeted HashtagsMaleFemaleδ43.0019.0011.007.00A PREPRINT - MAY 27, 2019
(a) Location (Weak)
(b) Location (Mild)
(c) Location (Strong)
(d) Persona (Weak)
(e) Persona (Mild)
(f) Persona (Strong)
Figure 8: Effect of obfuscation posts on location and user persona given weak, mild and strong connected topics to
locations
Unfortunately, as shown in Figure 7, #gowarriors has a strong connection to the male gender attribute value. In
Figure 7, the x-axis represents the posted hashtags one after the other and the y-axis represents the aggregated
gender inferences for both male and female attribute values over all the posted hashtags. In addition, δ represents the
difference of the aggregated gender inference between male and female attribute values. As shown, initially, δ = 43%
which indicates a strong link between the user's gender and the male attribute value. As δ ≥ ∆g, this indicates that
2-gender-indistinguishably is violated.
Therefore, Aegis suggests to post topics that are mainly discussed by White people who live in California but linked
to the female gender attribute value. Figure 7 shows the effect of posting subsequent topics on the aggregated gender
inference. The topic #womenintech helps to reduce the aggregate inference difference to 19%. #organicfood brings
the difference down to 11% and #bodybuilding reduces it to 7%. Notice that δ = 7% achieves δ ≤ ∆g and hence
2-gender-indistinguishably is achieved. Notice that the same example holds if the user's true gender is female. The goal
of Aegis is not to invert the gender attribute value but to achieve inference indistinguishability among kg = 2 different
gender attribute values.
5.4 User Location Obfuscation
The number and the topic to persona connection strength of the obfuscation topics largely depend on the topic to
persona connection strength of the original posts. In this experiment, we show how Aegis is used to hide user location
while preserving their gender and ethnicity. In this experiment, we set kl = 3 where user location is hidden among
three locations. ∆l is set to 0.1 to indicate that 3-location-indistinguishability is achieved if the difference between
the highest (top-1) aggregated location inference and the 3rd (top-3) aggregated location inference is less than 10%.
The number of obfuscation posts needed and their effect on the user persona are reported. This experiment runs using
4707 weak topics, 1984 mild topics, and 1106 strong topics collected from Twitter over several weeks. This experiment
assumes a newly created twitter profile simulated with one of the personas in Table 2. First, a post with some topic to
location connection strength (weak, mild, or strong) is added to the user profile. Then, we add the suggested obfuscation
posts one at a time to the user's timeline. After every added obfuscation post, the location and persona inference are
reported. The reported numbers are aggregated and averaged for every topic to location connection strength category.
Figure 8 shows the effect of adding obfuscation posts on both the location inference and the persona inference for
weak, mild, and strong topics. As shown in Figure 8a, the 4707 weak topics on average need just one obfuscation
suggestion to achieve 3-location-indistinguishability when ∆l = 0.1. Note that adding more obfuscation posts achieves
3-location-indistinguishability for smaller ∆ls (e.g., ∆l = 0.05 (4 suggestions), ∆l = 0.04 (5 suggestions)). Also,
adding one suggestion post achieves 26.5% reduction in δ. The same experiment is repeated for mild and strong topics
and the results are reported in Figures 8b and 8c respectively. Notice that strong topics requires four suggestions on
average to achieve 3-location-indistinguishability when ∆ = 0.1. Also, in Figures 8c, adding a single suggestion post
achieves 49.8% reduction in δ.
12
0 10 20 30 40 50012345Aggregated Location Inference (%)Number of Suggested TopicsTop-1 LocationTop-3 Locationδ12.689.326.935.894.623.76 0 10 20 30 40 50012345Aggregated Location Inference (%)Number of Suggested TopicsTop-1 LocationTop-3 Locationδ23.8612.359.758.227.206.20 0 10 20 30 40 50012345Aggregated Location Inference (%)Number of Suggested TopicsTop-1 LocationTop-3 Locationδ45.8218.4213.1010.909.218.03 65 70 75 80 85 90 95012345Aggregated Attribute Inference (%)Number of Suggested TopicsGenderEthnicity 65 70 75 80 85 90 95012345Aggregated Attribute Inference (%)Number of Suggested TopicsGenderEthnicity 65 70 75 80 85 90 95012345Aggregated Attribute Inference (%)Number of Suggested TopicsGenderEthnicityA PREPRINT - MAY 27, 2019
Figures 8d, 8e, and 8f show the effect on user persona after adding obfuscation posts to weak, mild, and strong posts
respectively. User persona is represented by gender and ethnicity. As obfuscation posts are carefully chosen to align
with the user persona, we observe negligible changes on the average gender and ethnicity inferences after adding
obfuscation posts.
5.5 The Effect of Changing kl
Figure 9: Change in δ as obfuscation posts are added
In this experiment, we measure the effect of changing the parameter kl on the number of obfuscation posts required to
achieve k-location-indistinguishability. kl determines the number of locations within which user ui wants to hide her
true location. Increasing kl increases the achieved privacy and boosts the required obfuscation overhead to achieve
k-location-indistinguishability. Assume users in Texas hide their State level location among 3 States: Texas, Alabama,
and Arizona. A malicious advertiser who wants to target users in Texas is uncertain about their location and now has to
pay 3 times the cost of the original advertisement campaign to reach the same target audience. Therefore, increasing k
inflates the cost of micro-targeting.
This experiment uses 621 strong topics collected from Twitter over several weeks. The average δ = Vui[l]1 − Vui[l]kl
is reported for all topics. In addition, the effect of adding obfuscation posts on the average δ for different values of
kl = 3, 5, and 7 is reported. Figure 9 shows the effect of adding obfuscation posts on the aggregated location inference
for different values of kl. The privacy parameter ∆l is set to ∆l = 0.1.
As shown in Figure 9, achieving 3-location indistinguishability for strong topics requires 4 obfuscation posts on the
average for ∆l = 0.1. On the other hand, 7-location indistinguishability requires more than 5 obfuscation posts for the
same value of ∆l. This result highlights the trade-off between privacy and obfuscation overhead. Achieving higher
privacy levels by increasing kl or lowering ∆l requires more obfuscation posts and hence more overhead. Obfuscation
posts are carefully chosen to align with the user persona. Therefore, we observe negligible changes on the average
gender and ethnicity inferences after adding obfuscation posts for different values of kl.
5.6 User Gender Obfuscation
Figure 10: The effect of obfuscation posts on gender inference for strong connected topics to gender.
13
5 10 15 20 25 30 35 40 45 50012345Aggregated Location Inference (%)Number of Suggested Topicsδ, kl = 3δ, kl = 5δ, kl = 7 0 10 20 30 40 50 60 70 80012345Aggregated Gender Inference (%)Number of Suggested TopicsMaleFemaleδ57.9134.6316.358.414.522.34A PREPRINT - MAY 27, 2019
This experiment shows how Aegis is used to hide user gender while preserving their ethnicity and location. In this
experiment, we set kg = 2 where user gender should be hidden among male and female gender domain values. ∆g is
set to ∆g = 0.1 to indicate that 2-gender-indistinguishability is achieved if the difference between the highest (top-1)
aggregated gender inference and the 2nd (top-2) aggregated gender inference is less than 10%. This experiment runs
over 40 gender strongly connected topics. The aggregated gender inference is reported when adding the original strong
post to the user's timeline and after adding every obfuscation post one at a time. In addition, δ, the difference between the
male gender inference and the female gender inference is reported. 2-gender-indistinguishability is achieved if δ ≤ 10%.
As shown in Figure 10, gender strongly connected topics result in high δ that violates the 2-gender-indistinguishability
privacy target. Therefore, Aegis suggest obfuscation posts that results in δ reduction. Figure 10 shows that strong topics
need on the average 3 obfuscation posts to achieve the gender privacy target. This result is quite consistent with the
location obfuscation experiments in Section 5.4. This shows Aegis's obfuscation mechanism is quite generic and can
be efficiently used to hide different user sensitive attributes. Finally, as the obfuscation posts are carefully chosen to
align with the user's public persona attributes, we observed negligible changes on the average location and ethnicity
inferences after adding obfuscation posts.
6 Related Work
The problem of sensitive attribute privacy of social network users has been extensively studied in the literature from
different angles. k-anonymity [40, 42, 43] and its successors l-diversity [35] and t-closeness [34] are well-known and
widely used privacy models in publishing dataset to hide user information among a set of indistinguishable users in
the dataset. Also, differential privacy [22 -- 24] has been widely used in the context of dataset publishing to hide the
identity of a user in a published dataset. These models focus on hiding user identity among other users in the published
dataset. Another variation of differential privacy is pan-privacy [25]. Pan-privacy is designed to work for data streams
and hence it is more suitable for social network streams privacy. However, these models are service centric and assume
trusted service providers. In this paper, we tackle the privacy problem from the end-user angle where the user identity is
known and all their online social network postings are public and connected to their identity. Our goal is to confuse
content-based sensitive attribute inference attacks by hiding the user's original public posts among other obfuscation
posts. Our multifaceted privacy achieves the privacy of user sensitive attributes without altering their public persona.
In the context of social networks privacy, earlier works focus on sensitive attribute inferences due to the structure of
social networks. In [47], Zhelava and Getoor attempt to infer the user's sensitive attributes using public and private user
profiles. However, the authors do not provide a solution to prevent such inference attacks. Georgiou et al. [26, 27]
study the inference of sensitive attributes in the presence of community-aware trending topic reports. An attacker can
increase their inference confidence by consuming these reports and the corresponding community characteristics of the
involved users. In [27], a mechanism is proposed to prevent social network services from publishing trending topics
that reveal information about individual users. However, this mechanism is service centric and it is not suitable for
hiding a user's sensitive attributes against content-based inference attacks. Ahmad et al. [15] introduce a client-centered
obfuscation solution for protecting user privacy in personalized web searches. The privacy of a search query is achieved
by hiding it among other obfuscation search queries. Although this work is client-centered, it is not suitable for social
networks privacy where the user online persona has to be preserved.
Recent works have focused on the privacy of some sensitive attributes such as location of social network users. Ghufran
et al. [28] show that social graph analysis can reveal user location from friends and followers locations. Although, it
is important to protect user sensitive attributes like location against this attack, Aegis focuses only on content-based
inference attacks. Yakout et al. [44] proposed a system called Privometer, which measures how much privacy leaks
from certain user actions (or from their friends' actions) and creates a set of suggestions that could reduce the risk of a
sensitive attribute being successfully inferred. Similar to Privometer, [32] proposes sanitation techniques to the structure
of the social graph by introducing noise, and obfuscating edges in the social graphs to prevent sensitive information
inference. Andres et al. [17] propose geo-indistinguishability, a location privacy model that uses differential privacy
to hide a user's exact location in a circle of radius r from locaction based service providers. In a recent work, Zhang
et al. [46] introduce Tagvisor, a system to protect users against content-based inference attacks. However, Tagvisor
requires users to alter their posts by changing or replacing hashtags that reveal their location. Other works [18, 29]
depend on user collaboration to hide an individual's exact location among the location of the collaboration group. This
approach requires group members to collaborate and synchronously change their identities to confuse adversaries.
However, these techniques are prone to content-based inference attacks and collaboration between users might be hard
to achieve in the social network context. For location based services, Mokbel et al. [36] use location generalization and
k-anonymity to hide the exact location of a query. These works do not preserve the user online persona while achieving
location privacy. In addition, these works do not provide a generic mechanism to hide other sensitive attributes such as
user gender and ethnicity.
14
A PREPRINT - MAY 27, 2019
This paper presents Aegis, the first persona friendly system that enables users to hide their sensitive attributes while
preserving their online persona. Aegis is a client-centric solution that can be used to hide any user specified sensitive
attribute. Aegis does not require users to alter their original posts or topics. Instead, Aegis hides the user's original
posts among other obfuscation posts that are aligned with their persona but linked to other sensitive attribute values
achieving k-attribute-indistinguishability.
7 Future Extensions
Research in the social network privacy has focused on dataset publishing and obfuscating user information among other
users. Such focus is service centric and assumes that service providers are trusted. However, Aegis is user centric and
aims to give the users control over their own privacy. This control comes with a cost represented by the obfuscation
posts that need to be posted by users. The role of Aegis is to automate the topic suggestion process and to ensure that
k-attribute-indistinguishability holds against content-base inference attacks. There are several directions where these
obfuscation and privacy models can evolve.
Obfuscation Post Generation. Aegis suggests topics as keywords or hashtags and requires users to write the obfuscation
posts using their personal writing styles to ensure that the original posts and the obfuscation posts are indistinguishable.
However, the obfuscation writing overhead might alienate users from Aegis. Instead, Aegis can exploit deep neural
network language models to learn the user's writing style. Aegis can use such a model to suggest full posts instead of
hashtags and users can either directly publish these posts or edit them before publishing. This extension aims to reduce
the overhead on the users by automating the obfuscation post generation.
Social Graph Attack Prevention. Aegis is mainly designed to obfuscate the user sensitive attributes against content-based
inference attacks. An orthogonal attack is to use the attribute values of friends and followers to infer a user's real
sensitive attribute value. Take location as a sensitive attribute example. Ghufran et al., [28] show that user location can
be inferred from the locations of followers and friends. A user whose friends are mostly from NYC is highly probable
to be from NYC. Aegis can be extended to prevent this attack. Users of similar persona but different locations can
create an indistinguishability network where users in this network have followers and friends from different locations.
Similar to the obfuscation topics, Aegis could suggest users to follow with similar persona but different locations.
8 Conclusion
In this paper, we propose multifaceted privacy, a novel privacy model that obfuscates a user's sensitive attributes
while publicly revealing their public online persona. To achieve the multifaceted privacy, we build Aegis, a prototype
client-centric social network stream processing system that achieves multifaceted privacy. Aegis is user-centric and
allows social network users to control which persona attributes should be publicly revealed and which should be kept
private. Aegis is designed to transfer user trust from the social network providers to her local machine. For this, Aegis
continuously suggests topics and hashtags to social network users to post in order to obfuscate their sensitive attributes
and hence confuse content-based sensitive attribute inferences. The suggested topics are carefully chosen to preserve
the user's publicly revealed persona attributes while hiding their private sensitive persona attributes. Our experiments
show that Aegis is able to achieve sensitive attributes privacy such as location and gender. Adding as few as 0 to 4
obfuscation posts (depending on how strongly connected the original post is to a persona) successfully hides the user
specified sensitive attributes without altering the user's public persona attributes.
References
[1] Facebook, instagram, and twitter provided data access for a surveillance product marketed to target activists of
color. https://www.aclunc.org/blog/facebook-instagram-and-twitter-provided-data-access-
surveillance-product-marketed-target, 2016.
[2] Russia-linked facebook ads reportedly aimed for swing states. http://fortune.com/2017/10/04/trump-
russia-facebook-ads-michigan-wisconsin-swing/, 2017.
[3] Russian-linked facebook ads targeted michigan and wisconsin.
https://www.cnn.com/2017/10/03/
politics/russian-facebook-ads-michigan-wisconsin/index.html, 2017.
[4] Tor Browser. https://www.torproject.org/, 2017.
[5] Aclu and workers take on facebook for gender discrimination in job ads. https://www.aclu.org/news/aclu-
and-workers-take-facebook-gender-discrimination-job-ads, 2018.
15
A PREPRINT - MAY 27, 2019
[6] Cambridge analytica data breach.
http://www.businessinsider.com/cambridge-analytica-data-
breach-harvested-private-facebook-messages-2018-4, 2018.
[7] Distribution of twitter users worldwide as of october 2018, by gender.
https://www.statista.com/
statistics/828092/distribution-of-users-on-twitter-worldwide-gender/, 2018.
[8] Docs -- twitter developers. https://developer.twitter.com/en/docs.html, 2018.
[9] Facebook pixel. https://www.facebook.com/business/learn/facebook-ads-pixel, 2018.
[10] Facebook will
https://www.
theverge.com/2018/8/21/17764480/facebook-ad-targeting-options-removal-housing-racial-
discrimination, 2018.
remove 5,000 ad targeting categories
to prevent discrimination.
[11] Monthly active Facebook users. https://www.statista.com/statistics/264810/number-of-monthly-
active-facebook-users-worldwide/, 2018.
[12] Monthly active instagram users. https://www.statista.com/statistics/253577/number-of-monthly-
active-instagram-users/, 2018.
[13] Monthly active Twitter users. https://www.statista.com/statistics/282087/number-of-monthly-
active-twitter-users/, 2018.
[14] Other data breaches like cambridge analytica. https://www.cnbc.com/2018/04/08/cubeyou-cambridge-
like-app-collected-data-on-millions-from-facebook.html, 2018.
[15] W. U. Ahmad, K.-W. Chang, and H. Wang. Intent-aware query obfuscation for privacy protection in personalized
web search. In The 41st International ACM SIGIR Conference on Research & Development in Information
Retrieval, pages 285 -- 294. ACM, 2018.
[16] M. Anderson. Researchers take author recognition to neural networks. https://thestack.com/world/2016/
06/07/researchers-take-author-recognition-to-neural-networks/, 2016.
[17] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential
privacy for location-based systems. In Proc. of ACM SIGSAC, CCS '13, pages 901 -- 914. ACM, 2013.
[18] J. W. Brown, O. Ohrimenko, and R. Tamassia. Haze: Privacy-preserving real-time traffic statistics. In Proc. of
ACM SIGSPATIAL, pages 540 -- 543. ACM, 2013.
[19] S. Chandra, L. Khan, and F. B. Muhaya. Estimating twitter user location using social interactions -- a content based
approach. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social
Computing (SocialCom), 2011 IEEE Third International Conference on, pages 838 -- 843. IEEE, 2011.
[20] Z. Cheng, J. Caverlee, and K. Lee. You are where you tweet: a content-based approach to geo-locating twitter
users. In Proceedings of the 19th ACM international conference on Information and knowledge management,
pages 759 -- 768. ACM, 2010.
[21] S. H. Ding, B. C. Fung, F. Iqbal, and W. K. Cheung. Learning stylometric representations for authorship analysis.
IEEE Transactions on Cybernetics, 2017.
[22] C. Dwork. Automata, Languages and Programming: ICALP 2006, Proceedings, Part II, chapter Differential
Privacy, pages 1 -- 12. Springer Berlin Heidelberg, 2006.
[23] C. Dwork. Differential privacy: A survey of results. In International Conference on Theory and Applications of
Models of Computation, pages 1 -- 19. Springer, 2008.
[24] C. Dwork. Differential privacy. In Encyclopedia of Cryptography and Security, pages 338 -- 340. Springer, 2011.
[25] C. Dwork, M. Naor, T. Pitassi, G. N. Rothblum, and S. Yekhanin. Pan-private streaming algorithms. In Proceedings
of ICS, 2010.
[26] T. Georgiou, A. El Abbadi, and X. Yan. Extracting topics with focused communities for social content recom-
mendation. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social
Computing, 2017.
[27] T. Georgiou, A. El Abbadi, and X. Yan. Privacy-preserving community-aware trending topic detection in online
In IFIP Annual Conference on Data and Applications Security and Privacy, pages 205 -- 224.
social media.
Springer, 2017.
[28] M. Ghufran, G. Quercini, and N. Bennacer. Toponym disambiguation in online social network profiles. In
Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems,
page 6. ACM, 2015.
16
A PREPRINT - MAY 27, 2019
[29] X. Gong, X. Chen, K. Xing, D.-H. Shin, M. Zhang, and J. Zhang. Personalized location privacy in mobile
networks: A social group utility approach. In Computer Communications (INFOCOM), 2015 IEEE Conference
on, pages 1008 -- 1016. IEEE, 2015.
[30] T. Grant. How text-messaging slips can help catch murderers. https://www.independent.co.uk/voices/
commentators/dr-tim-grant-how-text-messaging-slips-can-help-catch-murderers-923503.
html, 2008.
[31] A. Graves. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850, 2013.
[32] R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. Preventing private information inference attacks on social
networks. IEEE TKDE, 25(8):1849 -- 1862, 2013.
[33] M. Kosinski, D. Stillwell, and T. Graepel. Private traits and attributes are predictable from digital records of
human behavior. Proceedings of the National Academy of Sciences, 110(15):5802 -- 5805, 2013.
[34] N. Li, T. Li, and S. Venkatasubramanian. t-closeness: Privacy beyond k-anonymity and l-diversity. In IEEE ICDE,
pages 106 -- 115, April 2007.
[35] A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam. L-diversity: Privacy beyond k-anonymity.
ACM Trans. Knowl. Discov. Data, 1(1), Mar. 2007.
[36] M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper: Query processing for location services without
compromising privacy. In Proc. of VLDB, pages 763 -- 774, 2006.
[37] H. Nissenbaum. Privacy as contextual integrity. Wash. L. Rev., 79:119, 2004.
[38] M. J. Paul and M. Dredze. You are what you tweet: Analyzing twitter for public health. Icwsm, 20:265 -- 272, 2011.
[39] R. L. Rivest et al. Chaffing and winnowing: Confidentiality without encryption. CryptoBytes (RSA laboratories),
4(1):12 -- 17, 1998.
[40] P. Samarati. Protecting respondents identities in microdata release. IEEE TKDE, 13(6):1010 -- 1027, 2001.
[41] H. A. Schwartz, J. C. Eichstaedt, M. L. Kern, L. Dziurzynski, S. M. Ramones, M. Agrawal, A. Shah, M. Kosinski,
D. Stillwell, M. E. Seligman, et al. Personality, gender, and age in the language of social media: The open-
vocabulary approach. PloS one, 8(9):e73791, 2013.
[42] L. Sweeney. Achieving k-anonymity privacy protection using generalization and suppression. International
Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):571 -- 588, 2002.
[43] L. Sweeney. K-anonymity: A model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl.-Based Syst.,
10(5):557 -- 570, Oct. 2002.
[44] M. Yakout, M. Ouzzani, H. Elmeleegy, N. Talukder, and A. K. Elmagarmid. Privometer: Privacy protection in
social networks. IEEE ICDEW, 00:266 -- 269, 2010.
[45] V. Zakhary, C. Sahin, T. Georgiou, and A. El Abbadi. Locborg: Hiding social media user location while
maintaining online persona. In Proceedings of the 25th ACM SIGSPATIAL International Conference on Advances
in Geographic Information Systems, page 12. ACM, 2017.
[46] Y. Zhang, M. Humbert, T. Rahman, C.-T. Li, J. Pang, and M. Backes. Tagvisor: A privacy advisor for sharing
hashtags. arXiv preprint arXiv:1802.04122, 2018.
[47] E. Zheleva and L. Getoor. To join or not to join: the illusion of privacy in social networks with mixed public and
private user profiles. In Proc. of WWW, pages 531 -- 540. ACM, 2009.
17
|
1801.09946 | 2 | 1801 | 2018-04-20T10:48:17 | "23andMe confirms: I'm super white" -- Analyzing Twitter Discourse On Genetic Testing | [
"cs.SI",
"cs.CY"
] | Recent progress in genomics is bringing genetic testing to the masses. Participatory public initiatives are underway to sequence the genome of millions of volunteers, and a new market is booming with a number of companies like 23andMe and AncestryDNA offering affordable tests directly to consumers. Consequently, news, experiences, and views on genetic testing are increasingly shared and discussed online and on social networks like Twitter. In this paper, we present a large-scale analysis of Twitter discourse on genetic testing. We collect 302K tweets from 113K users, posted over 2.5 years, by using thirteen keywords related to genetic testing companies and public initiatives as search keywords. We study both the tweets and the users posting them along several axes, aiming to understand who tweets about genetic testing, what they talk about, and how they use Twitter for that. Among other things, we find that tweets about genetic testing originate from accounts that overall appear to be interested in digital health and technology. Also, marketing efforts as well as announcements, such as the FDA's suspension of 23andMe's health reports, influence the type and the nature of user engagement.Finally, we report on users who share screenshots of their results, and raise a few ethical and societal questions as we find evidence of groups associating genetic testing to racist ideologies. | cs.SI | cs | "23andMe confirms: I'm super white"
Analyzing Twitter Discourse On Genetic Testing
Alexandros Mittos1, Jeremy Blackburn2, and Emiliano De Cristofaro1
1University College London 2University of Alabama at Birmingham
{a.mittos, e.decristofaro}@ucl.ac.uk, [email protected]
8
1
0
2
r
p
A
0
2
]
I
S
.
s
c
[
2
v
6
4
9
9
0
.
1
0
8
1
:
v
i
X
r
a
Abstract
Recent progress in genomics is bringing genetic testing to
the masses. Participatory public initiatives are underway to se-
quence the genome of millions of volunteers, and a new mar-
ket is booming with a number of companies like 23andMe and
AncestryDNA offering affordable tests directly to consumers.
Consequently, news, experiences, and views on genetic testing
are increasingly shared and discussed online and on social net-
works like Twitter. In this paper, we present a large-scale anal-
ysis of Twitter discourse on genetic testing. We collect 302K
tweets from 113K users, posted over 2.5 years, by using thir-
teen keywords related to genetic testing companies and public
initiatives as search keywords. We study both the tweets and
the users posting them along several axes, aiming to under-
stand who tweets about genetic testing, what they talk about,
and how they use Twitter for that. Among other things, we find
that tweets about genetic testing originate from accounts that
overall appear to be interested in digital health and technology.
Also, marketing efforts as well as announcements, such as the
FDA's suspension of 23andMe's health reports, influence the
type and the nature of user engagement. Finally, we report on
users who share screenshots of their results, and raise a few
ethical and societal questions as we find evidence of groups
associating genetic testing to racist ideologies.
1
Introduction
In 1990, the Human Genome Project was kicked off with
the goal of producing the first complete sequence of a human
genome; at a cost of almost $3 billion, it was completed 13
years later [23]. Since then, costs have dropped at a stagger-
ing rate: by 2006, high-quality sequencing of a human genome
cost $14 million, and, by 2016, private individuals could have
their genomes sequenced for about $1,500 [27]. This rapid
progress is paving the way to personalized medicine, a con-
cept advocating for diagnosis and treatment to be tailored to
patients' genetic features, aiming to make healthcare more
preventive and effective [2]. It also enables public initiatives
to sequence large numbers of genomes and build large bio-
repositories for research purposes; for instance, the Precision
Medicine research program in US (now called All Of Us)
or the Genomics England project in UK are sequencing the
genomes of, respectively, 1M and 100K volunteers.
Moreover, a number of companies have entered the flour-
ishing market of direct-to-consumer (DTC) genetic testing.
Rather than visiting a clinic, customers purchase a collection
kit for a few hundred dollars or less, deposit a saliva sample,
and mail it back; after a few days, they receive a report with
information about genetic health risks (e.g., susceptibility to
Alzheimer's), wellness (e.g., lactose intolerance), and/or an-
cestry and genealogy information. Today, there are hundreds
of DTC companies – naturally, some more reputable than oth-
ers [30] – including 23andMe (which provides reports on car-
rier status, health, and ancestry) and AncestryDNA (which fo-
cuses on genealogy and ancestry). As of Jan 2018, 23andMe
has tested 2M and AncestryDNA 5M customers.1
Traditionally, health-related issues were communicated to
patients primarily by doctors and clinicians-the advent of
direct-to-consumer genetic testing changes this substantially.
Individuals can now learn potentially life-changing results
with a few clicks of the mouse, without contacting a medical
professional. Also, as results are delivered electronically, they
are more easily shared with others. Affordable DTC products
and participatory sequencing initiatives make genetic testing
increasingly more accessible and available to the general pop-
ulation. Like with other aspects of digital health, this leads to
social media attracting discussions, sharing of experiences, and
molding of perceptions around genetic testing, thus becoming
a key platform for related news and marketing efforts. How-
ever, while the research community has analyzed in great detail
the interlinked relationship between health and social networks
such as Twitter, to the best of our knowledge, genetic testing
discourse on social media has not been adequately studied.
To this end, in this paper, we set to address a few open ques-
tions: 1) What are the tweets related to genetic testing really
about? 2) Which accounts are particularly active in tweeting
and what do they talk about? 3) Is the discussion about genetic
testing dominated by certain keywords, themes, or companies?
4) What is the overall sentiment and what topics relate to more
negative sentiment? (We focus on Twitter due to its popularity
and the relatively ease of collecting data).
Aiming to answer these questions, we present an ex-
ploratory, large-scale analysis of Twitter discourse related to
genetic testing. Starting from 10 keywords related to DTC ge-
netics companies and 3 to genomics initiatives, we search and
crawl all available tweets containing these keywords that were
posted between Jan 1, 2015 and Jul 31, 2017. We collect 302K
tweets from 113K users, and analyze them along several axes,
1See http://for.tn/2eYVJuD and http://ancstry.me/2zH3HBN
1
seeking to understand who tweets about genetic testing, what
they talk about, and how they use Twitter for that. Specifically,
after presenting a general characterization of our dataset, we
analyze the tweets content-wise, studying the most common
hashtags/URLs and measuring sentiment. Next, we perform a
user-based analysis, looking at the profiles and their location,
and assessing whether they are likely to be bots. We also se-
lect a random sample of 15K users and analyze their latest 1K
tweets to study their interests. Note that, as a substantial chunk
of tweets turns out to be about DTC companies 23andMe and
AncestryDNA, we present a few case studies focused on them.
Finally, we examine the most negative tweets in our dataset,
finding a number of tweets related to racism and hate-speech,
as well as fears of privacy and data misuse, and look for in-
stances of users sharing screenshots of their test results.
Overall, our study leads to a few interesting observations:
1. Users tweeting about genetic testing seem overall inter-
ested in digital health and technology, although the con-
versation is often dominated by those with a vested in-
terest in its success, e.g., specialist journalists, medical
professionals, entrepreneurs, etc.
2. The two most popular DTC companies, 23andMe and An-
cestryDNA, also generate the most tweets. However, al-
though 23andMe has half the customers, it produces al-
most 5 times more tweets, which is also due to contro-
versy around their failure to get FDA approval in 2015.
3. Sentiment around initiatives is positive, with cover-
age boosted by mainstream news and announcements
(e.g. President Obama's) and neutral for DTC companies,
although with a few strongly opinionated users.
4. There is a clear distinction in the marketing efforts under-
taken by different companies, which naturally influence
the type and the nature of users' engagement; e.g., we
find the the promotional hashtag #sweepstakes in 1 out 8
tweets containing the keyword AncestryDNA.
5. We find a limited presence of social bots, with some key-
words attracting a different degree of automated publish-
ing, as some topics seem to be more popular among indi-
viduals than others.
6. We find evidence of groups using genetic testing to push
racist and anti-semitic agendas, and of users expressing
concerns about privacy and data protection
7. A non-negligible amount of users share and discuss
screenshots of their ancestry test results, despite the pos-
sible privacy implications.
Paper organization. The rest of the paper is organized as fol-
lows. In Section 2 we present related work focusing on the
following three themes: i) user perspectives on genetic testing,
ii) health in social networks, and iii) analysis of social media
discourse. In Section 3 we present our methodology for col-
lecting the dataset. In Section 4 we present a general charac-
terization of the tweets in our dataset. In Section 5 we study the
most common hashtags and URLs, and we measure the over-
all sentiment of tweets. In Section 6 we study the profiles of
people who tweet about genetic testing. Finally, in Section 7
we examine several cases where genetic testing is being used
to promote racist agendas, instances of people expressing con-
cerns about privacy, and of people sharing screenshots of their
ancestry test results online.
2 Related Work
User perspectives on genetic testing. A few qualitative stud-
ies have analyzed users' perspectives on genetic testing. Gold-
smith et al. [17] review 17 studies conducted in 6 different
countries, finding that, although participants appear to be inter-
ested in the health-related aspects of testing, they also express
concerns about privacy and reliability. Covolo et al. [12] re-
view 118 articles, highlighting that users are drawn to genetic
testing by the potential to monitor and improve their health.
Caulfield et al. [7] analyze the controversy around Myriad Ge-
netics following their attempt to patent the BRCA gene which
is associated with predisposition to breast cancer.
Closer to our work are quantitative studies using social me-
dia, however, to the best of our knowledge, the only relevant
work is by Chow-White et al. [10], who look at one week's
worth of tweets containing '23andMe', performing a simple
sentiment analysis, finding that positive tweets outnumber neg-
ative ones and that people tend to be enthusiastic about it.
Their analysis only studies one company and only sentiment,
whereas, we focus on 10 companies and 3 initiatives and con-
duct deeper statistical, content, and user-based analyses. Also,
they rely on a much smaller dataset, 2K vs 324K tweets, col-
lected over 1 week vs 2.5 years.
Health in social networks. Social networks like Twitter have
been used extensively to study health and health-related is-
sues, e.g., to measure and predict depression. De Choudhury
et al. [13] identify 476 users self-reporting depression, collect
their tweets, and study their engagement, emotion, and use of
depressive language. By comparing to a control group, they
extract significant differences, and build a classifier to predict
the likelihood of an individual's depression. Coppersmith et
al. [11] study tweets related to various mental disorders, while
Paul et al. [29] gather public health information from Twitter,
discovering statistically significant correlations between Twit-
ter and official health statistics. Abbar et al. [1] analyze the
nutritional behavior of US citizens: they collect 892K tweets
by 400K US users using food-related keywords and find that
foods match obesity and diabetes statistics, and that Twitter
friends tend to share the same preferences in food consump-
tion. Prasetyo et al. [31] study how social media can effect
awareness in health campaigns. Focusing on the Movember
charity campaign, they collect more than 1M tweets, using the
keyword 'Movember', and uncover correlations between the
visitors of the Movember website and popular Twitter users,
but none between tweets and donations.
Analyzing social media discourse. Cavazos-Rehg et al. [8]
study drinking behaviors on Twitter: using keywords related
to drinking (e.g., drunk, alcohol, wasted), they collect 10M
2
tweets and identify the most common themes related to pro-
drinking and anti-drinking behavior. Lerman et al. [24] con-
duct an emotion analysis on tweets from Los Angeles: using
public demographic data, they find that users with lower in-
come and education levels, and who engage with less diverse
social contacts, express more negative emotions, while peo-
ple with higher income and education levels post more posi-
tive messages. Chatzakou et al. [9] study the GamerGate con-
troversy2 on Twitter, collecting a dataset of tweets containing
keywords indicating abusive behavior. They compare the char-
acteristics of the related Twitter profiles to a baseline, find-
ing that users tweeting about Gamergate are more technologi-
cally savvy and active, and that their tweets are more negative.
Burnap et al. [6] study Twitter response to a terrorist attack
occurred in Woolwich in 2013. Using 'Woolwich' as a key-
word search, they collect 427K tweets, finding that opinions
and emotional factors are predictive of size and survival of in-
formation flows.
3 Dataset
We now present the methodology used to gather the tweets
studied in this paper. We build a dataset with tweets containing
keywords related to (1) direct-to-consumer (DTC) genetic test-
ing companies, and (2) public genome sequencing initiatives,
using these keywords as search queries and crawling all tweets
posted from Jan 1, 2015 to Jul 31, 2017 returned as results.
DTC genetic testing companies. We start from a list of 36
DTC genetic testing companies compiled by the International
Society of Genetic Genealogy3, which provides a good sam-
ple of the DTC ecosystem. We use each company's name as
a search keyword; if the search returns less than 1,000 tweets,
we discard it. In the end, we collect tweets for 10 companies:
23andMe, AncestryDNA, Counsyl, DNAFit, FamilyTreeDNA,
FitnessGenes, MapMyGenome, PathwayGenomics, Ubiome,
and VeritasGenetics. We opt for keywords not separated by
spaces (e.g., VeritasGenetics) rather than quoted search (e.g.,
"Veritas Genetics") since we notice that companies are primar-
ily discussed via hashtags or mentions, and because Twitter's
search engine does not provide exact results with quotes.
Genomics initiatives. Besides tweets related to for-profit com-
panies, we also want to study discourse related to public se-
quencing initiatives and related concepts. Thus, we select three
more keywords: PrecisionMedicine, PersonalizedMedicine,
and GenomicsEngland. Personalized Medicine aims to make
diagnosis, treatment, and care of patients tailored and opti-
mized to their specific genetic makeup. Precision Medicine
conveys a similar concept, but also refers to the initiative se-
quencing the genome of 1M individuals announced by Presi-
dent Obama in 2015to understand how a person's genetics, en-
vironment, and lifestyle can help determine the best approach
to prevent or treat disease.4 Genomics England is a similar UK
initiative with 100K volunteers, primarily focusing on cancer
and rare disease research. Once again, we search for keywords
not separated by spaces (e.g., PrecisionMedicine) since these
2https://en.wikipedia.org/wiki/Gamergate controversy
3https://isogg.org/wiki/List of DNA testing companies
4https://ghr.nlm.nih.gov/primer/precisionmedicine/initiative
Figure 1: Number of tweets per user account.
concepts are mostly discussed via hashtags and because of the
incorrectness of the search engine.
Crawl. We use a custom Python script to collect all posted
tweets from Jan 1, 2015 to Jul 31, 2017 returned as search re-
sults using the 10 DTC keywords and the 3 keywords related to
genomics initiatives. The crawler, run with self-imposed throt-
tling to avoid issues for the site operators over in Fall 2017,
collects, for each tweet, its content, the username, date and
time, the number of retweets and likes, as well as the URL
of the tweet. It also visits the profile of the users posting each
tweet, collecting their location (if any), the number of follow-
ers, following, tweets, and likes. Overall, we collect a total of
191K tweets from 94K users for the 10 DTC companies and
111K from 19K users for the 3 initiatives.
Baseline. We also collect a set of 163,260 random English
tweets, from the same Jan 2015 to Jul 2017 period (approx.
170 per day), which serves as a baseline set for comparisons.
Remarks. The keyword search also returns accounts that
match that keyword, e.g.,
including 23andMe,
#23andMe, or @23andMe, but also those posted by the
@23andMe account. For consistency, we discard the latter, an-
alyzing them separately when relevant. Note that our dataset
includes tweets from users who discuss their opinions on ge-
netic testing, but also blog posts, ads, news articles, etc. As our
goal is to discover how genetic testing is reflected through the
lens of Twitter, we choose not to discard any of the above sub-
sets in an attempt to "clean" the dataset, or to focus only on
certain kinds of profiles. Nevertheless, in Sec. 6, we do shed
light on the users tweeting about genetic testing, as well as
those who publish their genetic tests results.
tweets
4 General Characterization
We now present a general characterization of the tweets in
our dataset. Simple statistics of our keyword-based dataset are
reported in Table 1. From left to right, the table lists the total
number of tweets, unique users, retweets, and likes for each
of the 13 keywords and the random baseline. We also quantify
the percentage of tweets made by the official accounts of each
company or initiative, as well as the percentage of tweets in-
cluding media (images and videos), quoted tweets, hashtags,
and URLs, and how many of them are in the Alexa Top 1M.
3
Top 1M
75.40%
23andMe
49.68%
AncestryDNA
74.97%
Counsyl
79.18%
DNAFit
69.21%
FamilyTreeDNA
71.28%
FitnessGenes
64.30%
MapMyGenome
68.12%
PathwayGenomics
64.19%
Ubiome
71.95%
VeritasGenetics
48.82%
Genomics England
71.98%
Personalized Medicine
77.16%
Precision Medicine
Total
71.80%
Baseline
89.57%
Table 1: Our keyword dataset, with all tweets from January 1, 2015 to July 31, 2017 containing keywords related to genetic testing.
Quotes Hashtags
Likes Official Media
3.49%
6.14%
1.31%
2.69%
8.79%
7.08%
4.64%
3.49%
6.98%
5.37%
15.34% 18.74%
6.62%
4.36% 19.97%
9.40%
16.29% 18.47%
4.99%
15.30% 13.13%
6.11%
2.13% 18.51%
2.71%
2.85%
4.37%
6.65% 17.07% 17.07%
19.68% 17.80% 11.58%
6.93%
7.55%
8.56% 10.41%
7.75%
5.92%
41.20% 12.07%
URLs
27.23% 68.68%
54.29% 75.50%
44.01% 83.94%
57.22% 78.94%
34.18% 36.47%
44.53% 56.76%
53.63% 80.35%
61.01% 76.55%
27.85% 73.28%
46.13% 58.28%
61.19% 69.18%
99.93% 87.42%
99.88% 83.39%
56.54% 74.77%
23.48% 45.49%
149,897
47,249
4,255
2,508
3,111
2,809
3,726
2,521
13,991
2,526
18,756
15,514
128,303
395,166
486,960,753
Tweets
132,597
29,071
3,862
2,118
2,794
2,142
1,568
1,544
14,420
1,292
7,009
20,302
83,329
302,048
163,260
Users
64,014
16,905
1,834
844
1,205
773
704
579
6,762
497
1,863
4,631
13,012
113,624
131,712
RTs
72,848
16,266
2,716
1,336
1,196
908
4,488
1,968
9,223
1,443
19,772
19,085
118,043
269,292
282,063,006
–
–
2.26%
–
tinct users); AncestryDNA is a distant second (30K tweets
from 16.9K users). Given their large customer bases, this
should not come as a surprise. However, it is surprising that
23andMe has 4.6 times as many tweets as AncenstryDNA
even though AncestryDNA has over twice the customers as
23andMe. The least popular companies are MapMyGenome,
PathwayGenomics, and VeritasGenetics, with less than 2K
tweets each over our 2.5 year collection period. Among the ini-
tiatives, Precision Medicine generates a relative high number
of tweets (83K from 13K users), much more so than Personal-
ized Medicine (20K tweets).
Tweets per user. For each keyword, we also measure the num-
ber of tweets per user(see Figure 1). We find that the me-
dian for every keyword is 1; i.e., 50% of users tweet about
a given DTC company or initiative only once. However, we do
find differences in the outliers for different keywords. For in-
stance, there are several highly engaged users tweeting about
Personalized Medicine and Precision Medicine. Manual exam-
ination of these users indicates that most of them are medical
researchers and companies actively promoting the initiatives
as hashtags. The presence of these heavily "invested" users be-
comes more apparent when we look at the number of tweets
as a function of the number of unique keywords a user posts
about, as plotted in Figure 2: 95% of them post about only one
keyword, and those that post in more than one tend to post sub-
stantially more tweets about genetic testing in general; in some
cases, orders of magnitude more tweets.
Retweets and Likes. The total number of retweets and likes
per tweet in the baseline is substantially higher than for
tweets related to genetic testing due to outliers, i.e., viral
tweets or tweets posted by famous accounts (e.g., a tweet by
@POTUS44 on January 11, 2017 has 875,844 retweets and
1,862,249 likes). However, the median for retweets and likes
in the baseline dataset mirrors that of tweets in our keywords
dataset, with values between 0 and 1.
Note that, although the number of retweets and likes per
tweet could be influenced by how old the tweets are, this is
not really the case in our dataset. We collect tweets posted
up to July 2017 starting in late-August 2017, allowing ample
time for retweets and likes to occur, considering that previ-
ous work [22] indicates that 75% of retweets happen within 24
Figure 2: Number of tweets per user as a function of the number of
unique keywords they tweeted about.
DTC vs Initiatives. Overall, we find differences between
tweets about DTC genetic testing companies and those about
genomics initiatives. The majority of the latter come from a
smaller set of users compared to the former, i.e., a few very
dedicated users drive the discussion about genomics initiatives.
This is evident from Figure 1, which plots the number of tweets
per user for each keyword: Personalized Medicine and Preci-
sion Medicine have more outliers than most of the DTC genetic
companies (although the median for all keywords is 1). We
also find these tweets are more likely to contain URLs (87%
and 83% of tweets, respectively) than most companies, and
even more so when compared to the baseline (45%). This sug-
gests that tweets about these topics often include links to news
and/or other external resources.
Only around 50% of URLs linked from tweets related to
Genomics England or AncestryDNA are in the Alexa top 1M,
compared to 60–75% for other keywords. For Genomics Eng-
land, this is due to many URLs pointing to genomicsengland.
co.uk itself. For AncenstryDNA, whose official site at ancestry.
com is in the top 1M, it appears to be due to a very large num-
ber of marketing URLs tweeted along with the keyword; we
discuss this further later on.
Number of tweets. 23andMe is by far the most popular key-
word, with one order of magnitude more tweets than any
other company (130K in total, around 140/day, from 64K dis-
4
promotion strategies (see Sec. 5). We also find a number of
outliers for 23andMe, mostly around Feb 20 and Oct 19, 2015,
and Apr 6, 2017, which are key dates related to 23andMe's
failure to get FDA approval for their health reports in 2015,
then obtained in 2017. In fact, 20K/132K 23andMe tweets are
posted around those dates. As for Personalized and Precision
Medicine (Figure 3(b)), the volume of tweets stays relatively
flat. There are outliers for Precision Medicine too, e.g., 2,628
tweets on February 25, 2016, when the White House hosted
the Precision Medicine Initiative summit [18].
Discussion. Overall, our characterization shows that highly
engaged users drive the discussion around public genomics
initiatives, which is particularly influenced, at least in terms
of volumes, by important announcements such as the one
made by President Obama. As for direct-to-consumer (DTC)
genetic testing, the conversation is, as expected, dominated
by the two most popular companies: 23andMe and Ances-
tryDNA. However, it is interesting that the former generates
4 times more tweets even though the latter has more than twice
the customers. Some of this "popularity" seems to be due to
23andMe's controversy around FDA approval. We also find a
non-negligible use of hashtags, possibly used for promotion
and marketing efforts, and that a lot of tweets include URLs to
popular domains, indicating that they are used to disseminate
news and links to external resources. This warrants further ex-
ploration, thus, we perform hashtag and URL analysis in the
next section.
5 Content Analysis
Next, we analyze the content of the tweets related to genetic
testing, studying hashtags and URLs included in them and per-
forming a simple sentiment analysis. We also performed Latent
Dirichlet Allocation (LDA) [5] and Term Frequency-Inverse
Document Frequency (TF-IDF) [33] analysis, however, we
omit the results since they do not yield any actionable findings.
5.1 Hashtag Analysis
In Table 2, we report the top three hashtags for every key-
word, while differentiating between tweets made by regular
users and those by official accounts. We also quantify the
percentage of tweets with at least one hashtag (WH) and
that of tweets including the keyword as a hashtag (KH), e.g.,
#23andMe.
We find a few unexpected hashtags among the DTC
tweets, e.g., #sweepstakes (AncestryDNA), #startup (Fit-
nessgenes), #vote (Ubiome), #shechat and #appguesswho
(MapMyGenome). AncestryDNA's top hashtag, #sweepstakes
(12%), is related to a marketing campaign promoting a TV
series, "America: Promised Land." There are 3.5K tweets,
from distinct users, with the very same content (most likely
due to a "share" button): "I believe I've discovered my
@ancestry! Discover yours for the chance to win an An-
cestryDNA Kit. #sweepstakes journeythroughhistorysweeps.
com." We also find hashtags like #feistyfrugal and #holiday-
giftguide in the AncestryDNA top 10 hashtags, which confirms
how AncestryDNA uses Twitter for relatively aggressive mar-
keting campaigns. Moreover, in the Fitnessgenes tweets, we
(a) 23andMe and AncestryDNA
(b) Personalized/Precision Medicine
Figure 3: Number of tweets per day. Note the log scale in y-axis.
hours and 85% happen within a month.
Official accounts tweets. We also look at the tweets including
a given keyword (e.g., Ubiome) made by the corresponding of-
ficial account (e.g., @Ubiome). There are no official accounts
for Personalized and Precision Medicine, however, the Preci-
sion Medicine initiative is now called All Of Us and has a Twit-
ter account (created in February 2017) that has posted only a
few tweets (224 as of April 4, 2018), so we do not consider
it. Tweets made by the official accounts of most companies in-
cluding the name of the company as keyword is unsurprisingly
very (e.g., 1% for 23andMe). However, it is higher for oth-
ers (e.g., 15% for DNAfit, Fitnessgenes, and MapMyGenome),
due to the fact that these companies actually add their names
in their tweets as a hashtag (e.g., #AncestryDNA).
Hashtags, media, and quotes. Table 1 shows that around
a quarter of 23andMe's and Ubiome's tweets have hashtags
(slightly more than 23% for the baseline); for most other
keywords, it is above 40%. For Personalized and Precision
Medicine, we find that almost all tweets have the keyword in
the form of hashtag (99%). For Genomics England, this only
happens 61% of the time, since a lot of tweets include @Ge-
nomicsEngland. We perform a more detailed hashtag analysis
in the relevant section.
We then find that the percentage of tweets with media vary
from 4% in Ubiome to almost 20% in FamilyTreeDNA. Anec-
dotally, we see that images often contain text, i.e., are used to
overcome the character limit and comment on issues related to
the company (e.g., [28]). We also look at "quotes", i.e., tweets
including the URL of another tweet: for most keywords, per-
centages are lower than the baseline, except for VeritasGenet-
ics (mostly due to the official account), although less so for the
initiatives. Possibly, users tweeting about genomics initiatives
tend to be discuss more with each other, by commenting on
relevant tweets.
Temporal analysis. Finally, we analyze how the volume
of tweets changes over time. In Figure 3, we plot
the
number of tweets per day in our dataset (between Jan
1, 2015–July 31, 2017) for the two most popular compa-
nies (23andMe/AncestryDNA) and the two most popular ge-
nomics initiatives (Personalized/Precision Medicine). On av-
erage, there are 145 and 30 tweets per day for 23andMe and
AncestryDNA keywords, respectively. While the former is
relatively constant, the latter increases steadily in 2017(Fig-
ure 3(a)). This may be the result of AncestryDNA's aggressive
5
WH Top 3 Hashtags
– Without Official Accounts –
–
–
Keyword
23andMe
AncestryDNA
Counsyl
DNAFit
FamilyTreeDNA
FitnessGenes
MapMyGenome
PathwayGenomics
Ubiome
VeritasGenetics
Genomics England
Personalized Medicine
Precision Medicine
Table 2: Top 3 hashtags for each keyword, along with the percentage of tweets with at least a hashtag (WH) as well as that of of "keyword
hashtags" (KH), e.g., #23andMe.
27.09% dna (3.58%), genetics (2.07%), tech (1.96%)
75.48% sweepstakes (12.38%), dna (4.90%), genealogy (4.86%)
45.24% getaheadofcancer (2.64%), cap (1.93%), medical (1.94%)
55.30% diet (4.19%), fitness (3.72%), crossfit (3.54%)
29.31% dna (14.24%), genealogy (13.42%), ancestryhour (3.18%)
72.19% startup (5.93%), london (5.73%), job (5.59%)
54.98% shechat (7.94%), appguesswho (5.32%), genomepatri (4.22%)
55.85% coloncancer (6.91%), genetictesting (3.29%), cancer (2.85%)
28.57% microbiome (13.23%), tech (2.14%), vote (2.07%)
57.16% brca (3.92%), genome (3.62%), genomics (3.32%)
62.05% genomes100k (14.84%), genomics (7.72%), raredisease (5.24%)
precisionmedicine (22.74%), genomics (9.77%), pmcon (8.37%)
genomics (6.70%), personalizedmedicine (5.49%), cancer (4.89%)
KH
9.74%
46.88%
0%
40.37%
56.66%
45.29%
0%
19.35%
6.12%
0%
0%
–
–
– Only Official Accounts –
Top 3 Hashtags
23andMestory (6.67%), genetics (6.35%), video (5.19%)
dna (11.74%), ancestry (5.92%), familyhistory (5.07%)
acog17 (6.18%), womenshealthweek (5.15%), teamcounsyl (5.15%)
dna (5.33%), fitness (3.71%), generictogenetic (3.48%)
geneticgenealogy (5.55%), ftdnasuccess (4.44%), ftdna (3.33%)
fitness (5.85%), dna (4.32%), gtsfit (2.79%)
genomepatri (7.28%), knowyourself (4.04%), genetics (2.02%)
dnaday16 (9.67%), ashg15 (9.67%), health (3.22%)
microbiome (24.48%), bacteria (4.76%), meowcrobiome (2.72%)
brca (11.82%), liveintheknow (11.82%), wholegenome (10.75%)
genomes100k (32.45%), raredisease (19.49%), genomics (18.71%)
–
–
KH
12.46%
25.94%
3.08%
22.91%
10.86%
18.22%
15.80%
3.34%
6.61%
4.22%
1.77%
–
–
Keyword
23andMe
AncestryDNA
Counsyl
DNAFit
FamilyTreeDNA
FitnessGenes
MapMyGenome
PathwayGenomics
Ubiome
VeritasGenetics
Genomics England
Without Official Accounts
23andMe.com (7.33%), techcrunch.com (3.09%), fb.me (2.48%)
journeythroughhistorysweeps.com (15.18%), ancestry.com (13.94%),
ancstry.me (6.67%)
techcrunch.com (8.42%), businesswire.com (5.30%), bioportfolio.com (4.46%)
fb.me (15.81%), instagram.com (14.65%), dnafit.com (2.99%)
familytreedna.com (11.31%), myfamilydnatest.com (4.28%), fb.me (4.17%)
instagram.com (14.77%), fitnessgenes.com (8.48%), workinstartups.com (6.29%)
yourstory.com (11.84%), owler.us (11.44%), mapmygenome.in (9.18%)
paper.li (11.96%), atjo.es (10.82%), pathway.com (3.31%)
techcrunch.com (9.30%), bioportfolio.com (4.83%), ubiomeblog.com (4.21%)
veritasgenetics.com (10.97%), technologyreview.com (5.01%), buff.ly (2.30%)
genomicsengland.co.uk (33.85%), youtube.com (1.98%), buff.ly (1.64%)
Personalized Medicine
Precision Medicine
Baseline
instagram.com (8.78%), myriad.com (2.54%), buff.ly (2.32%)
buff.ly (2.92%), instagram.com (2.27%), nih.gov (1.87%)
instagram.com (4.18%), fb.me (3.44%), youtu.be (2.72%)
Only Official Accounts
23me.co (50.88%), 23andMe.com (21.13%), instagram.com (5.40%)
ancstry.me (74.11%), youtube.com (3.27%), ancestry.com.au (2.88%)
businesswire.com (14.78%), counsyl.com (13.91%), medium.com (5.21%)
fb.me (11.74%), dnafit.com (10.52%), dnafit.gr (2.83%)
familytreedna.com (76.56%), abcn.ws (3.12%), instagram.com (1.56%)
fitnessgenes.com (31.11%), instagram.com (4.44%), pinterest.com (4.44%)
mapmygenome.in (42.12%), youtu.be (14.35%), indiatimes.com (3.70%)
pathway.com (23.07%), nxtbook.com (3.84%), drhoffman.com (3.84%)
ubiomeblog.com (34.32%), igg.me (26.07%), ubiome.com (6.60%)
veritasgenetics.com (75.67%), biospace.com (1.35%), statnews.com (1.35%)
genomicsengland.co.uk (98.03%), peoplehr.net (0.58%),
campaign-archive1.com (0.21%)
–
–
–
Table 3: The top 3 domains per keyword, without official accounts and only considering the official accounts.
find hashtags like #startup, #london, and #job due to a num-
ber of tweets advertising jobs for Fitnessgenes, while #shechat
appears in tweets linking to an article related to women in busi-
ness about MapMyGenome's founder.
By contrast, top hashtags for official accounts' tweets are
closer to their main expertise/business. Similarly, those for ge-
nomics initiatives are pretty much always related to genetic
testing, and this is actually consistent besides top 3. (The
top 10 hashtags include, e.g., #digitalhealth, #genetics, and
#lifestylemedicine). Finally, the percentage of tweets with the
keyword appearing as a hashtag (KH), range from 12% for
23andMe to 25% for AncestryDNA even when excluding of-
ficial accounts, which might be the by-product of promotion
campaigns. When looking at tweets by official accounts KH
values go up for some companies, e.g., AncestryDNA heavily
promotes their brand using hashtags (46% KH).
5.2 URL Analysis
Next, we analyze the URLs contained in the tweets of our
dataset. Recall that the ratio of tweets containing URLs, as well
as the percentage of those in the Alexa top 1M domains, are re-
ported in Table 1. Once again, we distinguish between tweets
from the official accounts and report the top 3 (top-level) do-
mains per keyword in Table 3. Since there are several URL
shorteners in our dataset (e.g., bit.ly), so we first extract the top
10 domains for each keyword and identify those only provid-
ing URL shortening services, then, we "unshorten" the URLs
and use them in our analysis instead.
Among the top URLs shared by the official accounts, we
find, unsurprisingly, their websites, as well as others leading to
other domains owned by them, e.g., 23me.co, ancestry.com.au,
and ancstry.me. A few companies also promote news articles
about them or related topics, e.g., top domains for Counsyl and
MapMyGenome include businesswire.com and indiatimes.
com, while DNAfit seems more focused on social media with
its top domain being Facebook. As discussed previously, the
domain journeythroughhistorysweeps.com appears frequently
in AncestryDNA tweets. Then, note that techcrunch.com, a
blog about technology, appears several times, as it often covers
news and stories about genetic testing. We also highlight the
presence of owler.us, an analytics/marketing provider some-
times labeled as potentially harmful by Twitter, as one of the
top domains for MapMyGenome.
Finally, for genomics initiatives, we notice buff.ly, a social
media manager, suggesting that interested users appear to be
extensively scheduling posts, thus potentially being more tech-
savvy. We also find myriad.com, the domain of Myriad Ge-
netics, which discovered the BRCA1 gene and tried to patent
it [7], as their account is quite active in posting tweets with
Precision/Personalized Medicine keywords.
5.3 Sentiment Analysis
We perform sentiment analysis using SentiStrength [34],
which is designed to work on short texts. The tool outputs two
scores, one positive, in [1, 5], and one negative, in [−1,−5].
We calculate the sum value of the positive+negative scores for
every tweet, then, collect all tweets with that keyword from the
same user, and output the mean sentiment score.
In Figure 4, we report the distribution of sentiment across
the different keywords. The vast majority of tweets have neu-
tral sentiment, ranging from 0 to 1 scores. We run pair-wise
two-sample Kolmogorov-Smirnov tests on the distributions,
and in most cases reject the null hypothesis that they come
from a common distribution at α = 0.05. However, we are
6
understand their interests.
6.1 User Profiles
We start by analyzing the profiles tweeting about genetic
testing: in Figure 5, we plot the distribution of the number of
their followers, following, likes, and tweets.
Followers. Accounts tweeting about genomics initiatives have
a median number of followers similar to baseline, while for the
DTC companies the median is always lower, except for Coun-
syl, MapMyGenome, PathwayGenomics, and VeritasGenetics
(see Figure 5(a)). Also considering that, for these four com-
panies, there is a relatively low number of unique users (see
Table 1), we believe accounts tweeting about them are fewer
but more "popular." There are fewer outliers than the baseline,
which is not surprising since we do not expect many main-
stream accounts to tweet about genetic testing. Some outliers
appear for 23andMe and AncestryDNA, which, upon manual
examination, turn out to be Twitter accounts of newspapers or
known technology websites, reflecting how the two most pop-
ular companies also get more press coverage.
Following. The median number of 'following' (i.e., the ac-
counts followed by the users in our dataset) is usually higher
than baseline for DTC companies but similar for genomics ini-
tiatives (Figure 5(b)). This suggests that users interested in
DTC genetic testing might want to get more information off
Twitter and/or from more accounts.
Likes. We then measure the number of tweets each profile
has liked (Figure 5(c)). This measure, along with the number
of tweets, depicts, to a certain extent degree, a level of en-
gagement. We find that, for all keywords, profiles like fewer
tweets than baseline users. There is one interesting outlier
for 23andMe (@littlebytesnews), who liked more than 1M
tweets; this is likely to be a bot, as also confirmed by Botome-
ter [35]. Also, FamilyTreeDNA appears to have users liking
more tweets than others. However, these accounts appear not
to be bots, as we discuss later.
Tweets. We also quantify the number of tweets each account
posts (Figure 5(d)). As with the number of likes, users in our
datasets are less "active" than baseline users. There are inter-
esting outliers above 1M tweets, which are due to social bots.
We also find more tweets from Counsyl's users, seemingly
mostly due to a large number of profiles describing themselves
as "promoters" of science/digital life, technology enthusiasts,
and/or influencers. Finally, users tweeting about genomics ini-
tiatives appear to be even less active, with a lower median value
of tweets than the rest. Also considering that these users tweet
more about the same keyword (as discussed in Sec. 4) but fol-
low more accounts, we believe that they are somewhat more
passive than the average Twitter user, possibly using Twitter to
get information but actively engaging less than others.
Geographic Distribution. We then estimate the geographic
distribution of the users via the location field in their profile.
This is self-reported, and users use it in different ways, adding
their city (e.g., Miami), state (e.g., Florida), and/or country
(e.g., USA). In some cases, entries might be empty (7.5% of
the tweets in our dataset), ambiguous (e.g., Paris, France vs
Paris, Texas), or fictitious (e.g., "Hell"). Nevertheless, as done
Figure 4: Sentiment scores of the keyword dataset.
unable to reject the null hypothesis when comparing the base-
line dataset to the PathwayGenomics dataset (p = 0.77) and
when comparing DNAfit to Ubiome (p = 0.34). In general, the
genomics initiatives, and in particular Personalized Medicine
and Precision Medicine, have many outliers compared to most
DTC genetic companies, suggesting more users who reveal
strong feelings for or against these concepts. Genomics Eng-
land, however, has a median above zero, indicating generally
positive sentiment. Tweets about Counsyl are very neutral,
while Ubiome tweets seem to be the most positive.
5.4 Discussion
Our content analysis yields a few interesting findings. A
large part of the genetic testing discourse appears to be gen-
erated from news and technology websites, and from tech-
savvy users who rely on services to schedule social media
posts. Also, sentiment around DTC companies is overall neu-
tral, but positive for the genomics initiatives, however, tweets
about DTC companies include a lot of strongly opinionated
users (both positive and negative); we further explore tweets
with high negative score in Sec. 7. Finally, tweets related to
genetic testing not only contain a significantly higher number
of hashtags than a random baseline, but they are also used for
promotion. In general, we find several social media marketing
strategies at play, with some companies employing traditional
giveaways, others promoting mainly third-party articles about
the company, and others focusing their efforts across multiple
social media platforms. For instance, AncestryDNA is quite
active in this context, with one particular hashtag (#sweep-
stakes) found in 1 out of 8 AncestryDNA tweets. This has a
significant impact on how "regular" users engage in tweeting
about genetic testing, which we further analyze next.
6 User Analysis
In this section, we shed light on the accounts tweeting about
genetic testing. After a general characterization of the profiles,
we look for the presence of social bots [35]. Then, we select
a random sample of users tweeting about the two most pop-
ular DTC companies and analyze their latest 1,000 tweets to
7
(a) followers
(b) following
(c) likes
(d) tweets
Figure 5: Boxplots with statistics per user profile (note the log-scale in y-axis).
Figure 6: Geolocation of Twitter profiles, normalized by Internet us-
ing population per country.
in previous work [25], we use this field to estimate where most
of the tweets are coming from. We use the Google Maps Ge-
olocation API, which allows to derive the country from a text
containing a location.5 The API returns an error for 6.6% of
the profiles, mostly due to fictitious locations.
We find that the top 5 countries in our dataset are mostly
English-speaking ones: 69.1% of all profiles with a valid lo-
cation are from the US, followed by the UK (8.6%), Canada
(4.5%), India (2.1%), and Australia (1.4%). We then normal-
ize using Internet-using population estimates [20], and plot the
resulting heatmap, with the top 50 countries, in Figure 6. The
maximum value is obtained by the US (i.e., 0.000254 users per
Internet user), with 72.8K unique users, out of an estimated In-
ternet population of 286M, posting tweets in our dataset. This
suggest that US users dominate the conversation on genetic
testing on Twitter.
We also perform a geolocation analysis broken down to spe-
cific keywords. Unsurprisingly, the top country of origin for
Genomics England is the UK, as it is for DNAfit, which is
based in London. Similarly, the top country for India-based
company MapMyGenome tweets is India. Overall, we find that
tweet numbers are in line with the countries where the DTC
companies are based or operate – e.g., 23andMe health reports
are available in US, Canada, and UK, while AncestryDNA also
operates in Australia – as well as where the genomics initia-
tives are taking place.
5https://developers.google.com/maps/documentation/geolocation
Figure 7: Botometer scores for the keyword dataset.
6.2 Social Bot Analysis
Next, we investigate the presence of social bots in our
datasets, using the Botometer (botometer.iuni.iu.edu), a tool
that, given a Twitter handle, returns the probability of it being
a "social bot," i.e., an account controlled by software, algorith-
mically generating content and establishing interactions [35].
In Figure 7, we plot the distribution of Botometer scores for
all keywords. We compare the distributions using pairwise 2
sample KS tests, and reject the null hypothesis at α = 0.05 for
all datasets except Counsyl and MapMyGenome (p = 0.29),
DNAfit and VeritasGenetics (p = 0.17) and PrecisionMedicine
and VeritasGenetics (p = 0.10). We also find that all me-
dian scores are higher than the baseline (between 0.35 and 0.5
vs 0.3). This is not entirely surprising since we expect many
blogs, magazines, and news services covering genetic testing,
and these are likely to get higher scores than individuals since
they likely automate their activities. However, about 80% of
the accounts in our dataset have scores lower than 0.5 and 90%
lower than 0.6 (i.e., it is unlikely they are bots). We also find the
two most popular keywords, 23andMe and AncestryDNA, as
well as FamilyTreeDNA, somewhat stand out: accounts tweet-
ing about them get the lowest Botometer scores. Although for
FamilyTreeDNA this might be an artifact of the relatively low
number of tweets (2K users), the scores suggest there might
be more interaction/engagement from "real" individuals and/or
fewer tweets by automated accounts about 23andMe and An-
cestryDNA.
We then look at accounts with Botometer scores above 0.7,
8
1.34e−070.000254RTs
9,077,066
1,399,804
10,476,870
Tweets Users
9,534,302 12,227
3,320
12,000,745 15,547
4,208,967
Likes Hashtags URLs Top 1M
23andMe
24.40% 63.62% 81.43%
AncestryDNA 2,466,443
34.21% 63.64% 78.86%
Total
26.41% 63.62% 80.89%
Baseline
17.47% 41.24% 88.41%
Table 4: Summary of the users' tweets dataset, with last 1K tweets of
a 20% sample of 23andMe and AncestryDNA users.
3,501,053
22,001,065
25,502,118
5,035 139,551,104 342,052,546
finding that, for most DTC keywords, they account for 3–5% of
the users; not too far from the baseline (2%) and the genomics
initiatives (1.5–2%). Counsyl and MapMyGenome have more
than 10% of users with scores above 0.7. We also quantify how
many tweets are posted by (likely) social bots: almost 15% of
all PathwayGenomics tweets come from users with score 0.7
or above (4.5% of all users), while for all other keywords so-
cial bots are not responsible for a substantially high number of
tweets in our datasets.
6.3 Last 1K Tweets of a Sample of Users
We then focus on the users tweeting about the two most pop-
ular companies – i.e., 23andMe and AncestryDNA – and study
their last 1K tweets aiming to understand the characteristics of
the accounts who show interest in genetic testing. We only do
so for 23andMe and AncestryDNA as these companies have
the highest numbers of tweets and users, and thus, are more
likely to lead to a representative and interesting sample.
Data Crawl. We select a random 20% sample of
the
users who have posted at least one tweet with keywords
23andMe/AncestryDNA (resp., 12.2K/64K and 3.3K/16.9K
users) and crawl their latest 1K tweets if their account is still
active.6 This yields a dataset of 12M tweets, outlined in Ta-
ble 4. For comparison, we also get the last 1K tweets of a ran-
dom sample of 5K users from the keyword dataset's baseline
users. Note that statistics in Table 4 refer to the latest 1K tweets
of the user sample, while those in Table 1 to tweets with a given
keyword.
The numbers of retweets and likes per tweet are, once again,
lower than the baseline. However, users tweeting about Ances-
tryDNA receive, for their last 1K tweets, one order of magni-
tude more likes than those tweeting about 23andMe. Moreover,
we observe relatively high percentages of tweets with hash-
tags (63%) and URLs (around 80%). How far back in time
the 1,000th tweet appears varies across users, depending on
how often they tweet. We measure the time between the most
recent and the 1,000th tweet, and find that baseline users are
more "active" than the users who have tweeted about 23andMe
and AncestryDNA, in line with what discussed previously. In
particular, AncestryDNA users appear to post less: for half of
them, it takes at least 359 days to tweet 1K tweets compared to
260 for the baseline and 287 for 23andMe.
Hashtag analysis. We conduct a hashtag analysis on tweets
in Table 4. In Table 5, we report the top 10 hashtags of the
users' last 1K tweets. For 23andMe, we find several hashtags
related to health in the top 10; also considering that the top 30
include #pharma, #cancer, and #biotech, it is likely that users
who have shown interest in 23andMe are also very much inter-
6We find 575 and 61 inactive accounts, resp., for 23andMe and AncestryDNA.
Baseline
gameinsight (0.55%)
AncestryDNA
giveaway (3.31%)
sweepstakes (2.01%) trecru (0.34%)
win (2.01%)
genealogy (1.01%)
tech (0.63%)
23andMe
tech (1.07%)
news (1.06%)
health (0.58%)
business (0.48%)
healthcare (0.43%)
digitalhealth (0.40%) ad (0.51%)
startup (0.39%)
socialmedia (0.34%) promotion (0.48%)
viral (0.34%)
technology (0.34%)
Table 5: The top 10 hashtags of the users' tweets dataset.
btsbbmas (0.33%)
nowplaying (0.30%)
android (0.28%)
androidgames (0.27%)
ipad (0.26%)
trump (0.24%)
perduecrew (0.47%) music (0.21%)
contest (0.44%)
ipadgames (0.20%)
entry (0.51%)
AncestryDNA
instagram.com (6.78%)
fb.me (5.48%)
techcrunch.com (4.42%)
youtu.be (4.04%)
23andMe
fb.me (4.00%)
instagram.com (3.06%)
youtu.be (2.18%)
buff.ly (2.17%)
techcrunch.com (1.53%) wn.nr (1.79%)
lnkd.in (1.02%)
mashable.com (0.65%)
entrepreneur.com (0.63%) buff.ly (1.08%)
swee.ps (0.80%)
nyti.ms (0.62%)
reddit.com (0.55%)
twittascope.com (0.41%)
woobox.com (1.51%)
giveaway.amazon.com (1.17%) fllwrs.com (0.40%)
Baseline
fb.me (5.85%)
instagram.com (4.42%)
youtu.be (2.94%)
twittascope.com (0.58%)
tmblr.co (0.56%)
buff.ly (0.54%)
gigam.es (0.33%)
soundcloud.com (0.32%)
vine.co (0.30%)
Table 6: The top 10 domains of the users' tweets dataset.
ested in (digital) health, which is one of the primary aspects of
23andMe's business. This happens to a lesser extent for Ances-
tryDNA results: while top hashtags include #genealogy (4th),
they also include #giveaway, #sweepstakes, #win, #ad, #pro-
motion, #perduecrew, and #contest, suggesting that these users
are rather interested in promotional products. This is line with
our earlier observation that AncestryDNA extensively uses ad-
vertising and marketing campaigns on Twitter.
URL analysis. In Table 6, we report the top 5 domains of
the three sets. Over the last 1K tweets, users tweeting about
23andMe and AncestryDNA share a substantial number of
links to techcrunch.com, a popular technology website; i.e.,
users who have tweeted at least once about these companies
have an interest about subjects related to new technologies.
In fact, the top 10 list of 23andMe's set of tweets also in-
clude lnkd.in, mashable.com, and entrepreneur.com. For An-
cestryDNA, we find wn.nr, another website related to con-
tests and sweeps. There are thousands of tweets like "En-
ter for a chance to win a $500 Gift Card! wn.nr/DRRrZq
#MemorialDaySweeps #Entry". We also note the presence of
woobox.com, a marketing campaign website, responsible for
organizing giveaways, as well as giveaway.amazon.com, an
Amazon site organizing promotional sweepstakes. We believe
this might be due to a large presence of bots, however, Botome-
ter scores actually indicate these accounts are not. Therefore,
this behavior might be related to the fact that AncestryDNA,
through their marketing campaigns, attract Twitter users who
are generally active in looking for deals and sweeps.
6.4 Discussion
Overall, our user-level analysis shows that Twitter discourse
related to genetic testing is dominated by US users and in gen-
eral by those in English-speaking countries, but not necessar-
ily by "mainstream" popular accounts. However, 23andMe and
AncestryDNA do regularly attract the attention of major news
9
sites. Also, the majority of users involved in genetic testing dis-
cussion are not bots, so Twitter conversation is, to some extent,
"genuine." However, promotion and marketing campaigns end
up attracting different kinds of users, and yield different levels
of engagement. Overall, we find that users interested in genetic
testing appear less active than a random baseline, however,
they are more likely to use Twitter to get information about
their topics of interest, and in particular they are interested in
technology and digital health subjects.
7 Case Studies
We take a closer look at "negative" tweets, following the
sentiment analysis presented previously. We also investigate
the presence of users who post their genetic test results.
7.1 Racism
We select all tweets with genetic testing keywords from
users who yield a total sentiment score below -3, obtaining
3,605 tweets from 3,209 unique users. We then manually ex-
amine those with keywords 23andMe or AncestryDNA (1,725
and 167, respectively), and find several of them containing
themes related to racism, hate, and privacy fears.
In particular, the "ethnic" breakdown provided by ances-
try reports7 seems to spur several
instances of negative-
sentiment tweets associated with racism and disapproval of
multi-cultural/multi-ethnic values. For instance, a user with
more than 3K followers self-describing as a "Yuge fan for Don-
ald Trump", tweets: "Get this race mixing shit off my time
line!!" (Mar 23, 2017) in response to a 23andMe video about
ancestry. Another posts: "I wanna do that 23andMe so bad!
I'm kinda scared what my results will be tho lmao I'm prob
like half black tbh"(Jan 13, 2017), and gets a response: "I was
too just do it and never tell anyone if you're a halfbreed haha".
Also, a user identifying as 'American Fascist' tweets: "I'd like
to get the @23andMe kit but, I'm worried about the results.
Just my luck, I'd have non-white/kike ancestors. #Ultimate-
Blackpill" (May 30, 2017).
Although we leave to future work an in-depth analysis of
genetic testing related racism on the Web, we assess whether
it may be systematic on Twitter, e.g., appearing also in tweets
not scored as negative by SentiStrength. To this end, we search
for the presence of hateful words using the hatebase.org dictio-
nary, a crowdsourced list of 1K terms that indicate hate when
referring to a third person, removing words that are ambiguous
or context-sensitive, as done by previous work [19]. Naturally,
this is a best-effort approach since hateful terms might be used
in non-hateful contexts (e.g., to refer to oneself), or, conversely,
racist behavior can occur without hate words. Also, Twitter
might be removing tweets with hate words as claimed in their
hateful conduct policy.8 Nonetheless, we do find instances of
hate speech, e.g., anti-semitic tweets such as: "as long as there
are khazar milkers to cause people to demand my 23andMe
results, i will always be here to shitpost" (Nov 19, 2016), or
"@*** i would be pleased if you posted your 23andMe so i
7E.g. https://permalinks.23andMe.com/pdf/samplereport ancestrycomp.pdf
8https://support.twitter.com/articles/20175050
can confirm your khazar milkers are indeed genuine" (Dec 23,
2016).
Note that "Khazar milkers" refers to an anti-semitic the-
ory on the origin of Jewish people from the 1900s [15] In
a nutshell, it posits that Ashkenazi Jews are not descendant
from Israelites, but from a tribe of Turkic origin that converted
to Judaism. 23andMe issued ancestry reports that suggested
Ashkenazi Jews in a given haplogroup were descendant from a
single Khazarian ancestor. Understanding the ancestry of Jew-
ish people has been of interest to the genetics community for
years, and the Khazar theory has been refuted repeatedly [4].
Nonetheless, the alt-right has exploited it to corroborate their
anti-semitic beliefs [32], and incorporate it into their collec-
tion of misleading/factually incorrect talking points. In partic-
ular, "khazar milkers" was allegedly coined by the "@***"
user mentioned above, and is used to imply a sort of succubus
quality of Jewish women.
7.2 Privacy
We also identify, among the most negative tweets, themes
related to fears of privacy violation and data misuse. Examples
include "Is it me? Does the idea of #23andMe seem a bit sin-
ister? Do they keep the results? Who owns the results? Who
owns 23andMe?"(Jan 1, 2016), "Same thing with 23andMe
and similar companies. Indefinitely stored data with possible
sinister future uses? #blackmirror"(Nov 13, 2016), and "Why
does this scare the hell out of me? How can our privacy ever
be assured?" (Feb 27, 2016). Searching for 'privacy' and 'pri-
vate' in our keyword dataset returns 1,991 tweets, mostly from
23andMe and Precision Medicine (1.1K and 625, resp.), which
we proceed to examine both manually and from a temporal
point of view (i.e., measuring daily volumes). Overall, we find
that privacy in the context of genetic testing appears to be a
theme discussed recurrently on social media and a concern far
from being addressed. This is not entirely unexpected, consid-
ering that both the DTC market and the genomics landscape
are evolving relatively fast, with regulation and understanding
of data protection as well as informed consent often lagging
behind, as also highlighted in prior work [26, 14, 30].
Interestingly, one of the peaks in tweets related to 23andMe
and privacy occurs on Oct 19, 2015 (with 152 tweets). As dis-
cussed in the Content Analysis section, this a relevant date
w.r.t. the FDA revoking their approval for 23andMe's health
reports, which yields a peak in 23andMe tweets overall. How-
ever, the FDA ruling had nothing to do with privacy, yet, it put
23andMe in the spotlight, possibly causing privacy concerns
to resurface. In fact, privacy and 23andMe discussions period-
ically appear in our dataset, even beyond tweets with negative
sentiment, e.g., "I want to do #23andMe but don't want a pri-
vate company owning my genetic data. Anyone heard of any
hacks to do it anonymously?" (Jul 13, 2017), "@23andMe ur
privacy policy describes how there is no privacy. How about u
not share any data at all. I pay u and u send the results. Period"
(Dec 8, 2015), "Should we be concerned about data collection
and privacy with direct to consumer DNA testing companies
like 23andMe?" (Apr 19, 2017).
10
7.3 Users Sharing Test Results
Finally, we investigate the presence of users who post their
genetic test results, aiming to estimate their number and shed
light on their profiles. Given their popularity, we only do so for
23andMe and AncestryDNA. Among other things, we believe
this is important because health/ancestry reports may contain
sensitive information about the individuals taking these tests,
including their predisposition to diseases and their ethnic her-
itage [3].
Methodology. Finding all tweets that may include test re-
sults is quite hard, and arguably out of scope, thus, we fo-
cus on screenshots of genetic test results as we anecdotally
find a non-negligible number in our dataset. These are actu-
ally almost exclusively ancestry results, even though 23andMe
also provides health reports. We start from the 4.5K/1.5K
23andMe/AncestryDNA tweets with images, but, since they
are too many to be all manually examined, we use the follow-
ing methodology. First, we build two sets with 100 "ground
truth" images with screenshots of ancestry test results, one
each for 23andMe and AncestryDNA, then, use Perceptual
Hashing [21] to find similar images that are likely screenshots
of test results too, and manually check them to exclude false
positives.9
Overall, our approach likely yields a conservative estimate,
nonetheless, it constitutes a best-effort approach to identify and
analyze tweets including test results. We obtain 366 and 204
images for, respectively, 23andMe and AncestryDNA. Upon
manual examination, we find and remove 58 (16%) and 26
(13%) false positives. Thus, we estimate a lower bound of
0.23% and 0.60% of 23andMe and AncestryDNA tweets con-
taining ancestry test screenshots (and 3.40% and 5.15% of
tweets with pictures).
Tweets content. We manually examine the 486 tweets with
screenshots of ancestry test results, finding that users often ap-
pear to be somewhat enthusiastic about their experience. In
some cases, we note a feeling of "relief", sometimes expressed
in a humorous way, when the results show they are predomi-
nantly "white": about 10% of tweets with screenshots include
the word white. Examples include: "23andMe confirms: I'm
super white.", "Got my @23andMe results back today. I'm su-
per white. Like, rice on a paper plate with a glass of milk in a
snowstorm, white."
User Analysis. We also crawl the last 1,000 tweets of the 308
users who have posted screenshots with test results, and ana-
lyze them as done for the random sample discussed in Sec. 6.
We find that their most commonly used hashtags are indeed
related to genetic testing, confirming that the users who do ge-
netic tests are actually generally interested in the subject. It
is also interesting to find #maga to be the second most com-
mon hashtag for users who post 23andMe results (appearing
in 431 tweets). Then, looking at the top domains shared by
these users, we do not observe surprising difference compared
9Perceptual hash functions extract features from multimedia content and cal-
culate hash values based on them. They can be used to compare two objects
by calculating a distance/similarity score between two hash values; the ob-
jects are labeled as (perceptually) equal if the distance is below a chosen
threshold [36]. We set the pHash distant threshold to 17 since it produces the
best results in our setting.
to those from a random sample users (see Table 6), although
we find more social media services like Instagram and Face-
book.
8 Conclusion
This paper presented a large-scale analysis of Twitter dis-
course related to genetic testing. We examined more than 300K
tweets containing 13 relevant keywords as well as 12M tweets
posted by more than 100K accounts that have shown interest in
genetic testing. We found that the discourse related to genetic
testing is often influenced by news and technology websites,
and by a group of tech-savvy users who are overall interested
in tech and digital health. Overall, users tweeting about ge-
netic testing are mostly in the US and other English-speaking
countries, while we do not find evidence of extensive influ-
ence of social bots. However, the broad conversation seems
to be dominated by users that might have a vested interest in
its success, e.g., specialist journalists, medical professionals,
entrepreneurs, etc. This is particularly evident in the tweets
related to genomics initiatives, which are mainly discussed
by highly engaged users and which are influenced, at least in
terms of volume, by important announcements. Moreover, we
noticed that the two most popular DTC companies, 23andMe
and AncestryDNA, also generate the most tweets, however, al-
though 23andMe has half the customers, it produces almost 5
times more tweets, also due to controversy around their failure
to get FDA approval in 2015. We also observed a clear distinc-
tion in the marketing efforts undertaken by different compa-
nies, which ends up influencing users' engagement on Twitter.
Our work is particularly timely as genetic testing and ge-
nomics initiatives are increasingly often associated to ethical,
legal, and societal concerns [16]. In this context, our analysis
sheds light not only on who tweets about genetic testing, what
they talk about, and how they use Twitter, but also on groups
utilizing genetic testing to push racist agendas and users ex-
pressing privacy concerns. We also found a number of enthu-
siastic users who broadcast their test results through screen-
shots notwithstanding possible privacy implications. Overall,
our findings motivate future work studying other social media
platforms and health forums/websites, as well as for in-depth
qualitative studies of the relation between genetic testing and
racism and privacy fears on social media.
References
[1] S. Abbar, Y. Mejova, and I. Weber. You Tweet What You Eat:
Studying Food Consumption Through Twitter. In CHI, 2015.
[2] E. A. Ashley. Towards Precision Medicine. Nature Reviews
Genetics, 17(9), 2016.
[3] E. Ayday, E. De Cristofaro, J.-P. Hubaux, and G. Tsudik. Whole
genome sequencing: Revolutionary medicine or privacy night-
mare? IEEE Computer, 2015.
[4] D. M. Behar, M. Metspalu, Y. Baran, et al. No Evidence from
Genome-Wide Data of a Khazar Origin for the Ashkenazi Jews.
Human Biology, 85(6), 2013.
[5] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet alloca-
tion. JMLR, 2003.
11
[6] P. Burnap, M. L. Williams, L. Sloan, O. Rana, W. Housley,
A. Edwards, V. Knight, R. Procter, and A. Voss. Tweeting the
Terror: Modelling the Social Media Reaction to the Woolwich
Terrorist Attack. Social Network Analysis and Mining, 4(1),
2014.
[7] T. Caulfield, T. Bubela, and C. Murdoch. Myriad and the mass
media: the covering of a gene patent controversy. Genetics in
Medicine, 9(12), 2007.
[8] P. A. Cavazos-Rehg, M. J. Krauss, S. J. Sowles, and L. J. Bierut.
Hey Everyone, I'm Drunk. An Evaluation Of Drinking-Related
Twitter Chatter. JSAD, 76(4), 2015.
[9] D. Chatzakou, N. Kourtellis, J. Blackburn, E. De Cristofaro,
G. Stringhini, and A. Vakali. Measuring #GamerGate: A Tale
of Hate, Sexism, and Bullying. In WWW Companion, 2017.
[10] P. Chow-White, S. Struve, A. Lusoli, F. Lesage, N. Saraf, and
'Warren Buffet Is My Cousin': Shaping Public
A. Oldring.
Understanding of Big Data Biotechnology, Direct-To-Consumer
Genomics, and 23andMe on Twitter. Information, Communica-
tion & Society, 2017.
[11] G. Coppersmith, M. Dredze, and C. Harman. Quantifying Men-
tal Health Signals In Twitter. In CLPsych, 2014.
[12] L. Covolo, S. Rubinelli, E. Ceretti, and U. Gelatti.
Internet-
Based Direct-to-Consumer Genetic Testing: A Systematic Re-
view. JMIR, 17(12), 2015.
[13] M. De Choudhury, M. Gamon, S. Counts, and E. Horvitz. Pre-
dicting Depression via Social Media. In ICWSM, 2013.
[14] E. De Cristofaro. Genomic privacy and the rise of a new research
community. IEEE Security & Privacy, 12(2), 2014.
[15] A. Feldman.
23andMe Backpedals On Khazar The-
ory But The 'Alt-Right' Eats It Up, Anyway.
http:
//forward.com/news/national/381500/23andme-backpedals-on-
khazar-theory-but-the-alt-right-eats-it-up-anyway/, 2017.
[16] FTC.
tions.
kits-consider-privacy-implications, 2017.
the privacy implica-
DNA test kits: Consider
https://www.consumer.ftc.gov/blog/2017/12/dna-test-
[17] L. Goldsmith, L. Jackson, A. O'connor, and H. Skirton. Direct-
to-Consumer Genomic Testing: Systematic Review of the Liter-
ature on User Perspectives. European Journal of Human Genet-
ics, 20(8), 2012.
[18] L. Harley. White House hosts Precision Medicine Initia-
tive Summit. http://www.frontlinegenomics.com/white-house-
hosts-precision-medicine-initiative-summit/, 2016.
[19] G. E. Hine, J. Onaolapo, E. De Cristofaro, N. Kourtellis, I. Leon-
tiadis, R. Samaras, G. Stringhini, and J. Blackburn. Kek, Cucks,
and God Emperor Trump: A Measurement Study of 4chan's Po-
litically Incorrect Forum and Its Effects on the Web. In ICWSM,
2017.
[20] Internet Live Stats.
Internet Users by Country (2016). http:
//www.internetlivestats.com/internet-users-by-country/, 2017.
[21] E. Klinger and D. Starkweather. http://www.phash.org/, 2018.
[22] H. Kwak, C. Lee, H. Park, and S. Moon. What Is Twitter, A
Social Network Or A News Media? In WWW, 2010.
[23] E. S. Lander, L. M. Linton, B. Birren, C. Nusbaum, M. C. Zody,
J. Baldwin, K. Devon, K. Dewar, M. Doyle, W. FitzHugh, et al.
Initial Sequencing and Analysis of the Human Genome. Nature,
409(6822), 2001.
[24] K. Lerman, M. Arora, L. Gallegos, P. Kumaraguru, and D. Gar-
cia. Emotions, Demographics and Sociability in Twitter Inter-
actions. In ICWSM, 2016.
[25] A. Marcus, M. S. Bernstein, O. Badar, D. R. Karger, et al. Twit-
info: Aggregating and Visualizing Microblogs for Event Explo-
ration. In CHI, 2011.
[26] D. Mascalzoni, A. Hicks, P. Pramstaller, and M. Wjst. Informed
consent in the genomics era. PLoS Medicine, 5(9), 2008.
[27] NHGRI. The Cost of Sequencing a Human Genome. https:
//www.genome.gov/sequencingcosts/, 2017.
[28] B. Pardy. Tweet: FamilyTreeDNA Privacy. http://archive.is/
AUj6L, 2017.
[29] M. J. Paul and M. Dredze. You Are What You Tweet: Analyzing
Twitter for Public Health. In ICWSM, 2011.
[30] A. M. Phillips. DTC Genetics for Ancestry, Health, Love and
More: A View of the Business and Regulatory Landscape. Ap-
plied & Translational Genomics, 8, 2016.
[31] N. D. Prasetyo, C. Hauff, D. Nguyen, T. van den Broek, and
D. Hiemstra. On the Impact of Twitter-Based Health Cam-
paigns: A Cross-Country Analysis of Movember. In EMNPL,
2015.
[32] E. Reeve. Vice News – White Nonsense: Alt-right trolls are
arguing over genetic tests they think prove their whiteness. http:
//bit.ly/2DhP90h, 2016.
[33] G. Salton and M. J. McGill. Introduction to modern information
retrieval. McGraw-Hill, 1986.
[34] M. Thelwall, K. Buckley, G. Paltoglou, D. Cai, and A. Kappas.
Sentiment Strength Detection In Short Informal Text. JASIST,
61(12), 2010.
[35] O. Varol, E. Ferrara, C. A. Davis, F. Menczer, and A. Flam-
mini. Online Human-Bot Interactions: Detection, Estimation,
and Characterization. In ICWSM, 2017.
[36] C. Zauner. http://www.phash.org/docs/pubs/thesis zauner.pdf,
2010.
12
|
1704.02489 | 1 | 1704 | 2017-04-08T12:40:51 | Analyzing Social Interaction Networks from Twitter for Planned Special Events | [
"cs.SI"
] | The complex topology of real networks allows its actors to change their functional behavior. Network models provide better understanding of the evolutionary mechanisms being accountable for the growth of such networks by capturing the dynamics in the ways network agents interact and change their behavior. Considerable amount of research efforts is required for developing novel network modeling techniques to understand the structural properties such networks, reproducing similar properties based on empirical evidence, and designing such networks efficiently. First, we demonstrate how to construct social interaction networks using social media data and then present the key findings obtained from the network analytics. We analyze the characteristics and growth of such interaction networks, examine the network properties and derive important insights based on the theories of network science literature. We also discuss the application of such networks as a useful tool to effectively disseminate targeted information during planned special events. We observed that the degree-distributions of such networks follow power-law that is indicative of the existence of fewer nodes in the network with higher levels of interactions, and many other nodes with less interactions. While the network elements and average user degree grow linearly each day, densities of such networks tend to become zero. Largest connected components exhibit higher connectivity (density) when compared with the whole graph. Network radius and diameter become stable over time evidencing the small-world property. We also observe increased transitivity and higher stability of the power-law exponents as the networks grow. Data is specific to the Purdue University community and two large events, namely Purdue Day of Giving and Senator Bernie Sanders' visit to Purdue University as part of Indiana Primary Election 2016. | cs.SI | cs | Sadri, Hasan, Ukkusuri, Suarez Lopez
1
Analyzing Social Interaction Networks from Twitter for Planned Special Events
Arif Mohaimin Sadri, Ph.D.
Lyles School of Civil Engineering
Purdue University, West Lafayette, IN 47907, USA
Email: [email protected]
(Corresponding Author)
Samiul Hasan, Ph.D.
Assistant Professor
Department of Civil, Environmental, and Construction Engineering
University of Central Florida
12800 Pegasus Drive, Orlando, FL 32816
Phone: 407-823-2841
Email: [email protected]
Satish V. Ukkusuri, Ph.D.
Professor
Lyles School of Civil Engineering
Purdue University, West Lafayette, IN 47907, USA
Email: [email protected]
Juan Esteban Suarez Lopez
School of Civil Engineering
National University of Colombia
Medellin, Colombia
Email: [email protected]
Sadri, Hasan, Ukkusuri, Suarez Lopez
2
ABSTRACT
The complex topology of real networks allows its actors to change their functional behavior.
Network models provide better understanding of the evolutionary mechanisms being accountable
for the growth of such networks by capturing the dynamics in the ways network agents interact
and change their behavior. Considerable amount of research efforts is required for developing
novel network modeling techniques to understand the structural properties such networks,
reproducing similar properties based on empirical evidence, and designing such networks
efficiently. In this study, we first demonstrate how to construct social interaction networks using
social media data and then present the key findings obtained from the network analytics. We
analyze the characteristics and growth of online social interaction networks, examine the network
properties and derive important insights based on the theories of network science literature. We
also discuss the application of such networks as a useful tool to effectively disseminate targeted
information during planned special events. We observed that the degree-distributions of such
networks follow power-law that is indicative of the existence of fewer nodes in the network with
higher levels of interactions, and many other nodes with less interactions. While the network
elements and average user degree grow linearly each day, densities of such networks tend to
become zero. Largest connected components exhibit higher connectivity (density) when compared
with the whole graph. Network radius and diameter become stable over time evidencing the small-
world property. We also observe increased transitivity and higher stability of the power-law
exponents as the networks grow. Since the data is specific to the Purdue University community,
we also observe two very big events, namely Purdue Day of Giving and Senator Bernie Sanders'
visit to Purdue University as part of Indiana Primary Election 2016.
Keywords: planned special events, social media, Twitter, user mention, social interaction, network
science
Sadri, Hasan, Ukkusuri, Suarez Lopez
3
BACKGROUND AND MOTIVATION
Planned Special Events (PSE) include sporting events, concerts, conventions and similar large
events at specific venues such as stadiums and convention centers among others. PSEs possess
many operational needs that can be anticipated and managed in advance because of specific
locations and times of occurrence [1]. Organizing PSEs have several challenges including parking
management, crowd management, pedestrian facility design, and special facility for senior citizens
and handicapped individuals, providing transit facility for captive riders among others. In addition,
police enforcements often need to close several streets for security reasons, manage crowds who
walk together to the location and guide motorists to specific routes who are unfamiliar with the
area. Individuals attending these events travel by various travel modes, i.e. walk, private car and
public transit. Since the traffic patterns of PSEs vary significantly as compared to any given
weekday traffic patterns, accidents, or any other incidents, it is of great inconvenience for traffic
managers, drivers or freight movers to deal with PSEs [1]. Thus, PSEs are a major concern for
traffic planners and local transportation agencies because of increased traffic demand and
restricted roadway capacity causing disruptions to the regular traffic conditions [1, 2]. However,
this disruption and the associated operational needs can be anticipated and managed in advance
[3]. Participation from key stakeholders, development and implementation of effective traffic
management plan, and the flexibility to change plans to manage real-time traffic are among the
key strategies to efficiently handle PSEs [4].
Network Science is an emerging research field having multifaceted outlook in the study of large-
scale real networked systems which considers both the network topology and the behavior of
network actors. Complex networks with dynamic and irregular structure along with their statistical
properties are the primary focus of such research efforts i.e. the combined knowledge of network
structure and behavior which is significantly distinct from the straight-forward analysis of single
small graphs [5, 6]. The prevalence of networked systems has resulted in a number of studies with
applications in various domains over the last decade. Such domains include social organizations,
internet, systems biology, supply chains and logistics, information and communication systems,
financial markets, infrastructure systems among others [6-8]. A number of novel structural
properties and concepts have been observed and some unifying principles along with relevant
statistical distributions have been derived to characterize interdependence between the structure
and function of complex real networks. For example, the existence of small-world property in
many real networks suggest that most vertices in the network can be reached from every other
node by using relatively short paths despite large size of these networks [9-11]. On the other hand,
the scale-free property suggests the existence of large hubs i.e. a few nodes which are highly
connected to many other nodes in the network and such hubs result in a network degree
distributions (power-law) with highly right-skewed long tail referring to nodes with a much higher
degree than most other nodes [12]. Other properties include transitivity, network resilience, mixing
patterns, network homophily or similarity, degree correlations, preferential attachment,
community structure, network navigation, size of largest components among other which provide
valuable insights [6].
Information dissemination is the systematic way of distributing information and spreading
awareness to every individual and systematic planning, collection, organization, and delivery
technique are needed before circulating relevant information to any target audience by using
various media and communication means. Information dissemination thus constitutes an important
Sadri, Hasan, Ukkusuri, Suarez Lopez
4
and critical factor for the success of organizing PSEs. Despite many technical challenges to
manage PSEs, the empirical literature does not provide any specific guidelines to local traffic
managers and emergency response personnel to disseminate travel specific information as part of
traffic management plans for PSEs. Social media platforms (Twitter, Facebook and others) can be
considered as appropriate means of disseminating information dynamically. Studies have found
that an individual's real world actions can be inferred based on the connections and activities in
social media [13]. Twitter shows both the characteristics of a social network and an informational
network [14] and users can share short messages up to 140 characters along with the ability to
follow other. While the information network properties of Twitter instigate information contagion
globally, the social network properties allows access to geographically and personally relevant
information and [15]. Because of specific features, Twitter can be particularly useful for effective
information dissemination during PSEs.
The overwhelming usage and activity of Twitter users can be expressed by a 2013 statistic that
suggests over 143K tweets per second being generated on Twitter [16]. User activity in social
media has shown its prevalence in recent years and the world is more connected now than ever
before. The ease in information sharing and the ability to instigate others have primarily
contributed to such connectivity all over the world. However, the purpose and context of the online
activity on social media platforms, such as Facebook and Twitter, may vary from user to user. For
example, users' check-in activity can be referred as distinct from what users' post or share to
disseminate any specific information. One specific feature of such information sharing activity is
the ability of users' in mentioning (direct mentions, retweets and replies) others that they follow.
In this study, we used Twitter REST API for the keyword 'purdue' and obtained 56,159 tweets
over a month. Each tweet consisted of several words and user mentions which co-appeared with
the keyword 'purdue' and resembled higher likelihood of a Twitter subscriber belonging to the
Purdue University community. Next, we construct the 'purdue' specific online social interaction
networks by considering the user mentions. Finally, we analyze such network characteristics,
examine the properties and network growth, and derive relevant insights based on the theories of
network science literature.
RELATED WORK
The coupling between network structure and behavior of network agents has initiated a number of
studies related to the dynamical behavior of network actors communicating through complex
network topologies. This interdependence has significant outcomes when the robustness and
resilience of a real network is considered and the way networks respond to targeted failure due to
external disturbances [17]. Fundamental research questions, as explored in the empirical literature,
can be listed as (i) how to model emergence of new innovations or ideas based on agent
interactions, (iii) who are the key influential players in the network and how to find them, (iii) how
to maximize network influence based on certain mechanism, (iv) when and how networks execute
contagious behavior such as disease transmission or information propagation, (v) which agents are
more likely to connect and interact with agents of the same profile? A few examples of such studies
may include epidemic models of disease transmission [18, 19], email networks and computer virus
transmission [20, 21], collapse in power grid networks [22, 23], disruptions of trade markets [24],
information propagation in social networks [25], and many others.
Sadri, Hasan, Ukkusuri, Suarez Lopez
5
The successful spreading of awareness to every individual in a community solely depends on an
effectual information dissemination process [26-28]. The prevalence of user activities in social
media (Twitter and Facebook for example) has shown its prevalence over the last decade, allowing
people to be more connected than ever before worldwide. This has been possible because of the
flexibility in information sharing and the way people instigate their online neighbors. Unlike the
usual communication media, social media can be used as useful means to disseminate information
during any specific event such as PSEs. The benefits to convincingly collect, analyze and use such
large-scale and rich information from online information sources have also been addressed [29].
Many empirical studies have explored social media data for emergency response and disaster
management [30-35], crisis informatics [36-43] and many others. In fact, one could efficiently
analyze and predict real world human actions based on user activity and connectivity on social
media platforms [13, 15]. However, the purpose and context of the user activity over social media
platforms may vary from one user to another user.
Transportation researchers have started exploiting these large-scale data sources more extensively
in recent years. Such examples include problems related to travel survey techniques [44, 45],
activity-pattern modeling [46-48], origin-destination demand estimation [49-53] and transit
planning [54]. However, a few studies explored people's ego-centric offline social networks and
the effects of ego-centric social ties on joint activity participation [55, 56]. To the best of the
authors' knowledge, the empirical literature does not provide any specific evidence on how to
extract networks of user interactions from social media and the applicability of such networks to
solve transportation related problems, which is the primary scope of this study.
NETWORK DATA DESCRIPTION
We used twitter REST API to collect tweets for using a specific keyword 'purdue' which is
frequently used in Twitter within the Purdue community. The dataset selection was due to its
relevance in the study of information flow patterns of specific topics related to Purdue University.
It is equally important to understand how special events affect this behavior over time. By running
the twitter REST API between April 16, 2016 and May 16, 2016 for four consecutive weeks, we
were able to obtain 56,159 tweets for the query 'purdue' after initial data cleaning for non-English
tweets and common stop words. 19,532 of these tweets did not include any user mentions,
however, the rest of the tweets included at least one user mention in each tweet. The frequency
distribution of the top 50 words in these tweets, co-appeared with 'purdue', suggests that these top
50 most frequent words contribute up to ~25% of all the words that appeared in the collected data.
A word cloud of the most frequent words in the dataset is presented in Figure 1(a). Different
combinations of these words constitute specific topics based on which users influence one another
by using the user mention feature on Twitter. These frequently appeared words also suggest the
emergence of event specific topics such as Purdue Day of Giving, Senator Bernie Sanders's visit
during Indiana Primary among others. Celebrity players of Purdue such as Anthony Brown
(football), Spike Albrecht (basketball) and others also contributed to many topics. The differences
in the amount of user mentions in the tweets over days are plotted in Figure 1(b). It can be clearly
seen that the number of tweets having user mentions is almost twice as the number of tweets
without mentions. These tweets primarily contribute to the formation of networks of direct social
influence. In Table 1, we present the amount of user mentions as was observed in the tweets.
Sadri, Hasan, Ukkusuri, Suarez Lopez
6
In Twitter, users can post tweets up to 140 characters and each data point can be stored as a tuple
Tweet once collected with the following information:
Tweet (tweet_id) = {tweet, tweet_created_at, user_id, user_screen_name, user_location,
user_name, user_followers_count, user_friends_count, user_statuses_count,
user_favourites_count,, user_listed_count, user_mention, tweet_retweeted, tweet_lat, tweet_lon}
For this study, we are interested in using a sub-tuple tweet to infer the links of direct influence that
finally evolves into a highly connected network of a given context:
tweet (tweet_id) = { user_id, tweet, user_mention}
Let us consider the following three tuples from the tweets generated on Twitter on 04/28/2016
(02:45:40 +0000), 05/02/2016 (14:45:33 +0000) and 05/03/2016 (13:50:21 +0000), respectively.
tweet(725516302819938305) = {709920419529281537, 'at purdue university, we are in this
campaign to win and become the democratic nominee. - bernie sanders htt…', [null]}
tweet(727147016233558016) = {3239853627, 'rt @saracohennyc at purdue university, we are
in this campaign to win and become the democratic nominee. - bernie sanders htt…',
[709920419529281537]}
tweet(727495513277382656) = {325069363, 'rt @bernielovesall: rt @saracohennyc at purdue
university, we are in this campaign to win and become the democratic nominee. - bernie
sanders htt…', [3239853627, 709920419529281537]}
Based on the above tweets, there is a directed link from user 709920419529281537 to user
3239853627 and from user 709920419529281537 to 325069363. Please refer to Figure 2 (a) for
the details of this network construction. The preliminary analysis of these data waves suggest the
existence of 34,363 unique users and 38,442 unique undirected links (39,709 links if direction is
considered) of direct influence. The network elements of the graph (constructed based on the data)
are presented in Table 1.
Different network visualizations are presented from Figure 2(c)-2(f) to depict the network
configurations and how the network structure appears after four weeks. In Figure 2(c), we present
the undirected graph having 34,363 users from Twitter and 38,442 links. The network isolates
without any connectivity are also shown in the periphery. This graph includes 8,348 connected
components and the largest connected component is presented in Figure 2(e)-2(f). While Figure
2(f) better represents the hierarchical structure of the network with the most central node in the
center, Figure 2(e) presents weighted edges based on the number of appearance of these links. This
weighted graphs help to explain the existence of links having higher strength which also serves as
an evidence of higher influence. In Figure 2(d), we present the largest hub i.e. the most central
node having the largest degree. It is highly intuitive that the network will be under huge disruption
if such node disappears or remain active in cases.
Sadri, Hasan, Ukkusuri, Suarez Lopez
7
IMPLICATIONS FROM NETWORK ANALYSES
The user mentions, observed in the data for four consecutive weeks, construct a social interaction
network that includes 34,363 nodes and 39,709 links for the directed graph and 34,363 nodes and
38,442 links for the undirected graph (Table 1, Figure 2c). 6,096 of these nodes appeared as
network isolates (nodes without connectivity) in the periphery along with 8,348 connected
components (Figure 2c). 33,020 connections (links) among 21,045 users (nodes) were observed in
the largest connected component of this network (Figure 2e-2f). The radius and diameter of the
largest connected component were observed as 9 and 17, respectively. These are relevant to the
small world property of complex real networks that refers to the existence of relatively short paths
between any pair of nodes in most networks despite their large size. The existence of this property
has been observed in many real networks as studied in the empirical literature [9-11]. This property
has significant implications in the modeling of dynamic processes occurring on real networks. For
example, when effective information dissemination is considered, contagion will be faster through
the network because of short average path lengths [6]. Three important measures to explain this
property are eccentricity, radius and diameter. While the eccentricity of a node in a graph is the
maximum distance (number of steps or hops) from that node to all other nodes; radius and diameter
are the minimum and maximum eccentricity observed among all nodes, respectively.
Network Density, frequently used in the sociological literature [57], equals to 0 for a graph without
any link between nodes and 1 for a completely connected graph. The density of real graphs refer
to the proportion of links that exist in the graph and the maximum number of possible links in the
graph. For n users, the number of maximum links are n(n-1) for a directed graph and n(n-1)/2 for
a undirected graph. The densities that we observe in the social interaction network of 21,045 users
are 0.00003, 0.00007 and 0.00015 for the directed, undirected and the largest connected
component, respectively. This implies higher connectivity in the largest connected component,
more than twice as much as in the whole network. The node Degree is the number of edges
adjacent to that node, In-degree is the number of edges pointing in to the node and Out-degree is
the number of edges pointing out of the node. The degree of a node (𝑘) is the number of direct
edges to other nodes in a graph from that node and the degree distribution 𝑃(𝑘) in real networks,
(probability that a randomly chosen node has degree 𝑘), is significantly different from the Poisson
distribution, typically assumed in the modeling of random graphs. Real networks, in fact, exhibit
a power law (or scale-free) degree distribution characterized by higher densities of triangles such
as cliques in a social network [12]. Such networks also demonstrate significant correlations in
terms of node degrees or node-level attributes. Existence of hubs i.e. a few nodes that are highly
connected to other nodes, in the network can also be validated by the scale-free phenomenon. The
largest hub (or ego), as was observed in our dataset, is visualized in Figure 2(d). The presence of
large hubs results in a degree distribution with long tail (highly right-skewed), indicating the
presence of nodes with a much higher degree than most other nodes. For an undirected network,
the degree distribution 𝑃𝑑𝑒𝑔𝑟𝑒𝑒(𝑘) can be written as follows:
𝑃𝑑𝑒𝑔𝑟𝑒𝑒(𝑘) ∝ 𝑘−𝛾 …………..………….……….. (1)
where, 𝛾 is some exponent and 𝑃𝑑𝑒𝑔𝑟𝑒𝑒(𝑘) decays slowly as the degree 𝑘 increases, increasing the
probability of obtaining a node with a very high degree. Networks with power-law distributions
are called scale-free networks that holds the same functional form (power laws) at all scales. The
Sadri, Hasan, Ukkusuri, Suarez Lopez
8
power law 𝑃𝑑𝑒𝑔𝑟𝑒𝑒(𝑘) remains unchanged (other than a multiplicative factor) when rescaling the
independent variable 𝑘 by satisfying:
𝑃𝑑𝑒𝑔𝑟𝑒𝑒(𝑥𝑘) = 𝑥−𝛾 𝑃𝑑𝑒𝑔𝑟𝑒𝑒(𝑘) …………………..….. (2)
The presence of hubs that are orders of magnitude larger in degree than most other nodes is a
characteristic of power law networks. The average degree of all the 34,363 users in the social
interaction network is 1.156 (Table 1) and the overall degree distributions are plotted in Figure
3(a). Figure 3(b) presents the degree distributions that were observed each day starting from the
data period of data collection. By using Alstott et al.'s python code, we obtained the best fitting to
the degree distributions [58] and the empirical data of this study fits close to being a power-law or
truncated power-law distributions. The code also returns a value of 𝑥𝑚𝑖𝑛 which refers to the
minimal value of 𝑥 at which the power law begins to become valid. For power-law, we obtain 𝛾 =
2.294 ± 0.046; 𝑥𝑚𝑖𝑛 = 11 and for truncated power-law 𝛾 = 2.278; 𝑥𝑚𝑖𝑛 = 11. Here, 𝛾 is the
slope of the distribution. When 𝛾 is high, the number of nodes with high degree is smaller than the
number of nodes with low degree. A low value of 𝛾 may refer to a more equal distribution, whereas
higher values of 𝛾 may denote more and more unfair degree distributions. It is important to note
here that the best fit power law may only cover a portion of the distribution's tail [58]. From Figure
3(d), it appears that the data also fits close to being a log-normal distribution. However, difficulties
in distinguishing the power law from the lognormal are common and well-described, and similar
issues apply to the stretched exponential and other heavy-tailed distributions [59, 60]. Our analysis
on the distributions fitting are based on pairwise comparison between power-law, truncated power-
law, log-normal, and exponential distributions. See Figure 3(c)-3(d) for details.
Another network property is Transitivity that implies the higher likelihood of any two given nodes
in a network to be connected, given each of these two nodes are connected to some other node.
This property refers to the fact that the friend of one's friend is likely also to be the friend of that
person in case of social networks and this is a distinctive deviation from the properties of random
graphs. In fact, this is indicative of heightened number of triangles (sets of three nodes each of
which is connected to each of the others) that exist in real networks [6] (Newman, 2003a). The
existence of triangles can be quantified by Clustering Coefficient. C:
𝐶 =
3∗ 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑡𝑟𝑖𝑎𝑛𝑔𝑙𝑒𝑠 𝑖𝑛 𝑡ℎ𝑒 𝑛𝑒𝑡𝑤𝑜𝑟𝑘
𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑐𝑜𝑛𝑛𝑒𝑐𝑡𝑒𝑑 𝑡𝑟𝑖𝑝𝑙𝑒𝑠 𝑜𝑓 𝑛𝑜𝑑𝑒𝑠
……….……… (3)
A connected triple refers to a single node with links running to an unordered pair of others. In case
of an unweighted graph, the clustering coefficient (𝑐𝑐𝑖) of a node 𝑖 refers to the fraction of possible
triangles that exist through that node:
𝑐𝑐𝑖 =
2 𝑇𝑖
𝑑𝑒𝑔𝑖∗[𝑑𝑒𝑔𝑖−1]
…………………………………. (4)
Here, 𝑇𝑖 is the number of triangles that exist through node 𝑖 and 𝑑𝑒𝑔𝑖 is the degree of node 𝑖. The
average clustering coefficient in the undirected social interaction network was observed to be
0.149 (Table 1)
Turning to the results obtained from the network growth analysis, we present these results in Figure
4 and Figure 5. The unit of time for the analysis of network growth was set to be 24-hours. We
Sadri, Hasan, Ukkusuri, Suarez Lopez
9
observe that the growth of network elements [nodes and links in Figure 4(a), isolates and connected
components in Figure 4(b)] is almost linear over days except for the date 04/26/2016 for which we
could not obtain any data. One key insight here is that the growth rate is higher for days that
followed special events such as Purdue Day of Giving and Senator Bernie Sanders' visit to Purdue
University during Indiana Primary 2016. While the network elements grow linearly, the densities
tend to go down to zero because of less overall connectivity in the network (Figure 4c). However,
the density of the largest connected components remain slight higher over time. In addition, as the
social interaction network keeps growing based on difference in user interaction for various topics,
the diameter and radius keeps fluctuating initially, however becomes constant later. This is
indicative of network stability when the reachability from one node to another node is considered
(Figure 5a-5b). The average degree of the nodes shows similar pattern to that of the growth of
network elements initially, however becomes flat later (Figure 5c). The network transitivity, based
on average clustering coefficient, suggests that the network becomes more transitive over time,
however slight fluctuation still remains (Figure 5d). The power-law exponents each day are
presented in Figure 5e. After reducing slightly in the initial days, they turn to becoming flat and
take a value close to 2.3. This implies that the power-law property holds when social interaction
network is observed over a long period of time.
Finally, we present the existence of repetitions in terms of how elements of such networks appear
in the network data (Figure 6). This is of great significance within the context of finding highly
active nodes (users) in the social interaction networks along with the strength of relationships
between node pairs. The relevance of considering the dynamic strength of social ties in information
spreading has been duly addressed [61, 62]. The weighted graph, based on the number of times a
link has appeared, is presented in Figure 2(e). In order to assess the commonalities of network
elements (nodes and links) over time, we compute the fraction of nodes and links every day that
appeared at least once in any of the previous days. From Figure 6(a), it can be seen that 65.2% of
the total users (or nodes) on May 16, 2016 appeared in the data at least once. Similarly, we observe
that 28.3% of the total links of interaction (undirected graph) on May 16, 2016 appeared, in any
of the previous days, at least once (Figure 6b).
CONCLUSIONS AND KEY FINDINGS
Real networks having complex topologies demonstrate a unique interdependence between the
structure and functional behavior. In this study, we demonstrate such interdependence by
exploiting online social interaction networks based on network data obtained from Twitter. The
social interaction network was formed by following the user mentions appeared in the tweets
during four consecutive weeks which are specific to a university community. The network
characteristics and properties have been analyzed and the network growth has been monitored over
time. Key insights obtained from the network analyses are listed below:
• The network degree distributions exhibit a power-law which is indicative of the scale-free
property of most real networks. This property holds for any given day as evident from the
empirical data. This is indicative of the existence of fewer nodes in the network with higher
levels of interactions, and many other nodes with less interactions.
• Network visualization is indicative of some nodes (users) being highly active, some links
(relations) having higher strength, existence of network isolates, connected components,
Sadri, Hasan, Ukkusuri, Suarez Lopez
10
and hubs i.e. nodes having reachability to many other nodes. This is also evident when the
appearance of the network elements each day is compared to all previous days.
• Network elements and average user degree grow linearly each day, however, network
densities tend to become zero. Largest connected components exhibit higher connectivity
(density) when compared with the whole graph.
• Network radius and diameter become stable over time which suggests less variations when
the reachability from one node to another node is considered. These variables are related
to the small-world property.
Increased transitivity in the growth of such networks is observed following the pattern of
mean clustering coefficient. Initial fluctuations of the power-law exponents reduce as the
network grows.
•
The properties of social interaction networks, as observed in this study, have fundamental
implications towards effective information dissemination. For example, power-law degree
distributions is related to the resiliency of a communication network. The level of resilience, when
a random nodes in the network are removed, depends solely on the way the network is formed i.e.
network topology. In case of networks having many low-degree nodes would have less disruption
and higher resilience since this nodes lie on few paths between others. However, removal of hubs
(high degree nodes) would cause major disruption and network agents would fail to communicate
since the regular length of path will increase as a result of many disconnected pairs of nodes. For
any Planned Special Event (PSE), the assembling of vehicles and pedestrians in a short amount of
time cause transportation and transit authorities to often encounter significant challenges in
controlling the induced traffic coming from different origins before the event and departing from
the event location after the event. There is hardly any specific method in the empirical literature
that would allow local emergency managers or agencies to properly disseminate targeted
information to any specific audience as part of traffic management procedures for PSEs. A better
knowledge of social interaction network growth and properties would be worthwhile to be
considered for such events.
Acknowledgements
The authors are grateful to National Science Foundation for the grant CMMI-1131503 and CMMI-
1520338 to support the research presented in this paper. However, the authors are solely
responsible for the findings presented in this study.
Author Contributions Statement
All the authors have contributed to the design of the study, conduct of the research, and writing
the manuscript.
Additional Information
Competing financial interests: Authors declare no competing financial interests.
Sadri, Hasan, Ukkusuri, Suarez Lopez
11
REFERENCES
1. Skolnik J, Chami R, Walker M. Planned Special Events–Economic Role and Congestion
Effects. 2008.
2. Carson JL, Bylsma RG. Transportation planning and management for special events2003.
3. Latoski SP, Dunn WM, Wagenblast B, Randall J, Walker MD. Managing travel for planned
special events: final report. 2003.
4. Dunn Jr W. Traffic Management of Special Events: The 1986 US Open Golf Tournament.
Transportation Research Circular. 1989;(344).
5. Albert R, Barabási A-L. Statistical mechanics of complex networks. Reviews of modern
physics. 2002;74(1):47.
6. Newman ME. The structure and function of complex networks. SIAM review.
2003;45(2):167-256.
7. Boccaletti S, Latora V, Moreno Y, Chavez M, Hwang D-U. Complex networks: Structure
and dynamics. Physics reports. 2006;424(4):175-308.
8. Ukkusuri SV, Mesa-Arango R, Narayanan B, Sadri AM, Qian X. Evolution of the
Commonwealth Trade Network. International Trade Working Paper 2016/07,
Commonwealth Secretariat, London. 2016.
9. Milgram S. The small world problem. Psychology today. 1967;2(1):60-7.
10. Travers J, Milgram S. An experimental study of the small world problem. Sociometry.
1969:425-43.
11. Watts DJ, Strogatz SH. Collective dynamics of 'small-world'networks. nature.
1998;393(6684):440-2.
12. Barabási A-L, Albert R. Emergence of scaling in random networks. science.
1999;286(5439):509-12.
13. Korolov R, Peabody J, Lavoie A, Das S, Magdon-Ismail M, Wallace W, editors. Actions are
louder than words in social media. Proceedings of the 2015 IEEE/ACM International
Conference on Advances in Social Networks Analysis and Mining 2015; 2015: ACM.
14. Myers SA, Sharma A, Gupta P, Lin J, editors. Information network or social network?: the
structure of the twitter follow graph. Proceedings of the 23rd International Conference on
World Wide Web; 2014: ACM.
15. Kryvasheyeu Y, Chen H, Obradovich N, Moro E, Van Hentenryck P, Fowler J, et al. Rapid
assessment of disaster damage using social media activity. Science advances.
2016;2(3):e1500779.
16. Krikorian R. New tweets per second record, and how. Twitter Engineering Blog. 2013;16.
17. Albert R, Jeong H, Barabási A-L. Error and attack tolerance of complex networks. nature.
2000;406(6794):378-82.
18. Anderson RM, May RM, Anderson B. Infectious diseases of humans: dynamics and control:
Wiley Online Library; 1992.
19. Murray JD. Mathematical biology I: an introduction, Vol. 17 of interdisciplinary applied
mathematics. Springer, New York, NY, USA; 2002.
20. Balthrop J, Forrest S, Newman ME, Williamson MM. Technological networks and the spread
of computer viruses. Science. 2004;304(5670):527-9.
21. Newman ME, Forrest S, Balthrop J. Email networks and the spread of computer viruses.
Physical Review E. 2002;66(3):035101.
Sadri, Hasan, Ukkusuri, Suarez Lopez
12
22. Kinney R, Crucitti P, Albert R, Latora V. Modeling cascading failures in the North American
power grid. The European Physical Journal B-Condensed Matter and Complex Systems.
2005;46(1):101-7.
23. Sachtjen M, Carreras B, Lynch V. Disturbances in a power transmission system. Physical
Review E. 2000;61(5):4877.
24. Sornette D. Why stock markets crash: critical events in complex financial systems: Princeton
University Press; 2009.
25. Coleman JS, Katz E, Menzel H. Medical innovation: A diffusion study: Bobbs-Merrill Co;
1966.
26. Cutter SL, Finch C. Temporal and spatial changes in social vulnerability to natural hazards.
Proceedings of the National Academy of Sciences. 2008;105(7):2301-6.
27. Helbing D. Globally networked risks and how to respond. Nature. 2013;497(7447):51-9.
28. Vespignani A. Predicting the behavior of techno-social systems. Science.
2009;325(5939):425-8.
29. Lazer D, Pentland AS, Adamic L, Aral S, Barabasi AL, Brewer D, et al. Life in the network:
the coming age of computational social science. Science (New York, NY).
2009;323(5915):721.
30. Bagrow JP, Wang D, Barabasi A-L. Collective response of human populations to large-scale
emergencies. PloS one. 2011;6(3):e17680.
31. Hughes AL, Palen L. Twitter adoption and use in mass convergence and emergency events.
International Journal of Emergency Management. 2009;6(3-4):248-60.
32. Li J, Rao HR. Twitter as a rapid response news service: An exploration in the context of the
2008 China earthquake. The Electronic Journal of Information Systems in Developing
Countries. 2010;42.
33. Van Hentenryck P, editor Computational Disaster Management. IJCAI; 2013.
34. Wang D, Lin Y-R, Bagrow JP. Social networks in emergency response. Encyclopedia of
Social Network Analysis and Mining: Springer; 2014. p. 1904-14.
35. Watts D, Cebrian M, Elliot M. Dynamics of social media. Public Response to Alerts and
Warnings Using Social Media: Report of a Workshop on Current Knowledge and Research
Gaps. The National Academies Press, Washington, DC; 2013.
36. Caragea C, McNeese N, Jaiswal A, Traylor G, Kim H-W, Mitra P, et al., editors. Classifying
text messages for the haiti earthquake. Proceedings of the 8th international conference on
information systems for crisis response and management (ISCRAM2011); 2011: Citeseer.
37. Earle PS, Bowden DC, Guy M. Twitter earthquake detection: earthquake monitoring in a
social world. Annals of Geophysics. 2012;54(6).
38. Freeman M. Fire, wind and water: Social networks in natural disasters. Journal of Cases on
Information Technology (JCIT). 2011;13(2):69-79.
39. Guy M, Earle P, Ostrum C, Gruchalla K, Horvath S, editors. Integration and dissemination of
citizen reported and seismically derived earthquake information via social network
technologies. International Symposium on Intelligent Data Analysis; 2010: Springer.
40. Pickard G, Pan W, Rahwan I, Cebrian M, Crane R, Madan A, et al. Time-critical social
mobilization. Science. 2011;334(6055):509-12.
41. Sakaki T, Okazaki M, Matsuo Y, editors. Earthquake shakes Twitter users: real-time event
detection by social sensors. Proceedings of the 19th international conference on World wide
web; 2010: ACM.
Sadri, Hasan, Ukkusuri, Suarez Lopez
13
42. Skinner J. Natural disasters and Twitter: Thinking from both sides of the tweet. First
Monday. 2013;18(9).
43. Ukkusuri S, Zhan X, Sadri A, Ye Q. Use of social media data to explore crisis informatics:
Study of 2013 Oklahoma tornado. Transportation Research Record: Journal of the
Transportation Research Board. 2014;(2459):110-8.
44. Abbasi A, Rashidi TH, Maghrebi M, Waller ST, editors. Utilising Location Based Social
Media in Travel Survey Methods: bringing Twitter data into the play. Proceedings of the 8th
ACM SIGSPATIAL International Workshop on Location-Based Social Networks; 2015:
ACM.
45. Maghrebi M, Abbasi A, Rashidi TH, Waller ST, editors. Complementing Travel Diary
Surveys with Twitter Data: Application of Text Mining Techniques on Activity Location,
Type and Time. 2015 IEEE 18th International Conference on Intelligent Transportation
Systems; 2015: IEEE.
46. Hasan S, Ukkusuri SV. Urban activity pattern classification using topic models from online
geo-location data. Transportation Research Part C: Emerging Technologies. 2014;44:363-81.
47. Hasan S, Ukkusuri SV. Location contexts of user check-ins to model urban geo life-style
patterns. PloS one. 2015;10(5):e0124819.
48. Zhao S, Zhang K, editors. Observing Individual Dynamic Choices of Activity Chains From
Location-Based Crowdsourced Data. Transportation Research Board 95th Annual Meeting;
2016.
49. Cebelak MK. Location-based social networking data: doubly-constrained gravity model
origin-destination estimation of the urban travel demand for Austin, TX. 2013.
50. Chen Y, Mahmassani HS, editors. Exploring Activity and Destination Choice Behavior in
Two Metropolitan Areas Using Social Networking Data. Transportation Research Board 95th
Annual Meeting; 2016.
51. Jin P, Cebelak M, Yang F, Zhang J, Walton C, Ran B. Location-Based Social Networking
Data: Exploration into Use of Doubly Constrained Gravity Model for Origin-Destination
Estimation. Transportation Research Record: Journal of the Transportation Research Board.
2014;(2430):72-82.
52. Lee JH, Gao S, Goulias KG, editors. Comparing the Origin-Destination Matrices from Travel
Demand Model and Social Media Data. Transportation Research Board 95th Annual
Meeting; 2016.
53. Yang F, Jin PJ, Wan X, Li R, Ran B, editors. Dynamic origin-destination travel demand
estimation using location based social networking data. Transportation Research Board 93rd
Annual Meeting; 2014.
54. Collins C, Hasan S, Ukkusuri SV. A novel transit rider satisfaction metric: Rider sentiments
measured from online social media data. Journal of Public Transportation. 2013;16(2):2.
55. Carrasco J-A, Miller EJ. The social dimension in action: A multilevel, personal networks
model of social activity frequency between individuals. Transportation Research Part A:
Policy and Practice. 2009;43(1):90-104.
56. Sadri AM, Lee S, Ukkusuri SV. Modeling Social Network Influence on Joint Trip Frequency
for Regular Activity Travel Decisions. Transportation Research Record: Journal of the
Transportation Research Board. 2015;(2495):83-93.
57. Scott J. Social network analysis: Sage; 2012.
58. Alstott J, Bullmore E, Plenz D. powerlaw: a Python package for analysis of heavy-tailed
distributions. PloS one. 2014;9(1):e85777.
Sadri, Hasan, Ukkusuri, Suarez Lopez
14
59. Malevergne Y, Pisarenko V, Sornette D. Gibrat's law for cities: uniformly most powerful
unbiased test of the Pareto against the lognormal. Swiss Finance Institute Research Paper.
2009;(09-40).
60. Malevergne* Y, Pisarenko V, Sornette D. Empirical distributions of stock returns: between
the stretched exponential and the power law? Quantitative Finance. 2005;5(4):379-401.
61. Granovetter MS. The strength of weak ties. American journal of sociology. 1973:1360-80.
62. Miritello G, Moro E, Lara R. Dynamical strength of social ties in information spreading.
Physical Review E. 2011;83(4):045102.
TABLE 1: Description of the Tweets and Network Elements
Description of the Tweets
Number of Total Tweets
Number of Tweets without any User Mentions
Number of Tweets with at least one User Mentions
Number of Tweets only including Self Mentions
Number of Words
Description of Network Elements
Number of Nodes (directed)
Number of Links (directed)
Network Density (directed)
Number of Nodes (undirected)
Number of Links (undirected)
Network Density (undirected)
Number of Nodes (lagest connected component)
Number of Links (lagest connected component)
Network Density (lagest connected component)
Radius (lagest connected component)
Diameter (lagest connected component)
Number of Connected Components
Number of Isolates
Average Degree (directed)
Average Clustering Coefficient (undirected)
56,159
19,532
36,627
20,645
3,589,732
34,363
39,709
0.00003
34,363
38,442
0.00007
21,045
33,020
0.00015
9
17
8,348
6,096
1.156
0.149
Sadri, Hasan, Ukkusuri, Suarez Lopez
15
FIGURE 1: Description of the Tweet Database. (a) Snapshot of 100 most frequent words in the
dataset, (b) Tweets collected over time (Linked tweets versus Non-linked tweets)
Sadri, Hasan, Ukkusuri, Suarez Lopez
16
FIGURE 2: Construction and Visualization of Social Interaction Network. (a) Directed graph, (b) Undirected graph, (c) Undirected
graph visualization, (d) Largest hub, (e) Weighted edges of the largest connected component, (f) Circular tree visualization of the largest
connected component
Sadri, Hasan, Ukkusuri, Suarez Lopez
17
FIGURE 3: Degree Distributions of Purdue Twitter Mention Network. (a) In-degree, Out-degree and Degree Distributions (b)
Degree distributions each day, (c) Comparison of data fitting with different distributions (d) Closer snapshot to power-law, truncated
power-law and log-normal fitting comparisons
Sadri, Hasan, Ukkusuri, Suarez Lopez
18
FIGURE 4: Growth of Social Interaction Network over Time. (a) Cumulative amount of
network elements (nodes and edges), (b) Cumulative network isolates and connected generated
each day, (c) Change in network densities each day due to additional elements.
Sadri, Hasan, Ukkusuri, Suarez Lopez
19
FIGURE 5: Change in Social Interaction Network Properties over Time. (a) Diameter, (b)
Radius, (c) Average Degree, (d) Average Clustering Coefficient, (e) Power-law and Truncated
Power-law Exponents.
Sadri, Hasan, Ukkusuri, Suarez Lopez
20
FIGURE 6: Existence of Common Nodes and Links Each Day as compared to All Previous
Days. (a) Common users, (b) Common links (undirected)
|
1308.6149 | 1 | 1308 | 2013-08-28T13:19:23 | The Extreme Right Filter Bubble | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | Due to its status as the most popular video sharing platform, YouTube plays an important role in the online strategy of extreme right groups, where it is often used to host associated content such as music and other propaganda. In this paper, we develop a categorization suitable for the analysis of extreme right channels found on YouTube. By combining this with an NMF-based topic modelling method, we categorize channels originating from links propagated by extreme right Twitter accounts. This method is also used to categorize related channels, which are determined using results returned by YouTube's related video service. We identify the existence of a "filter bubble", whereby users who access an extreme right YouTube video are highly likely to be recommended further extreme right content. | cs.SI | cs | The Extreme Right Filter Bubble
Derek O’Callaghan
University College Dublin
Dublin 4, Ireland
[email protected]
Derek Greene
University College Dublin
[email protected]
Dublin 4, Ireland
Maura Conway
Dublin City University
Dublin 9, Ireland
[email protected]
Joe Carthy
University College Dublin
Dublin 4, Ireland
[email protected]
Pádraig Cunningham
University College Dublin
Dublin 4, Ireland
[email protected]
3
1
0
2
g
u
A
8
2
]
I
S
.
s
c
[
1
v
9
4
1
6
.
8
0
3
1
:
v
i
X
r
a
ABSTRACT
Due to its status as the most popular video sharing platform,
YouTube plays an important role in the online strategy of
extreme right groups, where it is often used to host associ-
ated content such as music and other propaganda. In this
paper, we develop a categorization suitable for the analysis
of extreme right channels found on YouTube. By combining
this with an NMF-based topic modelling method, we catego-
rize channels originating from links propagated by extreme
right Twitter accounts. This method is also used to cate-
gorize related channels, which are determined using results
returned by YouTube’s related video service. We identify
the existence of a “filter bubble”, whereby users who access
an extreme right YouTube video are highly likely to be rec-
ommended further extreme right content.
Keywords
extreme right; YouTube; filter bubble; matrix factorization.
Categories and Subject Descriptors
H.3.3 [Information Search and Retrieval]: Clustering;
H.3.5 [Online Information Services]: Web-based services
INTRODUCTION
1.
Social media platforms have become a key component in the
online strategy of extremist political groups, as they provide
direct access to audiences, particularly youth, for radicaliza-
tion and recruitment purposes [1, 12]. YouTube’s status as
the most popular video sharing platform means that it is es-
pecially useful to these groups. Extreme right content such
as music and other associated propaganda, some of which
is deemed illegal in certain countries, is made freely avail-
able there, often for long periods of time [4]. In addition to
hosting user-generated video content, YouTube also provides
recommendation services, where sets of related and recom-
mended videos are presented to users, based on factors such
as co-visitation count and prior viewing history [13].
In 2011, Pariser proposed the filter bubble concept, which
stated that recommendation services may limit the types of
content to which a user is exposed [27]. Recommendation in
social media can therefore have the undesirable consequence
of a user being excluded from information that is not aligned
with their existing perspective, potentially leading to im-
mersion within an ideological bubble. In this paper we show
that this can happen when a user accesses an extreme right
(ER) video or channel on YouTube. In studies on English
and German ER content, we show that users are likely to be
recommended further ER content within the same category,
or related ER content from a different category. They are
unlikely to be presented with non-ER content (Figure 7).
Our previous work found that Twitter is used by extreme
right groups to propagate links to content hosted on third-
party sites, including YouTube [26]. These links enabled
us to retrieve video and uploader channel information from
YouTube, where subsequent analysis is focused upon chan-
nels (synonymous with uploaders or accounts [29]), rather
than individual videos. We use a topic modelling strategy
to characterize these channels (see Section 4), where content
linked to these channels is then characterized in the same
fashion. Our proposed scheme includes categories identified
in the academic literature on the extreme right, which are
suited to the videos and channels found on YouTube. We
find evidence that an extreme right filter bubble does indeed
exist, as shown by the results discussed in Section 5.
In Section 2, we provide a description of prior work on You-
Tube categorization and recommendation, along with re-
search that involved the categorization of online extreme
right content. The retrieval of YouTube data based on links
originating from extreme right Twitter accounts is then dis-
cussed in Section 3. Next, in Section 4, we describe the
methodology used for related channel ranking, topic iden-
tification, and channel categorization. Our investigation
into the extreme right filter bubble can be found in Sec-
tion 5, where we focus on two data sets consisting primarily
of English and German language channels respectively. An
overview of the entire process can be found in Figure 1.
1
2. RELATED WORK
2.1 Video Recommendation
Video recommendation on YouTube has been the focus of a
number of studies. For example, Baluja et al. suggested that
standard approaches used in text domains were not easily
applicable due to the difficulty of reliable video labelling
[2]. They proposed a graph-based approach that utilised
the viewing patterns of YouTube users, which did not rely
on the analysis of the underlying videos. The recommen-
dation system in use at YouTube at the time was discussed
by Davidson et al. , where sets of personalized videos were
generated with a combination of prior user activity (videos
watched, favorited, liked) and the traversal of a co-visitation
graph [13]. In this process, recommendation diversity was
obtained by means of a limited transitive closure over the
generated related video graph. Zhou et al. performed a mea-
surement study on YouTube videos to determine the sources
responsible for video views, and found that related video
recommendation was the main source outside of the search
function for the majority of videos [33]. They also found
that the click through rate to related videos was high, where
the position of a video in a related video list played a critical
role. A similar finding was made by Figueiredo et al. , where
they demonstrated the importance of key mechanisms such
as related videos in the attraction of users to videos [14].
Turning to the task of YouTube video categorization, Filip-
pova et al. presented a text-based method that relied upon
metadata such as video title, description, tags and com-
ments, in conjunction with a pre-defined set of 75 categories
[15]. Using a bag-of-words model, they found that all of the
text sources contributed to successful category prediction.
More recently, a framework for the categorization of video
channels was proposed by Simonet, involving the use of se-
mantic entities identified within the corresponding video and
channel profile text metadata [29]. Following the judgement
that existing taxonomies were not well-suited to this partic-
ular problem, a new category taxonomy was developed for
YouTube content. Roy et al. investigated both video recom-
mendation and categorization in tandem, where videos were
categorized according to topics built from Twitter activity,
leading to the enrichment of related video recommendation
[28]. Video text metadata was used for this process, and the
topics were based on the categories proposed by Filippova
et al. , in addition to the standard YouTube categories at the
time. Separately, they also analyzed diversity among related
videos, where they found that there was a 25% probability
on average of a related video being from a different category.
2.2 Extreme Right Categorization
In the various studies that have analyzed online extreme
right activity, certain differences can be observed among re-
searchers in relation to their categorization of this activity
and associated organizations [5]. Burris et al. proposed a
set of eight primarily US-centric categories in their analy-
sis of a white supremacist website network; Holocaust Re-
visionists, Christian Identity Theology, Neo-Nazis, White
Supremacists, Foreign (non-US) Nationalists, Racist Skin-
heads, Music, Books/Merchandise [9]. A similar schema
was used by Gerstenfeld et al. , which also included Ku Klux
Klan and Militia categories [16]. They also discussed the dif-
ficulty involved in the categorization of certain sub-groups,
where a general category (Other) was applied in such cases.
These categories were adapted in separate studies of Italian
and German extreme right groups, where new additions in-
cluded Political Parties and Conspiracy Theorists, while oth-
ers such as Music and Skinheads were merged into a Young
category (Tateo [32], Caiani et al. [10]). Rather than focus-
ing on ideological factors, Goodwin proposed four organiza-
tional types found within the European extreme right milieu;
political parties, grassroots social movements, independent
smaller groups, and individual ‘lone wolves’. Other notable
categories include the Autonomous Nationalists identified
within Germany in recent years. These groups focus specif-
ically on attracting a younger audience, where social media
is often a critical component in this process [1].
The popularity of YouTube has led to its usage by extreme
right groups for the purpose of content dissemination. Its
related video recommendation service provides a motivation
for the current work to analyze the extent to which a viewer
may be exposed to such content. Separately, disagreements
over the categorization of online extreme right activity sug-
gests that a specific set of categories may be required for the
analysis of this domain.
3. DATA
In our previous work, we investigated the potential for Twit-
ter to act as one possible gateway to communities within
the wider online network of the extreme right [26]. Two
data sets associated with extreme right English language
and German language Twitter accounts were generated, by
retrieving profile data over an extended period of time. We
gathered all tweeted links to external websites, and used
these to construct an extended network representation. In
the current work, we are solely interested in tweeted You-
Tube URIs. Data for the Twitter accounts were retrieved
between June 2012 and May 2013, as limited by the Twit-
ter API restrictions effective at the time. YouTube URIs
found in tweets were analyzed to determine a set of chan-
nel (account) identifiers that were directly (channel profile
page URI) or indirectly (URI of video uploaded by channel)
tweeted. All identified channels were included, regardless of
the number of tweets in which they featured. Throughout
this work, we refer to these as seed channels; 26,460 and
3,046 were identified for the English and German data sets
respectively.
In order to explore the filter bubble hypothesis we must
first categorize YouTube channels. To do this, we use text
metadata associated with the videos uploaded by a particu-
lar channel, namely their titles, descriptions and associated
keywords. Although user comments have been employed
in other work [15], they were excluded here. This decision
followed an initial manual analysis of a sample of tweeted
videos, which found that comments were often not present,
or had been explicitly disabled by the uploader. We also
excluded the YouTube “category” field as it was considered
too broad to be useful in the extreme right domain. Using
the YouTube API, we initially retrieved the available text
metadata for up to 1,000 of the videos uploaded by each seed
channel, where the API returns videos in reverse chronologi-
cal order according to their upload time. In cases where seed
channels and their videos were no longer available (e.g. the
channel had been suspended or deleted since appearing in a
tweet), these channels were simply ignored.
2
Figure 1: Overview of the process used to investigate the extreme right filter bubble on YouTube.
In order to address the variance in the number of uploaded
videos per channel, and to reduce the volume of subsequent
data retrieval, we randomly sampled up to 50 videos for each
seed. For each video in this sample, metadata values were
retrieved for the top ten related videos returned by the API.
Using the default parameter settings, these videos appear to
be returned in order of “relevance”, as defined internally by
YouTube, similar to the default behaviour of video search re-
sults feeds described in the API documentation (June 2013).
We refer to the corresponding uploaders as related channels;
1,451,189 and 195,146 were identified for the English and
German data sets respectively. As before, we then retrieved
the available text metadata for up to 1,000 videos uploaded
by each unseen related channel, from which a random sam-
ple of up to 50 videos was generated.
For both seed and related channels, the corresponding up-
loaded video sample is used for categorization; this is de-
scribed in Section 4.2. Separately, we also note that the
videos in question may have been uploaded at any time prior
to retrieval, where these times are not necessarily restricted
to the period of either Twitter or YouTube data retrieval.
4. METHODOLOGY
Having retrieved the channel and video data from YouTube,
the next steps involved ranking the related channels for each
seed channel, identifying latent topics associated with the
uploaded videos, and using these to categorize both seed
and related channels. This section corresponds to part (b)
of the process overview diagram found in Figure 1.
4.1 Related Channel Ranking
For our analysis, it was first necessary to generate a set of
related channel rankings for each seed channel, according
to the related rankings returned by the YouTube API for
the sample of videos uploaded by the seed. We applied the
SVD rank aggregation method proposed by Greene et al. to
combine the rankings for each uploaded video into a single
ranked set across all videos for the seed in question, from
which we select the top ranked related channels [19]. We
restrict our focus to the top 10, given the impact of related
video position on click through rate [33]. The aggregation
process for each seed channel si and its ni uploaded videos
is as follows:
1. For each uploaded video vij (j ∈ [1, ni]), generate
a rank vector rvij between the seed si and its re-
lated channels using the retrieved YouTube API re-
lated video ranking. For channels related to seed videos
other than vij, a rank of (mi + 1) is applied, where mi
is the total number of channels related to si.
2. Stack all rvi rank vectors as columns, to form the mi×
ni rank matrix Ri, and normalise the columns of this
matrix to unit length.
3. Compute the SVD of Ri, and extract the first left sin-
gular vector. Arrange the entries in this vector in de-
scending order to produce a ranking of all channels
related to this seed.
From the ranking generated above, we then select the top 10
ranked related channels for each seed. These channels are
used for our filter bubble investigation in Section 5.
4.2 Topic Identification
For the purpose of channel categorization, we initially iden-
tified latent topics associated with the channels in both data
sets, based on their uploaded videos. Following the ap-
proach of Hannon et al. [20], we generated a “profile doc-
ument” for each seed and related channel, consisting of an
aggregation of the text metadata from their corresponding
uploaded video sample, from which a tokenized representa-
tion was produced. All available terms in the channel doc-
uments were used, where the tokenization process involved
the exclusion of URIs and normalization of diacritics. We
excluded a custom set of stopwords, such as official YouTube
category terms, additional YouTube-specific terms such as
“video” and “view”, and terms from multiple language stop-
word lists. Due to the frequent presence of names in the
data, we also excluded all identified first names. As sug-
gested by Fillipova et al. [15], terms were not stemmed due
to the expectation of both noisy terms and those of multiple
languages. Low-frequency terms appearing in < 20 channel
documents were excluded at this point.
These channel documents were transformed to log-based
TF-IDF vectors, and subsequently normalized to unit length.
However, in an attempt to reduce the term dimensionality
found in the combination of seed and related channel docu-
ments, we generated the TF-IDF vectors in two stages. The
first stage constructed vectors for the seed documents, from
which a reduced seed term vocabulary was derived. In the
second stage, vectors for the related documents were then
3
Related Channel RankingTopic IdentificationChannel Categorization(b) Methodology(c) Experiments Filter BubbleInvestigation(a) DataYouTubeData RetrievalTable 1: Categories of extreme right YouTube content, based on common categorizations found in academic literature on
extreme right ideology.
Category
Anti-Islam
Anti-Semitic
Description
Can include political parties (e.g. Dutch PVV ) or groups such as the English
Defence League (EDL), which often describe themselves as “counter-Jihad”.
All types of anti-Semitism, regardless of association (existing literature tends
to discuss this in relation to other categories).
Source
[1, 17]
[9, 32]
Conspiracy Theory Themes include New World Order (NWO), Illuminati etc. Not exclusively
[1, 30, 32]
Music
Neo-Nazi
Patriot
Political Party
Populist
Revisionist
Street Movement
White Nationalist
ER, but often related to Patriot in this context.
Includes any ER music such as Oi!, Rock Against Communism (RAC) etc.
Nazi references, such as to Hitler, WWII, SS etc.
US-centric, including groups such as “Birthers”, militia, anti-government,
anti-immigration, opposition to financial system. Some of these themes are
not exclusive to ER.
Primarily European parties such as the BNP, FP O, Jobbik, NPD, PVV,
Swedish Democrats, UKIP etc. Many of these parties are also categorized
as Populist.
Broader category that includes various themes such as anti-EU, anti-
establishment, anti-state/government, anti-immigration (as with Patriot,
some of these are not exclusive to ER). Although some disagreement about
this category exists [23], we have used it as it has proved convenient for
categorizing certain groups that span multiple themes.
References to Holocaust/WWII denial. Closely associated with Neo-Nazi.
Groups such as the EDL, Autonome Nationalisten, Spreelichter, Anti-Antifa
etc.
References to white nationalism and supremacism, also used to characterize
political parties such as the BNP or Jobbik.
[1, 9, 32]
[1, 9, 16]
[30]
[1, 10, 18]
[3, 24]
[9, 16, 32]
[1, 18]
[9, 16, 32]
constructed using the seed vocabulary. In both stages, short
documents containing < 10 terms were excluded. We use ms
and mr to refer to the number of seed and related channel
document vectors in a particular data set.
2. NMF is applied to Vs to produce two factors; Ws, an
n × T matrix containing topic basis vectors and Hs,
a T × ms matrix containing the topic assignments or
weights for each seed channel document.
Topic modelling is concerned with the discovery of latent
semantic structure or topics within a text corpus, which
can be derived from co-occurrences of words and documents
[31]. Popular methods include probabilistic models such as
latent Dirichlet allocation (LDA) [6], or matrix factoriza-
tion techniques such as Non-negative matrix factorization
(NMF) [21]. We initially evaluated both LDA and NMF-
based methods with the seed channel document representa-
tions described above (the former was applied to TF vec-
tors). However, as in our previous work, NMF was found
to produce the most readily-interpretable results, which ap-
peared to be due to the tendency of LDA to discover topics
that over-generalized [11, 25]. We were aware of the pres-
ence of smaller groups of channels associated with multiple
languages in both data sets, and opted for specificity rather
than generality by applying NMF to the TF-IDF channel
vectors. As we found previously, the IDF component en-
sured a lower ranking for less discriminating terms, thus
leading to the discovery of more specific topics.
To allow the seed channel vectors to determine the topic ba-
sis vectors, we undertook the process in two stages. Firstly,
we generate topics for the seeds:
1. Construct an n× ms term-document matrix Vs, where
each column contains a seed channel TF-IDF vector.
For both data sets, this results in a set of basis vectors con-
sisting of both ER and non-ER topics. The second stage
involves producing topic assignments for the related chan-
nel vectors:
1. Construct an n × mr term-document matrix Vr con-
taining the related channel TF-IDF vectors.
2. Generate a corresponding T × mr topic weights matrix
Hr by transforming Vr according to the Ws model.
The latter step was achieved with a single outer iteration
of the H non-negative least squares sub-problem from the
approach by Lin et al. [22]. As the basis vectors matrix Ws
was fixed, only one outer iteration was necessary in order to
generate an approximation of a converged Hr, thus permit-
ting large related channel matrices to be factorized given the
initial NMF operation on a far smaller seed matrix. In both
cases, to address the instability introduced by random ini-
tialization in standard NMF, we employed the deterministic
NNDSVD initialization method [7].
4.3 Topic and Channel Categorization
As discussed earlier in Section 2.1, some prior work has pro-
posed generic categories for use with YouTube videos and
channels. However, as these studies have focused on the
4
categorization of mainstream videos, they are not sufficient
for the present analysis where categories specifically associ-
ated with the extreme right are required. In Section 2.2, we
discuss prior work that characterized online extreme right
activity using a number of proposed categories, but as indi-
cated earlier, no definitive set of categories is agreed upon
in this domain [5]. Therefore, we propose a categorization
based on various schema found in a selection of academic lit-
erature on the extreme right, where this category selection
is particularly suited to the ER videos and channels we have
found on YouTube. Some categories are clearly delineated
while others are less distinct, reflecting the complicated ide-
ological make-up and thus fragmented nature of groups and
sub-groups within the extreme right [16].
In such cases,
we have proposed categories that are as specific as possible
while also accommodating a number of disparate themes and
groups. Details of the categories employed can be found in
Table 1.
As both data sets contained various non-ER channels, we
also created a corresponding set of non-ER categories con-
sisting of a selection of the general YouTube categories as of
June 2013, in addition to other categories that we deemed
appropriate following an inspection of these channels and
associated topics. These non-ER categories were:
• Entertainment
• Gaming
• Military
• Music
• News & Current Af-
fairs
• Politics
• Religion
• Science & Education
• Sport
• Television
Having produced a set of T topics for a data set, we then
proceeded to categorize them. For each topic, we manually
inspected the high-ranking topic terms from the correspond-
ing vector in Ws, in addition to profiles and uploaded videos
for a selection of seed channels most closely assigned to the
topic, according to their weights in Hs. Multiple categories
were assigned to topics where necessary, as using a single
category per topic would have been too restrictive while also
not reflecting the often multi-faceted nature of most topics
that were identified.
In many cases, categories for topics
were clearly identifiable, with a separation between ER and
non-ER categories. For example, an English Defence League
(EDL) topic was categorized as Anti-Islam and Street Move-
ment, while a topic having high-ranking terms such as “gui-
tar” and “band” was categorized as Music. For certain topics,
this separation was more ambiguous, where the channels as-
signed to a particular topic consisted of a mixture of both
ER and non-ER channels. A combination of both ER and
non-ER categories were assigned in such cases.
The set of categorized topics was then used to label both
seed and related channels, using the channel topic assign-
ment weights found in the H matrices. This supports the
potential assignment of multiple categories to a single chan-
nel. To achieve this, it was first necessary to determine a
weight threshold w for selecting discriminating topics to be
used in the categorization of a particular channel. Using a
(a) Categories assigned to topics.
(b) Channel H weights for topics.
(c) Channels categorized using topics where H ≥ w (in this
example, w = 0.05).
Figure 2: Topic and Channel categorization process.
range of values for w, we calculated µ, the mean number
of topics per channel with H weight ≥ w, and selected the
value for w where µ =∼ 1; the minimum number of topics
required for categorization. As we performed NMF in two
stages to produce Hs and Hr for seed and related channels
respectively, two corresponding ws and wr thresholds were
generated due to the dependency of the H weights’ upper
bound on the input matrices V . Using these thresholds, each
channel was categorized as follows:
1. Select all topics where the channel’s corresponding row
weights in H are ≥ w.
2. Add each selected topic weight to the totals maintained
for the topic’s corresponding categories.
3. Rank these categories in descending order based on
5
hitler, adolf, reichNeo-Nazicover, guitar, acousticRevisionistMusicCategoriesTopicsTopicsChannelshitler, adolf, reichcover, guitar, acousticChannel 1Channel 20.090.030.080.01Neo-NaziRevisionistMusicCategoriesChannelsChannel 1Channel 2their totals across all selected topics, and assign the
highest ranked category to the channel. Multiple cat-
egories are assigned in the event of a tie.
A simple example illustrating the complete process of map-
ping of channels to categories is shown in Figure 2. We
found that a certain number of channels, both seed and re-
lated, had a flat profile with relatively low weights (< w) for
all topics; these could be considered as grey sheep. Further
analysis found this to be due to factors such as the original
documents being short or containing few unique terms. As
we were unable to reliably categorize such channels, they
were excluded from all subsequent analysis. Separately, al-
though the NMF process often identified topics with high-
ranking discriminating terms in languages other than that
of the data set, a small number of topics with less discrimi-
nating general language terms were also found. As it would
have been difficult to distinguish between ER and non-ER
channels closely associated with these topics, these were also
excluded. Further details on the w thresholds and numbers
of excluded channels are provided in Section 5.
5. THE ER FILTER BUBBLE
In this section, we discuss the filter bubble analysis of the
English and German language YouTube data sets. The ex-
perimental methodology is as follows:
1. Generate an aggregated ranking of related channels for
each seed channel.
2. Generate TF-IDF channel document vectors, and iden-
tify topics using NMF.
3. Categorize the identified topics according to the set
defined in Table 1.
4. Categorize the channels based on their topic weights
in H.
5. Investigate whether an extreme right filter bubble is
present.
For Step 5 above, we define an extreme right filter bubble in
terms of the extent to which the related channels for a par-
ticular extreme right seed channel also feature extreme right
content. It has been shown that the position of a video in a
related video list plays a critical role in the click through rate
[33]. Therefore, we investigate the presence of a filter bub-
ble using the top k ranked related channels, with increasing
values of k ∈ [1, 3, 5, 7, 10], as follows.
For each ER seed channel:
1. Select the top k ranked related channels, filtering any
excluded channels as defined in Section 4.3. Seed chan-
nels with no remaining related channels following fil-
tering are not considered for rank k.
2. Calculate the total proportion of each category as-
signed to the ≤ k related channels.
Then, for each ER category:
1. Select all seed channels to which the category has been
assigned.
2. Calculate the mean proportion of each related category
associated with these seed channels.
We consider a filter bubble to exist for a particular ER cat-
egory when its highest ranking related categories, in terms
of their mean proportions, are also ER categories.
5.1 English language categories
From the total number of channels in the English language
data set, we generated 24,611 seed and 1,376,924 related
channel documents, using a corresponding seed-based vo-
cabulary of 39,492 terms. The TF-IDF matrices Vs and
Vr were then generated for seed and related documents re-
spectively, and topics were identified by applying NMF to
Vs. To determine the number of topics T , we experimented
with values of T in [10, 100] to produce topics that were
as specific as possible, given prior knowledge of the pres-
ence of smaller groups of channels associated with multiple
languages within both data sets. This led to the selection
of T = 80, as larger values resulted in topic splits rather
than the emergence of unseen topics. Of these, 27 ER top-
ics (33.75%), 39 non-ER topics (48.75%), 8 topics that were
a combination of ER and non-ER categories (10%), and 6
topics based on general terms of a separate language (7.5%)
were found.
Figure 3: English mean topics per channel at ws, wr in
[0.01, 0.09]. ws and wr were set to 0.03 and 0.08 respectively.
These 80 topics were then categorized according to the set
defined in Table 1, which permitted the subsequent catego-
rization of the seed and related channels using their corre-
sponding Hs and Hr topic weights. As described in Section
4.3, we first generated the weights thresholds ws and wr.
Figure 3 contains the mean number of topics per channel
µ with H weight ≥ w, for values of w in [0.01, 0.09]. Us-
ing µ =∼ 1 as the selection criterion resulted in values of
0.03 and 0.08 for ws and wr respectively. Using these, we
excluded 8,225 (33.42%) seed and 482,226 (35.66%) related
grey sheep channels that could not be categorized. Related
channels ranked at k > 10 were also excluded, and all non-
ER seed channels were removed from the candidate seed
set. The remaining 6,573 ER seed and their 22,980 related
6
●●●●●●●●●●●●●●●●●●02460.010.020.030.040.050.060.070.080.09wMean topics●●SeedRelatedTopics=⇠1ings with the introduction of certain non-ER categories, ER
categories consistently have the strongest presence. In the
case of Anti-Islam seed channels, it appears that the top
ranked related channels (k = 1) are mostly affiliated with
various groups from the UK and USA. Street Movement re-
lated channels at this rank are associated with the English
Defence League (EDL), a movement opposed to the alleged
spread of radical Islamism within the UK [18]. Channels
from various international individuals and groups that often
describe themselves as “counter-Jihad” can also be observed
[17]. The Conspiracy Theory and non-ER Religion cate-
gories appear to be associated with channels based in the
USA, where the dominance of these categories at lower rank-
ings (excluding the seed category) suggests that the channels
become progressively more US-centric.
The ER Music seed channels usually upload video and audio
recordings of high-profile groups associated with the extreme
right. For example, content from bands such as Skrewdriver
(UK) or Landser (Germany) can be found, along with other
groups from genres such as Oi!, RAC (Rock Against Com-
munism) and NSBM (National Socialist Black Metal) [1, 8].
Given this, the consistent presence of the White Nationalist
related category would appear logical. At the same time, we
also observe that non-ER Music becomes more evident as k
increases, perhaps reflecting the overlap between music gen-
res. For example, someone who is a fan of NSBM is often
a fan of other metal music that would not be categorized
as ER. For Populist seed categories, the related categories
generally appear more diverse. Channels affiliated with po-
litical parties can be observed, including the Eurosceptic
United Kingdom Independence Party (UKIP) or the British
National Party (BNP), where the latter is also considered
as White Nationalist [3, 24]. Opposition to establishment
organizations such as the EU may be a link to similar op-
position within the Patriot and Conspiracy Theory related
categories that are also present [30], while also explaining the
presence of the non-ER News & Current Affairs category. It
should also be mentioned that our definition of Populist is
broad and spans multiple themes (Table 1), where a certain
amount of disagreement about this category exists [23].
5.2 German language categories
A total of 2,766 seed and 177,868 related channel documents
were generated from the German language data set. Topics
were then identified by applying NMF to the corresponding
TF-IDF matrices. As before, we experimented with values
of T in [10, 100], and selected T = 60 given a similar ob-
servation of redundant topic splits for larger values of T .
Of these, 33 ER topics (55%), 20 non-ER topics (33.33%), 2
topics that were a combination of ER and non-ER categories
(3.33%), and 5 topics based on general terms of a separate
language (8.33%) were found. Having categorized these top-
ics, we calculated the mean number of topics per channel µ
with H weight ≥ w, for values of w in [0.01, 0.09], as seen in
Figure 5. Values of 0.06 and 0.087 were found for ws and wr
respectively at µ =∼ 1. We excluded 785 (28.38%) seed and
56,565 (31.8%) related grey sheep channels that could not be
categorized, in addition to related channels ranked at k > 10
and non-ER seed channels. The remaining 1,123 ER seed
and 4,973 related (ER and non-ER, k ≤ 10) channels were
used to calculate the mean related category proportions for
each ER category.
(a) Anti-Islam
(b) Music
(c) Populist
Figure 4: English mean category proportions of top k ranked
related channels (k ∈ [1, 3, 5, 7, 10]), for selected seed ER
categories.
channels were used to calculate the mean related category
proportions for each ER category.
Figure 4 contains plots for three ER categories that we have
selected for more detailed analysis, where ER and non-ER
categories have been prefixed with ER- and NER- respec-
tively. To assist visual interpretation, we have omitted any
weakly related categories whose mean proportion < 0.06 for
a particular k ranking. From inspecting these plots, two
initial observations can be made; (1) the seed category is
the dominant related category for all values of k, and (2) al-
though related category diversity increases at lower k rank-
7
0.00.20.40.6135710kMean proportionER−Anti−IslamER−Conspiracy TheoryER−Street MovementNER−EntertainmentNER−Religion0.00.20.40.6135710kMean proportionER−MusicER−White NationalistNER−EntertainmentNER−Music0.00.20.40.6135710kMean proportionER−Conspiracy TheoryER−PatriotER−Political PartyER−PopulistER−White NationalistNER−EntertainmentNER−News & Current AffairsFigure 6 contains plots for three ER categories that we have
selected for in-depth analysis. As seen in Figure 4, the seed
category is the dominant related category for all values of k,
and the ER related category presence is consistently stronger
than that of the non-ER categories, notwithstanding the in-
crease in diversity. The Populist and Political Party related
categories are prominent for Anti-Islam, given the inclu-
sion of channels affiliated with parties such as the National
Democratic Party of Germany (NPD), the Pro-Bewegung
collective, and the Freedom Party of Austria (FP O); all
strong opponents of immigration, particularly by Muslims
[1, 3, 17].
Figure 5: German mean topics per channel at ws, wr in
[0.01, 0.09]. ws and wr were set to 0.06 and 0.087 respec-
tively.
This data set also features many ER Music seed channels
that upload recordings of high-profile groups, with the main
difference being the prominence of the Neo-Nazi related cat-
egory for all rankings. These recordings and videos, along
with other non-music videos uploaded by these channels,
often feature recognizable Nazi imagery. Separately, chan-
nels that upload videos associated with groups that have
alleged ER ties, for example, Bohse Onkelz or Frei.Wild [1],
may explain in part the presence of the non-ER Music cat-
egory, given the mainstream success of these groups. This
may also be explained by material associated with hip-hop
groups such as “n’Socialist Soundsystem”, which provide an
alternative to traditional ER music based on rock and folk.
The close relationship with Music is also present for the
Neo-Nazi seed category, although further related diversity
can be observed. Seed channels featuring footage of German
participation in WWII, including speeches by high-ranking
members of the Nazi party, are likely to be the source of the
White Nationalist and Revisionist related categories. We
can safely assume that the prominence of Music is responsi-
ble for the appearance of its non-ER counterpart here.
5.3 Discussion
We conclude our filter bubble analysis by measuring the
mean proportions for the seed ER categories as a whole,
where the possible aggregated related categories were (1)
the same ER category as that of the seed, (2) a different
ER category, or (3) a non-ER category. The results for both
data sets can be found in Figure 7. As with the individual
seed categories, an ER filter bubble is also clearly identi-
fiable at the aggregate level. Although the increase in di-
versity for lower k rankings introduces a certain proportion
(a) Anti-Islam
(b) Music
(c) Neo-Nazi
Figure 6: German mean category proportions of top k
ranked related channels (k ∈ [1, 3, 5, 7, 10]), for selected seed
ER categories.
of non-ER categories, this is always outweighed by ER cate-
gories, where the seed ER category remains dominant for all
values of k. These findings would appear to contrast those
of certain prior work where greater related video diversity
was observed [28, 33]. Although we have analyzed related
channels rather than individual videos, we might have ex-
pected to also find this behaviour at both levels. However,
it would appear this is not always true, at the very least in
the case of ER channels.
8
●●●●●●●●●●●●●●●●●●2460.010.020.030.040.050.060.070.080.09wMean topics●●SeedRelatedTopics=⇠10.00.20.40.6135710kMean proportionER−Anti−IslamER−Political PartyER−PopulistNER−EntertainmentNER−News & Current Affairs0.00.20.40.6135710kMean proportionER−MusicER−Neo−NaziER−White NationalistNER−Music0.00.20.40.6135710kMean proportionER−MusicER−Neo−NaziER−PopulistER−RevisionistER−White NationalistNER−Music(a) English
(b) German
Figure 7: Aggregated mean category proportions of top k ranked related channels (k ∈ [1, 3, 5, 7, 10]), for seed ER categories.
The data retrieval process described in Section 3 involved
following related video links for only one step removed from
the corresponding seed video; no further related retrieval
was performed for related videos themselves. Of the ER
seed channels used in the filter bubble analysis in Sections
5.1 and 5.2, we identified those that appeared in top k re-
lated rankings of other ER seed channels, for k ≤ 10; 6,186
(94%) and 1,056 (94%) such channels respectively for the
English and German language data sets. These high per-
centages allude to the presence of cycles within the related
channel graph, where retrieving additional data by following
related videos for multiple steps may have been somewhat
redundant. They also further emphasize the existence of the
filter bubble.
Separately, it might be argued that our findings merely con-
firm that YouTube’s related video recommendation process
is working correctly. However, this is precisely what we were
trying to quantify, in terms of the categories of extreme right
content to which a user may be exposed following a short
series of clicks. As a consequence, users viewing this content
may rarely be presented with an alternative perspective.
6. CONCLUSIONS AND FUTURE WORK
YouTube’s position as the most popular video sharing plat-
form has resulted in it playing an important role in the online
strategy of the extreme right, where it is used to host as-
sociated content such as music and other propaganda. We
have proposed a set of categories that may be applied to
this YouTube content, based on a review of those found in
existing academic studies of the extreme right’s ideological
make-up. Using an NMF-based topic modelling approach,
we have categorized channels according to this proposed set,
permitting the assignment of multiple categories per chan-
nel where necessary. This categorization has helped us to
identify the existence of an extreme right filter bubble, in
terms of the extent to which related channels, determined
by the videos recommended by YouTube, also belong to ex-
treme right categories. Despite the increased diversity ob-
served for lower related rankings, this filter bubble maintains
a constant presence. The influence of related rankings on
click through rate [33], coupled with the fact that the You-
Tube channels in this analysis originated from links posted
by extreme right Twitter accounts, would suggest that it is
possible for a user to be immersed in this content following
a short series of clicks.
In future work, we would like to experiment with alternative
channel representations that address the existence of noise
found with certain channels and associated topics at lower
related rankings. We would also like to perform a longer
temporal analysis in an attempt to investigate any correla-
tion between changes in this filter bubble and extreme right
activity across multiple social media platforms. Separately,
although we have used the methodology presented in this
paper to study extreme right channels, it may be interest-
ing to investigate its application to other types of extremist
political content found on YouTube.
7. ACKNOWLEDGMENTS
This research was supported by 2CENTRE, the EU funded
Cybercrime Centres of Excellence Network and Science Foun-
dation Ireland (SFI) under Grant Number SFI/12/RC/2289.
8. REFERENCES
[1] Baldauf, J., Gross, A., Rafael, S., and Wolf, J.
Zwischen Propaganda und Mimikry.
Neonazi-Strategien in Sozialen Netzwerken. Amadeu
Antonio Stiftung (2011).
[2] Baluja, S., Seth, R., Sivakumar, D., Jing, Y., Yagnik,
J., Kumar, S., Ravichandran, D., and Aly, M. Video
suggestion and discovery for youtube: taking random
walks through the view graph. In Proc. 17th
international conference on World Wide Web, WWW
’08, ACM (2008), 895–904.
[3] Bartlett, J., Birdwell, J., and Littler, M. The New
Face of Digital Populism. Demos (2011).
[4] Bell, M. Frei verfugbarer Nazi-Rock: YouTube und die
braunen Musikanten. Der Spiegel (03 2013).
[5] Blee, K. M., and Creasap, K. A. Conservative and
Right-Wing Movements. Annual Review of Sociology
36 (2010), 269–286.
[6] Blei, D. M., Ng, A. Y., and Jordan, M. I. Latent
dirichlet allocation. J. Mach. Learn. Res. 3 (Mar.
2003), 993–1022.
9
0.000.250.500.751.00135710kMean proportionSame ER CategoryOther ER CategoryNon−ER Category0.000.250.500.751.00135710kMean proportionSame ER CategoryOther ER CategoryNon−ER Category[7] Boutsidis, C., and Gallopoulos, E. SVD based
Conference, WebSci ’13, ACM (2013), 118–121.
initialization: A head start for nonnegative matrix
factorization. Pattern Recogn. 41, 4 (Apr. 2008),
1350–1362.
[8] Brown, T. S. Subcultures, Pop Music and Politics:
Skinheads and ”Nazi Rock” in England and Germany.
Journal of Social History 38, 1 (2004), 157–178.
[9] Burris, V., Smith, E., and Strahm, A. White
Supremacist Networks on the Internet. Sociological
Focus 33, 2 (2000), 215–235.
[10] Caiani, M., and Wagemann, C. Online Networks of
the Italian and German Extreme Right. Information,
Communication & Society 12, 1 (2009), 66–109.
[11] Chemudugunta, C., Smyth, P., and Steyvers, M.
Modeling General and Specific Aspects of Documents
with a Probabilistic Topic Model. In Advances in
Neural Information Processing Systems (2006),
241–248.
[12] Conway, M., and McInerney, L. Jihadi Video and
Auto-radicalisation: Evidence from an Exploratory
YouTube Study. In Proc. 1st European Conference on
Intelligence and Security Informatics, EuroISI ’08,
Springer-Verlag (2008), 108–118.
[13] Davidson, J., Liebald, B., Liu, J., Nandy, P.,
Van Vleet, T., Gargi, U., Gupta, S., He, Y., Lambert,
M., Livingston, B., and Sampath, D. The YouTube
video recommendation system. In Proc. 4th ACM
conference on Recommender Systems, RecSys ’10
(2010), 293–296.
[14] Figueiredo, F., Benevenuto, F., and Almeida, J. M.
The Tube over Time: Characterizing Popularity
Growth of YouTube Videos. In Proc. 4th ACM
international conference on Web search and data
mining, WSDM ’11 (2011), 745–754.
[15] Filippova, K., and Hall, K. B. Improved video
categorization from text metadata and user comments.
In Proc. 34th Int. ACM SIGIR Conference on
Research and development in Information Retrieval,
SIGIR ’11 (2011), 835–842.
[16] Gerstenfeld, P. B., Grant, D. R., and Chiang, C.-P.
Hate Online: A Content Analysis of Extremist
Internet Sites. Analyses of Social Issues and Public
Policy 3, 1 (2003), 29–44.
[17] Goodwin, M. The Roots of Extremism: The English
Defence League and the Counter-Jihad Challenge.
Chatham House (2013).
[18] Goodwin, M., and Ramalingam, V. The New Radical
Right: Violent and Non-Violent Movements in
Europe. Institute for Strategic Dialogue (2012).
[19] Greene, D., and Cunningham, P. Producing a Unified
Graph Representation from Multiple Social Network
Views. In Proc. 5th Annual ACM Web Science
[20] Hannon, J., Bennett, M., and Smyth, B.
Recommending Twitter users to follow using content
and collaborative filtering approaches. In Proc. 4th
ACM Conference on Recommender Systems
(RecSys’10) (2010), 199–206.
[21] Lee, D. D., and Seung, H. S. Learning the parts of
objects by non-negative matrix factorization. Nature
401 (1999), 788–791.
[22] Lin, C.-J. Projected Gradient Methods for
Nonnegative Matrix Factorization. Neural Comput.
19, 10 (Oct. 2007), 2756–2779.
[23] Marli`ere, P. Populism and the enchanted world of
’moderate politics’. openDemocracy (2013).
[24] Mudde, C. Populist Radical Right Parties in Europe.
Cambridge University Press, 2007.
[25] O’Callaghan, D., Greene, D., Conway, M., Carthy, J.,
and Cunningham, P. An Analysis of Interactions
Within and Between Extreme Right Communities in
Social Media. In To Appear: MSM 2012 and MUSE
2012 Postproceedings (2013).
[26] O’Callaghan, D., Greene, D., Conway, M., Carthy, J.,
and Cunningham, P. Uncovering the Wider Structure
of Extreme Right Communities Spanning Popular
Online Networks. In Proc. 5th Annual ACM Web
Science Conference, WebSci ’13 (2013), 276–285.
[27] Pariser, E. The Filter Bubble: What the Internet Is
Hiding from You. Penguin Group USA, 2011.
[28] Roy, S. D., Mei, T., Zeng, W., and Li, S.
SocialTransfer: cross-domain transfer learning from
social streams for media applications. In Proc. 20th
ACM international conference on Multimedia, MM
’12, ACM (2012), 649–658.
[29] Simonet, V. Classifying YouTube Channels: a
Practical System. In Proc. 2nd International
Workshop on Web of Linked Entities (WoLE 2013),
ACM (2013), 1295–1304.
[30] SPLC. Ideology. Southern Poverty Law Center (2013).
[31] Steyvers, M., and Griffiths, T. Probabilistic Topic
Models. In Latent Semantic Analysis: A Road to
Meaning., T. Landauer, D. Mcnamara, S. Dennis, and
W. Kintsch, Eds. Laurence Erlbaum, 2006.
[32] Tateo, L. The Italian Extreme Right On-line Network:
An Exploratory Study Using an Integrated Social
Network Analysis and Content Analysis Approach.
Journal of Computer-Mediated Communication 10, 2
(2005).
[33] Zhou, R., Khemmarat, S., and Gao, L. The impact of
YouTube recommendation system on video views. In
Proc. 10th ACM SIGCOMM conference on Internet
measurement (2010), 404–410.
10
|
1312.6552 | 1 | 1312 | 2013-12-23T14:10:54 | Socially-Aware Networking: A Survey | [
"cs.SI",
"cs.NI",
"physics.soc-ph"
] | The widespread proliferation of handheld devices enables mobile carriers to be connected at anytime and anywhere. Meanwhile, the mobility patterns of mobile devices strongly depend on the users' movements, which are closely related to their social relationships and behaviors. Consequently, today's mobile networks are becoming increasingly human centric. This leads to the emergence of a new field which we call socially-aware networking (SAN). One of the major features of SAN is that social awareness becomes indispensable information for the design of networking solutions. This emerging paradigm is applicable to various types of networks (e.g. opportunistic networks, mobile social networks, delay tolerant networks, ad hoc networks, etc) where the users have social relationships and interactions. By exploiting social properties of nodes, SAN can provide better networking support to innovative applications and services. In addition, it facilitates the convergence of human society and cyber physical systems. In this paper, for the first time, to the best of our knowledge, we present a survey of this emerging field. Basic concepts of SAN are introduced. We intend to generalize the widely-used social properties in this regard. The state-of-the-art research on SAN is reviewed with focus on three aspects: routing and forwarding, incentive mechanisms and data dissemination. Some important open issues with respect to mobile social sensing and learning, privacy, node selfishness and scalability are discussed. | cs.SI | cs | Socially-Aware Networking: A Survey
Feng Xia, Senior Member, IEEE, Li Liu, Jie Li, Jianhua Ma, and Athanasios V. Vasilakos, Senior
Member, IEEE
1
Abstract—The widespread proliferation of handheld devices
enables mobile carriers to be connected at anytime and
anywhere. Meanwhile, the mobility patterns of mobile devices
strongly depend on the users’ movements, which are closely
related
to
their
social relationships and behaviors.
Consequently,
today’s mobile networks are becoming
increasingly human centric. This leads to the emergence of a
new field which we call socially-aware networking (SAN). One
of the major features of SAN is that social awareness becomes
indispensable
information for the design of networking
solutions. This emerging paradigm is applicable to various
types of networks (e.g. opportunistic networks, mobile social
networks, delay tolerant networks, ad hoc networks, etc) where
the users have social relationships and interactions. By
exploiting social properties of nodes, SAN can provide better
networking support to innovative applications and services. In
addition, it facilitates the convergence of human society and
cyber physical systems. In this paper, for the first time, to the
best of our knowledge, we present a survey of this emerging
field. Basic concepts of SAN are introduced. We intend to
generalize the widely-used social properties in this regard. The
state-of-the-art research on SAN is reviewed with focus on
three aspects: routing and forwarding, incentive mechanisms
and data dissemination. Some important open issues with
respect to mobile social sensing and learning, privacy, node
selfishness and scalability are discussed.
Index Terms—Social Awareness; Mobile Social Networks;
Data Dissemination; Routing; Forwarding
I. INTRODUCTION
T
striking
few decades have witnessed
HE
last
communications
developments
in wireless
and
networking technologies which yield essential network
architectures to constitute ubiquitous networks. The rich
diversity of wireless mobile devices, especially smart mobile
devices, has joined in the networks with unprecedented speed.
As predicted by Gartner, mobile phones will overtake PCs as
the most common Web access devices in the world by 2013
[1]. Clearly, the applications and services are being migrated
into mobile devices. Thus, mobility, or more generally the
This work was partially supported by the Natural Science Foundation of
China under Grant No. 60903153, Liaoning Provincial Natural Science
Foundation of China under Grant No. 201202032, and the Fundamental
Research Funds for the Central Universities (DUT12JR10).
Feng Xia, Li Liu, and Jie Li are with School of Software, Dalian University
of Technology, Dalian 116620, China (e-mail: [email protected]).
Jianhua Ma is with the Faculty of Computer and Information Sciences,
Hosei University, Japan (e-mail: [email protected]).
Athanasios V. Vasilakos
is with
the Dept of Computer and
Telecommunications Engineering, University of Western Macedonia, Greece
(e-mail: [email protected]).
dynamic nature stands out as the main factor affecting the
service. Many applications benefit from the mobile devices,
such as mobile social network services, environment
monitoring, urban sensing, etc. Currently, a great number of
mobile devices access the Internet through e.g. 3G cellular
networks, which leads to huge communication overload and
thus has negative influence on the quality of service (QoS) of
the applications.
With the increasing workload, it has become crucial to
make full use of the limited resources of mobile devices and
communication networks so that the resource efficiency can
be improved and hence more and more mobile applications
can be supported. Recently, researchers begin to address this
issue from a social perspective. As a consequence, the field of
socially-aware networking (SAN) is emerging as a new
paradigm to exploit the social properties of network nodes
(especially mobile devices) for designing networking
solutions. In addition , recent rapid advances in social
networking applications are also a major drive force for the
emergence of SAN.
The main starting point of SAN relies on the dramatic
development on fields of wireless communications and
sociology (or social network theory). Firstly, the mobile
devices are now equipped with more storage, higher
computing speed and various wireless communication
interfaces. By using short-range wireless technologies such
as Wi-Fi and Bluetooth, mobile devices could form
temporary ad hoc networks to communicate with each other.
In recent years, many research efforts related to mobile
devices have been made in order to explore the potential of
mobile devices. For instance, opportunistic networks [2] and
mobile ad hoc networks (MANET) [3] aim at exploring
communications among mobile devices by using the
aforementioned short-range telecommunication protocols.
On the other hand, mobile sensing [4], mobile cloud
computing [5] and opportunistic computing [6] utilize the
huge
information resources and computing capability
provided by mobile devices. However, ad hoc networks are
not stable enough which usually utilize the opportunistic
contact to communicate. The mobility of mobile devices will
directly affect the topology of networks.
Secondly, it has been found that mobile devices have close
relationship with objects in society, because they are usually
carried by e.g. people, animals or vehicles. The mobility of
devices’ carriers (i.e. users) represents the mobility of mobile
devices. Human beings, as the main actors of mobility, take
especially important role and attract increasing attention
from information technology both in academy and industry.
There are a lot of social properties or relationships hidden
among human beings. For example, people are often highly
sociable and people with similar properties usually spend
long time together, being more willing to share information
and resources. The gregarious feature is called community.
People from the same community may contact or share
information with higher probability. By exploring social
relationships, catching the mobility regularities of mobile
devices as well as predicting the contact opportunities of
them will be effective. Furthermore, the contact information
could be a basic evidence for designing the routing protocols
in mobile environments.
the
features driven by
its own
SAN has built
aforementioned spheres. First of all, SAN focuses on wireless
communications among ad hoc networks which generally
consist of mobile devices connected via e.g. Wi-Fi, Bluetooth ,
etc. Similar to opportunistic networks, SAN is characterized
by the intermittent disconnection and the absence of the
infrastructure. Furthermore, social properties are valuable to
find
the users’ mobility pattern and predict contact
opportunities more accurately. Therefore SAN is able to
discover more reliable contact opportunities (with higher
prediction accuracy) by taking advantage of the social
awareness of network nodes. Social awareness (also known
as social consciousness) originates from sociology, and it is
often used to describe the sociability and social behaviors of
human beings. For instance, social awareness could be
consciously shared within a society, which means that a user
should know what is socially acceptable and what to be
performed in that manner .
The SAN paradigm can be applied into many areas such as
pocket switched networks (PSN) [7], vehicular ad-hoc
networks (VANET) [8] and cyber-physical systems (CPS) [9],
etc. In the meantime, it requires support from a number of
technologies
such as mobile sensing, opportunistic
computing, and social network analysis. Recently, several
research fields have emerged as socially aware paradigms
which share some common attributes with SAN, such as
mobile social networks [10], social opportunistic networks
[11], vehicle social networks [12], opportunistic Internet of
Things (IoT) [13], etc. They all address mobile nodes and are
driven by social network theory. However, they are different
in terms of focus. Mobile social networks originate from
online social networks which emphasize the relationship of
similar interests or commonalities. Social opportunistic
networks are based mainly on the prediction of contact
opportunities and concentrate on the social relationships
between mobile nodes and their regular movements. Vehicle
social networks consider the social properties of vehicles and
passengers. Opportunistic IoT usually focuses on the
interaction between human and IoT.
Compared to these related areas, SAN is human-centric
and studies individuals’ social properties comprehensively.
They involve a great deal of information, such as personal
property (e.g. preference, habit, and
life regularity),
human-to-human relationship (e.g. friendship, colleague,
and
family), human-to-community
relationship
(e.g.
interests and popularity), and human-to-environment
relationship. Based on these social properties, the objective of
2
SAN is to design networking solutions to support mobile
applications. In this context, routing and forwarding
protocols and dissemination strategies are
the most
important components by which data is delivered or
disseminated. In addition, mobile devices usually involve
personal (or private) information which leads to selfish
behaviors that benefit the users. Thus incentive mechanisms
are also an essential component.
In this paper, we present a survey of the emerging field of
socially-aware networking. To the best of our knowledge,
this is the first effort of its kind. We present the architecture
of SAN. Following a discussion on social properties, we
summarize the state-of-the-art research efforts on routing
and forwarding protocols, incentive mechanisms and data
dissemination algorithms in SAN. Our aim is to provide a
better understanding of
research opportunities and
challenges in the field of SAN and to find appealing hints for
future explorative activities on this timely and exciting topic.
The remainder of this paper is structured as follows.
Section II presents the architecture of SAN and Section III
describes several important social properties. In Section IV,
we review socially-aware routing and forwarding protocols
from perspectives of unicast and multicast, respectively,
along with some discussion on congestion problem. Incentive
mechanisms for dealing with node selfishness are explored in
Section V. The paper examines socially-aware data
dissemination algorithms categorized into solicitation and
cache based approaches and forwarding based approaches in
Section VI. We discuss some important open issues in
Section VII and conclude the paper in Section VIII.
II. ARCHITECTURE OF SOCIALLY-AWARE NETWORKING
SAN studies the context information of network nodes
(especially mobile devices), captures and extracts the social
properties and formulates reasonable protocols to support
upper-layer applications. However, SAN is an emerging field
Applications
Routing and
Forwarding
Protocols
Incentive
Mechanism
Data
Dissemination
Privacy
and Security
Leaning and Analysis
Personal Property
Preference,
Willingness,
Habit, etc.
Social Property and Relationship
Human-to-
Community,
Human-to-
Human,
Human-to-
Environment
Community,
Similarity, Tie
Strength,
Mobility
Pattern, etc.
Sensing Data
Personal Operation
Environment Sensing
Contact Sensing
Fig. 1. Architecture of SAN
still in its infancy. Till now there is no formal (uniform)
definition for this terminology or its architecture. In th is
paper, we propose a simple architecture of SAN, as shown in
Fig. 1 where the above mentioned workflow of SAN is
depicted. The detailed description about the structure is
presented below.
The major task of the first two steps is to achieve social
awareness by sensing and analyzing data using some
intelligent technologies, such as data mining and machine
learning. To obtain the information about personal behaviors,
social contact and the environment, mobile sensing is an
effective way to sense the surroundings. Specifically, various
sensors deployed in real world could be utilized, as well as
sensors embedded in mobile devices. The available sensors
include e.g. accelerometer, digital compass, gyroscope, GPS,
microphone and camera, which enable personal, group, and
community scale sensing applications [4]. In this sense, SAN
relies on CPS, i.e. to obtain the information of social
awareness. On the other hand, SAN enhances CPS by
exploiting social properties, which enrich human -to-human,
human-to-object, and object-to-object interactions in the
physical world as well as in the virtual world.
The various data, which reflect either personal behaviors
or environment information, are the main evidences to
explore both the personal and social properties. The personal
properties involve e.g. one’s preference, willingness, habit,
life regularity, etc. They could be obtained through analyzing
the operations and behaviors of the user. SAN is based on
social properties and relationships of users, which are more
reliable and more natural. The learning and deduction
process requires more resources and computing capability,
which might need the support of e.g. mobile cloud computing
and data mining.
Through analyzing and learning from these data, SAN can
deduce important social properties. The most commonly used
social properties include community, centrality, similarity,
tie strength and human mobility pattern. These properties are
connected to the social relationships. To be exact, the
human-to-human relationship refers
to direct contact
relationship and it involves personal information such as
friendship, which indicates a kind of tie strength. The
human-to-community relationship indicates an individual’s
gregarious property and status in community. They can be
gathered by use of contact graph (physical contact) and social
graph (virtual graph, such as online social networks). The
human-to-environment
relationship
implies
that
the
environmental information is related to human beings.
The available personal and social properties are valuable
evidence
to devise
the routing protocols and data
dissemination algorithms. Thus, socially-aware routing and
forwarding protocols and socially-aware data dissemination
algorithms are essential issues in SAN. In addition, the
protocols in SAN rely heavily on the nodes’ cooperation due
to the exploration of social relationship and interactions
among the users. As a consequence, incentive mechanisms
are necessary to deal with selfishness of nodes. In addition ,
privacy and security protecting strategies are also an
important component of SAN. However,
it
is very
3
Fig. 2. Taxonomy of Protocols in SAN
challenging and we list it in open issues. For these reasons,
routing and forwarding protocols, incentive mechanisms and
data dissemination algorithms in the context of SAN are the
main topics of this paper. Fig. 2 illustrates a generalized
taxonomy for SAN protocols based on the above description,
which is used for organizing this paper.
SAN has some similarities with the SCI (social and
community intelligence) concept presented by Zhang et al.
[14]. However, SCI focuses on the collection and analysis of
social information and aims to reveal individual and group
behaviors, social interactions and community dynamics,
while SAN pays more attention to designing networking
protocols by use of social properties. It is worth noting that
the proposed architecture is just a starting point for extensive
study of SAN. We hope it will eventually lead to a converged
viewpoint and taxonomy of SAN.
III. SOCIAL PROPERTIES
The research on social networks was initiated by Milgram
in 1960’s [15]. Milgram introduced the idea of small world
phenomenon which indicates that any pair of people in the
world can connect with each other through small sequences
of relationships (typically five or six), and thereafter many
works reaffirmed it [16]-[18].
Contemporary researches mainly focus on understanding
the dynamics and structure of social networks with respect to
relationships which can be classified in terms of strength of
mutual familiarity and intensity. Social network analysis
(SNA) [19] studies relationships between human beings, as
well as patterns and implications of these relationships. SNA
is a useful and powerful tool for analyzing complex social
relationships among people in social sciences [20]. The
notion of social network and the methods for SNA attract
significant interest initially from the social and behavioral
communities, later data mining, and only recently from the
networking community. In this section, we concentrate on
social properties that are most popular in design of protocols
and algorithms in SAN.
A. Social Graph
Social networks exhibit the small world phenomenon that
node encounters are sufficient
to build a connected
relationship graph. Graph is a convenient tool to represent
the relational structure of social networks in a natural
manner , which is generally called social graph. In a social
graph, vertices (nodes) indicate human individuals and edges
(links) indicate social relationships between individuals. In
some degree, social network is equal to the social graph, so
they can be used alternatively. One significant challenge in
social networks is how to represent a link between two nodes
[21]. According to different link meanings, several social
graphs are proposed in recent literature. Contact graph is a
popular way to analyze and estimate relationships among
people by observing their inter-contact time in the history
[22]-[25]. Besides, neighbor graph [21], regularity graph and
interest graph [27] are proposed recently as well.
B. Community
A community is a structural subunit (which can be
represented as a set of individuals) of a social network with
high density of internal links [21]. Individuals have more
social connections with other individuals inside their own
community than with individuals outside. The social
connections may be family, friends, common location or
common interest, which are decided by the social graph. In
general, individuals in the same community may meet each
other more frequently. Therefore, community structure has
significant impact on people’s mobility patterns and thus is
beneficial for choosing appropriate forwarding path.
C. Centrality
Besides community, the centrality is another basic concept
in social networks, which considerably affects
the
performance of socially-aware forwarding algorithms. The
experiments in [28] demonstrate that it is important to find
appropriate centrality and community in the design of
socially-aware
dissemination
data
and
forwarding
algorithms.
Centrality is used to describe importan t and prominen t
nodes in a social graph. People have various roles and
popularities in society. A central node has stronger capability
of connection with other nodes. Experiments in [24] show
that there is a small number of nodes which have extremely
high relaying ability, and a large number of nodes which
have moderate or low centrality values, with 30 and 70
percentiles, respectively. This phenomenon is called human
heterogeneity (or node heterogeneity).
The most recognized centrality measures are introduced by
Freeman [29][30]: degree centrality, betweenness centrality
and closeness centrality. Here we give a brief introduction to
each of them.
1) Degree Centrality
Degree centrality is defined as the number of one-hop
neighbors of a node [19]. For a network consisting of n nodes,
the degree centrality DegCi of a node i is:
de g i
( )
(1)
D e gC
i
n
1
where deg(i) is the number of directly connected neighbors of
node i. DegCi indicates the connection ratio of node i
between the real connection number of node i and the
4
i
i
maximum number of possible connections, i.e. n-1. Degree
centrality identifies the most active nodes in the network. A
node with high degree centrality maintains large number of
links to others. As such, a central node occupies a structural
position (network location) that may act as a conduit for
information exchange [23].
2) Betweenness Centrality
Betweenness centrality is the percentage of the number of
shortest-paths including node i over all the shortest-paths
[31]. The betweenness centrality BetCi of a node i is:
sp
i
( )
(2)
B e tC
j k
,
sp
j
i
j k
,
where spj,k is the number of shortest paths linking nodes j and
k, and spj,k(i) is the number of shortest paths linking nodes j
and k which pass through node i. Betweenness centrality is a
measure of the extent to which a node has con trol over
information flowing between others [32]. Nodes with high
betweenness centrality can bridge two nonadjacent nodes and
may impact on data flow between communities. Therefore,
betweenness centrality is a key metric to determine the links
between communities.
3) Closeness Centrality
Closeness centrality is defined as the inverse of the sum of
the distances between a given actor and all other actors in the
network [14]. The closeness centrality CloCi of a node i is
1
(3)
C loC
j
d is i
( ,
)
j
i
where dis(i,j) is the distance between nodes i and j. A node
with the highest closeness means that the node has the
shortest path to other nodes in network. So closeness
centrality describes the efficiency of information propagation
from one node to all the others. In message forwarding and
data dissemination applications, closeness centrality can be
used to choose relay nodes to deliver the message with
success and/or faster to the other nodes in the community.
The analysis of data collected from ACM CoNEXT’07
concludes that centrality is the primary factor to decide
whether a node is a good next hop and the best performance
trade-off is obtained when several complementary rules are
combined [33].
D. Similarity
Sociologists have long realized that social network
displays a high degree of transitivity, that is to say, there is a
heightened probability of two people being acquainted if they
have one or more other acquaintances in common. Th is
phenomenon is also called clustering [23]. Similarity
indicates the group of nodes depending upon common
contacts or interests which can be measured by the ratio of
common links (e.g. contact, interest, neighbors) between
individuals. The higher similarity a node and the destination
share, the more opportunities they have to encounter. Nodes
with higher similarity can be good candidates for
information dissemination among clusters of nodes.
E. Tie Strength
The notion of tie strength was firstly introduced by
Granovetter in 1973, which is defined as “the amount of time,
the emotional intensity, the intimacy (mutual confiding), and
the reciprocal services, which characterize a tie” [34]. Tie
strength is a quantifiable property that characterizes the link
between two nodes. Strong ties are more likely to be activated
for information flow when compared to weak ties. The most
widely used
tie strength
indicators are:
frequency,
intimacy/closeness, longevity, reciprocity, recency, multiple
social context, and mutual confiding (trust) [22]. A
combination of the tie strength indicators can be used for
information flow to determine which contact has the
strongest social relationship to the destination. Meanwhile,
the effects of weak ties in social networks are also crucial to
data dissemination. Granovetter’s research modifies that the
weak ties may be beneficial to forming bridges between high
density clusters.
F. Human Mobility Pattern
Researchers observe that human mobility presents two key
properties from analysis of real mobility traces: spatial
regularity and
temporal regularity
[35][36]. Spatial
regularity is that nodes usually move around a set of locations
frequently and regularly in time schedule. For example, the
students usually move around among dormitory, classroom
and canteen at different periods of the day. Temporal
regularity is that human mobility pattern is repetitive at long
time. For instance, human repeats working mobility pattern
from Monday to Friday. The two properties of human
mobility can be used to predict the users’ future mobility
which plays important role in choosing the forwarders.
IV. SOCIALLY-AWARE ROUTING AND FORWARDING
PROTOCOLS
Due to the mobility of mobile devices, it is usually difficult
to find an end-to-end path between source and destination(s)
at the beginning of communications. All of the current
routing methods share a store-carry-and-forward paradigm
and utilize contact opportunity
to communicate
in
intermittently (dis)connected networks such as delay tolerant
networks (DTN) and opportunistic networks. Thus relaying
selection and forwarding decision are critical to be made by
the current node based on certain routing strategy. The
prediction of contact opportunity is one key issue for design
of efficient routing and forwarding protocols. SAN considers
the social properties during the course of routing and
forwarding protocol design to make better forwarding
decisions.
Routing can be classified into unicast and multicast
according to the number of destinations the data need to be
delivered. Unicast routing focuses on forwarding data to a
single
specific destination. Multicast
involves
the
distribution of the data to a group of users. In this section, we
will review unicast routing protocols and multicast routing
protocols based on social properties, respectively. In addition ,
congestion is a very challenging problem as well as an
important factor that influences the design of routing
protocols. Consequently, here we will also examine
state-of-the-art work addressing the congestion problem in
the context of SAN.
5
A. Unicast Routing
The key faction of routing protocols is to select the most
optimal relay nodes which have highest probability to meet
the destination(s) in order to maximize message delivery
ratio while minimizing message overhead and delay. The
relative stable social relationships (especially the community
relationship) of the users are reasonable information for
predicting future contact opportunities. The social network
structure can be viewed as
three
levels:
individual,
community, and whole network [37]. The community is very
widely used in routing protocols. Nodes in the same
community have more chances to meet than those in different
communities. A large number of community detection
algorithms have been proposed to divide a social network
into separated communities. Based on whether the support of
community is needed or not, we classify routing and
forwarding protocols as community-based routing and
community-independent routing.
1) Community-Based Routing
It is believed that nodes have more opportunities to contact
in community, which is beneficial to forwarding messages
for other members of their community. One of the first
research works on community in routing protocols is carried
out by Hui and Crowcroft [38]. They conducted an
experiment in INFOCOM’06 conference, which results in
community relationship through analyzing inter -contact
time distribution . The results proved that community
structure can improve forwarding efficiency. Inter-contact
time is the time elapsed between two successive contact
periods for a given pair of devices [39]. In experimental
analysis
the
distribution,
time
inter-contact
of
intra-community pair has higher power law coefficient than
the inter-community pair, which indicates that nodes in the
same community tend to meet more often. In the experiment,
they proposed a forwarding scheme named LABEL which
assumes each node has a label on behalf of its affiliation. It
directly forwards messages to destination, or chooses
next-hop nodes with the same label as the destination node.
They also presented the concept of friendship community
which can help improve delivery.
The general operation principle in community-based
routing is shown in Fig. 3. Community is the basis of
forwarding data. Firstly, mobile nodes are grouped into
communities by certain community detection algorithm.
According to the forwarding strategy, data are forwarded
among nodes. If the relay nodes are out of destination
community (the community where the destination belongs
to), the inter-community forwarding strategy is used to
forward data close to the destination community as quickly as
possible. If the relay nodes are in the destination community,
the intra-community forwarding strategy is used to forward
data to the central node and the central node can forward the
data to the destination .
Community detection and formation play an important
role in community-based routing. In LABEL, the affiliation
(or community) is labeled through configuration. To make
the community practically useful, many community detection
algorithms have been proposed. Most of the proposed
Community Detection
Out of Destination
Community
In Destination
Community
Inter-community
Forwarding
Forward to
Centrality Nodes
Forward to
Destination Node
Intra-community
Forwarding
Fig. 3. Operating Principle of Community-based Routing
algorithms are centralized and they focus on analysis of
offline mobile trace. Contrary to the centralized methods (see
[39]), Hui and Crowcroft proposed three algorithms, named
SIMPLE, K-CLIQUE and MODULARITY, for online
distributed community detection based on the contact graph
in [24]. Then they presented BUBBLE RAP [24] based on
socially-aware overlay. The overlay is constructed by
combining the community with centrality. BUBBLE RAP
calculates global ranking (i.e. global centrality) for the whole
network and local ranking (i.e. local centrality) for the local
community for each node based on degree centrality. When a
node has a message destined for another node, the node first
bubbles the message up through hierarchical ranking tree
using the global ranking until reach ing a node which is in the
same community as the destination node. Then in the same
community, the message is bubbled up through local ranking
tree using the local ranking until the destination is reached or
message expires.
Bulut and Szymansk [41] introduced direct and indirect
friendship to indicate the tie strength of virtual link and to
form friendship community. They consider three behavior
features of close friendship: high frequency, longevity and
regularity, and also define two metrics called SPM (social
pressure metric) and CSPM (conditional SPM) for direct and
indirect friendship based on contact history. Friendship
community is a set of nodes having a link quality larger than
a threshold. To reflect temporal distinctions, different
friendship communities in different periods of the day are
established for each node. When forwarding, current node
with the message will choose the node that belongs to the
same community with the destination and with a stronger
friendship of destination than current node.
Several works in the literature consider the relationship
between communities and formulate
inter-community
forwarding decision [21][42][43].
LocalCom [21] only requires limited local information to
form communities and it also considers the forwarding
between different communities. Firstly, the authors presented
a metric named “similarity” to construct the neighboring
graph which considers the encounter frequency, encounter
length, separation period in the encounter history. Then
based on
the neighboring graph and
the associated
“similarity”, the authors proposed a distributed algorithm for
6
community detection, and represented the communities with
an extended k-hop clique. LocalCom adapts different
forwarding plans for in tra- and inter-community packet
forwarding. Intra-community packet forwarding adapts
single hop source routing. The “similarity” metrics indicate
the quality of virtual links (tie strength) and the node with
larger “similarity” metrics is chosen to forward data.
Controlled flooding routing is used for inter-community
communication based on gateways. Gateways are nodes that
have direct neighboring relationships with nodes in other
communities and bridges are selected from gateways using
two marking and pruning schemes: static pre-pruning and
dynamic pruning based on betweenness centrality [21].
Gently [42] is based on the Context-aware Adaptive
Routing (CAR) protocol [44] and LABEL. LABEL will be
the same as WAIT when a sender does not meet a member of
the destination community (where the destination belongs to).
In contrast to WAIT, Gently uses CAR-like routing to
improve the efficiency when not meeting the destination
community. Gently supports unicast as well as multicast and
defines labels to identify communities of hosts. A recipient of
message can be a single host or a group (community) of hosts.
When the message carrier meets a node of destination
community, Gently adopts a LABEL based strategy. Then in
the destination community, CAR-like routing is used to
deliver the message to the destination.
Zhou et al. [43] observed that while habitual mobility is
useful in reducing the average communication latency,
irregular deviation from habit can seriously affect worst-case
performance. They proposed Diverse Routing (DR), a
tunable protocol, to cope with the nodes deviating from their
habitual activities. The main idea of DR is to statistically
cluster the network into proximity-based social cluster and
scatter at least one copy of a packet in a cluster such that even
deviant nodes will be close to at least one of these packets.
DR uses limited communication overhead to provide a
stability and flexibility propagation scheme. Like Gently, DR
supports unicast and multicast at the same time.
Community-based routing
the forwarding
improves
efficiency depending on the higher meeting probabilities in
the same community. Centrality and tie strength further
provide evidence to choose the appropriate forwarder as well.
However, distributed community detection and formation are
still a challenge due to the dynamic topology of the network
and difficulties in the information exchange and calculation.
On the other hand, special nodes such as gateways have to be
employed
inter-community
accommodate
to
communications. Hui and Crowcroft [38] introduced the
concept of friendship community where two or more
communities are very close or overlap and validated that the
power law coefficient of friendship community is between
intra-community
and
inter-community.
Exploiting
friendship among communities will be a potential way to
improve the forwarding efficiency between communities.
2) Community-Independent Routing
Considering the difficulty of community detection and
formation, many routing protocols have been presented
without community support. The concept of ego network is
exploited where only locally available information is
considered [22][23]. Ego networks can be defined as
networks consisting of a single actor (ego) together with the
actors they are connected to (alters) and all the links among
those alters [22]. These routing protocols are mainly based
on utility function to calculate the satisfied nodes.
SimBet routing [23] is based on utility function which
exploits betweenness centrality metrics and similarity to the
destination node using ego network. In routing process, the
encounter nodes firstly exchange the contact list to update the
betweenness and similarity values. Then they exchange a
summary list of destination values, calculate and compare the
SimBet utility. If a node has a higher utility for a given
destination, the destination is added to a request vector.
Finally, they exchange the request list for further routing.
Further introducing the tie strength relationship with the
destination, SimBetTS [22] was presented as an evolution of
SimBet. Measuring
tie strength
in SimBetTS
is an
aggregation of a selection of indicators based on frequency,
intimacy/closeness and
simulation
the
In
recency.
experiments, betweenness utility, similarity utility, and tie
strength utility have been examined respectively, as well as
the SimBetTS protocol combining these three metrics. The
results show that SimBetTS improves overall delivery
performance while reducing the load on central nodes, which
is better distributed across the network.
Some works embed context information of nodes into
routing protocols. For instance, PROPHET [45] exploits the
frequency of history contacts between users. MobySpace [46]
and MV [47] exploit information about users’ mobility
patterns and places the users visit. The social relationships
taking into
information worth
are
important context
consideration . HiBOp
[48] automatically
learns and
represents context information, the users’ behavior and their
social relations, and exploits this knowledge to drive the
forwarding process [6][76]. Nodes running HiBOp infer
acquaintance between users through analyzing the similarity
of their context information and behavior which include both
present and historical information. Messages are forwarded
through users closer to the destination. To improve the
successful delivery rate, for each message more than one
copy is injected into the network following a different route.
To control the delivery cost, only the sender is allowed to
inject multi-copies. In addition, HiBOp supports both unicast
and group communications without requiring any particular
customization.
Mtibaa et al. [49] exploited the information about social
interactions of users from online social network platforms
and applications such as Facebook, Orkut, or MySpace, etc.
They proposed PeopleRank to rank the nodes in the social
graph by using social relationships, inspired by the famous
PageRank algorithm. Such social relationships can be based
on explicit friendships (as defined in online social networks
for example), on personal communications (for example
extracted through the communication patterns available in
cell phones), or even common interests. The node with a
higher PeopleRank value will be more central in the social
network and be a better forwarder. In addition, PeopleRank
7
can be implemented in a centralized way or in a completely
distributed fashion.
Aforementioned approaches take the social relationships
among nodes into consideration. Several works leverage the
regular human mobility pattern to predict the best forwarder.
Some examples of predict-based routing protocols include
PROPHET, MobySpace, MaxProp [50], etc. PROPHET and
MaxProp are based on history contact data while MobySpace
is based on the visit probability of locations in history.
However, they all ignore the regularity of human mobility in
spatial and temporal aspects which can take more accurate
prediction for the future mobility.
In addition , the regularity of human mobility is considered
in some works. PER [51] employs a time-homogeneous
semi-markov process model to describe node mobility as
transitions between possible locations. Location transition
and sojourn time probability distributions are determined
from nodes’ mobility history. Nazir et al. [52] assumed that
people follow similar mobility patterns daily (i.e. Monday to
Friday) and proposed algorithms for social encounter based
content delivery system with the time critical property.
the
The
community-independent
routings
avoid
community detection, and leverage the context information,
social properties (such as centrality, similarity, and tie
strength) and the regular mobility pattern to predict the best
forwarder. It is simple and easy to implement these routing
protocols. One drawback of community-independent routing
is that they are less sensitive to deviations. The prediction
relies on historical mobility. If nodes deviate from their
regular mobility patterns, the prediction will have large
errors. For this reason, taking the deviation of mobility into
consideration is a critical issue in the future.
Temporal and spatial factors are also of great significance.
The history temporal/location information represent the
people’s movement pattern. The current temporal/location
information indicate the instantaneous state which is related
to the future state. Gao et al. took temporal factor into
consideration in [53]. The transient node contact patterns are
exploited. They define transient connectivity which indicates
that some nodes may remain connected with each other
during specific time periods and develop appropriate data
forwarding metrics for more accurate prediction of node
contact capability within the given time constraint. Existing
works in the literature pay more attention to history
temporal/location
information,
rather
than
current
information. In addition, the combination of social properties
and temporal/location information is worth investigating.
B. Multicast Routing
Multicast routing is a considerably fresh and challenging
problem in frequently disrupted and partitioned networks.
Multicast routing allows information to be delivered to
multiple destinations. Usually, the multiple destinations are
identified as a group. Group membership of a particular
multicast group may change with time as nodes join and
leave the group [54]. Patra et al. [55] classified multicast
routing strategies in DTNs on the basis of their basic working
mechanisms. The categories include flooding multicast
routing, tree-based multicast routing, probability-based
multicast routing, and intelligent multicast routing. None of
them consider social properties.
into
relationships group people
social
Inherent
communities, which can be leveraged for the purpose of
multicast routing. Some works aforementioned in unicast
routing support multicast such as community-based routing.
In community-based routing protocols, if the recipients of the
multicast are in the same community, it is feasible to support
multicast. The process is that the message is forwarded to any
member of the community and then replicated in an epidemic
manner among the members of the community. Taking
HiBOp as an instance, it supports context-aware multicasting
using the destinations’ identity table.
Gao et al. [54] are among the first to study multicast from
the social network perspective. They proposed a set of
multicast routing methods with single and multiple data
items based on community and centrality. In single-data
multicast, they introduced a new metric called cumulative
contact probability (CCP) to indicate the average probability
that a node meets a random node within a time constraint.
Based on CCP of nodes, the minimum number of relays is
selected (by solving a unified knapsack problem) to satisfy
the requirement on delivery ratio within certain time
constraint. In multi-data multicast, a node maintains its
destination-awareness about other nodes to select relays
among its neighbors. If the destinations are in other
communities, data forwarding is conducted through gateway
nodes to connect multiple communities. The multi-data
multicast is also modeled as a knapsack problem ensuring the
required delivery ratios.
In multicast, the selection of relays is usually based on the
relays’ cumulative probabilities in order to forward single or
multiple data to multiple destinations [54]. However, unicast
generally relies on the future meeting probability to decide
the relay. Compared to unicast, multicast protocols face more
complicated context and are more challenging to design.
However, multicast has a wide spectrum of application
scenarios which require sharing data among people in e.g. a
meeting, conference or battlefield scenario.
C. Congestion
One critical issue of routing protocols is the trade-off
between improving delivery ratio and reducing delivery
delay and overhead. The socially-aware routing protocols
mentioned above contribute to this target by selecting
appropriate forwarders which have more opportunities to
encounter the destination from the perspective of social
interactions. However, the problems of overhead and
congestion remain to be addressed. In the context of networks,
congestion generally refers to a network state where the
relevant node is overloaded with too many messages. A result
of congestion is that network QoS may be deteriorated. The
cause of overhead and congestion may come from e.g. the
redundant message duplications and over-use of the central
nodes. The physical buffer of any mobile node is limited.
When there are excessive messages to be exchanged,
congestion may happen [56].
8
Redundant message duplications might cause high
overhead and congestion of the network. In the worst case,
94% of duplicate packets reach the destination , which will
induce huge overhead on bandwidth, energy and memory
consumption [57]. Many protocols are trying to achieve an
efficient trade-off by controlling duplication.
Kawarabayashi et al. [57] proposed a strategy to lower
message duplication under a given delay or delivery
probability. Based on predictable working day model, the
authors formulated the problem of message duplication into a
spanning tree problem which is further optimized in delivery
time, duplication and storage space of messages. In [58], the
delegation forwarding algorithm forwards a message only if
it encounters another node whose quality metric is greater
than any other nodes seen by the message so far. The cost of
delegation forwarding algorithm is proportional to the square
root of population size, which is more optimal in contrast to
naive forwarding with linear cost.
Most of the routing protocols lead the routing to direct
most of the traffic through a small subset of good nodes (e.g.
central node). For instance, in the SimBet algorithm, the top
10% of nodes carry out 54% of all the forwards and 85% of
all the handover [59]. This unfair load distribution causes
local storage congestion, further increasing the discarding
rate and decreasing the delivery rate.
To deal with congestion problem, current methods mainly
focus on two strategies. One is to mitigate the role of the
central nodes. Fair routing [59] classifies the nodes into
different levels to limit the exchange of messages. It exploits
the social process of perceived interaction strength based on
the social relation between nodes in different time scales.
Then it forwards the message by the stronger social relation
and uses assortative-based queue control to limit the
exchange of messages to those users with similar “social
status”. In other words, nodes will only accept forwarding
requests from those nodes of equal or higher status. In
addition, Yuan et al. [62] introduced strangers to participate
in routing and exploited the optimized number of strangers
in order to achieve a better performance of overhead/packet
delivery ratio in pure darkness scenario. The other strategy is
based on detection of the congestion. Nile [55] keeps the link
loads in check to push replicas only to those promising paths
that may sustain more loads. Radenkovic and Grundy [60]
introduced congestion driven part in forwarding protocol to
avoid nodes that have lower availability and higher
“congestion rates”. In reality, the detection of congestion and
the prediction of idle paths are difficult to address due to
changing network topology. Recently, some researchers tried
to make use of strange nodes and nodes with weak ties, which
might be a promising approach to cope with congestion.
Table I summarizes representative socially-aware routing
and
forwarding protocols
in
the
literature. The
socially-aware routing and forwarding protocols using
community can support both unicast and multicast, which
have more flexibility and applicability. A lot of experiments
and simulations have been carried out in the protocols listed
in the table which are usually based on real trace data. The
results of experiments and simulations show that the
Solution
LABEL [33]
BUBBLE RAP [19]
LocalCom [16]
Friendship-based [36]
Gently [37]
DR [38]
SimBet [18]
SimBetTs [17]
HiBOp [43]
PeopleRank [44]
Social-based [49]
Fair Routing [52]
unicast, multicast
unicast, multicast
TABLE I
SUMMARY OF SOCIALLY-AWARE ROUTING AND FORWARDING PROTOCOLS
Social Characteristics
Unicast or Multicast
Trace-Based Mobility
InfoCom06
unicast, multicast
community
HongKong, Cambridge,
community
unicast, multicast
InfoCom06,
degree centrality
MIT Reality Mining
Haggle
community
MIT Reality Mining
tie strength
betweenness centrality
MIT Reality Mining
community, friendship,
similarity, tie strength
Implemented in Haggle
community
Duk trace, WTD trace
community
MIT Reality Mining
betweenness centrality
similarity
Intel, Cambridge, InfoCom06
betweenness centrality,
similarity, tie strength
context information,
social relationship, similarity
friendship, similarity
community, centrality
unicast, multicast
unicast, multicast
unicast
unicast
unicast, multicast
unicast
multicast
Community based mobility
model
MobiClique, SecondLife,
InfoCom06, Hope
MIT Reality Mining
InfoCom06
MIT Reality Mining
community,
centrality
unicast
9
Protocols for Comparison
MCP, WAIT, Control
MCP, LABEL,
FLOOD,
WAIT , PROPHE
PROPHET,
BubbleRap
PROPHET, SimBet
SimBet, Epidemic
PROPHET,
Epidemic
PROPHET,
Epidemic
PROPHET,
Epidemic
Epidemic, BubbleRap,
PROPHET, SimBet
Epidemic, PROPHET,
SimBet
socially-aware routing and forwarding protocols outperform
socially-oblivious protocols, as a general rule.
V. ROUTING AND FORWARDING WITH SELFISHNESS
All the approaches mentioned above assume all nodes in
the network are cooperative and altruistic. Therefore, all
nodes are willing to help forward messages for other nodes.
But in reality, many nodes exhibit non-cooperative behaviors,
such as selfish nodes or even malicious nodes, in order to e.g.
conserve limited resources (like power and buffer) and
increase their own benefits.
A selfish node always acts for its own interest, meaning
selfish nodes may not be willing to provide services for others
in order to conserve their limited buffer or power resources.
Whereas, a malicious node acts maliciously with the
intention to disrupt the main functionality of the networks, so
it might possibly drop packets, jam the wireless channel, and
even forge false packets [63].
Many efforts have been made in the literature to evaluate
the effects of cooperation and/or selfishness in opportunistic
networks from different aspects [64]-[69]. It has been proved
that node collaboration (even limited collaboration) can
dramatically
improve
performance
compared
to
non-cooperation scenarios and different non-cooperation
behaviors may have opposite impacts on different routing
algorithms.
Social selfishness is first introduced in [70]. In social
perspective, a selfish user is usually willing to help others
with whom he/she has social relationships (e.g., friends,
coworkers, roommates) or in same community. He/she will
provide better service to those with stronger social ties than
those with weaker ties, especially when there are resource
constraints. The social related selfishness is defined as social
selfishness. In contrast, individual selfishness refers to the
nodes having the same selfishness level to other nodes. Social
selfishness conveys the social tie between the nodes and can
be used to select trusted relay nodes. When a node has no
social ties to the outside world, e.g. a node is out of its own
community, it becomes individual selfishness. It would be
better to treat nodes’ selfishness behaviors in different ways
with respect to different scenarios.
To deal with selfish nodes, incentive mechanisms are
necessary
to
stimulate nodes’
cooperation,
check
misbehaviors and punish selfish nodes. Due to frequent
network partitions, resource constraints and longer delay, the
incentive mechanisms developed in wireless networks like
MANETs, may not work effectively in intermittently
(dis)connected scenarios [68]. This is a challenging problem
that has attracted a lot of attention from many researchers.
Most recent works addressing node selfishness fall into
one of the following four categories: reputation-based,
credit-based, Tit-For-Tat (TFT), and trust-based. Generally
speaking, the first three categories are traditional incentive
mechanisms that focus on individual selfishness, while
trust-based
strategies
take
social
selfishness
into
consideration. One could argue that trust-based solutions do
not belong to incentive mechanisms because they do not take
any action to stimulate cooperation or check the selfish node.
In the context of socially-aware networks, however, social
selfishness becomes an important issue to be addressed.
Consequently, we cover trust-based strategies here. Different
categories of solutions have different principles to stimulate
cooperation. At the same time, they need to cope with various
attacks coming from malicious nodes.
10
A. Reputation-Based Incentive Mechanisms
In general,
reputation-based
incentive mechanisms
identify misbehaving nodes and exclude them from the
network. Nodes can build up their good reputation scores by
forwarding packets for others, and thus will be rewarded with
higher priorities when transferring their own packets. The
corresponding reputation score decreases when a node
misbehaves. The node with bad reputation is detected and
excluded when its reputation becomes below a threshold
[74].
In reputation systems, sybil attack and whitewashing
attack are common attacks to be handled. A sybil attack [71]
indicates that a malicious node attempts to create multiple
identities in order to help itself gain good reputation,
abandon bad reputation or evade responsibility of its actions.
In a whitewashing attack [72], a node repeatedly leaves and
rejoins the system using newly created identities to avoid
suffering from bad reputation. In classical networks, trust is
established by a certificate authority (CA) through a public
key infrastructure (PKI) [73]. But it is not easy to implement
in non-infrastructure and intermittent connection scenarios.
RADON [74] is a reputation-assisted data forwarding
protocol which comprehensively evaluates an encounter’s
forwarding ability by
integrating
the
reputation of
forwarding data with the possibility of meeting a destination.
In RADON, a special message called Positive Feedback
Message (PFM) is used to help the Watchdog monitor a
node’s forwarding behavior in the reputation management
system. RADON prevents a malicious node from deliberately
dropping
and
arbitrarily
forwarding data, which
dramatically improves the network performance in a malign
environment.
Give2Get Epidemic Forwarding and Give2Get Delegation
Forwarding are the first protocols for packet forwarding in a
social setting to tolerant selfish behaviors, which are based
on Epidemic
forwarding and Delegation forwarding
respectively [74]. Give2Get consists of two phases: the relay
phase and the test phase. In the relay phase, the sender (S),
which generates the message, tries relaying the message to
(at least) the first two nodes it meets by negotiating a
cryptographic session key. Assume node B relays the
message, node B continues the relay phase to find two other
nodes and relay the message to them. By doing this, it can
collect two proofs of relay for itself. When meeting node S
again, during the test phase, if node B is not able either to
show the two proofs or to prove to have still the message in its
memory, then node S can broadcast a proof of misbehavior
(PoM) to the whole network, which will remove node B if it
cannot prove that node S is wrong. In addition, both
protocols are Nash equilibriums, i.e. no individual has an
interest to deviate.
MobiID [76] is a “user-centric” and dynamic reputation
based incentive scheme to stimulate cooperation in bundle
forwarding. Conventional reputation based schemes always
rely on neighboring nodes to monitor the traffic and keep
tracks of each other’s reputation. In contrast, MobiID allows
each node to maintain, update and show its reputation tickets
by itself on demand. This is called self-check. It also defines
a social metric which considers the forwarding willingness
from forwarding history and identifies the social community
based on
this metric. Through sharing
reputation
information in the community and forming consensus views
towards targets, MobiID implies community check. MobiID
exploits Offline System Manager
(OSM) which
is
responsible for key distribution. In addition, MobiID
addresses attacks such as modifying the forwarding history to
over-claim a high reputation (so as to attract bundles) and
isolate the node from the target user.
IRONMAN [77] is another incentive mechanism using
social information. However it uses pre-existing social
information to detect and punish selfish nodes, thus
incentivizing them to participate in the network. The social
information can be obtained through interview, or from an
online social network (e.g., Facebook friend lists). With the
proliferation of online social network applications such as
Facebook, Orkut, or MySpace,
the social interaction
information of users becomes available. The social
information is increasingly reliable and can be utilized for
many purposes such as predicting future encounters in
opportunistic networks. The integration of online social
network and mobile networks is a prominent problem in
future research work.
SRed [78] is a localized, link-state-based and multi-path
routing protocol which also mitigates a number of known
routing layer attacks such as black hole, den ial of service
(DoS) and wormhole. SRed uses reputation-based routing
generation mode in benign environments, otherwise the
probabilistic routing generation mode will be activated. The
dynamic window mechanism is used to switch between the
two modes in order to achieve a good trade-off between
efficiency and security.
The above protocols avoid central management
mechanisms to control the reputation estimation in order to
adapt to mobile environments. RADON, Give2Get and SRed
utilize
the successful
forwarding process
to verify
misbehaving nodes. Li and Cao [79] presented a similar
scheme to migrate routing misbehavior through detecting
packet dropping.
All these protocols can achieve high delivery efficiency,
but they benefit from different aspects. RADON, Give2Get,
SRed and Li and Cao’s scheme are easy to operate, while
MobiID and IROMAN are of high reliability thanks to the
exploring of social community and group strength.
B. Credit-Based Incentive Mechanisms
Credit-based incentive schemes introduce some forms of
virtual currency or credit to regulate the packet-forwarding
relationships among different nodes [80]. Nodes earn credits
by forwarding packets. As a return, these credits can then be
used to obtain forwarding service from other nodes in the
system. That is, it will take some credits for the source node
to send each packet. If a packet is delivered successfully, the
corresponding credits will be distributed to the intermediate
nodes participating in packet relay.
There are two significant difficulties in credit-based
incentive schemes. One is the management of nodes and
credits distribution. Sometimes, the realization of payments
requires an out-of-band trusted third party, which is unlikely
to be available in DTN. The other is cheat attacks from
selfish nodes. Due to the selfish nature, mobile nodes will try
to cheat the system to maximize their welfare through
injecting or deleting some relay nodes to achieve more
credits.
In SMART [80] and Pi [81], the systems employ an
Offline Security Manager (OSM), which is responsible for
key distribution , and a Virtual Bank (VB), which is
responsible for credit management. SMART is a secure
multilayer credit-based incentive scheme for DTN which can
be compatible with diverse data forwarding algorithms. It is
based on the notion of a layered coin that consists of one base
layer and several endorsed layers. The base layer is generated
by the source while the endorsed layers are generated by
forwarding nodes. This layered coin mechanism makes
SMART withstand a wide range of cheating actions (or
attacks) such as layer injection attack, nodular tontine attack
and submission refusal attack. Pi is a variant of SMART
which combines reputation- and credit-based schemes. In Pi,
if and only if the messages arrive at the destination, the
forwarding nodes can get credits from the source node. To
achieve fairness, the forwarding node still can get good
reputation from a trusted authority (TA) for the failure
forwarding.
MobiCent [73] also makes use of a Trusted Third Party
(TTP) to store key information for nodes and provides
verification
and
payment
services.
It
uses
incentive-compatible payment mechanisms to cater to client
that wants to minimize either payment or data delivery delay
and handle the edge insertion and edge deletion attacks. In
this scheme, nodes are paid for forwarding packets and the
destination makes the payment decision. No node will get
incentive to tamper with the path it reports to the destination.
C. TFT Incentive Mechanisms
TFT is based on the basic principle that “I’ll do for you as
much as you did for me” [84]. BitTorrent [82] is one of the
most popular P2P (peer-to-peer) systems using direct TFT
reciprocity strategy. In BitTorrent, a user’s download rate is
proportional to its upload rate. The TFT incentive scheme
often suffers from bootstrapping problems and injecting of
fake messages.
is a pair-wise TFT
Incentive-Aware Routing [83]
incentive routing protocol which combines generosity and
contrition. The generosity addresses the bootstrapping and
absorbs transient asymmetries, while contrition prevents
mistakes from causing endless retaliation.
Buttyán et al. [84] proposed a mechanism to discourage
selfish behaviors based on the principle of barter: a user who
trades in messages can download a limited volume of
messages from another user if he/she can give the same
volume of messages in return. In this scheme, digital
signature and reputation mechanism can be used to prevent
the injection of fake messages.
RELICS [85] is a mechanism to combat selfishness in
energy-constrained DTNs. The incentive mechanism used in
11
RELICS is called reciprocity of service. Every node is given
an explicit rank based on its transit behavior (i.e., forwarding
messages originated from others). The rank of a node is
accumulated when
in relaying
the node participates
messages, whereas the rank is decreased when the node sends
message. Based on the rank of the source node, messages
originated from high ly-ranked nodes are given priority over
lowly-ranked ones. Furthermore, RELICS, for the first time,
takes energy into consideration for the incentive mechanism
in DTNs. In the scheme, it considers energy to be the core
rationale behind selfishness, and each node is allowed to set a
delivery threshold and to adapt its energy depletion rate
based on its rank such that the rate is merely enough to
achieve the desired delivery ratio.
Existing credit-based and TFT incentive mechanisms do
not take social properties into consideration directly.
However, as traditional incentive mechanisms, they can be
applied to social-based routing protocols. Furthermore,
credit-based and TFT incentive mechanisms with social
awareness will be interesting research topics.
D. Trust-Based Strategies
Social selfishness is closely related to not only the
willingness in tention for forwarding but also the trusted
relationship between nodes. Furthermore, more relationship
trust implies stronger social tie between nodes, which can be
used in effective relay node selections during the course of
forwarding. Trust-based strategies often establish trusted
relationship to complete trusted routing by coping with social
selfishness.
Considering social selfishness and
following
the
philosophy of design for users, SSAR [70] allows user
selfishness and improves performance by considering user
willingness, resource constraints, and contact opportunity
when selecting relays. User willingness values can be
configured via user interface in the mobile device.
Chen et al. [63] integrated social trust and QoS trust into a
composite trust metric for determining the best message
carrier among new encounters for message forwarding. They
consider healthiness and cooperativeness for social trust to
account for a node’s trustworthiness for message delivery,
and connectivity and energy for QoS trust to account for a
node’s QoS capability to quickly deliver the message to the
destination node. Trust-threshold based routing (TTBR) was
proposed which designs trust thresholds for determining the
trustworthiness of node acting as a recommender or as the
next message carrier. TTBR is distributed and does not
require a complicated credit management system.
Considering the social network structure and its dynamics,
Trifunovic et al. [86] proposed two approaches for social
trust establishment that are robust to sybil attacks: explicit
social trust and implicit social trust. Explicit social trust is
based on consciously established friend ties by building a
robust tree-like graph of paired users. Implicit social trust
leverages mobility properties using complex network tools
and builds another graph up to two-hops based on the
familiarity of surrounding peers and the similarity to
reinforce trust in a user.
12
Mtibaa and Harras [87] leveraged social information and
proposed six trust based filters to establish trustworthy
communications over mobile opportunistic networks. The six
filters couple three socially-aware estimators of trust
including common interests, common friends, and the
distance in the social graph, with two major techniques of
trust
establishment
including Relay-to-Relay
and
Source-to-Relay. It has been shown that the trust filters yield
a fair trade-off between trust and success rate.
Trust-based strategies provide more effective and secure
forwarding solutions. But the establishment of trust may face
the difficulty that centralized mechanisms cannot be easily
deployed
in
infrastructure-less networks
such
as
opportunistic networks. It is also challenging to efficiently
and effectively propagate the social information.
VI. SOCIALLY-AWARE DATA DISSEMINATION
Large volume of data is being generated every day. Many
content-based services or information are on the fly in the
mobile networks. Meanwhile, with
the
emerging
User-Generated Content (UGC) service, the users are not
only the consumers but also the producers of the content. The
content-based services wish to push the data to their
describers, while people wish to produce and share the
content with their friends. Consequently, there is an
increasingly crucial demand to data dissemination in
multi-point asynchronous manner
in practice. With
multi-point asynchronous communication , the destination of
communication
can be
a group of nodes,
and
communications between nodes use asynchronous way. From
the social perspective, people always group into communities
and their behaviors are regular. These social properties are
beneficial for improving the efficiency of data dissemination.
The Publish/Subscribe (Pub/Sub for short) paradigm
recently emerges as a promising solution
to data
dissemination thanks to the decoupling characteristic. It has
attracted a lot of attention from many researches. The
decoupling characteristics give the advantage of removal of
static dependencies in a distributed environment, which is
beneficial in supporting highly dynamic and decentralized
systems [25].
In Pub/Sub paradigm, three roles are usually deployed:
publisher, subscriber and broker. The publisher is the
information producer which issues newly-detected events
without having to specify the receiver. The subscriber is the
information consumer which expresses their interest in
certain events without knowledge of what the publisher
might be. The broker is the interface between the publisher
and subscriber which provides routing, event matching, and
filtering services, etc. In the context of data dissemination ,
the nodes providing the contents are publishers. The nodes
that are interested in the contents are the subscribers. The
relay nodes are the brokers. As a consequence, mobile nodes
can be publisher, subscriber or broker alternatively [25].
Recent works about socially-aware data dissemination fall
into one of two categories depending on different point of
view. The first category is based on solicitation and cache,
from the viewpoint of nodes. For a node in this context,
besides its interested content, it can cache the uninterested
content for others to improve the dissemination efficiency.
However, the buffer size of any node is limited. It is
impossible to store all encountering contents. Frequent buffer
replacement will induce considerable consumption of power
and decrease the efficiency of the network. Thus, soliciting
and caching appropriate set of contents for future distribution
according to local and/or global environments is an effective
way to improve the efficiency of data dissemination and to
reduce energy consumption. The second category is based on
forwarding, from a perspective of the content. People sharing
common interest and/or activities can build communities
which facilitate communications and information sharing
between them. In this regard, how to find the proper
forwarders to carry them to the destination community as
quickly as possible
the core of successful data
is
dissemination.
In this section we will give an overview of solicitation and
cache based approaches, and forwarding based approaches
respectively. And most algorithms in these two research
directions employ similar mechanism with PodNet [88].
Therefore, we will give a simple introduction to the PodNet
firstly. In PodNet, the improvement approach for content
distribution focuses on solicitation and five solicitation
strategies are proposed. Accordingly, we classify PodNet into
the first category.
A. Solicitation and Cache Based Approaches
The PodNet project is a Pub/Sub paradigm application for
data dissemination in wireless ad hoc networks. In PodNet,
contents are organized into feed channels. Users subscribe to
channels they are interested in. Users are associated in
pair-wise way when they come into the transmission range of
each other. The behavior of the scheme can be described as a
receiver-driven broadcasting paradigm. The intermediate
nodes are allowed to solicit and cache the unsubscribed
contents (i.e. uninterested contents) according to their
available buffers so that it can better serve its potential
encounters in the future [89].
With PodNet, the cache structure of a node is separated
into two parts: private cache and public cache. The private
cache is used for storing subscribed channels and the public
cache is used for public channels that are solely for
redistribution. It is assumed that the capacity of private cache
is large enough to store the interested contents while the
public cache is limited. Upon pair -wise contacts, nodes first
exchange the subscribed content which is matched using
Bloom Filter. Then nodes use the remaining connection time
to update and download contents for public cache by using
certain solicitation strategy. Five solicitation strategies are
presented,
including Most Solicited, Least Solicited,
Uniform, Inverse Proportional, and No Caching. These
strategies are based on popularity of content which can be
obtained and maintained
locally by exploiting
the
information from the requests of other peers except for the
No Caching strategy. For example, Most Solicited caches the
most popular content while Least Solicited caches the least
popular content.
Due to buffer size limits, there are two key issues with the
Pub/Sub paradigm, including soliciting proper unsubscribed
content to cache and replicating proper unsubscribed content
when the buffer is full.
Ma et al. [90] proposed to make a soliciting and caching
decision by jointly considering the history encounter
information, the content preferences of the subscribers and
the popularity of the contents. Using these information, each
node evaluates all contents waiting for caching and solicits
those unsubscribed contents it prefers to cache for future
distribution.
Chuah et al. [91] proposed a data model that categorizes
data into sets. Each category has a certain set of associated
keywords. Users’ interests are described by using the same
keyword space as the data model. When two nodes encounter,
each node exchanges the meta-data descriptions of stored
data and counts how many nodes obtain data from itself in an
observation window. If the data is of interest, the node will
request for it. Otherwise, a node will request for data of no
interest only with a probability which is dynamically adjusted
based on the average rewards achieved from storing data of
this category in the previous observation window.
In the above-mentioned approaches, every node makes
independent dissemination decisions. Ma et al. [92]
presented a cooperative cache-based data dissemination
framework (CCCDF) to carry out the cooperative soliciting
and caching strategies for encountering nodes. Considering
two encountering nodes as a group, CCCDF produces
cooperative dissemination decisions based on all relevant
information such as nodes’ mobility characteristics and
content subscriptions. Through updating and exchanging
average meeting rates, two nodes solicit the subscribed and
unsubscribed content download sequence as well as drop
sequence in case the cache is full. Based on the CCCDF, Ma
et al. proposed two cooperative content dissemination
strategies for different motivations [92]: CCCDF (Optimal)
is an optimal strategy to maximize the overall content
delivery performance while CCCDF (Max-Min) is a
cooperative strategy to share the limited network resources
among the contents in a Max-Min fairness manner no matter
how popular the content is.
Considering that mobile nodes often move to places where
they can establish communications, Jaho and Stavrakakis [87]
integrated interest social group with locality-induced social
group to enhance data dissemination. They compared two
storage strategies: selfish and cooperative. When soliciting
contents, the cooperative strategy takes into account the
interests of the nodes they will (most) likely encounter in the
future besides its own interests, whereas the selfish strategy
only caches contents of its own interest. It has been shown
that the cooperative strategy outperforms the other one.
ContentPlace [94]-[96] employs the same community
detection mechanisms as [25], but does not need any overlay
infrastructure. ContentPlace is not limited by the assumption
that the members in a community have common interest. In
contrast, it assumes that different communities have different
interests and one community have different interests either.
ContentPlace considers the relationship of one user with
13
several communities, that is to say, users belong to several
different social communities. It assumes
that users
automatically learn the time spent on the communities, the
interested data types and the data spread in communities.
These kinds of information are used to evaluate the utility of
each encountered data. The core of ContentPlace is to select a
set of data objects to cache in order to maximize the local
utility of its buffer by solving the multi-constrained 0-1
knapsack problem. In addition, ContentPlace also considers
five policies to evaluate the social weight, i.e. Most
Frequently Visited (MFV), Most Likely Next (MLN), Future
(F), Present (P), and Uniform Social (US). The simulations
provide best results in the Most Likely Next and Future
policies.
B. Forwarding Based Approaches
The key factor of forwarding based approaches is how to
select appropriate nodes in order to complete the data
dissemination as quickly as possible. Human beings’ social
properties are beneficial to predicting the information of
destination and meeting probability. Community and
centrality are two popular properties in socially-aware data
dissemination. In the first place, people with common
interests always come into a community and there are some
“central” people in a community. The communities are the
sole destination of relevant contents and can help the content
find their destination easily. Central nodes can help the
content travel quickly in community. Additionally, people
always follow regular mobility patterns. They always access
several locations frequently. The mobility regularity can help
to select appropriate
relay nodes
to minimize
the
intermediate nodes and improve the efficiency of data
dissemination.
In [25], a socio-aware overlay is built for Pub/Sub
communications by using the community and centrality
concepts. It detects community dynamically in which
community members are well connected, implying that
socially they share the same interests with high probability.
Nodes with high closeness centrality in communities are
selected as brokers to construct an overlay to facilitate
multi-point Pub/Sub event dissemination. Since nodes with
high closeness centrality have the best visibility to other
nodes in the community, it will be relatively reliable to
delivery contents to any (other) member of the community
through these nodes. However, it is hard to maintain the
overlay network because nodes with highest centrality values
may change over time (due to e.g. mobility).
SocialCast [97] is an interest-based routing framework for
Pub/Sub paradigm and it is based on utility function to select
best carriers. The approach assumes that socially-bound
hosts are likely to be co-located regularly. It exploits
prediction based on metrics of social interaction (probability
of a user to be co-located with another one sharing the same
interests and change degree of connectivity) to identify the
best information carriers, which implies the dissemination of
messages through matching the subscriber’s interests.
SocialCast asks a publisher to insert r copies. When a better
carrier is encountered, only one copy is removed from the
local buffer and sent to the new carrier. Therefore, at any
time, the network contains at most r copies of the message.
This approach to message distribution is also explored by
other solutions such as Spry and Wait [98]. SocialCast works
well when a community is interested in the same type of
contents, but it is not clear how it works in more general
settings.
Li and Wu [26] proposed a Mobile cOmmunity-based
Pub/Sub (MOPS) scheme which utilizes the long-term social
network properties to facilitate content-based services.
MOPS defines the closeness metric based on nodes’ temporal
and spatial encounter information to depict the neighboring
relationship between nodes. The closeness-based local
community is defined as a clique of nodes where any
neighboring relationship is stronger than an adjustable
threshold. It considers not only the direct but also the indirect
neighboring relationship. MOPS combines push and pull
strategies
and
determines
the boundary between
communities as
the push-pull boundary. Within
the
community, nodes broadcast interests and publishers send
contents directly to the nodes. Brokers are then deployed as
the interfaces to match the interests and bridge communities.
Habit [27] leverages information about nodes’ regularity
of movement and their social network (or network of interest)
to construct regularity graph and interest graph respectively.
The regularity graph is responsible for describing the
familiar stranger relationship between nodes with temporal
and spatial relevant. If a node encounters anther node
frequently enough, it becomes a familiar stranger in a regular
time period. The interest graph is responsible for describing
the relationship of interested content transmission between
nodes. Using these two graphs, Habit enables relevant
content to reach interested nodes while minimizing the
computation and communication load on uninterested
intermediate nodes, while still achieving a high delivery rate.
Fan et al. [99] addressed data dissemination among
several communities and proposed to make decision on the
routing trajectory based on semi-Markov analytical model.
They defined geo-community based on the geographic
regularity of human mobility and geo-centrality as the super
user among communities. They formulated the super user
route design as a combinational optimization problem of
Convex Optimization and Traveling Salesman Problem to
achieve the goal of minimizing the total duration and
guaranteeing the required data dissemination probability.
Forwarding based approaches exploit social information
in the working environment and take into consideration
social relationships between users to select the data object to
exchange. The networks are generally divided into several
communities that provide more global information. However,
due to the dynamic topology of the network, more resources
will be consumed to detect and maintain the communities. In
addition, there is no consideration of the multi-interest
scenario. One challenge is that we must find a way to achieve
a fairly distributed delivery rate.
The main difference between solicitation and cache based
approaches and forwarding based approaches lies in what
they concern about. Solicitation and cache based approaches
14
emphasize more on messages’ properties. They usually
consider messages’ popularity and dissemination rate. Thus
they are suitable to content-aware environments. For
instance, the community is detected according to individuals’
interest. While forwarding based approaches emphasize
more on individual’s properties. They pay more attention to
the individual’s status in order to disseminate faster.
Therefore, they have been more widely adopted.
In addition, the cache freshness problem is attracting
researchers’ attention. Some messages such as news are
time-sensitive. As a result, to achieve cache freshness, the
date should be the newest in cache. However, previous
researches usually maintain the freshness of cached data by
refreshing periodically. Recently, Cao et al. [100], for the
first time, proposed a scheme to efficiently maintain the
cache freshness by organizing the caching nodes as a tree
structure during data access. Each node in the tree is
responsible for refreshing the data cached at its children in a
distributed and hierarchical manner.
VII. OPEN ISSUES
In previous sections, we have reviewed the state of the art
in the emerging field of SAN. Accordingly, we try to cover
the majority of categories of related research efforts, though
the content is not projected to be exhaustive. From the
analysis and comparison of these methods, we can conclude
that the social properties are the potential improvement
strength to mobile network design. There are large spaces to
improve the efficiency of protocols and algorithms by
exploring comprehensive use of social properties. In addition,
although security and mobility model from social aspects are
not involved in this paper, they are also hot research topics in
SAN and many research works have been conducted, e.g.
[63], [101]-[112]. Besides, quite a number of research
projects and initiatives closely related to SAN have been
launched in recent years. A list of these research projects is
provided in Table II. Despite the considerable amount of
ongoing research, the SAN research community is very
young. Many challenges remain yet to be addressed. On the
other hand, there are a lot of opportunities to improve the
efficiency and effectiveness of SAN to accommodate new
applications and services. In this section, several open issues
will be outlined.
A. Mobile Social Sensing and Learning
In the context of SAN, protocol and algorithm design takes
into account relevant social properties as main basis. It is
necessary to sense and learn the context information in order
to obtain the social properties. In present works, the social
properties mainly come from the analysis of the experiment
data and most existing studies are based on analytical or
simulation models. Then comes the challenge that how to
bring SAN into real applications with mobile social sensing
and learning.
Basically, it might be easy to obtain raw data of the context
information such as time, location, action, etc. by using
mobile devices equipped with appropriate sensors. In this
aspect, most of the projects listed in Table II have provided
Project
Organization(s)
SocialNets
FET
TABLE II
SUMMARY OF SOCIALLY-AWARE NETWORKING RELATED PROJECTS
Research Area(s)
Social networks for the delivery and acquisition of content covering
online opportunistic wireless network
PeerSoN
MetroSense
A Million People
PodNet
GroupMedia
Haggle
P2P infrastructure supporting features of online social networks.
KTH, EPFL, NTU
Singapore, etc
Dartmouth College Applications, classification techniques, and sensing paradigms for
mobile phones capable of societal-scale sensing
Mobile network, epidemiology, urban planning, and social science.
Content distribution protocol and system on mobile devices.
Perceptual socially-aware applications for cell phones and PDAs.
Situated and autonomic communications
CSG ETH Zürich
MIT
FU FET
15
URL
http://www.social-nets.eu/
http://www.peerson.net/
http://metrosense.cs.dartmouth.edu/
http://www.amillionpeople.net/
http://podnet.ee.ethz.ch/
http://groupmedia.media.mit.edu/
http://www.haggleproject.org/
large amounts of datasets of inevitable value. While, since
majority of the existing data is about information like time,
location, which is not enough for further analysis on social
behavior, novel mobile social sensing technologies need to be
tested, especially for collection of users’ words, actions, etc.
After being collected, the useful information needs to be
extracted from the sensor data for real usage, as a result of the
fact
that, different applications need different social
properties and different social properties require different
data at different scales. For example, the human mobility
pattern is sensitive to the time and location at individual scale,
while the community and centrality are sensitive to the
interest or interaction at group scale. This makes the mobile
social learning a vital issue. In other words, an SAN
application should be able to analyze the collected data or
classify them according to the social features they reflect. In
some occasions, the application should also be able to predict
the trend or future pattern to afford users a smarter life, for
example, remind a meeting, help schedule, or make an
appointment. To this end, the mobile devices need to support
large storage capacity and computation capacity. In this
regard, mobile cloud computing is a suitable solution to
computing and mining big data for very large numbers of
users [101], with the ability of providing available computing
and storage resources.
Based on the above statements, both mobile social sensing
and learning need further research on improving their own
effectiveness and efficiency considering the points of
application and social properties.
B. Privacy
Mobile devices, which are used to monitor people’s
context information , record their preferences and behaviors,
and hence possess the users’ private information. Most of the
protocols and algorithms for SAN require users to share their
personal information such as physical location [114],
preference, and social relation. Therefore, the privacy issue
for mobile users in SAN becomes crucial. A generalized
privacy policy is hard to implement because the granularity
of privacy concern may differ from user to user, even the
same user has different sensitivities to the same information
in different applications [115].
The solutions to privacy presented by existing works are
usually encryption or access control to private information .
Encryption only exposes the sensitive information to the
identified users, which is not suitable to SAN due to the
general requirement of central server. Information access
control allows users to disclose their private information to
“close” users. For instance, most mobile social networking
services allow a user to share his/her location with his/her
friends, even friends of friends (FoF). In the context of SAN,
access control to private information becomes difficult due to
various relationships involved. There is a tradeoff between
obtaining accurate social properties for socially-aware
networking protocol design and protecting privacy.
C. Node Selfishness
Dealing with selfish nodes is an important but challenging
issue in SAN. As mentioned before, node selfishness in this
context can be classified into social selfishness and
individual selfishness. Many research efforts on incentive
mechanisms are exploited to stimulate the individual selfish
nodes to cooperate [116]. However, the social selfishness is
usually used to help select trusted nodes in routing protocols
and they are not exploited sufficiently, particularly in
incentive mechanisms. It is necessary to detect and deal with
the individually selfish nodes and socially selfish nodes
differently according to the context information, particularly
social information. Addressing the problem of selfish nodes
effectively will be beneficial to not only the design of routing
protocols and data dissemination algorithms, but also
handling of privacy and security problems. As a consequence,
node selfishness is worth investigation.
D. Scalability
Scalability is an open problem that is seldom considered in
previous works [117]. Indeed it should be taken into account
on each level of SAN’s architecture. Here we take the routing
and data dissemination, and application levels as examples.
On the level of routing and data dissemination, most of the
existing protocols and algorithms require nodes to store their
encounter information with others or context information to
estimate the appropriate relays. However, mobile devices are
limited by the wireless spectrum and onboard resources,
especially the low buffer storage and energy. This causes the
problem of scalability and makes the routing protocols or
data dissemination algorithms badly compatible with the
increasing node density of the network in many aspects: (1) If
new nodes join the network or some nodes are powered off, a
new route between two nodes needs to be detected, and this
costs energy and time; (2) When the network is large, finding
an effective route will be difficult, especially in situations
where the topology is dynamic; (3) Larger memory space is
needed to store the increased encounter information; (4)
Sometimes, there are multiple feasible routes to disseminate
the information ; in this case, optimal route selection and
route management become challenging problems. All these
points require mobile devices to have good capacity in terms
of buffer, computation and energy efficiency.
On the level of application (or system), scalability is also
an important issue. For a robust system, the ability of being
able to be extended with new features easily is very necessary
when facing with changing requirements. When a new
device joins the system, it is necessary to integrate the device
into the system quickly, which is also an essential aspect of
scalability. Besides these scenarios, it is possible to identify
many requirements in terms of scalability in the context of
SAN.
VIII. CONCLUSION
Socially-aware networking is going to be a new hotspot of
research on network science and engineering. The close
connection between ubiquitous mobile devices and the users’
social relationships attracts researchers to explore the
potential of introducing social properties into network design.
We believe that SAN will benefit the engineering of next
generation networks as a promising paradigm.
In this paper, we have discussed basic concepts behind this
new terminology and presented a first survey of state of the
art. Through examining existing research results, it can be
seen that social properties are indeed a powerful source not
only for the design of outstanding networks, covering the
areas of routing and forwarding protocols, but also for
tackling the problems related to selfishness behavior in
routing and
forwarding situations. Additionally, we
described the major approaches on socially aware data
dissemination to make full use of the social properties.
However, a multitude of challenges remain to be addressed
before the full potential of SAN can be realized in practice.
We have examined some of these open issues in this paper.
We hope this survey will provide a better understanding of
the literature of SAN and spark new research interests and
developments in this field.
REFERENCES
[1] M. Walsh. “Gartner: mobile to outpace desktop web by 2013,” Online
Media Daily, January 2010.
[2] L. Pelusi, A. Passarella, and M. Conti, “Opportunistic networking: data
forwarding in disconnected mobile ad hoc networks,” Communications
Magazine, IEEE, vol. 44, no. 11, pp. 134–141, Nov. 2006.
[3] Handbook of Wireless Networks and Mobile Computing, 1st ed, John
Wiley & Sons, Inc., Ivan Stojmenović, New York, USA, 2002, pp.
325-346.
[4] N. D. Lane, E. Muluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T.
Campbell, “A survey of mobile phone sensing,” Communications
Magazine, IEEE, vol. 48, no. 9, pp. 140–150, Sept. 2010.
[5] D. Huang, “Mobile cloud computing,” IEEE COMSOC Multimedia
Communications Technical Committee (MMTC) ELetter, 2011.
[6] M. Conti, and M. Kumar, “Opportunities in opportunistic computing,”
IEEE Computer, vol. 43, no. 1, pp. 42–50, Jan. 2010.
16
[7] P. Hui, A. Chaintreau, R. Gass, J. Scott, J. Crowcroft, and C. Diot,
“Pocket-switched networking: challenges, feasibility and implementation
issues,” Lecture Notes in Computer Science, vol. 3854, pp. 1-12, 2006.
[8] W. Chen, R. K. Guha, T. J. Kwon, J. Lee, and I. Y. Hsu, “A survey and
challenges in routing and data dissemination in vehicular ad-hoc
networks,” in Proc. IEEE Int. Conf. on Vehicular Electronics and Safety,
Columbus, 2008, pp. 328–333.
[9] F.-J. Wu, Y.-F. Kao, and Y.-C. Tseng, “From wireless sensor networks
toward cyber physical system,” Pervasive and Mobile Computing, vol, 7,
no. 4, pp. 397–413, Aug. 2011.
[10] K. Yang, X. Cheng, L. Hu, and J. Zhang, “Mobile social networks:
International Journal of
state-of-the-art and a new vision”,
Communication Systems, vol. 25, pp. 1245-1259.
[11] M. R. Schurgot, C. Comaniciu, K. Jaffrès-Runser, “Beyond traditional
DTN routing: social networks for opportunistic communication,”
Communications Magazine, IEEE, vol.50, no.7, pp.155-162, July 2012.
[12] D. Popovici, M. Desertot, S. Lecomte, T. Delot, “A framework for mobile
and context-aware applications applied to vehicular social networks”,
Social Network Analysis and Mining, pp.1-12. May 2012
[13] B. Guo, Z. Yu, X. Zhou, and D. Zhang, “Opportunistic IoT: Exploring the
social side of the internet of things,” CSCWD 2012, pp.925-929, 23-25
May 2012.
[14] D. Zhang, B. Guo, and Z. Yu, “The Emergence of Social and Community
Intelligence,” Computer, vol. 44, no. 7, pp. 21-28, July 2011.
[15] S. Milgram. “The small world problem,” Psychology Today, vol. 1, no. 1,
pp. 60–67, May 1967.
[16] D. Saxbe. “Six degrees of separation: Two new studies test ’six degrees of
separation’ hypothesis,” Psychology Today, 2003.
[17] W. X. Zhou, D. Sornette, R. A. Hill, and R. I. M. Dunbar, “Discrete
hierarchical organization of social group sizes,” Proc. the Royal Society
B, vol. 272, no. 1561, pp. 439–444, Feb. 2005.
[18] D. J. Watts, and S. H. Strogatz. “Collective dynamics of “small-world”
networks,” Nature, vol. 393, pp. 440–442, Jun. 1998.
[19] S. Wasserman, and K. Faust, “Social network analysis: methods and
applications, structural analysis in the social sciences series,” Cambridge
Univ. Press, 1994.
[20] O. Serrat, “Social network analysis”, Knowledge Solutions, Feb 2009.
[21] F. Li, and J. Wu, “LocalCom: A Community-based epidemic forwarding
scheme in disruption-tolerant networks,” in Proc. IEEE SECON '09,
Florida, 2009, pp.1–9.
[22] E. M. Daly, and M. Haahr, “Social network analysis for information flow
in disconnected delay-tolerant MANETs,” IEEE Transactions on Mobile
Computing, vol.8, no.5, pp. 606–621, May. 2009.
[23] E. M. Daly, and M. Haahr, “Social network analysis for routing in
disconnected delay-tolerant MANETs,” in Proc. ACM MobiHoc’07,
Montreal, 2007, pp. 32–40.
[24] P. Hui, J. Crowcroft, and E. Yoneki, “Bubble Rap: social –based
forwarding in delay tolerant networks,” in Proc. ACM MobiHoc’08,
Hong Kong, 2008, pp. 241–250.
[25] E. Yoneki, P. Hui, S. Chan, and J. Crowcroft, “A socio-aware overlay for
publish/subscribe communication in delay tolerant networks,” in Proc.
ACM MSWiM’07, Chania, 2007, pp. 225–234.
[26] F. Li, and J. Wu, “MOPS: providing content-based service in
disruption-tolerant networks,” in Proc. ICDCS’09, Florida, 2009, pp.
526–533.
[27] A. J. Mashhadi, S. B. Mokhtar, and L. Capra, “Habit: leveraging human
mobility and social network for efficient content dissemination in delay
tolerant networks,” in Proc. IEEE WoWMoM’09, London, 2009, pp. 1–6.
[28] N. Wang, and E. Yoneki, “Impact of social structure on forwarding
algorithms in opportunistic networks,” 2011 Int. Conf. on Selected
Topics in Mobile and Wireless Networking (iCOST) , Shanghai, 2011,
pp. 82–88.
[29] L. C. Freeman, “A set of measures of centrality based on betweenness,”
Sociometry, vol. 40, no. 1, pp. 35–41, Mar. 1977.
[30] L. C. Freeman, “Centrality in social networks conceptual clarification,”
Social Networks, vol. 1, no. 3, pp. 215–239, 1978-1979.
[31] Y. Zhang, and J. Zhao, “Social network analysis on data diffusion in
delay tolerant networks,” in Proc. ACM MobiHoc’09, New Orleans,
2009, pp. 345–346.
[32] D. Katsaros, N. Dimokas, and L. Tassiulas, “Social network analysis
concepts in the design of wireless ad hoc network protocols,” Network,
IEEE, vol.24, no.6, pp.23–29, Nov.-Dec. 2010.
[33] A. Mtibaa, A. Chaintreau, J. LeBrun, and E. Oliver, A.-K. Pietilainen,
and C. Diot. “Are you moved by your social network application?” in
Proc. WOSN’08: Wksp. Online social networks, New York, 2008, pp.
67–72.
[34] M. S. Granovetter, “The strength of weak ties,” The Am. J. Sociology, vol.
78, no. 6, pp. 1360-1380, May 1973.
[35] M. González, C. Hidalgo, and A.-L. Barabási, “Understanding individual
human mobility patterns,” Nature, vol. 453, no. 7196, pp. 779–782, Mar.
2008.
[36] W, Hsu, T . Spyropoulos, K. Psounis, and A. Helmy, “Modeling
time-variant user mobility in wireless mobile networks,” in Proc. IEEE
INFOCOM’07, Anchorage, 2007, pp. 758–766.
[37] S. Yang, X. Yang, C. Zhang, and E. Spyrou, “Using social network theory
for modeling human mobility,” Network, IEEE, vol. 24, no. 5, pp.6–13,
September-October 2010.
[38] P. Hui, and J. Crowcroft, “How small labels create big improvements,”
IEEE PerCom Workshops '07, New York, 2007, pp.65–70.
[39] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott,
“Impact of human mobility on the design of opportunistic forwarding
algorithms,” in Proc. IEEE INFOCOM’06, Barcelona, 2006, pp.
606–620,
[40] L. Danon, J. Duch, A. Diaz-Guilera, and A. Arenas, “Comparing
community structure identification,” Journal of Statistical Mechanics:
Theory and Experiment, vol. 2005, no. 9, pp. 1–10, Sep. 2005.
[41] E. Bulut, and B. K. Szymanski, “Friendship based routing in delay
tolerant mobile social networks,” in Proc. IEEE GLOBECOM’10, Miami,
2010, pp.1–5.
[42] M. Musolesi, P. Hui, C. Mascolo, and J. Crowcroft, “Writing on the clean
slate: Implementing a socially-aware protocol in Haggle,” in Proc. IEEE
WoWMoM’08, Newport Beach, 2008, pp. 1–6.
[43] T. Zhou, R. R. Choudhury, and K. Chakrabarty, “Diverse routing:
exploiting social behavior for routing in delay-tolerant networks,” in Proc.
CSE '09, vol. 4, pp. 1115–1122, Aug. 2009.
[44] M. Musolesi, S. Hailes, and C. Mascolo. “Adaptive routing for
intermittently connected mobile ad hoc networks,” in Proc. IEEE
WoWMoM’05, Taormina - Giardini Naxos, 2005, pp. 183–189.
[45] A. Lindgren, A. Doria, and O. Schelén, “Probabilistic routing in
intermittently connected networks,” Service Assurance with Partial and
Intermittent Resources, vol. 3126, pp. 239-254, 2004.
[46] J. Leguay, T. Friedman, and V. Conan, “DTN routing in a mobility
pattern space,” in Proc. ACM SIGCOMM WDTN '05. Philadelphia, 2005,
pp. 276–283.
[47] B. Burns, O. Brock, and B. N. Levine, “MV routing and capacity building
in disruption tolerant networks,” in Proc. IEEE INFOCOM’05, Miami,
2005.
[48] C. Boldrini, M. Conti, and A. Passarella, “Exploiting users’ social
relations to forward data in opportunistic networks: the HiBOp solution,”
Pervasive and Mobile Computing, vol. 4, no. 5, pp. 633–657, Oct. 2008.
[49] A. Mtibaa, M. May, C. Diot, and M. Ammar, “PeopleRank: social
opportunistic forwarding,” in Proc. IEEE INFOCOM’10, San Diego,
2010, pp. 1–5.
[50] J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine, “Maxprop: routing
in Proc. IEEE
for vehicle-based disruption-tolerant networks,”
INFOCOM’06, Barcelona, 2006, pp. 1–11.
[51] Q. Yuan, I. Cardei, and J. Wu, “Predict and relay: an efficient routing in
disruption-tolerant networks,” in Proc. ACM MobiHoc’09, New Orleans,
2009, pp. 95–104.
[52] F. Nazir, J. Ma, and A. Seneviratne, “Time critical content delivery using
predictable patterns in mobile social networks,” in Proc. CSE '09,
Vancouver, 2009, pp.1066–1073.
[53] W. Gao, G. Cao, T . La Porta, and J. Han, “On Exploiting Transient Social
Contact Patterns for Data Forwarding in Delay Tolerant Networks,”
IEEE Transactions on Mobile Computing, January, 2013.
[54] W. Gao, Q. Li, B. Zhao, and G. Cao, “Social-aware multicast in
disruption-tolerant networks,” IEEE/ACM Trans. Netw., vol. PP, no. 99,
p. 1, 2012.
[55] S. Patra, S. Saha, V. Shah, S. Sengupta, K. G. Singh, and S. Nandi, “A
qualitative survey on multicast routing in delay tolerant networks,”
WiMo/CoNeCo 2011, Ankara, 2011, pp. 197–206.
[56] M. Radenkovic, and A. Grundy, "Efficient and Adaptive Congestion
Control for Heterogenious Delay Tolerant Networks", Ad Hoc Networks,
vol. 10, no. 7, Sep. 2012, pp. 1322-1345.
[57] K.-i. Kawarabayashi, F. Nazir, and H. Prendinger, “Message duplication
reduction in dense mobile social networks,” in Proc. IEEE ICCCN’10,
Zurich, 2010, pp.1–6.
[58] V. Erramilli, M. Crovella, A. Chaintreau, and C. Diot. “Delegation
forwarding,” in Proc. ACM MobiHoc’08, Hong Kong, 2008, pp.
251–260.
[59] J. M. Pujol, A. L. Toledo, and P. Rodriguez, “Fair routing in delay
tolerant networks,” in Proc. IEEE INFOCOM’09, Rio de Janeiro, 2009,
pp. 837–845.
[60] M. Radenkovic, and A. Grundy, “Congestion aware forwarding in delay
tolerant and social opportunistic networks,” in Proc. WONS’11,
Bardonecchia, 2011, pp. 60–67.
17
[61] M. A. Islam, and M. Waldvogel, “Optimizing message delivery in
mobile-opportunistic networks,” 2011 Baltic Congress on Future
Internet Communications, Riga, 2011, pp. 134–141.
[62] P. Yuan, H. Ma, and P. Duan, “On exploiting few strangers for data
forwarding in delay tolerant networks,” in Proc. MSN’11, Beijing, 2011,
pp. 282–288.
[63] I.-R. Chen, F. Bao, M. Chang, and J.-H. Cho, “Trust management for
encounter-based routing in delay tolerant networks,” in Proc. IEEE
GLOBECOM’10, Miami, 2010, pp.1–6.
[64] A. Panagakis, A. Vaios, and I. Stavrakakis, “On the effects of cooperation
in DTNs,” in Proc. COMSWARE’07, Bangalore, 2007, pp.1–6.
[65] K. Xu, P. Hui, V. O. K. Li, J. Crowcroft, V. Latora, and P. Lio, “Impact of
altruism on opportunistic communications,” in Proc. ICUFN’09, Hong
Kong, 2009, pp.153–158.
[66] P. Hui, K. Xu, V. O. K. Li, J. Crowcroft, V. Latora, and P. Lio,
“Selfishness, altruism and message spreading in mobile social networks,”
in Proc. IEEE INFOCOM’09, Rio de Janeiro, 2009, pp. 1–6.
[67] O. R. Helgason, F. Legendre, V. Lenders, M. May, and G. Karlsson,
“Performance of opportunistic content distribution under different levels
of cooperation,” 2010 European Wireless Conference (EW), Lucca,
2010, pp. 903–910.
[68] Y. Li, G. Su, and Z. Wang, “Evaluating the effects of node cooperation on
DTN routing,” AEU - International Journal of Electronics and
Communications, vol. 66, no. 1, pp. 62–67, Jan. 2012.
[69] Y. Li, G. Su, D. O. Wu, D. Jin, L. Su, and L, Zeng, “The impact of node
tolerant networks,” IEEE
selfishness on multicasting
in delay
Transactions on Vehicular Technology, vol. 60, no. 5, pp. 2224–2238,
Jun. 2011.
[70] Q. Li, S. Zhu, and G, Cao, “Routing in socially selfish delay tolerant
networks,” in Proc. IEEE INFOCOM’10, San Diego, 2010, pp.1–9.
[71] J. R. Douceur, “The sybil attack,” Lecture Notes of Computer Science,
vol. 2429, pp. 251-260, 2002.
[72] E. Friedman, and P. Resnick, “The social cost of cheap pseudonyms,”
Journal of Economics and Management Strategy, vol. 10, no. 2, pp.
173–199, Summer 2001.
[73] B. B. Chen, and M. C. Chan, “MobiCent: a credit-based incentive system
for disruption tolerant network,” in Proc. IEEE INFOCOM’10, San
Diego, 2010, pp.1–9.
[74] N. Li, and S. K. Das, “RADON: reputation-assisted data forwarding in
opportunistic networks,” in Proc. of 2nd Int. Workshop on Mobile
Opportunistic Networking, Pisa, 2010, pp. 8–14.
[75] A. Mei, and J. Stefa, “Give2get: forwarding in social mobile wireless
networks of selfish individuals,” in Proc. ICDCS’10, Genova, 2010, pp.
488–497.
[76] L. Wei, H. Zhu, Z. Cao, and X. Shen, “MobiID: a user-centric and
social-aware reputation based incentive scheme for delay/disruption
tolerant networks,” Ad-hoc, Mobile, and Wireless Networks, Lecture
Notes in Computer Science, vol. 6811, pp. 177–190.
[77] G. Bigwood, and T . Henderson, “IRONMAN: using social networks to
add incentives and reputation to opportunistic networks,” in Proc. IEEE
SocialCom’11, Boston, 2011, pp. 65–72.
[78] Z. Xu, Y. Jin, W. Shu, X. Liu, and J. Luo, “SReD: a secure
reputation-based dynamic window scheme for disruption-tolerant
networks,” in Proc. IEEE MILCOM’09, Boston, 2009, pp.1–7.
[79] W. Gao, G. Cao, M. Srivatsa and A. Iyengar, “Distributed Maintenance
of Cache Freshness in Opportunistic Mobile Networks,” in Proc. IEEE
ICDCS’12, Macau, 2012, pp. 132-141.
[80] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, “SMART: a secure
multilayer credit-based incentive scheme for delay-tolerant networks,”
IEEE Transactions on Vehicular Technology, vol. 58, no. 8, pp.
4628–4639, Oct. 2009.
[81] R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss, “Pi: a practical incentive
protocol for delay tolerant networks,” Wireless Communications, IEEE
Transactions on, vol. 9, no. 4, pp. 1483–1493, Apr. 2010.
[82] BitTorrent
Specification.
Protocol
http://wiki.theory.org/BitTorrentSpecification, 2003.
[83] U. Shevade, H. H. Song, L. Qiu, and Y. Zhang, “Incentive-aware routing
in DTNs,” in Proc. IEEE ICNP’08, Orlando, 2008, pp. 238–247.
[84] L. Buttyán, L. Dóra, M. Félegyházi, and I. Vajda, “Barter trade improves
message delivery in opportunistic networks”, Ad Hoc Networks, vol. 8,
no. 1, pp. 1-14, Jan. 2010.
[85] M. Y. S. Uddin, B. Godfrey, and T. Abdelzaher, “RELICS: in-network
realization of incentives to combat selfishness in DTNs,” in Proc. IEEE
ICNP’10, Kyoto, 2010, pp. 203–212.
[86] S. Trifunovic, F. Legendre, and C. Anastasiades, “Social trust in
opportunistic networks,” in Proc. IEEE INFOCOM’10, San Diego, 2010,
pp. 1–6.
[87] A. Mtibaa, and K. A. Harras, “Social-based trust in mobile opportunistic
networks,” in Proc. IEEE ICCCN’11, Hawaii, 2011, pp. 1–6
[88] V. Lenders, G. Karlsson, and M. May, “Wireless ad hoc podcasting,” in
Proc. IEEE SECON'07, San Diego, 2007, pp. 273–283.
[89] Y. Ma, and A. Jamalipour, “A cooperative cache-based content delivery
framework for intermittently connected mobile ad hoc networks,” IEEE
Transactions on Wireless Communications, vol. 9, no. 1, pp. 366–373,
Jan. 2010.
[90] Y. Ma, M. R. Kibria, and A. Jamalipour, “Cache-based content delivery
in opportunistic mobile ad hoc networks,” in Proc. IEEE GLOBECOM’
08, New Orleans, 2008, pp. 1–5.
[91] M. Chuah, P. Yang, and P. Hui, “Cooperative user centric information
dissemination in human content-based networks,” in Proc. IEEE
ICPAD’10, Shanghai, 2010, pp. 794–799.
[92] Y. Ma, and A. Jamalipour, “Cooperative content dissemination in
intermittently connected networks,” in Proc. IEEE ICC '09, Dresden,
2009, pp.1–5.
[93] E. Jaho, and I. Stavrakakis, “Joint interest- and locality-aware content
dissemination in social networks,” in Proc. WONS 2009, Snowbird, 2009,
pp. 173–180.
[94] C. Boldrini, M. Conti, and A. Passarella, “Design and performance
evaluation of ContentPlace, a social-aware data dissemination system for
opportunistic networks,” Computer Networks, vol. 54, no. 4, pp.
589–604, Mar. 2010.
[95] C. Boldrini, M. Conti, and A. Passarella, “Contentplace: social-aware
data dissemination in opportunistic networks,” in Proc. MSWIM’08,
Vancouver, 2008, pp. 203–210.
[96] C. Boldrini, M. Conti, and A. Passarella, “Context and resource
awareness in opportunistic network data dissemination,” in Proc. IEEE
WoWMoM’08. Newport Beach, 2008, pp.1–6.
[97] P. Costa, C. Mascolo, M. Musolesi, and G.-P. Picco, “Socially-aware
routing for publish-subscribe in delay-tolerant mobile ad hoc networks,”
IEEE JSAC Special issue on Delay-Tolerant Networks, vol. 26, no. 5, pp.
748–760, Jun. 2008.
[98] T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Spray and wait: An
efficient routing scheme for intermittently connected mobile networks,” in
Proc. ACM SIGCOMM WDTN ’05, Philadelphia, 2005, pp. 252–259.
[99] J. Fan, Y. Du, W. Gao, J. Chen, and Y. Sun, “Geography-aware active
data dissemination in mobile social networks,” in Proc. IEEE MASS’10,
San Francisco, 2010, pp. 109–118.
[100] Q. Li, and G. Cao, “Mitigating Routing Misbehavior in Disruption
Tolerant Networks,” IEEE Transactions on Information Forensics and
Security, Vol. 7, No. 2, April 2012.
[101] F. Li, Y. Yang, and J, Wu, “CPMC: an efficient proximity malware
coping scheme in smartphone-based mobile networks,” in Proc. IEEE
INFOCOM’10, San Diego, 2010, pp. 1–9.
[102] V. Lenders, E, Koukoumidis, P, Zhang, and M, Martonosi,
“Location-based trust for mobile user-generated content: applications,
challenges and implementations,” Proc. the 9th workshop on Mobile
computing systems and applications, Santa Cruz, 2008, pp. 60-64.
18
[103] G. Palla, I. Derenyi, I. Farkas, and T, Vicsek, “Uncovering the
overlapping community structure of complex networks in nature and
society,” Nature, vol. 435, pp. 814–818, Jun. 2005.
[104] S. Fortunato, “Community detection in graphs,” Physics Reports, vol.
486, no. 3-5, pp.75–174, Feb. 2010.
[105] M. Musolesi, and C. Mascolo, “A community based mobility model for ad
hoc network research,” in Proc. ACM REALMAN’06, Florence, 2006, pp.
31–38.
[106] C. Boldrini and A. Passarella, “HCMM: modeling spatial and temporal
properties of human mobility driven by users’ social relationships,”
Computer Commun., vol. 33, no. 9, pp. 1056–1074, Jun. 2010.
[107] S. Yang, X. Yang, C, Zhang, and E, Spyrou, “Using social network theory
for modeling human mobility,” IEEE Network, vol. 24, no. 5, pp. 6–13,
Sep.-Oct. 2010.
[108] V. Borrel, F. Legendre, M. Dias de Amorim, and S. Fdida, “SIMPS: using
sociology for personal mobility,” IEEE/ACM Trans. Net., vol. 17, no. 3,
pp. 831–842, Jun. 2009.
[109] D. Fischer, K. Herrmann, and K. Rothermel, “GeSoMo - a general social
mobility model for delay tolerant networks,” IEEE 7th Int’l. Conf.
Mobile Ad Hoc and Sensor Sys, Stuttgart, 2010, pp. 99–108.
[110] A. Mei, and J. Stefa, “SWIM: a simple model to generate small mobile
worlds,” in Proc. IEEE INFOCOM’09, Rio de Janeiro, 2009, pp.
2106–2113.
[111] K. Lee, S. Hong, S. J. Kim, I. Rhee, and S. Chong, “SLAW: a new
mobility model for human walks,” in Proc. IEEE INFOCOM’09, Rio de
Janeiro, 2009, pp. 855–863.
[112] F. Ekman, A. Keranen, J, Karvo, and J. Ott, “Working day movement
model,” in Proc. 1st ACM SIGMOBILE Wksp. Mobility Models, Hong
Kong, 2008, pp. 33–40.
[113] A. Madan,M. Cebrian, D. Lazer, and A. Pentland, “Social sensing for
epidimiological behavior change,” in Proc. ACM UBICOMP’10,
Copenhagen, 2010, pp. 291–300.
[114] K. Rechert, K. Meier, R. M. Zahoransky, D. Wehrle, D. von Suchodoletz,
B. Greschbach, S. Wohlgemuth, and I. Echizen, “Reclaiming Location
Privacy in Mobile Telephony Networks - Effects and Consequences for
Providers and Subscribers”, IEEE Systems Journal, Vol. 7, No. 2, June
2013, pp. 211-222.
[115] N. Kayastha, D. Niyato, P. Wang, and E. Hossain, “Applications,
architectures, and protocol design issues for mobile social networks: a
survey,” Proceedings of the IEEE, vol. 99, no. 12, pp. 2130–2158, Dec.
2011.
[116] G. Vakili, and S. Khorsandi, “Self-Organized Cooperation Policy Setting
in P2P Systems Based on Reinforcement Learning”, IEEE Systems
Journal, Vol. 7, No. 1, March 2013, pp.151-160.
[117] X. Wang, and S. Li, “Scalable Routing Modeling for Wireless Ad Hoc
Networks by Using Polychromatic Sets”, IEEE Systems Journal, Vol. 7,
No. 1, March 2013, pp. 50-58
|
1806.02377 | 1 | 1806 | 2018-06-06T18:41:32 | Predictive Analysis on Twitter: Techniques and Applications | [
"cs.SI"
] | Predictive analysis of social media data has attracted considerable attention from the research community as well as the business world because of the essential and actionable information it can provide. Over the years, extensive experimentation and analysis for insights have been carried out using Twitter data in various domains such as healthcare, public health, politics, social sciences, and demographics. In this chapter, we discuss techniques, approaches and state-of-the-art applications of predictive analysis of Twitter data. Specifically, we present fine-grained analysis involving aspects such as sentiment, emotion, and the use of domain knowledge in the coarse-grained analysis of Twitter data for making decisions and taking actions, and relate a few success stories. | cs.SI | cs | Predictive Analysis on Twitter: Techniques and
Applications
Ugur Kursuncu1,2, Manas Gaur1, Usha Lokala1, Krishnaprasad Thirunarayan1,
Amit Sheth1, and I. Budak Arpinar2
1Kno.e.sis Center, Wright State University, Dayton, OH, USA
2Department of Computer Science, The University of Georgia, Athens, GA, USA
{ugur,manas,usha,prasad,amit}@knoesis.org
{kursuncu,budak}@uga.edu
Abstract. Predictive analysis of social media data has attracted con-
siderable attention from the research community as well as the business
world because of the essential and actionable information it can pro-
vide. Over the years, extensive experimentation and analysis for insights
have been carried out using Twitter data in various domains such as
healthcare, public health, politics, social sciences, and demographics. In
this chapter, we discuss techniques, approaches and state-of-the-art ap-
plications of predictive analysis of Twitter data. Specifically, we present
fine-grained analysis involving aspects such as sentiment, emotion, and
the use of domain knowledge in the coarse-grained analysis of Twitter
data for making decisions and taking actions, and relate a few success
stories.
Keywords. Social media analysis, Citizen sensing, Community evolu-
tion, Event analysis, Sentiment-emotion-intent analysis, Spatio-temporal-
thematic analysis, Election prediction, Harassment detection, Mental
health, Demographic prediction, Drug trends, Stock Market prediction,
Machine Learning, Semantic Social Computing.
1
Introduction
With the growing popularity of social media and networking platforms as an im-
portant communication and sharing media, they have significantly contributed
to the decision making process in various domains. In the last decade, Twitter
has become a significant source of user-generated data. The number of monthly
active users was 330 million as of third quarter of 2017, and the number of daily
active users was 157 million as of second quarter of 2017. Moreover, nearly 500
million tweets per day are shared on Twitter. Accordingly, significant technical
advancements have been made to process and analyze social media data us-
ing techniques from different fields such as machine learning, natural language
processing, statistics, and semantic web. This amalgamation and interplay of
multiple techniques within a common framework have provided feature-rich an-
alytical tools [1, 2], leading to valid, reliable and robust solutions.
8
1
0
2
n
u
J
6
]
I
S
.
s
c
[
1
v
7
7
3
2
0
.
6
0
8
1
:
v
i
X
r
a
2
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
Twitter provides multimodal data containing text, images, and videos, along
with contextual and social metadata such as temporal and spatial informa-
tion, and information about user connectivity and interactions. This rich user-
generated data plays a significant role in gleaning aggregated signals from the
content and making sense of public opinions and reactions to contemporary is-
sues. Twitter data can be used for predictive analysis in many application areas,
ranging from personal and social to public health and politics. Predictive analyt-
ics on Twitter data comprises a collection of techniques to extract information
and patterns from data, and predict trends, future events, and actions based on
the historical data.
Gaining insights and improving situational awareness on issues that matter
to the public are challenging tasks, and social media can be harnessed for a
better understanding of the pulse of the populace. Accordingly, state-of-the-
art applications, such as Twitris [3] and OSoMe [2], have been developed to
process and analyze big social media data in real time. Regarding availability
and popularity, Twitter data is more common than data from web forums and
Reddit1. It is a rich source of user behavior and opinions. Although analytical
approaches have been developed to process Twitter data, a systematic framework
to efficiently monitor and predict the outcome of events has not been presented.
Such a framework should account for the granularity of the analysis over a variety
of domains such as public health, social science, and politics, and it has been
shown in Figure 1.
We discuss a predictive analysis paradigm for Twitter data considering pre-
diction as a process based on different levels of granularity. This paradigm con-
tains two levels of analysis: fine-grained and coarse-grained. We conduct fine-
grained analysis to make tweet-level predictions on domain independent aspects
such as sentiment, topics, and emotions. On the other hand, we perform coarse-
grained analysis to predict the outcome of a real-world event, by aggregating
and combining fine-grained predictions. In the case of fine-grained prediction, a
predictive model is built by analyzing social media data, and prediction is made
through the application of the model to previously unseen data. Aggregation
and combination of these predictions are made from individual tweets form sig-
nals that can be used for coarse-grained predictive analysis. In essence, low-level
signals from tweets, such as sentiment, emotions, volume, topics of interest, loca-
tion and timeframe, are used to make high-level predictions regarding real-world
events and issues.
In this chapter, we describe use of Twitter data for predictive analysis, with
applications to several different domains. In Section 2, we discuss both processing
and analytic techniques for handling Twitter data and provide details of feature
extraction as well as machine learning algorithms. In Section 3, we explain a
predictive analysis paradigm for Twitter that comprises two levels: fine-grained
and coarse-grained. We also provide use cases, based on real-world events, of
how coarse-grained predictions can be made by deriving more profound insights
about a situation from social media using signals extracted through fine-grained
1 https://goo.gl/Jo1h9U
Predictive Analysis on Twitter: Techniques and Applications
3
Fig. 1. Overview of Predictive Analysis on Twitter Data.
predictions. We also describe common domain-independent building blocks that
can serve as the foundation for domain-specific predictive applications. In Sec-
tion 4, we give further details on specific state-of-the-art applications of Twitter
analytics that have been developed for different domains, such as public health,
social and political issues. In Section 5, we conclude with a discussion of the
impact of social media on the evolvement of real-world events and actions, chal-
lenges to overcome, for broader coverage and more reliable prediction. We also
provide a comparative table relating techniques used with corresponding appli-
cations.
2 Language Understanding of Tweets
Novel processing and analysis techniques are required to understand and de-
rive reliable insights to predict trends and future events from Twitter data due
to their unique nature – it contains slangs, unconventional abbreviations and
grammatical errors as a matter of course. Moreover, due to the evolving nature
of many events, may it be political, sports, or disaster-related, collecting relevant
information as the event unfolds is crucial [4, 5]. Overcoming the challenges posed
by the volume, velocity, and variety of incoming social, big data is non-trivial
[6]. Sole keyword-based crawling suffers from low precision as well as low recall.
For instance, obtaining tweets related to marijuana legislation [7] using its street
name spice pulls irrelevant content about pumpkin spice latte and spice in food.
To improve recall without sacrificing precision, Sheth et al. [8] provided a solu-
tion for adapting and enhancing filtering strategies that (a) obtains customized
tweet streams containing topics of user interest [9] by constructing a hierarchi-
cal knowledge base by analyzing each users tweets and profile information [10],
(b) selects and employs a domain-specific knowledge graph (e.g., using the Drug
TwitterComputational Techniques for Twitter DataML/DL/NLP/Sem. WebTextual ProcessingFeature ExtractionMachine LearningHealthPublic HealthPolitical IssuesSocial IssuesTransportationDisaster ManagementCommunity on Social MediaDemographicsAnomaly & Popularity PredictionSales & Stock PredictionFine-grained AnalysisCoarse-grained AnalysisBackground KnowledgePredictive Analysis Paradigm of TwitterApplication Domains4
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
Abuse Ontology for opioid related analysis [11]) for focus, and (c) reuses a broad
knowledge graph such as DBPedia for coverage and generality. In Twitter data
analysis, the processing phase includes natural language processing using tech-
niques such as TF-IDF, word2vec, stemming, lemmatization, eliminating words
with a rare occurrence, and tokenizing. On the other hand, some of the com-
monly used techniques, such as removal of stop-words, have proven ineffective.
Saif [12] has compared six different stop words identification methods over six
different Twitter datasets using two well-known supervised machine learning
methods and assessed the impact of removing stop words by observing fluctu-
ations in the level of data sparsity, the size of the classifiers feature space and
the classifier performance. Saif concludes that in most cases that removing stop
words from tweets has a negative impact on the classification performance.
2.1 Unique Nature of Tweets
Twitters limit on the number of characters in a message encourages the use of
unconventional abbreviations, misspellings, grammatical errors and slang terms.
For instance, since a tweet was limited to 140 characters (until recent doubling to
280 character in December 2017), different sets of techniques and metadata have
been considered to identify the best features to optimize the overall performance
of the model being built. Due to the heterogeneous nature of the Twitter content,
one can develop a variety of features [13] ranging from textual, linguistic, visual,
semantic, network-oriented, to those based on the tweet and user metadata. Fur-
ther, to handle tweets textual data, the extracted features, techniques and tools
[3, 14, 15] have been customized to exploit as well as being robust concerning
misspellings, abbreviations, and slangs. Gimpel et al. [14] addressed this prob-
lem in the context of part-of-speech (PoS) tagging, by developing a new tagset
along with features specific to tweets, and reported 89% accuracy as opposed to
Stanford tagger with 85% accuracy.
Tweets also include hashtags, URLs, emoticons, mentions, and emoji in their
content. As these components contribute to the meaning of a tweet, it is imper-
ative that we incorporate them in the analysis, on a par with textual content.
Hashtags are meant to help in categorizing tweet's topics. They are fre-
quently used to collect and filter data as well as for sentiment [16–18], emotion
[6], and topical analysis [19, 20]. Wang et al. [16] used hashtags in their topical
hashtag level sentiment analysis incorporating co-occurrence and literal meaning
of hashtags as features in a graph-based model and reported better results com-
pared to a sentiment analysis approach at the tweet level. In emotion analysis,
Wang et al. [6] collected about 2.5 million tweets that contain emotion-related
hashtags such as #excited, #happy, and #annoyed, and used them as the self-
labeled training set for developing a high accuracy, supervised emotion classifier.
URL presence in a tweet is usually indicative the content being an index for
a longer explanatory story pointed to by the URL. Researchers found URLs in
a tweet to be discriminative in various studies such as sentiment analysis [21,
22], popularity prediction [23, 24], spam detection [25]. They reported that the
feature for URL presence in a tweet appeared as a top feature or has a substantial
contribution to the accuracy of the model.
Predictive Analysis on Twitter: Techniques and Applications
5
Emoticons (e.g., :), < 3) have been exploited by Liu et al. [26] in their
Twitter sentiment analysis study, such as by interpreting :) as conveying posi-
tive sentiment and :( as conveying the negative sentiment. They used all tweets
containing those emoticons as self-labeled training set and integrated them with
the manually labeled training set [27]. They have achieved significant improve-
ment over the model trained with only manually labeled data. Go et al. [21],
and other researchers [28, 29] conducted sentiment analysis on Twitter in 2009,
and they found that they were able to achieve a better accuracy using models
trained with emoticon data.
Emoji is a pictorial representation of facial expressions, places, food and
many other objects, being used very often on social media to express opinions
and emotions on contemporary issues of contentions and discussions. The use
of emoji is similar to emoticon since they both provide a shorter means of ex-
pression of an idea and thought. The difference is that an emoji use a small
image for the representation as opposed to emoticon that uses a sequence of
characters. Kelly et al. [30] studied the use of emoji in different contexts by
conducting interviews and found that the use of emoji goes beyond the context
that the designer intended. Novak et al. [31] created an emoji sentiment lexicon
analyzing the sentiment properties of emojis, and they pointed that the emoji
sentiment lexicon can be used along with the lexicon of sentiment-bearing words
to train a sentiment classifier. On the other hand, Miller et al. [32] found that
the emoji provided by different platforms are not interpreted similarly. Wijer-
atne et al. [33] gathered possible meanings of 2,389 emojis in a dataset called
EmojiNet, providing a set of words (e.g., smile), its POS tag (e.g., verb), and
its definition, that is called its sense. It associates 12,904 sense labels with 2,389
emojis, addressing the problem of platform-specific meanings by identifying 40
most confused emoji to a dataset.
2.2 Metadata for Tweet and User
There are mainly two types of metadata in a tweet object, namely, tweet meta-
data2 and user metadata3. Tweet metadata contains temporal and spatial infor-
mation along with user interactions and other information such as replies and
language. On the other hand, user metadata contains information pertaining to
the user that authored the tweet, such as screen-name and description. Some of
the available metadata are described below.
2.2.1 Tweet Metadata
createdAt: This field contains the information on when the tweet was created,
which is especially important when a time series analysis is being done [34].
favoriteCount: The users on Twitter can like a tweet, and this is one way of
interacting with the platform. The number of likes for a tweet has been used as
a feature in various applications that includes trend detection [34], identification
2 TweetObject.https://developer.twitter.com/en/docs/tweets/data-dictionary/overview/
tweet-object
3 UserObject.https://developer.twitter.com/en/docs/tweets/data-dictionary/overview/
user-object
6
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
of influence and popularity.
inReplyToScreenName: If this field of the tweet object is not null, it is a
reply to another tweet, and this field will hold the username of the user that
authored the other tweet. This information is valuable, especially to predict
the engagement of the audience over an issue that tweets relate to, and to find
influential users.
geoLocation: the Twitter platform has a feature that can attach the users
geolocation to the tweet, but this is up to the users to make it publically available.
Most of the users prefer not to share their geolocation.
retweet count: Twitter allows users to repost a tweet by retweeting to their
audience, and the original tweet holds this field to keep how many times this
tweet has been retweeted. This information is useful to incorporate the prediction
of popularity and trending topics.
2.2.2 User Metadata
description: This field holds the description of the account. As this metadata
carries information on characteristics of the user, it is mostly used in user clas-
sification.
followers count: This field holds the number of followers the user has, and as it
is changeable information over time, the information located in a specific tweet
may not be up to date.
friends count: Twitter calls the accounts that a user follows as "friends," but
it is also known as "followees." The numbers of followers and followees are used
to determine the popularity of user and topics.
statuses count: Twitter also calls tweets as status, and in this case, status
count refers to the number of tweets that a user has posted.
2.3 Network and Statistical Features
The users interact on the social networking platform Twitter with each other
through follows, replies, retweets, likes, quotes, and mentions. Centrality metrics
have been developed to compute and reveal users position and their importance
based on their connections in their network. These centrality measures can help
identify influential users. These metrics include in-degree, out-degree, closeness,
betweenness, PageRank and eigenvector centrality. Closeness centrality is defined
by Freeman [35] as the sum of distances from all other nodes, where the distance
from a node to another is defined as the length (in links) of the shortest path
from one to the other. The smaller the closeness centrality value, the more central
the node. Betweenness [36] measures the connectivity of a node by computing
the number of shortest paths which pass through the node. This aspect makes
this node, a user in a Twitter social network, an essential part of the network
as it controls the flow of information in the network. Therefore, removing this
node would disconnect the network. EigenVector [37, 38] metric measures the
importance of a node based on the importance of its connections within the
network. Therefore, the more critical connections a node gets, the more critical
the node becomes. These metrics were used in a user classification application as
Predictive Analysis on Twitter: Techniques and Applications
7
features by Wagner et al. [15] because of the intuition that similar users would
have similar network connectivity characteristics.
Statistical features such as min, max, median, mean, average, standard devia-
tion, skewness, kurtosis, and entropy can be computed for several data attributes
[34]. Machine learning determines a subset of these features that have the dis-
criminative power necessary for particular applications and domains, especially
for predicting user behaviors and user types [39]. For instance, [34] extracted
statistical features of a user, tweet, network. The statistical analysis was done
over attributes such as senders follower count, originators followee count, the
time between two consecutive tweets, and the number of hashtags in a tweet.
They conducted a time series analysis to predict if a trending meme is organic or
promoted by a group. On the other hand, [39] utilized statistical features to pre-
dict the type of users on social media based on their political leanings, ethnicity,
and affinity for a particular business. As they classified users, they computed
statistical characteristics of tweeting behavior of users such as average number
of messages per day, average number of hashtags and URLs per tweet, average
number and standard deviation of tweets per day.
2.4 Machine Learning and Word Embeddings
Machine learning algorithms play a crucial role in the predictive analysis for
modeling relationships between features. It is well-known that there is no uni-
versal optimal algorithm for classification or regression task, and in fact requires
us to tailor the algorithm to the structure of the data and the domain of dis-
course. Recent survey papers [40–43] and our comparative analysis (see Table 1)
of related influential studies show what algorithms we found to perform well for
various applications. As can be seen, this covers a wide variety – Random Forest,
Naive Bayes, Support Vector Machine, Artificial Neural Networks, ARIMA and
Logistic Regression.
Furthermore, deep learning (a.k.a advanced machine learning) enhanced the
performance of learning applications. Deep learning is a strategy to minimize the
human effort without compromising performance. It is because of the ability of
deep neural networks to learn complex representations from data at each layer,
where it mimics learning in the brain by abstraction4. The presence of big data,
GPU, and sufficiently large labeled/unlabeled datasets improve its efficacy. We
discuss some of the applications that make use of deep learning for prediction
task on social media in section 4.
Textual data processing benefits from the lexico-semantic representation of
content. TF-IDF [44], Latent/Hierarchical Dirichlet Allocation(LDA/HDA) [45],
Latent Semantic Analysis (LSA) [46] and Latent Semantic Indexing have been
utilized in prior studies for deriving textual feature representations. In a re-
cent paper [47], they put forward a word embedding approach called Word2Vec
that generates a numerical vector representation of a word that captures its
contextual meaning incorporating its nearby words in a sentence. Training the
word embedding model on a problem-specific corpus is essential for high-quality
4 How do Neural networks mimic the human brain? https://www.marshall.usc.edu/blog/
how-do-neural-networks-mimic-human-brain
8
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
domain-specific applications, since the neighborhood set of words for an input
term impacts its word embedding. For instance, pre-trained models of word2vec
on news corpora generate poor word embeddings over a Twitter corpus. Wijer-
atne et al. [48] used word embeddings to further enhance the prediction of gang
members on Twitter by training their model on a problem-specific corpus.
2.5 Multi-modality on Twitter
Visual elements such as images and videos are often used on social media plat-
forms. While users can attach images and videos to their tweets, they can also
upload a profile image and a header image. Since the latter images are mostly
related to the users characteristics, personality, interest or a personal prefer-
ence, these images are mostly used for classification of account type (e.g., me-
dia, celebrity, company), detection of user groups [49, 48] and identification of
demographic characteristics (e.g., gender, age) [50]. Balasuriya et al. [49] used
the profile image of users in their feature set for finding street gang members
on Twitter since gang members usually set their profile image in a particular
way to intimidate other people and members of rival gangs. They retrieved a set
of 20 words and phrases for each image through the Clarifai5 web service to be
used as features. As image processing is costly regarding time and computational
resources required for training a model to retrieve information from images, it
is usually preferred to use off-the-shelf web services that provide cheaper, yet
effective alternative, for scalable social media analytics.
3 Prediction on Twitter Data
Gaining understanding about and predicting an events outcome and its evolve-
ment over time using social media, requires incorporation of analysis of data
that may differ in granularity and variety. As tools [14, 51] are developed and
customized for Twitter, its dynamic environment requires human involvement
in many aspects. For instance, verification of a classification process [52] and an-
notation of a training dataset [33, 53, 54] are essential in the predictive analysis
that can benefit from human expert guidance in creating ground truth dataset.
Social media analysis in the context of complex and dynamic domains [55–57]
is challenging. Our approach to overcoming this challenge and dealing with a
variety of domains is to customize domain independent building blocks to de-
rive low-level/fine-grained signals from individual tweets. Then, we aggregate
and combine these signals to predict high-level/coarse-grained domain-specific
outcomes and actions with a human in the loop.
3.1 A Predictive Analysis Paradigm for Twitter
We consider predictive analysis on Twitter data as a two-phase approach: The
first phase is fine-grained predictive analysis and the second phase is coarse-
grained predictive analysis. An illustration of this paradigm is depicted in figure
2. The fine-grained analysis is a tweet-level prediction for individual signals,
such as sentiment and emotions, about an event that is being monitored. This
low-level prediction is made by building a predictive model that employs feature
5 https://www.clarifai.com
Predictive Analysis on Twitter: Techniques and Applications
9
Fig. 2. Two level Predictive Analysis Paradigm for Twitter.
engineering and machine learning algorithms. Aggregating the tweet-level pre-
dictions for a specific time frame and location generates signals. For instance,
a predictive model for sentiment predicts the sentiment of each tweet about an
event in question as negative (-1) neutral (0) or positive (+1), and we produce a
signal between -1 and +1 for a particular location and time frame. A collection
of such signals (e.g., emotions, topics) helps domain experts form insights while
monitoring or predicting the outcome of an event, in their higher level analysis.
Extraction of these signals is discussed further in subsequent section.
Coarse-grained analysis is a higher level prediction involving outcomes and
trends of a real-world event, such as elections[58], social movements[59] and dis-
aster coordination[60–63]. In this case, we gather the signals which we generated
from the fine-grained predictions and make a judgment call for the outcome by
making sense of these signals in the context of the event and the related domain.
Sentiment, emotions, volume, topics, and interactions between Twitter users can
be considered as signals, while the importance and informativeness of each of
these parameters may vary depending on the event and its domain. For instance,
gauging the sentiment of a populace towards an electoral candidate would be
very significant to predict the outcome of an election [56], but the same kind
of information may not be as critical in the context of disaster management
because, in the latter case, the sentiment may be largely negative. Further, for
reliable decision making, the sentiment must be interpreted in a broader context.
Predominantly positive sentiment towards democratic candidates in California
is not as significant as that in Ohio. Similarly, the context provided by county
demographics may be crucial in generalizing, predicting, and determining the
outcome of an election. Moreover, temporal and spatial context plays an im-
portant role to understand the ongoing events better and obtain more profound
Feature Extraction•Textual•Linguistic•Metadata•Network•Statistical•VisualFine-grained Predictive AnalysisBuild Predictive ModelGenerate Signals for Coarse-grained PredictionPrediction Making(Coarse-grained)Domain ExpertsSentimentEmotionsTopicsVolumeNetworkIntentHealth Rel. SignalsLocationPreferenceCoarse-grained Predictive Analysis10
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
insights. In US presidential elections, some states, called the swing states (as the
electorates choice has changed between Republican and Democratic candidates
through the previous elections in these states), typically determine the eventual
outcome of US elections. Therefore, narrowing down the analysis to the state
level and gathering signals from these particular states would meaningfully con-
tribute to the prediction of the outcome of the Presidential election and the
future direction of the country.
In general, prediction analytics requires domain-specific labeled datasets cre-
ated with the assistance of domain experts, and customization of feature space,
classification algorithm, and evaluation. Real world events have a dynamic na-
ture in which critical happenings may change the course of discussions on social
media. For example, breaking news about a candidate in an election may change
the vibe in echo chambers of Twitter; thus, affecting the public opinion in one
or another direction. For this reason, it is imperative to conduct the analysis
accounting for essential milestone events happening during the process. There-
fore, the analysis of such events would require an active learning paradigm that
incorporates evolving domain knowledge in real-time.
3.2 Use Cases for Coarse-grained Prediction
Coarse-grained prediction requires taking into account many signals, and eval-
uating them concerning both present and historical context that varies with
location and time frame. Importance of the signals in some domains and their
related events may vary, and sole use of these signals would not be sufficient to
make a reliable judgment call, although these signals are essential parameters in a
real-world event context. For instance, an election usually whips up discussions
on various sub-topics, such as unemployment, foreign policy; and necessitates
proper cultivation of a diverse variety of signals following contextual knowledge
of the domain [56]. We provide two use cases in this subsection to illustrate how
a coarse-grained or high-level predictive analysis can be conducted.
3.2.1 US 2016 Presidential Election
During the 2016 US Presidential elections where swing states played a key role in
determining the outcome, many polling agencies failed to predict it accurately67.
On the other hand, researchers8 conducted a real-time predictive analysis using
a social media analytics platform [3], making the prediction accurately before
the official outcome was announced, by analyzing the state-level signals, such as
from Florida and Ohio. Temporal aspect was also important in this use case to
explain the evolution of the public opinion based on milestone events over the
period of the election, as well as the election day because people tend to express,
who they voted in the same day. They analyzed 60 million tweets by looking at
the sentiment, emotions, volume, and topics narrowing down their analysis to
state-level. On the election day, they focused on specific states such as Florida,
6 http://www.pewresearch.org/fact-tank/2016/11/09/why-2016-election-polls-missed-their-mark/
7 https://goo.gl/mFtzvb
8 https://goo.gl/AJVpKf
Predictive Analysis on Twitter: Techniques and Applications
11
which, before the election day, they predicted would be a pathway for Donald
Trump to win the election9. In their analysis of Florida, volume and positive
emotion (joy) for Trump was higher, whereas positive sentiment for Clinton was
higher, eliciting report10 such as limited to professed votes from Florida until
1pm is not looking in her favor. Later in the day, the volume of tweets for Trump
increased to 75% of all tweets based on the hashtag "#ivoted". Particularly in
critical states of Florida, North Carolina, and Michigan, volume and positive
emotions for Trump were significantly higher than for Clinton, although the
sentiment was countering the overall signal. They made the call that the winner
of Presidency and Congress as Donald Trump and the GOP respectively. While
conducting this analysis [56], they noticed that the predictive model that they
have built for sentiment signal was not successful due to the dynamic nature of
the election with changing topics in conversations. A similar analysis was made
for UK Brexit polls in 2012 by the same researchers, correctly predicting the
outcome utilizing the volume and sentiment signals111213.
3.2.2 US Gun Reform Debate 2018
Researchers14 monitored gun reform discussions on Twitter to predict the public
support using the Twitris platform after the tragic shooting at a high school in
Parkland, Florida, in February 2018. The public started demanding a gun control
policy reform, and it has attracted the attention of legislative and executive
branches of both state and federal governments. As polls measured the public
opinion15, researchers reported that the public support for a gun reform on
social media was increasing over time since the Parkland shooting, confirming the
overall outcome of these polls. They observed that reactions from public on social
media in terms of the volume, sentiment, emotions and topics of interest, are
strongly aligned with the milestone events related to this issue such as (i) POTUS
(President of the United States) meeting with families of the victims on February
21, (ii) CPAC(Conservative Political Action Conference) between February 22
and 24, (iii) POTUS meeting with lawmakers on February 28 expressing strong
support for a gun control policy change. These events significantly affected the
public opinion on social media based on the aforementioned signals.
At the beginning of the gun reform discussions on social media, sentiment
for pro-gun reform tweets was strong whereas the sentiment for anti-gun reform
was relatively weak. However, the CPAC meeting changed the climate on social
media, and it significantly boosted the momentum of anti-gun reform tweets,
especially after the NRA (National Rifle Association) CEO Wayne LaPierres
speech in the morning of February 2216. Overall the volume of tweets for pro-gun
9 https://goo.gl/sh7WNr
10 https://goo.gl/iCqzk3
11 https://goo.gl/i2Ztm6
12 https://goo.gl/dFCGL9
13 https://goo.gl/2EhSma
14 http://blog.knoesis.org/2018/04/debate-on-social-media-for-gun-policy.html
15 http://time.com/5180006/gun-control-support-has-surged-to-its-highest-level-in-25-years/
16 https://goo.gl/kgbqWC
12
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
reform was mostly higher than the anti-gun overhaul, except between February
22 and February 2417, which covers the CPAC meeting where NRA CEO, VP
Pence, and POTUS gave speeches. It surged the volume, positive sentiment and
emotions in anti-gun reform posts radically, and those parameters for pro-gun
reform posts dropped in the same manner. Effect of the meeting lasted a few
days, and boycott calls for NRA and NRAs sponsors started to pick up in the
meantime. After the meeting, sentiment for pro-gun reform tweets increased
consistently, and the emotions expressed in pro-gun reform tweets became more
intensified.
Emotions in anti-gun reform tweets were intense especially during and af-
ter the CPAC meeting, but later emotions in pro-gun reform tweets took over.
Especially volume, positive sentiment, and emotions were overwhelmingly high
right after the POTUS meeting with lawmakers on Wednesday, February 28,
expressing his support for a gun policy reform.
Furthermore, some of the most popular topics that users were discussing
in their tweets included midterm elections, parkland students, boycott the nra,
stupid idea and individual freedoms, where pro-gun reform arguments were ex-
pressed more frequently. The topic of midterm elections being one of the most
popular topics on social media in gun reform discussions, also suggests that
politicians from both Democrats and Republicans sensed the likely effect of this
public opinion change on the midterm elections on November 2018. They have
concluded in their predictive analysis that the public support for gun reform was
significantly higher based on the signals they observed in the context of related
events.
3.3 Extraction of Signals
We make predictions for the outcome of real-world events based on the insights
we collect from big social data, and these insights are extracted as various signals
such as sentiment, emotions, volume, and topics. The sentiment is a qualitative
summary of opinions on a particular issue, and sentiment analysis techniques
are utilized to extract such information computationally. The emotional analy-
sis provides another stream of qualitative summary that is expressed by users
about a particular event. The volume of tweets is an important signal about the
engagement of the public in an event or an issue of consequence. Topical analysis
is a process that extracts topics that contain particular themes in the domain of
interest. We can produce and make use of more specific signals depending on the
domain such as preference, intent, and symptoms. The signals described below
are commonly used parameters in higher level prediction tasks, and we describe
related state-of-the-art applications and their technical details in the following.
3.3.1 Sentiment Analysis
Sentiment is one of the essential signals that can be used to measure the public
opinion about an issue. As users on Twitter express their opinions freely, senti-
ment analysis of tweets attracted the attention of many researchers. Their ap-
17 https://goo.gl/LMFu3B
Predictive Analysis on Twitter: Techniques and Applications
13
proaches differ regarding the feature set, machine learning algorithm, and text
processing techniques. Considering feature set, [18] used n-grams, POS-tags,
emoticons, hashtags and subjectivity lexicon for sentiment analysis. For ma-
chine learning, Naive Bayes, SVM, and Conditional Random Fields (CRF) have
been employed, and Naive Bayes has shown good performance [29]. Also, text
processing techniques like stopwords removal, word-pattern identification, and
punctuation removal have shown to improve sentiment analysis in [17]. Nguyen
et al. [64] used time series analysis to be able to predict the public opinion so
that the stakeholders on a stock market can react or pro-act against the public
opinion by posting balanced messages to revert the public opinion based on the
measurement that they performed using social media. Their objective was to
use the sentiment change over time by identifying key features that contribute
to this change. They measured the sentiment change regarding the fraction of
positive tweets. They employed SVM, logistic regression and decision tree, and
found that SVM and logistic regression provided similar results outperforming
the decision tree. They modeled the sentiment change overall twitter data and
achieved around 73% F-score on sentiment prediction using time series analy-
sis. [65] employs a deep learning approach combining convolutional and gated
recurrent neural network (CGRNN) for a diverse representation of tweets for sen-
timent analysis. Such a system was trained on GloVe word embedding created
on a crawled dataset. The system was ranked among the top 10, evaluated using
average F1 score, average recall, mean absolute error (MAE), Kullback-Leibler
divergence (KLD), and EMD score [66] for SemEval-2016 sub-tasks B, C, D, E.
Exclusion of hand-crafted features and improved performance on SemEval 2016
shows the potency of the approach.
3.3.2 Emotion Analysis
Identification of emotions in tweets can provide valuable information about the
public opinion on an issue. Wang et al. [6] predicted seven categorical emo-
tions from the content of tweets using 131 emotion hashtags and utilizing the
features such as n-grams, emotion lexicon words, part-of-speech tags, and n-
gram positions. They used two machine learning algorithms: LIBLINEAR and
Multinomial Naive Bayes. In a similar study, Lewenberg et al. [54] examined the
relationship between the emotions that users express and their perceived areas of
interest, based on a sample of users. They used Ekmans emotion categories and
crowdsourced the task of examining the users and their tweets content to deter-
mine the emotions as well as their interest areas. They created a tweet-emotion
dataset consisting of over 50,000 labeled tweet-emotion pairs, then trained a lo-
gistic regression model to classify the emotions in tweets according to emotion
categories, using textual, linguistic and tweet metadata features. The model pre-
dicted a users emotion score for each emotion category, and they determined the
user's interest in areas such as sports, movies, technical computing, politics,
news, economics, science, arts, health, and religion.
14
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
3.3.3 Topical Analysis
Topical analysis is one of the essential strategies under the umbrella of infor-
mation extraction techniques that capture semantically relevant topics from the
social media content [67]. Extraction of topics in the context of social media
analysis helps understand the subtopics associated with an event or issue and
what aspects of the issue have attracted the most attention from the public.
As discussed in use cases for elections and gun reform debate, it is imperative
to have the topics extracted from tweets for a better understanding of the un-
derlying dynamics of relevant discussions. Chen et al. [68] associated topics of
interest with their relative sentiment to monitor the change in sentiments on
the extracted topics. Furthermore, utilizing the extracted topics as features for
a supervised model improved the performance of the classification task in [69].
In [70], researchers assessed quality of topics using coherence analysis, context-
sensitive topical PageRank based ranking and probabilistic scoring function. This
approach was used in a crime prediction application [71].
3.3.4 Engagement Analysis
The volume is the size of the dataset that has been collected and indicates the
user engagement on an event being monitored. In general, the larger the dataset,
the better is the accuracy and consistency of a predictive model because it min-
imizes the possibility of bias. Engagement analysis enables human experts to
improve their confidence in the learned representations/patterns for an accurate
high-level prediction. However, while maintaining the sufficient size of the dataset
to make reliable predictions from representative data is critical, data collection
strategies need to be chosen strategically since relying solely on keyword-based
crawling can bring in noise and irrelevant[72] data from a different context into
the dataset. Therefore, a suitable filtering mechanism is essential for better qual-
ity data with high recall as well as precision. A semantic filtering mechanism [8,
73] as in the Twitris platform, can be implemented that selects and employs
a domain-specific knowledge graph (e.g., using the Drug Abuse Ontology for
related opioid analysis [11]) for precision, and reuses a broad knowledge graph
such as DBPedia for coverage and generality (see section 2). Thus, a significant
and relevant dataset can be collected with high recall and precision that will
allow one to obtain insights on the user engagement.
4 Applications
Twitter data has enabled researchers and analysts to deal with diverse domains
ranging from healthcare, finance, and economy to socio-political issues and crisis
management. Approaches to retrieve as much information as possible requires
the inclusion of domain-specific features as well as the use of domain knowledge
in the analysis. In this section, we provide a list of domains where predictive
analysis applications on Twitter were implemented, along with the technical de-
tails. A comprehensive table is also included at the end to give a comparative
overview of application domains, the features and machine learning algorithms
being used, and their performance. The included applications were selected be-
Predictive Analysis on Twitter: Techniques and Applications
15
cause they were state-of-the-art in their respective domains or had been influ-
ential. The applications that we describe in this section combine a variety of
signals that can be the basis for coarse-grained predictive analysis. Since some
of the applications in this section make use of the Twitris platform; therefore,
we first provide background information about the platform. Purohit et al. [1]
introduced the Twitris platform for citizen sensing that performs analysis of
tweets, complemented by shared information from contextually relevant Web
of Data and background knowledge. They describe it as a scalable and interac-
tive platform which continuously collects, integrates, and analyzes tweets to give
more profound insights. They demonstrate the capabilities of the platform with
an analysis in various dimensions including spatio-temporal-thematic, people-
content network, and sentiment-emotion-subjectivity, with examples from busi-
ness intelligence including brand tracking, advertising campaigns, social/political
unrests, and disaster events.
4.1 Healthcare
Twitter data can be employed to shed light on many healthcare and disease-
related aspects of contemporary interest, ranging from Alzheimer and dementia
progression [74] to eating disorders [75] and mental health problems [76, 77].
We focus on applications to glean depression in individuals or at a community
level using self-reports about these conditions, their consequences, and patient
experiences on Twitter.
Depression is a condition that a sizable population in all walks of life ex-
periences in their daily life. Social media platforms including Twitter has been
used to voluntarily express the mood changes and feelings as they arise. From
these tweets, it is possible to predict whether a user is depressed or not, what
symptoms they show as well as the reasons for their depressive mood. Some
examples indicative of depression as expressed in tweets18 include: "I live such
a pathetic life.", "Cross the line if you feel insecure about every aspect of your
life." ,"That's how depression hits. You wake up one morning afraid that you're
going to live.", and "Secretly having a mental breakdown because nothing is
going right and all motivation is lost.". These tweets epitomize the expression of
emotional tumult that may underlie subsequent conscious actions in the physical
world.
An interesting study by Yazdavar et al. [76] explored the detection of clinical
depression from tweets by mimicking the PHQ-9 questionnaire which clinicians
administer to detect depression in patients. This study is different from tradi-
tional clinical studies that use questionnaires and self-reported surveys. They
crawled 23M tweets over 45K twitter users to uncover nine significant depres-
sive symptoms; (1) Lack of Interest, (2) Feeling Down, (3) Sleep Disorder, (4)
Lack of Energy, (5) Eating Disorder, (6) Low Self-esteem, (7) Concentration
Problems, (8) Hyper/Lower Activity, and (9) Suicidal Thoughts. A probabilistic
topic model with a semi-supervised approach is developed to assess clinical de-
pression symptoms. This hybrid approach is semi-supervised in that it exploits a
18 These tweets were modified before we share them in this chapter.
16
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
lexicon of depression symptoms as background information (top-down) and com-
bines it with generative model gleaned from the social media data (bottom-up)
to achieve a precision of 72% on unstructured text.
De Choudhury et al. [53] predicted the depression in an individual by exploit-
ing their tweets. For ground truth dataset, they used, crowdsourcing to collect
and label data. They utilized tweet metadata, network, statistical, textual and
linguistic features, and time series analysis over a year of data to train an SVM
model, obtaining an accuracy of 0.72.
The extraction of the location of people who experience depression using tex-
tual and network features can further assist in locating depression help centers.
[78] utilizes a multiview19 and deep learning based model, to predict the user
location. The multi-entry neural network architecture (MENET) developed for
location prediction uses words, the semantics of the paragraph (using doc2vec
[79]), network features and topology (using node2vec [80]) and time-stamps to
deduce users location. They achieved an accuracy over 60% for GeoText20, UT-
Geo1121 and 55% for TwitterWorld[81]. Furthermore, MENET achieves an ac-
curacy of 76% in region classification and 64.4% in state classification using
GeoText dataset.
4.2 Public Health
Social media platforms including web forums, Reddit and Twitter, has become
a venue where people seek advice and provide feedback for problems concern-
ing public health. These conversations can be leveraged to predict trends in
health-related issues that may threaten the well-being of the society. Moreover,
caregivers have also seen these sources to be a game changer in its potential for
actionable insights because of the information circulation. Particularly, cannabis
legalization issue in the U.S. has been a trending topic22 in the country as well
as social media. Prior research on Twitter data analysis in this domain proved
that it is an essential tool for epidemiological prediction of emerging trends.
Existing studies have involved identifying syntactic and statistical features
for public health informatics, such as PREDOSE (PRescription Drug abuse On-
line Surveillance and Epidemiology) which is a semantic web platform that uses
the web of data, background domain knowledge and manually created drug abuse
ontology for extraction of contextual information from unstructured social me-
dia content. PREDOSE performs lexical, pattern recognition (e.g., slang term
identification), trend analysis, triple extraction (subject-predicate-object) and
content analysis. It is helpful in detecting substance abuse involving marijuana
and related products. Not only can it analyze generic marijuana but also its
concentrates like butane hash oil, dabs, and earwax that are used in the form
of vaporizers or inhalers. In a similar analysis of Twitter data, the marijuana
concentrate use and its trends were identified in states where cannabis was le-
19 http://www.wcci2016.org/document/tutorials/ijcnn8.pdf
20 https://www.cs.cmu.edu/~ark/GeoText/README.txt
21 http://www.cs.utexas.edu/~roller/research/kd/corpus/README.txt
22 http://www.pewresearch.org/fact-tank/2018/01/05/americans-support-marijuana-legalization/
ft_18-01-05_marijuana_line_update/
Predictive Analysis on Twitter: Techniques and Applications
17
galized as well as not legalized. In 2014, utilizing the eDrugTrends23 Twitris
platform, researchers collected a total of 125,255 tweets for a two-month period,
and 22% of these tweets have state-level location information[82]. They found
that the percentage of dabs-related tweets was highest in states that allowed
recreational or medicinal cannabis use and lowest in states that have not passed
medical cannabis laws, where the differences were statistically significant. A sim-
ilar study in 2015 [83] reported adverse effects of Cannabis edibles and estimated
the relationship between edibles-related tweeting activity and local cannabis leg-
islation. Another study [82] was to automatically classify drug-related tweets by
user type and the source of communication as to what type of user has authored
the tweet, where the user types are defined as user, retailer and media. They
employed supervised machine learning techniques incorporating the sentiment
of tweets (e.g., positive, negative, neutral).
4.3 Political Issues
Political discussions on Twitter, which capture dynamic evolvement of public
opinion, can directly impact the outcome of any political process. Arab Spring
demonstrations [84–86] in the middle eastern countries, Gezi protests [87, 85] in
Turkey, as well as US Presidential elections in 2016 involving influence peddling
on several social media platforms [88] provide impactful illustrative examples.
Researchers have explored user classification and profiling in the context of such
political events on Twitter to predict the issue trends and eventual outcome.
Researchers [39, 89, 90] used Twitter data to predict political opinions of
users based on linguistic characteristics (e.g., Tf-IDF) of their tweet content.
While classification of users based on their political stance on Twitter has been
well studied, Cohen et al. [91] have claimed that much of the studies and their
datasets to date have covered very narrow portion of the Twittersphere, and
their approaches were not transferable to other datasets. Pennacchiotti et al.
[39] focused on the user profiling task on Twitter, and used user-centric features
such as profile, linguistic, behavioral, social and statistical information, to detect
their political leanings, ethnicity, and affinity for a particular business.
Moreover, prediction of dynamic groups of users has been employed [58] to
monitor the polarity during a political event by analyzing tweeting behavior and
content through clustering. Usage of hashtags and URL, retweeting behaviors
and semantic associations between different events were key to clustering. 56%
of the Twitter users participated in 2012 US Republican Primaries by posting
at least one tweet, while 8% of the users tweeted more than 10 tweets. 35%
of all users mostly retweet, separating them from the remaining. In terms of
dynamic user groups, they formed the following bilateral groups: silent majority
and vocal minority, high and low engaged users, right and left-leaning users,
where users were from different political beliefs and ages. They analyzed these
dynamic groups of users to predict the election outcomes of Super Tuesday
primaries in 10 states. They also reported that the characterization of users by
tweet properties (frequency of engagement, tweet mode, and type of content) and
23 http://wiki.knoesis.org/index.php/EDrugTrends
18
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
political preference provided insights to make reliable predictions. 8 weeks of data
comprising 6,008,062 tweets from 933,343 users about 4 Republican candidates:
Newt Gingrich, Ron Paul, Mitt Romney and Rick Santorum, was analyzed to
assess the accuracy of predicting the winner. Prediction of user location using
a knowledge base such as LinkedGeoData24 in tweets also contributed to the
election prediction. Furthermore, an error of 0.1 between the prediction and
actual votes attest to the efficacy of the approach. Such a low error rate in
prediction is attributed to original tweets (not retweets) from users who are
highly engaged and right leaned.
4.4 Social Issues
Social issues and related events have been a part of discussions on Twitter, which
gives opportunities to the researchers to address problems concerning individuals
as well as the society at large. Solutions to such problems can be provided by
measuring public opinion and identification of cues for detrimental behavior on
Twitter by employing predictive analysis. We explain three problems and their
respective solutions in this subsection.
4.4.1 Harassment
Harassment25 is defined as an act of bullying an individual through aggressive of-
fensive word exchanges leading to emotional distress, withdrawal from social me-
dia and then life. According to a survey from Pew Research Center26, 73% of the
adult internet users have observed, and 40% have experienced harassment, where
66% percent of them are attributed to social media platforms. Also, according
to a report from Cyberbullying27 research center, 25% of teenagers claimed to
be humiliated online. While it is imperative to solve this problem, frequency
and severe repercussions of online harassment exhibit social and technological
challenges.
Prior work [92] has modeled harassment on social media to identify the ha-
rassing content which was a binary classification approach. However, in their
predictive analysis, the context, network of users and dynamically evolving com-
munities shed more light on the activity than pure content-based analysis. For in-
stance, sarcastic communication between two friends on social media may not be
conceived as harassment while the aggressive conversation between two strangers
can be considered as an example of bullying. For reliably identifying and predict-
ing harassment on Twitter, it is essential to detect language-oriented features
(e.g., negation, offensive words), emotions, and intent. [93] employs machine
learning algorithms along with word embedding, and DBpedia knowledge graph
to capture the context of the tweets and user profiles for harassment prediction.
Edupuganti et al. [94] focused on reliable detection of harassment on Twit-
ter by better understanding the context in which a pair of users is exchanging
messages, thereby improving precision. Specifically, it uses a comprehensive set
24 http://linkedgeodata.org/About
25 http://wiki.knoesis.org/index.php/Context-Aware_Harassment_Detection_on_Social_Media
26 http://www.pewinternet.org/2014/10/22/online-harassment/
27 http://cyberbullying.us/facts
Predictive Analysis on Twitter: Techniques and Applications
19
of features involving content, profiles of users exchanging messages, and the se-
quence of messages, we call conversation. By analyzing the conversation between
users and features such as change of behavior during their conversation, length
of conversation and frequency of curse words, the harassment prediction can be
significantly improved over merely using content features and user profile infor-
mation. Experimental results demonstrate that the comprehensive set of features
used in our supervised machine learning classifier achieves F-score of 88.2 and
Receiver Operating Characteristic (ROC) of 94.3. Kandakatla et al. [95] presents
a system that identifies offensive videos on YouTube by characterizing features
that can be used to predict offensive videos efficiently and reliably. It exploits
using content and metadata available for each YouTube video such as comments,
title, description, and the number of views to develop Nave Bayes and Support
Vector Machine classifiers.The training dataset of 300 videos and test dataset of
86 videos were collected, and the classifier obtained an F-Score of 0.86.
4.4.2 Gang Communities & Their Members and Gun Violence
Gang communities and their members have been using Twitter to subdue their
rivals, and identification of such users on Twitter facilitates the law enforcement
agencies to anticipate the crime before it can happen. Balasuriya et al. [49] in-
vestigated conversations for finding street gang members on Twitter. A review
of the profiles of gang members segregates them from rest of the Twitter popu-
lation by checking hashtags, YouTube links, and emojis in their content [96]. In
[49], nearly 400 gang member profiles were manually identified using seed terms,
including gang affiliated rappers, their retweeters, followers as well as followees.
They used textual features of the tweet, YouTube video descriptions and com-
ments, emojis and profile pictures to power various machine learning algorithms
including Naive Bayes, Logistic Regression, Random Forest and Support Vec-
tor Machines, to train the model. Random Forest performed well for Gang and
Non-Gang classification. It is interesting to notice that gang members usually
make use of their profile images in a specific way to intimidate other people and
members of rival gangs.
As gun control policies in big cities, such as Chicago, have changed over the
years, the volume of the taunting and threatening conversations on social media
has also relatively increased [97]. Such conversations can be leveraged to assist
law enforcement officers by providing insights on situational awareness as well
as predicting a conflict between gang groups for a possible gun violence inci-
dent. Blevins et al. [97] used a Twitter dataset that was manually labeled by
a team of researchers with expertise in cyber-bullying, urban-based youth vio-
lence and qualitative studies. Their strategy was to collect all tweets, mentions,
replies, and retweets from a specific user profile between 29 March and 17 April
2014. Three experts developed the key types of content and used the work by
Bushman and Huesmann [98] to identify and categorize types of aggression. To
overcome the challenge of recognizing special slang terms and local jargons in
tweets as mentioned in Desmond et al. work, Blevins et al.[97] developed a part-
of-speech (POS) tagger for the gang jargon and mapped the vocabulary they
20
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
use to Standard English using machine translation alignment. They developed
emotion classifier that uses the extracted POS tags, and Dictionary of Affect in
Language (DAL) quantitative scores (Whissell, 2009) as key features. Ternary
classification is applied to the whole dataset (TCF) and binary classification
on the aggression-loss subset (BCS). Then they use a cascading classifier (CC),
which uses two SVM models. Initially, one SVM model is used to filter the tweets
into aggression/loss tweets, and all other tweets fall into the other category. After
this filtration, only aggression/loss tweets is passed to second SVM model which
is again a binary classifier for loss or aggression. So this Aggression Supervised
classifier is able to categorize loss with 62.3% F-score and aggression with 63.6%
F-score which beats the baseline model (Unigrams) by 13.7 points (aggression)
and 5.8 points (loss) [97].
4.5 Transportation
Congestion due to traffic is one of the prevalent problems in the United States
(U.S.). Even after having structured rules that govern the flow of the traffic in
the U.S., congestion due to non-recurring activities still affects the schedules
of people. However, the stationing of police officers to smooth the traffic is a
probable solution, although it would not be long-term. Having an estimation of
the flow of traffic in the advent of an event can help people to re-route their
path to the destination. Leveraging social media and machine learning to esti-
mate traffic is one such long-term solution that can be drafted for active traffic
monitoring. Social media is flooded with posts from people about an event. Such
posts can provide the location of the event or the tweeter, and it can be used
along with other textual features to estimate the traffic flow. In [99], textual fea-
tures, tweet and user-metadata such as text, hashtags, URLs, number of users
and retweeted tweets were used by combining with live event data to predict
traffic dynamics. They utilized autoregressive model, neural network, support
vector regression, and K-nearest neighbor for traffic prediction. The evaluation
was performed using mean absolute percentage error (MAPE), and root means
square error (RMSE), with support vector regression (SVR) performing better
over other regression models. SVR reduced the error in traffic prediction by 24%
in terms of RMSE.
4.6 Location Estimation
Social media serves a vital role in times when people struggle to survive a disas-
trous event such as hurricane or earthquake, to provide solutions for assisting the
public in recovery efforts. These solutions include identification of the demand
and its location, and mapping the identified demands with suitable suppliers
analyzing Twitter data.
In particular, location extraction plays a significant role in identifying the
area that is impacted by a disaster as well as providing assistance [100]. Mah-
mud et al. [101] developed an approach to predict the location of users at the
city level on Twitter combining several classifiers. They removed stop words,
performed part-of-speech tagging, extracted hashtags, and extracted a feature
called local term, a term used by local people to refer to the city. For detecting
Predictive Analysis on Twitter: Techniques and Applications
21
the local terms, several classification algorithms and found Nave Bayes, SVM and
Decision trees (J48) as the best performing algorithms. Al-Olimat et al. [102]
developed a tool called LNEx (Location Name Extraction), that extracts the lo-
cation from the tweet content by utilizing the OpenStreetMap[103], GeoNames
[104] and DBpedia [105] for disambiguation. The information retrieval process
from the tweet is two-fold, which are toponym extraction and geoparsing. To-
ponym is a process to extract city and street names, points of interest, from
unstructured text, tweets in particular for this study. Location names are usu-
ally abbreviated on Twitter; hence, a text normalization procedure is used for
expansion of such brevity. For instance, tweets may contain Rd as an abbrevi-
ation, and it is normalized to road. Furthermore, ambiguous location problems
are resolved by employing the geoparsing procedure using the OpenStreetMap
API28. LNEx improved the average F-Score by 98-145%, outperforming all the
state of art taggers.
4.7 Community on Social Media
People with distinct feelings, expression, solutions, and intelligence, share their
opinions on Twitter. Such a diversified content can be related to elections, foot-
ball game or a domain that is influenced by public views. With the abundance
of textual data, one can envision the power of collective intelligence that can be
harnessed for a wise recommendation, judgment and strategy building. Also, it is
a known fact that a judgment call made by a crowd is superior to an individuals
decision [106]. Formation of a diverse group can improve the decision-making
process through what is known as Wisdom of Crowd (WoC). WoC is meant to
minimize regional biases that may cloud objectivity associated with individuals
judgment and bring together different perspectives and knowledge that can en-
hance coverage and comprehensiveness of the analysis. For example, WoC can be
used to design a portfolio of stocks that maximize the profit in the stock market
trading. However, no existing work illustrates the notion of WoC statistically
and analytically. A methodological way for measuring the diversity of the crowd
is crucial to the rise of human social engagement on social media. According to
a recent survey from Pew Research Center, 76% of the American population is
active on social media. It attributes success to a significant amount of online
data and can aid in creating WoC of the social system. In [107], fantasy premier
league (FPL) is considered to exercise the better judgment of the diverse crowd.
In their work, they predict the best performing team captain in the premier
league, an element dictating the success of a team, based on the scores retrieved
from the fantasy football and content of Twitter users. They utilized Word2vec
similarity measure to quantify the diversity of two groups of users during cap-
tain selection in FPL. Furthermore, They defined and validated their statistical
objective scoring criteria to measure the quality of crowd judgment.
4.8 Demographics
In many applications, demographic information is a key to analysis that depends
on different segments of the population concerning age groups, ethnicity, and
28 https://wiki.openstreetmap.org/wiki/API_v0.6
22
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
gender. For example, age is critical for understanding drug abuse, while gender
is critical to understand vulnerability to depression. Twitter in its current state
does not require users to provide any demographic information.
4.8.1 Age Estimation using social media
Researchers developed a machine learning system coupled with the DBpedia
knowledge graph utilizing the user follower-followee networks to predict the most
probable age of a Twitter user, in [108]. They gathered pre-identified famous
people from DBpedia, based on their occupations and areas of interest, which
also included their birth dates. Then they extracted a sample of 23,120 users who
are in one/two hops of follower-followee network of famous people. Some of the
user profiles were spam/bot and hence they were removed. Then they selected
16K users among the followers of the top 50 famous figures as their training set
and 8K as their testing set. They achieved 84% accuracy in predicting the age of
these users. They selected Support Vector Regression (SVR) with K-Fold Cross
Validation [109] as their best performing model after evaluating using Linear
Regression [110], Least Absolute Shrinkage and Selection Operator (LASSO)
[111], and ElasticNet [112].
Zhang et al. [113] studied the problem of age prediction on Twitter, using
SVM and least square optimization algorithm in building the model. They uti-
lized various features such as linguistic, textual, and network, to improve their
model, achieving an F1 score of 0.81. They discovered that the characteristics
of users in the same age groups have similar content and interactions between
each other. On the other hand, Nguyen et al. [114] investigated the relationship
between the language used in tweets of a user and his/her age. They annotated
the dataset that was collected following a guideline formed based on the tweet
content of users in different age groups such as explicit or implicit age or life
stage mentions. They found that the language use of people in same age groups
is similar regarding the word and phrase selections as well as the topics that
they are talking about. For instance, the following two sets of words, school,
son, daughter, wish, enjoy, thanks, take care and haha, xd, internship, school
have been used by users in two different age groups. In their analysis, they used
linear and logistic regression models with unigram feature only, achieving an F1
score of 0.76.
4.8.2 Gender Estimation using Twitter
Estimation of the gender of a twitter user is beneficial to the analysis of Twit-
ter data for health-related, drug abuse, and harassment activities. Existing ap-
proaches utilized statistical features [115] and seldom involved background knowl-
edge along with social information. In [116], a dataset from Sina Weibo, which
is a counterpart of the micro-blogging platform Twitter, in China, was used to
assess their methodology for gender prediction. [117] exploits online behavioral
and textual features and choice of vocabulary for each user. Online behavioral
features include the number of fans, attention, messages, comments, forwards
and a ratio of original/forwarded messages. Textual features include hashtags,
Predictive Analysis on Twitter: Techniques and Applications
23
URLs, emoticons, and sentence length. They also made use of username and pic-
tures in content. Lexical features were extracted from the content using TF-IDF.
They used four algorithms for predicting gender: Decision Tree, Naive Bayes, Lo-
gistic Regression and Support Vector Machines (SVMs), and found that SVM
outperformed other classifiers by attaining accuracy of 94.3%.
4.9 Anomaly & Popularity Prediction
Twitter has become a playground for spammers. While public conversations on
Twitter are diverse and challenging to analyze and summarize, spammers and
bots further complicate the reliability of the outcome. Bots are automated soft-
ware that is programmed to post a predefined content. They are being used
mostly to propagate or promote bias and skew votes in politics, views on so-
cial issues, or provide impetus to promotional campaigns. On the other hand,
prediction of the popularity of trending topics or issues requires robust analysis
that takes into account anomalous accounts.
Thomas et al. [25] collected 1.8 billion tweets sent by 32.9 million users and
manually identified 1.1 million suspended accounts as spammer accounts along
with 80 million anomalous tweets. They used user behavior regarding interac-
tions with other users, public Twitter handler service usage and textual features
of tweet content such as shortened URLs created using free web hosting services.
Volkova et al. [118] also studied this problem by applying a deep learning tech-
nique, Recurrent Neural Networks (RNN), using tweet metadata and network
features. They compared their approach with state-of-the-art machine learning
methods such as log-linear models. Their RNN model outperformed all the ma-
chine learning models built using various combinations of features with 0.95
F1 score. Sentiment has also been used in spam detection works [119, 120] as
a feature to detect bots on Twitter. Varol et al. [120] also studied the detec-
tion of online bots on Twitter, and utilized Random Forests, AdaBoost, Logistic
Regression and Decision Tree algorithms. They found Random Forest classifier
achieved the best performance with 0.95 AUC score. They made use of senti-
ment features that they extracted from the text beside tweet and user metadata,
textual, linguistic and network features.
Poblete et al. [121] have investigated the tweet credibility issue in the news
disseminated on the platform. They crowdsourced the task of evaluating the
credibility of each tweet to determine if it has newsworthy topics, labeling each
tweet using automated credibility analysis. Labels given by crowdsourcing pro-
cess were used in the training phase. They used SVM, decision trees, decision
rules and Bayesian networks, and best results were given by J48 decision tree,
achieving an 86% F1 score. Ross et al. [122] created a robust and general feature
set for learning to rank tweets based on credibility and newsworthiness. In pre-
vious works by Gupta et al. [123–125], they have demonstrated that when the
training and testing data are from two distinct time periods, the ranker performs
poorly. Ross et al. [122] improved upon this by creating a feature set that does
not overfit a particular year or a set of topics, which is critical for robust analysis
of social media over time and across different domains.
Varol et al. [34] conducted a time series analysis to predict if a trending meme
24
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
is organic or promoted by a group. They aimed to predict memes that have
potential to trend before it becomes trending; therefore, the task of predicting
trends is naturally forced to utilize a sparse dataset. For this reason, they had
to reliably extract textual, linguistic, tweet and user metadata, network and
statistical features, from a small dataset. They used three learning algorithms
namely, K-Nearest Neighbor (KNN) with Dynamic Time Warping (KNN-DTW),
Symbolic Aggregate approXimation with Vector Space Model (SAX-VSM) and
KNN. KNN is a machine learning algorithm for classification and DTW for
multi-dimensional time series. They found KNN-DTW and KNN showed the
best performance in prediction. They used AUC as evaluation metric to measure
accuracy because it is not biased by the imbalance in classes (e.g., 75 promoted
trends versus 852 organic ones). Weng et al. [126] studied the prediction of the
popularity of meme on Twitter. They relied mostly on network features besides
tweet and user metadata, using random forest and linear regression. They ex-
tracted 13 features such as some early adopters, average shortest network path
length between users, the diameter between users, and the number of infected
communities. They built their model using random forest and tested against five
different baselines that used linear regression along with different combinations
of the 13 features. Their model achieved 0.85 F1 score, outperforming the base-
lines. Kobayashi et al. [127] predicted the popularity of a tweet in terms of the
number of retweets in a time window in the future. They used time series anal-
ysis using a method called time-dependent Hawkes process (TiDeH) calculating
infectious rate and using tweet and user metadata such as temporal information
from a tweet and number of followers of a user. They evaluated their system
against other existing methods that incorporated linear regression and Poisson
process and reported that it outperformed other approaches achieving around
5% mean error rate. Tsur et al. [128] also studied the popularity of hashtags
on Twitter, through linguistic features of the tweet text, specifically hashtags.
They obtained promising results using a modified version of Gradient Boosted
Trees called Gradient Boosted rank. They compared their approach with SVM
and Least-effort algorithms, obtaining 0.11 mean error rate. Ruan et al. [129]
predicted the volume of tweets, analyzing the user behavior on individual as
well as collective level. Besides tweeting activity and content analysis of users,
they utilized the underlying follower-followee network, user network structure,
neighboring friends influence and user past activity as features. They used lin-
ear regression model with multiple features that include network structure, user
interaction, content characteristics and past activity, and found that combining
features yields the best performance.
4.10 Sales & Stock Price Prediction
As social media, particularly Twitter, users share their satisfaction or frustration
with products on the platform, these user reviews can be exploited by companies
to generate actionable insights to meet customer expectations and eventually
provide better quality products and services. Industrial applications of predictive
analysis of social media have been gradually adopted, to gain the understanding
Predictive Analysis on Twitter: Techniques and Applications
25
Table 1. Comparative Analysis of Applications and their Evaluation. Acronyms for
Algorithms and Features are described in Table 2
Ref. & Evaluation
Application
Algorithms
Features
User Profiling
User Classification
SVM
LinR
CNN
RF
NB
LogR, LASSO
UsM, TwM
Ling, Nw,
Stat, Txt
Vis
[39]
F1=0.88
[113] F1=0.81
[130] F1=0.59
[131] F1=0.83
[49]
F1=0.77
[132] Acc=0.82
[89] Acc=0.92
F1=∼0.75
[90]
[114] F1=0.76
[54] AUC=∼0.7
[15] AUC=0.8
[108] Acc=0.84
[53] Acc=0.72
F1=0.62
[133]
User Attitude, Personality,
and Mood Prediction
SVM, NB, RF
TwM, Txt, Ling,
Nw, Stat
[134] AUC=0.8
Sales & Stock price prediction NB, RF, SVM
TwM
[59] Med error=0.32 Social and Political events,
[135]] F1=0.58
Elections, Collective action
[136] Acc=0.85
[137] AUC=0.91
PosR
NBR, SVM,
LogR, CNN, RF
TwM, UsM
Txt, Ling, Nw
[34] AUC=0.95
[126] F1=∼0.85
[127] Mean err= ∼0.179
[128] Mean err=∼0.11
Popularity prediction
KNN-DTW, SAX-VSM, Txt
KNN, RF,
TiDeH, LinR, LogR
GrB, SVM
Nw and Stat,
TwM and UsM
Ling
Spam bot detection
Troll detection
Credibility prediction
KNN-DTW, SAX-VSM, Text, Nw,
KNN, LinR, DT
NB, GrB
RF, AdB,
BNet, RNN,
SVM, LogR
Ling, TwM, UsM
Stat, Vis
Sentiment analysis
Emotion Detection
NB, SVM, CRF,
Ling,
LibLin, RBF-NN, AdB, Txt,
TwM
RT, REPTree,
BNet, LogR
and UsM
[25] Acc=0.89
[34] AUC=0.95
[119] AUC=0.73
[118] F1= 0.95
[138] F1=0.99
[120] AUC=0.95
[121] F1=0.86
[17] Pre=∼0.80
[16] F1=0.77
[18] F1=0.67
[22] F1=∼0.60
[29] F0.5=0.62
[21] Acc=0.82
[6] Acc=0.61
[139] Mean error=0.071
[140] Acc=∼0.71
[141] F0.5= 0.76
F1=∼0.73
[64]
F1=0.79
[26]
[101] Acc=∼0.83
[142] Mean error=0.39
[143] Acc=0.88
[144] Acc=0.79
Location Estimation
Traffic Estimation
NB, SVM, DT,
LinR, MxEnt
Ling, TwM, UsM
Txt
[145] F1= 0.70
[146] Pre=0.86
Finding Important Users,
Community Detection
RNN, SVM
Nw, UsM, Txt
[147] LFK-NMI=0.13 Topic Extraction,
[148] F1=0.63
Meme Extraction
HiCl, KM, LDA, SVM Txt, Ling, TwM, UsM
Nw
[149] Acc=0.84
[150] AUC=0.83
[151] F= 0.8736
[83] K Alpha=0.84
Public Health
Health-care
NB,
SVM, RF
LDA, ssToT
Txt, Ling, TwM
Sentiment,
[102]
F1=0.81
[152] R2= 0.67
Disaster Management
LogR
Txt, Ling, UsM, TwM
Nw
26
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
of the market. Some of the use-cases that have adopted social media data for
decision making are for:
1. Improvement of Customer Service: Delta Airline exploited social media to
identify the reasons for customer frustration. For instance, lost luggage or
poor service.
2. New Products Research and Development: JD Power quality assessment has
determined that car company modify car seats based user sentiments on the
social sphere [153].
3. Key Influencers: A cosmetics company L'Oreal uses social media follower-
followee network to find Influencers for promotions29.
4. Recommendations through deep learning: YouTube utilizes the deep neural
network to enhance their recommendation system using implicit feedback by
analyzing users comments and videos of interest [154].
Georgiev et al. [134] investigated the question of how the Olympic Games
impacted the sales of businesses in London. They used Twitter posts along with
the check-ins through Foursquare platform to extract mostly location-specific
features from tweet text and tweet metadata, such as the distance of businesses
to stadiums and sponsor businesses, transitions to entertainment places and
social areas. They evaluated their work using AUC, for Nave Bayes, Random
Forest, and SVM algorithms and reported that SVM performed best with 0.8 of
AUC.
[155] employs feed-forward network (FF) for predicting the likelihood of a
customer to buy a product. They restricted their dataset to tweets about mobile
phones and cameras, expensive products that people often buy after doing some
research online. Before predicting the likelihood of purchasing a product, they
predicted whether a tweet represents the respective users purchasing behavior.
Then they predict whether the user will purchase the product after 60 days time
window of tweeting. They compared the performance of their approach with
Long Short Term Memory (LSTM), Recurrent Neural Networks (RNNs) (with
varying dropout rates) based implementation and observed that their approach
with FF surpasses others by small margins. FF learning cycle involved RM-
Sprop [156], sigmoid activations and negative log-likelihood function with batch
training.
5 Conclusion
Twitter has positioned itself as an essential part of the social media environment
becoming an emergent communication medium. This development has opened
up new opportunities for researchers to gauge the pulse of the populace reliably
and use that to study public opinion, form policies, understand the impact of
events, and find newer ways to address certain problems. Social media data has
already enabled researchers to predict the trends and outcomes of several crit-
ical real-world events, and its reliability and coverage can further be improved
29 https://www.socialmediatoday.com/special-columns/adhutchinson/2015-09-09/big-brand-
theory-loreal-stays-connected-their-audience
Predictive Analysis on Twitter: Techniques and Applications
27
by incorporating background knowledge [85, 20]. Specifically, monitoring the en-
gagement and public opinion about ongoing events from temporal and spatial
perspectives can foretell their evolution as well as the outcome. Moreover, this
information can complement traditional surveys or polls that are conducted by
non-government agencies to improve our confidence in the prediction, as tradi-
tional methods alone can be misleading or sluggish in reacting to rapidly chang-
ing events. In order to account for the complex decision making that requires
consideration of a number of factors that can impact a situation or an event,
incorporation of as many signals as possible in comprehending the big picture
is necessary. We have explored a predictive analysis paradigm that comprises
two levels of prediction, using coarse-grained analysis built upon fine-grained
analysis. Such analysis have been conducted with creditable success for events
such as elections, gun violence, drug misuse or illicit drug use [3].
In this chapter, we have discussed processes, algorithms, and applications
concerning predictive analysis in different domains. We illustrated fine-grained
analysis by customizing domain-independent approaches to extract signals such
as sentiment, emotions, and topics through the application of machine learning
models, and coarse-grained analysis by aggregating and cultivating the signals to
make predictions. We have also provided details of related prominent studies in
ten different domains such as healthcare, public health, political and social issues,
disaster management, sales and stock prediction, and demographics. The follow-
ing table summarizes related work describing various applications and methods
used.
Table 2. The Acronyms used in the comparative table.
Acronym Algo. Description
LinR
RF
NB
LogR
PosR
NBR
GB
AdB
DT
BNet
LibLin
HiCl
KM
RT
Acronym Feature Descr.
UsM
Linear Regression
TwM
Random Forest
Ling
Nave Bayes
Nw
Logistic Regression
Poisson Regression
Stat
Negative Binomial Reg. Txt
Gradient Boosting
Vis
AdaBoost
Decision Trees
Bayes Net
LIBLINEAR
Hierarchical Clustering
K-Means
Random Tree
User metadata
Tweet metadata
linguistic
Network
Statistical
Textual
Visual
6 Acknowledgement
We are grateful to Amelie Gyrard, Mustafa Nural, Sanjaya Wijeratne, Shreyansh
Bhatt, Ankita Saxena for their assistance with their reviews and comments that
greatly improved this book chapter.
We acknowledge partial support from the National Science Foundation (NSF)
award CNS-1513721: "Context-Aware Harassment Detection on Social Media",
28
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
National Institutes of Health (NIH) award: MH105384-01A1: "Modeling Social
Behavior for Healthcare Utilization in Depression", NSF award EAR- 1520870
Hazards SEES: Social and Physical Sensing Enabled Decision Support for Dis-
aster Management and Response, Community in Social Media : This work was
supported by Army Research Office Grant No. W911NF-16-1-0300, National In-
stitute on Drug Abuse (NIDA) Grant No. 5R01DA039454-02 Trending: Social
media analysis to monitor cannabis and synthetic cannabinoid use. Any opin-
ions, conclusions or recommendations expressed in this material are those of the
authors and do not necessarily reflect the views of the NSF, NIH, NIDA or Army
Research Office.
References
1. H. Purohit and A. Sheth, "Twitris v3: From Citizen Sensing to Analysis, Coor-
dination and Action," in ICWSM, 2013.
2. C. A. Davis, G. L. Ciampaglia, L. M. Aiello, K. Chung, M. D. Conover, E. Ferrara,
A. Flammini, G. C. Fox, X. Gao, B. Gon¸calves, P. A. Grabowicz, K. Hong, P.-
M. Hui, S. Mccaulay, K. Mckelvey, M. R. Meiss, S. Patil, C. P. Kankanamalage,
V. Pentchev, J. Qiu, J. Ratkiewicz, A. Rudnick, B. Serrette, P. Shiralkar, O. Varol,
L. Weng, T.-L. Wu, A. J. Younge, and F. Menczer, "OSoMe: the IUNI observatory
on social media," PeerJ Computer Science.
3. A. Sheth, H. Purohit, G. A. Smith, J. Brunn, A. Jadhav, P. Kapanipathi, C. Lu,
and W. Wang, "Twitris: A System for Collective Social Intelligence," Encyclopedia
of Social Network Analysis and Mining, 2018.
4. K. B. Penuel and M. Statler, Encyclopedia of disaster relief. Sage Publications,
2011.
5. J. Malilay, M. Heumann, D. Perrotta, A. F. Wolkin, A. H. Schnall, M. N. Pod-
gornik, M. A. Cruz, J. A. Horney, D. Zane, R. Roisman, J. R. Greenspan, D. Thor-
oughman, H. A. Anderson, E. V. Wells, and E. F. Simms, "The Role of Applied
Epidemiology Methods in the Disaster Management Cycle," American Journal of
Public Health, vol. 104, no. 10, pp. 2092–2102, 2014.
6. W. Wang, L. Chen, K. Thirunarayan, and A. P. Sheth, "Harnessing Twitter 'Big
Data' for Automatic Emotion Identification," in IEEE International Confernece
on Social Computing (SocialCom), 2012.
7. F. R. Lamy, R. Daniulaityte, R. W. Nahhas, M. J. Barratt, A. G. Smith,
A. Sheth, S. S. Martins, E. W. Boyer, and R. G. Carlson, "Increases in synthetic
cannabinoids-related harms: Results from a longitudinal web-based content anal-
ysis," International Journal of Drug Policy, 2017.
8. A. Sheth and P. Kapanipathi, "Semantic Filtering for Social Data," IEEE Internet
Computing, 2016.
9. P. Kapanipathi, F. Orlandi, A. Sheth, and A. Passant, "Personalized Filtering of
the Twitter Stream," in SPIM Workshop at ISWC 2011, 2011.
10. P. Kapanipathi, P. Jain, C. Venkataramani, and A. Sheth, "User Interests Identi-
fication on Twitter Using a Hierarchical Knowledge Base," in European Semantic
Web Conference, 2014.
11. D. Cameron, G. A. Smith, R. Daniulaityte, A. P. Sheth, D. Dave, L. Chen,
G. Anand, R. Carlson, K. Z. Watkins, and R. Falck, "PREDOSE: A semantic web
platform for drug abuse epidemiology using social media," Journal of Biomedical
Informatics, vol. 46, pp. 985–997, 2013.
12. H. Saif, Semantic Sentiment Analysis in Social Streams, 2017.
Predictive Analysis on Twitter: Techniques and Applications
29
13. S. Wijeratne, A. Sheth, S. Bhatt, L. Balasuriya, H. S. Al-Olimat, M. Gaur, A. H.
Yazdavar, and K. Thirunarayan, "Feature Engineering for Twitter-based Appli-
cations," in Feature Engineering for Machine Learning and Data Analytics, 2017,
p. 35.
14. K. Gimpel, N. Schneider, B. O 'connor, D. Das, D. Mills, J. Eisenstein, M. Heil-
man, D. Yogatama, J. Flanigan, and N. A. Smith, "Part-of-Speech Tagging for
Twitter: Annotation, Features, and Experiments," Proceedings of ACL, 2011.
15. C. Wagner, S. Asur, and J. Hailpern, "Religious Politicians and Creative Photog-
raphers: Automatic User Categorization in Twitter," in SocialCom, 2013.
16. X. Wang, F. Wei, X. Liu, M. Zhou, and M. Zhang, "Topic Sentiment Analysis
in Twitter: A Graph-based Hashtag Sentiment Classification Approach," in Pro-
ceedings of the 20th ACM international conference on Information and knowledge
management. ACM, 2011.
17. D. Davidov, O. Tsur, and A. Rappoport, "Enhanced Sentiment Learning Using
Twitter Hashtags and Smileys," in Proceedings of the 23rd international confer-
ence on computational linguistics. ACM, 2010, pp. 241–249.
18. E. Kouloumpis, T. Wilson, and J. Moore, "Twitter sentiment analysis: The good
the bad and the omg!" Proceedings of the Fifth International AAAI Conference
on Weblogs and Social Media (ICWSM 11), pp. 538–541, 2011.
19. D. M. Romero, B. Meeder, and J. Kleinberg, "Differences in the Mechanics of
Information Diffusion Across Topics: Idioms, Political Hashtags, and Complex
Contagion on Twitter," in Proceedings of the 20th international conference on
World wide web., 2011.
20. F. Morstatter, J. Pfeffer, H. Liu, and K. M. Carley, "Is the Sample Good Enough?
Comparing Data from Twitter's Streaming API with Twitter's Firehose," in
ICWSM, 2013, pp. 400–408.
21. A. Go, R. Bhayani, and L. Huang, "Twitter Sentiment Classification using Distant
Supervision," Tech. Rep., 2009.
22. A. Agarwal, B. Xie, and I. Vovsha, "Sentiment analysis of twitter data," in Pro-
ceedings of the Workshop on Language in Social Media (LSM 2011), no. June,
2011, pp. 30–38.
23. B. Suh, L. Hong, P. Pirolli, and E. H. Chi, "Want to be Retweeted? Large Scale
Analytics on Factors Impacting Retweet in Twitter Network," in IEEE interna-
tional conference on Social Computing Social computing (SocialCom), 2010.
24. N. Naveed, T. Gottron, J. Kunegis, and A. C. Alhadi, "Bad News Travel Fast : A
Content-based Analysis of Interestingness on Twitter," in Proceedings of the 3rd
International Web Science Conference. ACM, 2011.
25. K. Thomas, C. Grier, and V. Paxson, "Suspended Accounts in Retrospect: An
Analysis of Twitter Spam," in Proceedings of the 2011 ACM SIGCOMM confer-
ence on Internet measurement, 2011.
26. K.-L. Liu, W.-J. Li, and M. Guo, "Emoticon Smoothed Language Models for
Twitter Sentiment Analysis," in Proceedings of the Twenty-Sixth AAAI Confer-
ence on Artificial Intelligence, 2012.
27. C. Zhai, J. Lafferty, J. Lafferty, and C. Zhai, "A Study of Smoothing Methods
for Language Models Applied to Information Retrieval," ACM Transactions on
Information Systems, vol. 22, no. 2, pp. 179–214, 2004.
28. M. Boia and B. Faltings, "A :) Is Worth a Thousand Words: How People Attach
Sentiment to Emoticons and Words in Tweets," in SocialCom, 2013.
29. A. Pak and P. Paroubek, "Twitter as a Corpus for Sentiment Analysis and Opin-
ion Mining," LREc, vol. 10, 2010.
30
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
30. R. Kelly and L. Watts, "Characterising the Inventive Appropriation of Emoji as
Relationally Meaningful in Mediated Close Personal Relationships," Experiences
of Technology Appropriation: Unanticipated Users, Usage, Circumstances, and
Design, 2015.
31. P. K. Novak, J. Smailovi´c, B. Sluban, and I. Mozetic, "Sentiment of Emojis,"
PLOS One, 2015.
32. H. Miller, J. Thebault-Spieker, S. Chang, I. Johnson, L. Terveen, and B. Hecht,
"Blissfully happy or ready to fight: Varying Interpretations of Emoji," Interna-
tional AAAI Conference on Web and Social Media, no. ICWSM, pp. 259–268,
2016.
33. S. Wijeratne, L. Balasuriya, A. Sheth, and D. Doran, "EmojiNet: An Open Service
and API for Emoji Sense Discovery," in ICWSM, 2017.
34. O. Varol, E. Ferrara, F. Menczer, and A. Flammini, "Early detection of promoted
campaigns on social media," EPJ Data Science, vol. 6, no. 1, 2017.
35. L. C. Freeman, "Centrality in Social Networks Conceptual Clarification," Social
Networks, vol. 179, pp. 215–239, 1978.
36. L. Freeman, "A set of measures of centrality based on betweenness," Sociometry,
vol. 40, no. 1, pp. 35–41, 1977.
37. P. Bonacich, "Power and centrality : A family of measures," American Journal of
Sociology, vol. 92, no. 5, pp. 1170–1182, 1987.
38. G. Lawyer, "Understanding the influence of all nodes in a network," Nature Sci-
entific Reports, 2015.
39. M. Pennacchiotti and A.-M. Popescu, "Democrats, Republicans and Starbucks
Afficionados: User Classification in Twitter," in Proceedings of the 17th ACM
SIGKDD international conference on Knowledge discovery and data mining, 2011.
40. R. Irfan, C. K. King, D. Grages, S. Ewen, S. U. Khan, S. A. Madani, J. Kolodziej,
L. Wang, D. Chen, A. Rayes, N. Tziritas, C.-Z. Xu, A. Y. Zomaya, A. S. Alzahrani,
and H. L, "A Survey on Text Mining in Social Networks," The Knowledge Engi-
neering Review, vol. 000, pp. 1–24, 2004.
41. A. K. Nassirtoussi, S. Aghabozorgi, T. Y. Wah, D. Chek, and L. Ngo, "Text
mining for market prediction: A systematic review," EXPERT SYSTEMS WITH
APPLICATIONS, vol. 41, pp. 7653–7670, 2014.
42. F. Franch, "(Wisdom of the Crowds) : 2010 UK Election Prediction with Social
Media," Journal of Information Technology & Politics, vol. 10, no. 1, pp. 57–71,
jan 2013.
43. F. Bravo-Marquez, D. Gayo-Avello, M. Mendoza, and B. Poblete, "Opinion Dy-
namics of Elections in Twitter," in Eighth Latin American Web Congress, 2012.
44. L. Hong, O. Dan, and B. Davison, "Predicting Popular Messages in Twitter," in
WWW, 2011.
45. M. Sokolova, K. Huang, S. Matwin, J. Ramisch, V. Sazonova, R. Black, C. Orwa,
S. Ochieng, and N. Sambuli, "Topic Modelling and Event Identification from
Twitter Textual Data," ArXiv preprint, 2016.
46. S. T. Dumais, "Latent semantic analysis," Annual Review of Information Science
and Technology, vol. 3, no. 11, p. 4356, 2008.
47. T. Mikolov, I. Sutskever, K. Chen, G. Corrado, and J. Dean, "Distributed Repre-
sentations of Words and Phrases and their Compositionality," Advances in neural
information processing systems, 2013.
48. S. Wijeratne, L. Balasuriya, D. Doran, A. Sheth, and A. Org, "Word Embeddings
to Enhance Twitter Gang Member Profile Identification," in IJCAI Workshop on
Semantic Machine Learning, 2016.
Predictive Analysis on Twitter: Techniques and Applications
31
49. L. Balasuriya, S. Wijeratne, D. Doran, and A. Sheth, "Finding Street Gang Mem-
bers on Twitter," in ASONAM, 2016.
50. S. Sakaki, Y. Miura, X. Ma, K. Hattori, and T. Ohkuma, "Twitter User Gender
Inference Using Combined Analysis of Text and Image Processing," in Proceedings
of the 25th International Conference on Computational Linguistics, 2014, pp. 54–
61.
51. K. Bontcheva, L. Derczynski, A. Funk, M. a. Greenwood, D. Maynard, and
N. Aswani, "TwitIE : An Open-Source Information Extraction Pipeline for Mi-
croblog Text," Proceedings of Recent Advances in Natural Language Processing,
no. September, pp. 83–90, 2013.
52. T. Mitra and E. Gilbert, "CREDBANK: A Large-Scale Social Media Corpus with
Associated Credibility Annotations," in ICWSM, 2016.
53. M. De Choudhury, M. Gamon, S. Counts, and E. Horvitz, "Predicting Depression
via Social Media," in ICWSM, 2013.
54. Y. Lewenberg, Y. Bachrach, and S. Volkova, "Using emotions to predict user
interest areas in online social networks," in Data Science and Advanced Analytics
(DSAA), 2015.
55. H. Wang, D. Can, A. Kazemzadeh, F. Bar, and S. Narayanan, "A System for
Real-time Twitter Sentiment Analysis of 2012 U.S. Presidential Election Cycle,"
in Proceedings of the 50th Annual Meeting of the Association for Computational
Linguistics, 2012, pp. 115–120.
56. M. Ebrahimi, A. H. Yazdavar, and A. Sheth, "On the Challenges of Sentiment
Analysis for Dynamic Events," IEEE Intelligent Systems, 2017.
57. S. Vieweg, A. L. Hughes, K. Starbird, and L. Palen, "Microblogging During Two
Natural Hazards Events: What Twitter May Contribute to Situational Aware-
ness," in CHI - Crisis Informatics, 2010.
58. L. Chen, W. Wang, and A. P. Sheth, "Are Twitter Users Equal in Predicting Elec-
tions? A Study of User Groups in Predicting 2012 U.S. Republican Presidential
Primaries," in Social Informatics, 2012.
59. M. De Choudhury, S. Jhaver, B. Sugar, and I. Weber, "Social Media Participation
in an Activist Movement for Racial Equality," in ICSWM, no. Icwsm, 2016, pp.
92–101.
60. H. Purohit, A. Hampton, V. L. Shalin, A. P. Sheth, J. Flach, and S. Bhatt, "What
kind of #conversation is Twitter? Mining #psycholinguistic cues for emergency
coordination," Computers in Human Behavior, vol. 29, pp. 2438–2447, 2013.
61. H. Purohit, A. Hampton, S. Bhatt, V. L. Shalin, A. P. Sheth, and J. M. Flach,
"Identifying Seekers and Suppliers in Social Media Communities to Support Crisis
Coordination," in Computer Supported Cooperative Work (CSCW), 2014.
62. H. Purohit, S. Bhatt, A. Hampton, V. L. Shalin, and A. P. Sheth, "With Whom
to Coordinate, Why and How in Ad- Hoc Social Media Communications during
Crisis Response," in Proceedings of the 11 th International ISCRAM Conference,
2014, pp. 787–791.
63. Shreyansh Bhatt, Hemant Purohit, and Andrew Hampton, "Assisting Coordina-
tion during Crisis: A Domain Ontology based Approach to Infer Resource Needs
from Tweets," in Web Science, 2014.
64. L. T. Nguyen, P. Wu, W. Chan, W. Peng, and Y. Zhang, "Predicting collective
sentiment dynamics from time-series social media," in Proceedings of the First
International Workshop on Issues of Sentiment Discovery and Opinion Mining
(WISDOM), 2012, pp. 6:1–6:8.
32
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
65. D. Stojanovski, G. Strezoski, G. Madjarov, and I. Dimitrovski, "Finki at SemEval-
2016 Task 4: Deep Learning Architecture for Twitter Sentiment Analysis," in
Proceedings of SemEval, 2016, pp. 149–154.
66. A. Esuli, F. Sebastiani, C. Nazionale, and D. Ricerche, "Optimizing Text Quanti-
fiers for Multivariate Loss Functions," ACM Transactions on Knowledge Discov-
ery from Data ACM Trans. Knowl. Discov. Data. VV, vol. 26, 2015.
67. T. L. Griffiths, M. Steyvers, J. B. Tenenbaum, and T. Griffiths, "Topics in se-
mantic representation Topics in semantic representation," Psychological review,
2007.
68. L. Chen, C. Org, W. Wang, W. Org, M. Nagarajan, S. Wang, A. P. Sheth, and
A. Org, "Extracting Diverse Sentiment Expressions with Target-Dependent Po-
larity from Twitter," in Proceedings of the Sixth International AAAI Conference
on Weblogs and Social Media, 2012.
69. L. Hong and B. D. Davison, "Empirical Study of Topic Modeling in Twitter," in
1st Workshop on Social Media Analytics (SOMA '10), 2010.
70. W. X. Zhao, J. Jiang, J. He, Y. Song, P. Achananuparp, E.-P. Lim, and X. Li,
"Topical Keyphrase Extraction from Twitter," in Proceedings of the 49th Annual
Meeting of the Association for Computational Linguistics, 2011, pp. 379–388.
71. X. Wang, M. S. Gerber, and D. E. Brown, "Automatic Crime Prediction us-
ing Events Extracted from Twitter Posts," in International conference on social
computing, behavioral-cultural modeling, and prediction. Springer, 2012.
72. N. Bhattacharya, I. Arpinar, and U. Kursuncu, "Real Time Evaluation of Quality
of Search Terms during Query Expansion for Streaming Text Data Using Velocity
and Relevance," in Proceedings - IEEE 11th International Conference on Seman-
tic Computing, ICSC 2017, 2017.
73. L. Phillips, C. Dowling, K. Shaffer, N. Hodas, and S. Volkova, "Using Social Media
To Predict the Future: A Systematic Literature Review," in arXiv preprint, 2017.
74. J. M. Robillard, T. W. Johnson, C. Hennessey, B. L. Beattie, and J. Illes, "Aging
2.0: Health Information about Dementia on Twitter," Plos One, vol. 20, no. 87,
2013.
75. V. M. Prieto, S. Rgio Matos, M. Lvarez, F. Cacheda, J. L. Oliveira, and J. A. An,
"Twitter: A Good Place to Detect Health Conditions," PLoS ONE, vol. 9, no. 1,
2014.
76. A. H. Yazdavar, H. S. Al-Olimat, M. Ebrahimi, G. Bajaj, T. Banerjee,
K. Thirunarayan, J. Pathak, and A. Sheth, "Semi-Supervised Approach to Moni-
toring Clinical Depressive Symptoms in Social Media," in Proceedings of the 2017
IEEE/ACM International Conference on Advances in Social Networks Analysis
and Mining, 2017.
77. G. Coppersmith, M. Dredze, C. Harman, and K. Hollingshead Ihmc, "From
ADHD to SAD: Analyzing the Language of Mental Health on Twitter through
Self-Reported Diagnoses," in Proceedings of the 2nd Workshop on Computational
Linguistics and Clinical Psychology: From Linguistic Signal to Clinical Reality,
2015, pp. 1–10.
78. T. H. Do, D. M. Nguyen, E. Tsiligianni, B. Cornelis, and N. Deligiannis, "Mul-
tiview Deep Learning for Predicting Twitter Users' Location," arXiv preprint,
2017.
79. J. H. Lau and T. Baldwin, "An Empirical Evaluation of doc2vec with Practical
Insights into Document Embedding Generation," arXiv preprint, 2016.
80. A. Grover and J. Leskovec, "node2vec: Scalable Feature Learning for Networks,"
in Proceedings of the 22nd ACM SIGKDD international conference on Knowledge
discovery and data mining, 2016.
Predictive Analysis on Twitter: Techniques and Applications
33
81. H. Bo, P. Cook, T. Imoth, and B. Dw, "Geolocation Prediction in Social Media
Data by Finding Location Indicative Words," in Proceedings of COLING 2012,
2012, pp. 1045–1062.
82. R. Daniulaityte, R. W. Nahhas, S. Wijeratne, R. G. Carlson, F. R. Lamy, S. S.
Martins, E. W. Boyer, G. A. Smith, and A. Sheth, ""Time for dabs": Analyzing
Twitter data on marijuana concentrates across the U.S. HHS Public Access,"
Drug Alcohol Depend, vol. 155, pp. 307–311, 2015.
83. F. R. Lamy, R. Daniulaityte, A. Sheth, R. W. Nahhas, S. S. Martins, E. W. Boyer,
and R. G. Carlson Francois R Lamy, ""Those edibles hit hard": Exploration of
Twitter data on cannabis edibles in the U.S HHS Public Access," Drug Alcohol
Depend, vol. 1, no. 164, pp. 64–70, 2016.
84. P. N. Howard, M. Hussain, and W. Mari, "Opening Closed Regimes What Was
the Role of Social Media During the Arab Spring?" 2011.
85. Z. Tufekci, "Big Questions for Social Media Big Data: Representativeness, Validity
and Other Methodological Pitfalls," in ICWSM, 2014.
86. I. Arpinar, U. Kursuncu, and D. Achilov, "Social media analytics to identify and
counter islamist extremism: Systematic detection, evaluation, and challenging of
extremist narratives online," in Proceedings - 2016 International Conference on
Collaboration Technologies and Systems, CTS 2016, 2016.
87. G. Haciyakupoglu and W. Zhang, "Social Media and Trust during the Gezi
Protests in Turkey," Journal of Computer-Mediated Communication, vol. 20,
no. 4, pp. 450–466, 2015.
88. H. Allcott and M. Gentzkow, "Social Media and Fake News in the 2016 Election,"
Journal of Economic PerspectivesVolume, vol. 31, no. 2Spring, pp. 211–236, 2017.
89. T.-A. Hoang, W. W. Cohen, E.-P. Lim, D. Pierce, and D. P. Redlawsk, "Politics,
Sharing and Emotion in Microblogs," in ASONAM, 2013.
90. A. Makazhanov and D. Rafiei, "Predicting Political Preference of Twitter Users,"
Social Network Analysis and Mining, 2014.
91. R. Cohen and D. Ruths, "Classifying Political Orientation on Twitter: It's Not
Easy!" in ICWSM, 2013.
92. J.-M. Xu, K.-S. Jun, X. Zhu, and A. Bellmore, "Learning from Bullying Traces in
Social Media," in 2012 Conference of the North American Chapter of the Asso-
ciation for Computational Linguistics: Human Language Technologies, 2012, pp.
656–666.
93. Y. Chen, S. Zhu, Y. Zhou, and H. Xu, "Detecting Offensive Language in Social
Media to Protect Adolescent Online Safety," in Privacy, Security, Risk and Trust
(PASSAT), 2012 International Conference on and 2012 International Confernece
on Social Computing (SocialCom), 2012.
94. V. Edupuganti, "Harassment Detection on Twitter using Conversations," Ph.D.
dissertation, 2017.
95. R. Kandakatla, "Identifying Offensive Videos on YouTube," Ph.D. dissertation,
2016.
96. S. Wijeratne, D. Doran, A. Sheth, and J. L. Dustin, "Analyzing the Social Media
Footprint of Street Gangs," in Intelligence and Security Informatics (ISI), 2015.
97. T. Blevins, R. Kwiatkowski, J. Macbeth, K. Mckeown, D. Patton, and O. Ram-
bow, "Automatically Processing Tweets from Gang-Involved Youth: Towards De-
tecting Loss and Aggression," in Proceedings of COLING 2016, the 26th Inter-
national Conference on Computational Linguistics: Technical Papers, 2016, pp.
2196–2206.
98. B. Bushman and L. Huesmann, "Short-term and long-term effects of violent media
on aggression in children and adults," Arch Pediatr Adolesc Med, 2006.
34
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
99. M. Ni, Q. He, and J. Gao, "Using Social Media to Predict Traffic Flow under Spe-
cial Event Conditions," in The 93rd Annual Meeting of Transportation Research
Board, 2014.
100. R. Krishnamurthy, P. Kapanipathi, A. P. Sheth, K. Thirunarayan, and A. Sheth,
"Location Prediction of Twitter Users using Wikipedia," 2014.
101. J. Mahmud, J. Nichols, and C. Drews, "Where Is This Tweet From? Inferring
Home Locations of Twitter Users," in ICWSM, 2012.
102. H. S. Al-Olimat, K. Thirunarayan, V. Shalin, and A. Sheth, "Location Name
Extraction from Targeted Text Streams using Gazeeer-based Statistical Language
Models," arxiv preprint, vol. 11, no. 17, 2017.
103. M. Haklay and P. Weber, "Openstreetmap: User-generated street maps," IEEE
Pervasive Computing, 2008.
104. D. Ahlers, "Assessment of the accuracy of geonames gazetteer data," in GIR,
2013.
105. J. Lehmann, R. Isele, M. Jakob, A. Jentzsch, D. Kontokostas, P. N. Mendes,
S. Hellmann, M. Morsey, P. van Kleef, S. Auer, and C. Bizer, "Dbpedia a large-
scale, multilingual knowledge base extracted from wikipedia," Semantic Web,
vol. 1, pp. 1–5, 2012.
106. M. D. Lee and M. N. Lee, "The relationship between crowd majority and accuracy
for binary decisions," Judgment and Decision Making, vol. 12, no. 4, pp. 328–343,
2017.
107. S. Bhatt, B. Minnery, S. Nadella, B. Bullemer, V. Shalin, and A. Sheth, "En-
hancing crowd wisdom using measures of diversity computed from social media
data," in Proceedings of the International Conference on Web Intelligence, 2017.
108. A. Smith and M. Gaur, "What's my age?: Predicting Twitter User's Age using
Influential Friend Network and DBpedia," arxiv preprint, 2018.
109. P. Refaeilzadeh, L. Tang, and H. Liu, "Cross-Validation," Encyclopedia of
Database Systems. Springer, 2009.
110. D. Nguyen, N. A. Smith, and C. P. Ros´e, "Author Age Prediction from Text using
Linear Regression," in Proceedings of the 5th ACL-HLT Workshop on Language
Technology for Cultural Heritage, Social Sciences, and Humanities. Association
for Computational Linguistics, 2011.
111. C. Chen, Y. Chang, K. Ricanek, and Y. Wang, "Face age estimation using model
selection," 2010 IEEE Computer Society Conference on Computer Vision and
Pattern Recognition - Workshops, pp. 93–99, 2010.
112. A. Culotta, N. Kumar Ravi, and J. Cutler, "Predicting Twitter User Demograph-
ics using Distant Supervision from Website Traffic Data," Journal of Artificial
Intelligence Research, vol. 55, pp. 389–408, 2016.
113. J. Zhang, X. Hu, Y. Zhang, and H. Liu, "Your age is no secret: Inferring mi-
crobloggers' ages via content and interaction analysis," Proceedings of the 10th
International Conference on Web and Social Media, ICWSM 2016, no. Icwsm,
pp. 476–485, 2016.
114. D. Nguyen, R. Gravel, D. Trieschnigg, and T. Meder, ""How Old Do You Think
I Am?": A Study of Language and Age in Twitter," in ICWSM, 2013.
115. D. Bamman, J. Eisenstein, and T. Schnoebelen, "GENDER IN TWITTER:
STYLES, STANCES, AND SOCIAL NETWORKS," CoRR, 2012.
116. W. Li and M. Dickinson, "Gender Prediction for Chinese Social Media Data," in
Proceedings of Recent Advances in Natural Language Processing, 2017, pp. 438–
445.
Predictive Analysis on Twitter: Techniques and Applications
35
117. L. Li, M. Sun, and Z. Liu, "Discriminating Gender on Chinese Microblog: A
Study of Online Behaviour, Writing Style and Preferred Vocabulary," in 10th
International Conference on Natural Computation (ICNC), 2014.
118. S. Volkova and E. Bell, "Identifying Effective Signals to Predict Deleted and
Suspended Accounts on Twitter across Languages," in ICWSM, Association for
the Advancement of Artificial Intelligence, no. Icwsm, 2017, pp. 290–298.
119. J. P. Dickerson, V. Kagan, and V. S. Subrahmanian, "Using Sentiment to Detect
Bots on Twitter: Are Humans more Opinionated than Bots?" in ASONAM, 2014.
120. O. Varol, E. Ferrara, C. A. Davis, F. Menczer, and A. Flammini, "Online Human-
Bot Interactions: Detection, Estimation, and Characterization," in ICWSM, 2017.
121. B. Poblete, C. Castillo, and M. Mendoza, "Information Credibility on Twitter,"
pp. 45–59, 2011.
122. J. Ross and K. Thirunarayan, "Features for Ranking Tweets Based on Credibility
and Newsworthiness," in International Conference on Collaboration Technologies
and Systems, 2016.
123. A. Gupta, P. Kumaraguru, C. Castillo, and P. Meier, "TweetCred: A Real-
timeWeb-based System for Assessing Credibility of Content on Twitter," Lec-
ture Notes in Computer Science (including subseries Lecture Notes in Artificial
Intelligence and Lecture Notes in Bioinformatics), vol. 8851, no. November, 2014.
124. A. Gupta and P. Kumaraguru, "Credibility Ranking of Tweets during High Im-
pact Events," in PSOSM, 2012.
125. A. Gupta, H. Lamba, P. Kumaraguru, and A. Joshi, "Faking Sandy: Characteriz-
ing and Identifying Fake Images on Twitter during Hurricane Sandy," in WWW,
2013.
126. L. Weng, F. Menczer, and Y.-Y. Ahn, "Predicting Successful Memes using Net-
work and Community Structure," in IC, 2014, pp. 535–544.
127. R. Kobayashi and R. Lambiotte, "TiDeH: Time-Dependent Hawkes Process for
Predicting Retweet Dynamics," no. ICWSM, 2016, pp. 191–200.
128. O. Tsur and A. Rappoport, "Don't Let Me Be #Misunderstood: Linguisti-
cally Motivated Algorithm for Predicting the Popularity of Textual Memes," in
ICWSM, Ninth International AAAI Conference on Web and Social Media, 2015,
pp. 426–435.
129. Y. Ruan, H. Purohit, D. Fuhry, S. Parthasarathy, A. P. Sheth, and A. Sheth,
"Prediction of Topic Volume on Twitter," in 4th International ACM Conference
on Web Science, 2012, pp. 397–402.
130. N. Pattisapu, M. Gupta, P. Kumaraguru, and V. Varma, "Medical Persona Clas-
sification in Social Media," in ASONAM, 2017.
131. Z. Gilani, E. Kochmar, and J. Crowcroft, "Classification of Twitter Accounts into
Automated Agents and Human Users," in ASONAM, 2017.
132. J. S. Alowibdi, U. A. Buy, P. S. Yu, and L. Stenneth, "Detecting Deception in
Online Social Networks," in ASONAM, 2014.
133. J. Mahmud, G. Fei, A. Xu, A. Pal, and M. Zhou, "Predicting Attitude and Ac-
tions of Twitter Users," in Proceedings of the 21st International Conference on
Intelligent User Interfaces - IUI '16. ACM Press, 2016, pp. 1–6.
134. P. Georgiev, A. Noulas, and C. Mascolo, "Where Businesses Thrive: Predicting
the Impact of the Olympic Games on Local Retailers through Location-based
Services Data," in ICWSM, 2014, pp. 151–160.
135. X. Yang, R. Mccreadie, C. Macdonald, and I. Ounis, "Transfer Learning for Multi-
language Twitter Election Classification," in ASONAM, 2017.
36
Kursuncu, Gaur, Lokala, Thirunarayan, Sheth and Arpinar
136. R. Korolov, D. Lu, J. Wang, G. Zhou, C. Bonial, C. Voss, L. Kaplan, W. Wal-
lace, J. Han, and H. Ji, "On Predicting Social Unrest Using Social Media," in
IEEE/ACM International Conference on Advances in Social Networks Analysis
and Mining (ASONAM), 2016.
137. N. Kallus, "Predicting Crowd Behavior with Big Public Data," arXiv preprint,
2014.
138. J. Echeverria and S. Zhou, "Discovery, Retrieval, and Analysis of the 'Star Wars'
Botnet in Twitter," in ASONAM, 2017.
139. W. Gao and F. Sebastiani, "Tweet Sentiment: From Classification to Quantifica-
tion," in ASONAM, 2015.
140. A. Hassan, A. Abbasi, and D. Zeng, "Twitter Sentiment Analysis: A Bootstrap
Ensemble Framework," in SocialCom, 2013.
141. A. Kothari, W. Magdy, K. Darwish, A. Mourad, and A. Taei, "Detecting Com-
ments on News Articles in Microblogs," in ICWSM, 2013.
142. T. Georgiou, A. E. Abbadi, X. Yan, and J. George, "Mining Complaints for
Traffic-Jam Estimation: A Social Sensor Application," in ASONAM, 2015.
143. A. J. Aiswal, W. Peng, and T. Sun, "Predicting Time-sensitive User Locations
from Social Media," in ASONAM, 2013.
144. D. Rout, D. Preoiuc-Pietro, K. Bontcheva, and T. Cohn, "Where's @wally? A
Classification Approach to Geolocating Users Based on their Social Ties," in 24th
ACM Conference on Hypertext and Social Media, Paris, France, 2013.
145. B. Rath, W. Gao, J. Ma, and J. Srivastava, "From Retweet to Believability:
Utilizing Trust to Identify Rumor Spreaders on Twitter," in ASONAM, 2017.
146. I. Bizid, N. Nayef, P. Boursier, S. Faiz, and J. Morcos, "Prominent Users Detection
during Specific Events by Learning On-and Off-topic Features of User Activities,"
in ASONAM, 2015.
147. E. Ferrara, M. Jafariasbagh, O. Varol, V. Qazvinian, F. Menczer, and A. Flam-
mini, "Clustering Memes in Social Media," in ASONAM, 2013.
148. S. Yamamoto and T. Satoh, "Hierarchical Estimation Framework of Multi-Label
Classifying: A Case of Tweets Classifying into Real Life Aspects," in ICWSM,
2015.
149. A. Beykikhoshk, O. Arandjelovi, D. Phung, and S. Venkatesh, "Data-Mining
Twitter and the Autism Spectrum Disorder: A Pilot Study," in ASONAM, 2014.
150. Z. Yin, Y. Chen, D. Fabbri, J. Sun, and B. Malin, "#PrayForDad: Learning
the Semantics Behind Why Social Media Users Disclose Health Information," in
ICWSM, 2016.
151. R. Daniulaityte, L. Chen, F. R. Lamy, R. G. Carlson, K. Thirunarayan, and
A. Sheth, "When Bad' is Good': Identifying Personal Comm unication and Sen-
timent in Drug-Related Tweets," JMIR PUBLIC HEAL TH AND SURVEIL-
LANCE, 2016.
152. Y. Hu, S. Farnham, and K. Talamadupula, "Predicting User Engagement on
Twitter with Real-World Events," in ICWSM, 2015.
153. J. S. Kessler, M. Eckert, L. Clark, and N. J. Nicolov Power, "The ICWSM 2010
JDPA Sentiment Corpus for the Automotive Domain," in 4th International AAAI
Conference on Weblogs and Social Media Data Workshop Challenge (ICWSM-
DWC), 2010.
154. P. Covington, J. Adams, and E. Sargin, "Deep Neural Networks for YouTube
Recommendations," in Proceedings of the 10th ACM Conference on Recommender
Systems, 2016.
Predictive Analysis on Twitter: Techniques and Applications
37
155. M. Korpusik, S. Sakaki, F. Chen, and Y.-Y. Chen, "Recurrent neural networks
for customer purchase prediction on twitter." in CBRecSys@ RecSys, 2016, pp.
47–50.
156. T. Tieleman and G. Hinton, "Divide the gradient by a running average of its recent
magnitude. coursera: Neural networks for machine learning. technical report."
|
1311.2023 | 1 | 1311 | 2013-10-25T12:54:05 | Information dissemination processes in directed social networks | [
"cs.SI",
"physics.soc-ph"
] | Social networks can have asymmetric relationships. In the online social network Twitter, a follower receives tweets from a followed person but the followed person is not obliged to subscribe to the channel of the follower. Thus, it is natural to consider the dissemination of information in directed networks. In this work we use the mean-field approach to derive differential equations that describe the dissemination of information in a social network with asymmetric relationships. In particular, our model reflects the impact of the degree distribution on the information propagation process. We further show that for an important subclass of our model, the differential equations can be solved analytically. | cs.SI | cs |
Information dissemination processes in directed
social networks
K. Avrachenkov∗ 1, K. De Turck†2, D. Fiems‡2, and B.J. Prabhu§3,4
1INRIA Sophia Antipolis, 2004 route des Lucioles, 06902 Sophia
Antipolis Cedex, France
2Department of Telecommunications and Information Processing,
Ghent University, St. Pietersnieuwstraat 41, 9000 Gent, Belgium
3CNRS, LAAS, 7 avenue du colonel Roche, F-31400 Toulouse,
4Univ de Toulouse, LAAS, F-31400 Toulouse, France
France
August 11, 2018
Abstract
Social networks can have asymmetric relationships. In the online so-
cial network Twitter, a follower receives tweets from a followed person but
the followed person is not obliged to subscribe to the channel of the fol-
lower. Thus, it is natural to consider the dissemination of information in
directed networks. In this work we use the mean-field approach to derive
differential equations that describe the dissemination of information in a
social network with asymmetric relationships.
In particular, our model
reflects the impact of the degree distribution on the information propa-
gation process. We further show that for an important subclass of our
model, the differential equations can be solved analytically.
1 Introduction
We develop mathematical models for the dissemination of information on di-
rected graphs and investigate the influence of parameters such as the degree
distribution on the dynamics of the dissemination process. The directed graph
model, as opposed to the undirected model, is better suited for networks like
the one of Twitter because of the asymmetric relationship that exists between
∗[email protected]
†[email protected]
‡[email protected]
§[email protected]
1
different users. Specifically, in the Twitter network, a user can choose to re-
ceive the tweets -- in other words, become a follower -- of one or more other users
by subscribing to their accounts. Certain users, celebrities for example, have
several millions of followers who follow their tweets. These users do not neces-
sarily follow the tweets of all of their followers which results in an asymmetric
relationship between users. This asymmetry is modelled by a directed graph in
which an outgoing edge is drawn from a user to each of its followers. An edge
in the opposite direction from the follower to the user need not always exist and
is drawn only if the user subscribes to the channel of this follower.
A hashtag is a word or a phrase prefixed by # and used in social networks
as a keyword. The prefix facilitates the search for conversations related to the
prefixed word or phrase. The typical life cycle of a hashtag closely resembles an
epidemic. In the first phase the interest in the hashtag grows as users generate
tweets containing this hashtag. These tweets are received by followers who then
either retweet them or generate new tweets with this hashtag. The number of
users tweeting this hashtag ("infected" users) grows as a function of time during
this phase. At a certain point in time, the interest reaches its zenith and starts
to wane as users move on and get interested in other events. The second phase
begins at this point in time as users stop tweeting this hashtag (or, "recover"),
and the number of infected users decreases.
In this work we use the mean-field approach to derive the differential equa-
tions which describe the process of information dissemination. We obtain a
couple of differential equations which describe the evolution of the fractions of
infected and recovered persons. As a model for the underlying network we take
the Configuration-type model for directed graphs [2]. While epidemics have
been widely studied on undirected graphs, there is a hardly any analysis of the
epidemic-type processes on directed networks. In [7, 6], the mean-field approach
has been applied to the analysis of epidemics on an undirected configuration-
type graph model. In [5], the effect of network topology has been analysed in
the case of undirected graphs.
In particular, the authors of [5] applied their
general results to analyse the Erdos-R´enyi and preferential attachment random
graph models. An interesting approach combining a decomposition approach
with two-state primitive Markov chain has been proposed in [8] for undirected
networks with general topology. For an overview of various results about epi-
demic processes on undirected networks we refer the interested reader to the
books [4, 1, 3].
2 The mean-field model
Consider a network of N nodes structured according to the Configuration-type
model for directed graphs [2]. The in-degree and out-degree of the nodes are
drawn from a distribution f (k, l) = P(K = k, L = l), defined on the bounded
set D = {(k, l) : 0 ≤ k ≤ K, 0 ≤ l ≤ L, (k, l) 6= (0, 0)}, where the first (resp.
second) index corresponds to the in-degree (resp. out-degree) and K (resp. L) is
the maximal in-degree (resp. out-degree). In the remainder, we always assume
2
that EK = EL; in a network every outgoing link is an incoming link of some
other node. A generic node with in-degree k and out-degree l shall be referred
to as a (k, l)-node.
Each node in the network can be in one of the three states : infected, recov-
ered, or susceptible. An infected node infects its susceptible neighbours after
an exponentially distributed time with intensity λ. Note that, the infection is
spread simultaneously along all the outgoing edges and not just one edge at
a time. The simultaneous dissemination along all outgoing edges models the
spread of tweets on Twitter. An infected node recovers after an exponentially
distributed time of rate ν, at which time it stops spreading information in the
network.
We shall be mainly interested in a large-population model, that is when N →
∞. This assumption simplifies considerably the analysis of the dissemination
process while being realistic1.
Let ik,l(t) (resp. rk,l(t)) denote the fraction of infected (resp. recovered)
(k, l) nodes at time t. The following result describes the dynamics of these two
quantities.
Theorem 1. Let ik,l(0) > 0 for some (k, l) ∈ D. Then, ∀(k, l) ∈ D,
dik,l(t)
dt
= λk(f (k, l) − ik,l(t) − rk,l(t)) Pk′ ,l′ l′ik′,l′ (t)
Pk′ ,l′ l′f (k′, l′)
− ik,l(t)ν,
(1)
and
drk,l(t)
dt
= ik,l(t)ν.
(2)
Sketch of proof. Let I N
k,l(t)) be the number of infected (resp. re-
covered) (k, l) nodes in a network of N nodes. Then in a small time interval
∆,
k,l(t) (resp. RN
I (N )
k,l (t + ∆) = I (N )
k,l (t) + number of (k, l) nodes infected in time ∆
− number of (k, l) infected (k, l) nodes that recover in time ∆.
Since each infected node recovers after an exponentially distributed time of rate
ν, the number of (k, l) infected nodes that recover in ∆ will be approximately
I (N )
k,l (t)ν∆. There will be additional terms containing ∆2 which we neglect.
k,l − (I (N )
Let us compute the number of (k, l) nodes that get infected in time ∆. There
are N (N )
k,l (t)) susceptible (k, l) nodes. Assume that each (k, l)
node has a probability pk,l to get infected in the interval ∆. Then, expected
number of infected (k, l) nodes in time ∆ will be (N
k,l (t) + R(N )
Each (k, l) node has k incoming edges. Assuming that the edges are con-
nected independently, pk,l = (1 − (1 − qk,l)k), where qk,l is the probability that
the infection is transmitted along one of the edges in ∆. The number of (k, l)
nodes infected in ∆ is thus
(N )
k,l − (I
(N )
k,l + R
(N )
k,l ))pk,l.
(N (N )
k,l − (I (N )
k,l + R(N )
k,; )) · (1 − (1 − qk,l)k),
1Twitter has approximately 200 million registered users (source: Wikipedia).
3
which, for ∆ sufficiently small, can be approximated as
(N (N )
k,l − (I (N )
k,l + R(N )
k,l ))kqk,l.
Finally, we compute qk,l. In an interval ∆, each infected node transmits the
(N )
infection with probability λ∆. Thus, there are Pk′,′l l′I
k′ ,l′ λ∆ edges that are
infected and that transmit the infection in ∆. There are a total of Pk′,l′ l′N (N )
k′,l′ .
Assuming that an incoming edge is connected uniformly at random to an out-
going edge, we obtain
qk,l = Pk′ ,l′ l′I (N )
k′,l′ λ∆
Pk′,l′ l′N (N )
k′,l′
.
Consequently,
I (N )
k,l (t + ∆) − I (N )
k,l (t) = (N (N )
k,l − (I (N )
k,l + R(N )
k,l ))kPk′ ,l′ l′I (N )
k′,l′ λ∆
Pk′,l′ l′N (N )
k′,l′
− I (N )
k,l ν∆.
If the initial number of nodes is large, then we can divide the two sides of
the above equation to obtain the following difference equation in terms of the
fraction of the infected and the recovered nodes:
ik,l(t + ∆) − ik,l(t) = (f (k, l) − (ik,l(t) + rk,l(t)))kPk′,l′ l′ik′,l′ (t)λ∆
Pk′,l′ l′f (k′, l′)
− ik,l(t)ν∆.
To complete the picture, we take the limit ∆ → 0, and obtain the differential
equations (1) and (2).
Remark 1. In the above equation ik,l is the fraction of the (k, l) nodes that are
infected. This fraction varies between 0 and f (k, l). If instead, we want to look
at the evolution of the fraction of infected nodes and recovered nodes conditioned
on them being (k, l) nodes, then the corresponding differential equations for these
fractions will be
dik,l(t)
dt
drk,l(t)
dt
= λk(1 − ik,l(t) − rk,l(t))Pk′,l′ l′f (k′.l′)ik′,l′ (t)
Pk′,l′ l′f (k′, l′)
− ik,l(t)ν,
(3)
= ik,l(t)ν.
(4)
3 Epidemics without recovery
The solution of (1) and (2) can be computed numerically. In some specific case
we can obtain explicit solutions to these equations. In particular, this is the
case when there is no recovery: ν = 0, or in the language of Twitter, they keep
generating new tweets with the same hashtag. That is, a hashtag never gets out
of mode. This can well represent the case for the topics or personalities that
can sustain popularity over a long period of time.
4
Since there are no recovered nodes, rk,l(t) = 0, ∀t, and (1) takes the form
dik,l(t)
dt
= λk(f (k, l) − ik,l(t)) Pk′,l′ l′ik′,l′ (t)
Pk′,l′ l′f (k′, l′)
.
(5)
The differential equation (5) can be solved in terms of a reference value of (k, l),
say (k, l) = (1, 1) by noting that
1
dik,l(t)
k(f (k, l) − ik,l(t))
dt
=
1
di1,1(t)
(f (1, 1) − i1,1(t))
dt
,
whence
f (k, l) − ik,l(t) =
f (k, l) − ik,l(0)
(f (1, 1) − i1,1(0))k (f (1, 1) − i1,1(t))k =: ck,l(f (1, 1) − i1,1(t))k.
(6)
The fraction of infected nodes of degree (1, 1) can be obtained by substuting
the value of ik,l(t) in (5) and solving it:
di1,1(t)
dt
= λ(f (1, 1) − i1,1(t))Pk′,l′ l′ (cid:16)f (k′, l′) − ck′ ,l′(f (1, 1) − i1,1(t))k′(cid:17)
Pk′,l′ l′f (k′, l′)
. (7)
Deterministic in-degree
Assume that the in-degree K is deterministic and is equal to d. Then, equation
(5) becomes
did,l(t)
dt
= λd(f (d, l) − id,l(t))X
l′
l′id,l′(t)
Pj jf (d, j)
.
Since the expected in-degree and the expected out-degree coincide, Pj jf (d, j) =
d. Denote Θ(t) = Pj
, and rewrite the above equation as:
jid,j (t)
d
did,l
dt
= λd(f (d, l) − id,l(t))Θ(t).
(8)
Multiplying the above equation by l
the following equation for Θ:
d and summing over all values l, we obtain
dΘ
dt
= λd(1 − Θ)Θ,
which upon integration yields:
id,l(t) = f (d, l) − c1e−λd R Θ(t)dt = f (d, l) −
f (d, l) − id,l(0)
1 − Θ(0) + Θ(0)e−λd·t
.
(9)
5
4 Numerical experiments
In this section, we validate the mean-field model developed in Section 2.
In
the numerical experiments, first the in-degree and out-degree sequences are
generated according to the given degree distributions. So as to have the same
number of incoming stubs as outgoing stubs, the difference between the two is
added to the smaller quantity. A configuration-type graph is then created by
matching an incoming stub with an outgoing stub chosen uniformly at random.
It was shown in [2] that this procedure does indeed approximates closely the
configuration model. The information diffusion process is then simulated on
this graph.
For computing the solution of the system of differential equations (1) and
(2) numerically, the empirical degree distributions from the graph generated
previously are given as input.
The results of two such experiments with 20000 nodes is shown in Figure
1. The in-degree and the out-degree sequences were taken to be independent
of each other. The out-degree sequence was drawn from a Uniform distribution
in the set {1, 20} in the two simulations. For the figure on the left, the in-
degree distribution was taken to be deterministic with parameter 10, and for
the figure on the right it was the Zipf law on {1, 71} and exponent 1.2. In both
experiments, λ = 1 and ν = 0.5, and 5 percent of all nodes were assumed to be
infected at time 0.
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
s
e
d
o
n
d
e
t
c
e
f
n
i
f
o
n
o
i
t
c
a
r
F
diff. eqn.
simulation
0.6
0.5
0.4
0.3
0.2
0.1
s
e
d
o
n
d
e
t
c
e
f
n
i
f
o
n
o
i
t
c
a
r
F
diff. eqn.
simulation
0
0
2
4
6
Time
8
10
12
0
0
2
4
6
Time
8
10
12
Figure 1: Fraction of all nodes infected as a function of time for Deterministic
in-degree distribution (left) and Zipf in-degree distribution (right).
Observations
It is observed that the dissemination process is faster when the variance of
the in-degree distribution is smaller. This observation was reinforced by other
experiments in which the in-degree was drawn from a Uniform distribution. In
several other experiments that we conducted, it was also observed that the out-
degree distribution does not have any noticeable effect of the dynamics of the
epidemics.
6
Our on-going work is oriented towards investigating the influence of the
variance of the in-degree distribution and giving a theoretical foundation to the
above observations.
5 Acknowledgments
This work was partially supported by the Parternariat Hubert Curien PHC
TOURNESOL FR 2013 29053SF between France and the Flemish community
of Belgium, by the Inria Alcatel-Lucent Joint Lab ARC "Network Science", and
by the European Commission within the framework of the CONGAS project
FP7-ICT-2011-8-317672.
References
[1] Alain Barrat, Marc Barthelemy, and Alessandro Vespignani. Dynamical
Processes on Complex Networks. Cambridge University Press, 2008.
[2] N. Chen and M. Olvera-Cravioto. Directed random graphs with given degree
distributions. To appear in Stochastic Systems.
[3] Moez Draief and Laurent Massouli. Epidemics and Rumours in Complex
Networks. Cambridge University Press, 2010.
[4] Richard Durrett. Random Graph Dynamics, volume 20. Cambridge univer-
sity press, 2007.
[5] Ayalvadi Ganesh, Laurent Massouli´e, and Don Towsley. The effect of net-
work topology on the spread of epidemics. In INFOCOM 2005. 24th Annual
Joint Conference of the IEEE Computer and Communications Societies.
Proceedings IEEE, volume 2, pages 1455 -- 1466. IEEE, 2005.
[6] Yamir Moreno, Romualdo Pastor-Satorras, and Alessandro Vespignani. Epi-
demic outbreaks in complex heterogeneous networks. The European Physical
Journal B-Condensed Matter and Complex Systems, 26(4):521 -- 529, 2002.
[7] Romualdo Pastor-Satorras and Alessandro Vespignani. Epidemic spreading
in scale-free networks. Physical review letters, 86(14):3200, 2001.
[8] P. Van Mieghem, J. Omic, and R. Kooij. Virus spread in networks. Net-
working, IEEE/ACM Transactions on, 17(1):1 -- 14, 2009.
7
|
1711.06845 | 1 | 1711 | 2017-11-18T10:57:21 | Evaluating Roles of Central Users in Online Communication Networks: A Case Study of #PanamaLeaks | [
"cs.SI",
"cs.CY",
"cs.NI",
"nlin.AO",
"stat.AP"
] | Social media has changed the ways of communication, where everyone is equipped with the power to express their opinions to others in online discussion platforms. Previously, a number of stud- ies have been presented to identify opinion leaders in online discussion networks. Feng ("Are you connected? Evaluating information cascade in online discussion about the #RaceTogether campaign", Computers in Human Behavior, 2016) identified five types of central users and their communication patterns in an online communication network of a limited time span. However, to trace the change in communication pattern, a long-term analysis is required. In this study, we critically analyzed framework presented by Feng based on five types of central users in online communication network and their communication pattern in a long-term manner. We take another case study presented by Udnor et al. ("Determining social media impact on the politics of developing countries using social network analytics", Program, 2016) to further understand the dynamics as well as to perform validation . Results indicate that there may not exist all of these central users in an online communication network in a long-term manner. Furthermore, we discuss the changing positions of opinion leaders and their power to keep isolates interested in an online discussion network. | cs.SI | cs | Evaluating Roles of Central Users in Online Communication
Network: A Case Study of #PanamaLeaks
Mohsin Adalata, Muaz A. Niazi∗a
aComputer Science Department,
COMSATS Institute of Information Technology,
Islamabad, Pakistan
∗Corresponding author
7
1
0
2
v
o
N
8
1
]
I
S
.
s
c
[
1
v
5
4
8
6
0
.
1
1
7
1
:
v
i
X
r
a
Abstract
Social media has changed the ways of communication, where everyone is equipped with the power
to express their opinions to others in online discussion platforms. Previously, a number of stud-
ies have been presented to identify opinion leaders in online discussion networks. Feng ("Are
you connected? Evaluating information cascade in online discussion about the #RaceTogether
campaign", Computers in Human Behavior, 2016) identified five types of central users and their
communication patterns in an online communication network of a limited time span. However,
to trace the change in communication pattern, a long-term analysis is required. In this study, we
critically analyzed framework presented by Feng based on five types of central users in online
communication network and their communication pattern in a long-term manner. We take an-
other case study presented by Udnor et al. ("Determining social media impact on the politics of
developing countries using social network analystics", Program, 2016) to further understand the
dynamics as well as to perform validation . Results indicate that there may not exist all of these
central users in an online communication network in a long-term manner. Furthermore, we discuss
the changing positions of opinion leaders and their power to keep isolates interested in an online
discussion network.
Keywords: Complex network, Social network analysis, opinion formation
1. Introduction
To exchange opinions and information, internet is being used all-around the world. With in-
creased use of internet, social media also became popular and a central medium for communica-
tion. In recent times, social networking has become de facto medium for communication among
the same social group or network [1]. People participate in online discussion by using different
platforms like Facebook, Twitter, YouTube and other social networking tools [2].Twitter is one
of the popular social networking tool (micro blogs) among others, where people broadcast brief
update messages [3].
In scientific literature, a number of studies have been carried out using Twitter data. For
example, Ch'ng in [4] used Twitter data to find generation of online communities and Baek in
[5] argued roles and positions of participants in an online community. Geo located tweets are used
Preprint submitted to Elsevier
November 21, 2017
by Blanford in [6] to capture regional connections and cross border movement. Twitter data is
even used for evaluation of inter organizational disaster coordination networks, created in result of
disaster [7]. Lee et al. in [8] demonstrated how scholars are using Twitter communication network
for informal scholarly communication. Authors used social network analysis methods in all of the
above-mentioned studies. Social network analysis is a strategy for analyzing social structures [9].
Aim of all the above studies in different fields is to find the influential nodes in network. In online
communication network, these nodes are called opinion leaders.
Rogers defined opinion leadership as "the degree to which an individual is able to influence
other individuals' attitudes or overt behavior informally in desired way with relative frequency"
[10]. The concept of opinion leadership originates from two step flow theory, the theory posits
that information first comes from mass media to opinion leaders and then this information is trans-
mitted to society via opinion leaders [11]. Opinion leaders are opinion broker in two sense, first
opinion leaders influence is between two social groups rather than in-between social group and
second they are transition between two network mechanism responsible for spreading the idea
[12].
For identification of opinion leaders in Twitter network, Borge in [13] used social network
analysis techniques on following-follower and mention network. Some researchers proposed dif-
ferent algorithms to find opinion leaders in social networks. For example, Aleahmad et al. pro-
posed OLFinder in [14] and Huang proposed a Dynamic Opinion Rank algorithm in [15]. Li et
al.
in [16] proposed framework for opinion leader identification, which consist of five stages.
First is keyword blog search; second is ontology extraction; ontology-assisted extraction and hot
blog identification is third and fourth respectively; fifth and last stage of framework is opinion
leader identification. The method of identifying opinion leaders in virtual communities proposed
by Zhang in [17] consist of five steps: first, find twenty participators who are active with large
followers; second, to investigate details of these active users, construct a relational matrix; third,
centrality analysis; fourth, identify opinion leaders by comparing standardized degree of network
users; last, if centrality and map analysis fails then correlation analysis is used. Researchers also
applied two step flow theory [11] for identifying opinion leaders in online social network.
By adopting two step flow theory, Feng in [18] proposed another approach to identify central
users in the online communication network. In this work, the author identified five types of central
users in Twitter network: conversation starter, influencer, active engager, network builder, and
information bridge. However, Feng study analyzed tweets in only four-days time span to trace
communication patterns that is not appropriate because opinion in a society may vary with time.
The proposed approach needs to be applied for trend analysis on longitudinal network.
In this context, this study explores communication patterns among participants of online dis-
cussion network in longitudinal manner by adopting previous approach proposed by Feng in [18].
In this study, we use "PanamaLeaks" as case study.
International Consortium of Investigative
Journalists' raised issue of Panama Leaks by leaking 11.1 million records from Panama-based law
firm, Mossack Fonseca [19]. We retrieve Twitter data using #PanamaLeaks keyword from April
2017 to August 2017. The research questions we address are: Weather central users identified
by Feng study exist in online communication network in longitudinal manner?. If yes, then what
are the changes in communication pattern of central users?. For validation, we apply the same
approach on another case study of #NeigieraDecides presented in [20].
2
Our main contributions can be listed as follows:
• To identify most central users in longitudinal network of #PanamaLeaks.
• To analyze the flow of information among the participants of online longitudinal discussion
network in #PanamaLeaks.
The reminder of the paper is structured as follows: Section 2 presents background, Section 3
presents our proposed method and dataset followed by results presented in section 4, Discussion
is formulated in section 5.
2. Background
In this section, we present characteristics and communication patterns of the most central users
identified by Feng in [18].
2.1. Conversation starter
A conversation starter is a user in network with numerus "in-degree" links and a few or none
"out-degree" links. Conversation starter is the one, who is responsible for starting the original
topic and flow of information in the network. However, the control on flow of information in
network is not under control of the conversation starter. Figure 1 shows connection pattern for
conversation starter in the network.
Figure 1: Connection Pattern for "Conversation Starter" in online discussion network.Circles are presenting users in
the network. Circle filled with black color is "Conversation Starter". Many arrows pointing towards "Conversation
Starter" presents many users in the network mentioning/retweeting "Conversation Starter" tweet.
2.2. Influencer
An influencer is opinion leader in the network.
Influencer in a network has plentiful "in-
degree" links and few "out-degree" links. Influencer does not initiate the topic of conversation in
the network, however influencer do influence opinion of other users in the network by creating
frequent tweets that are retweeted by other users. Figure 2 shows connection pattern for influencer
in the network.
3
Figure 2: Connection Pattern for "Influencer" in online discussion network. Circles are presenting users in the
network. Circle filled with black color is "influencer". Many arrows pointing towards "Influencer" presents many
users in the network mentioning/retweeting "Influencer" tweet.
2.3. Active engager
An active engager in a user in online discussion network with many "out-degree" and a few or
none "in-degree" links. Active engager is eager to distribute information and make connections in
online discussion network. Active engager is also opinion expresser in network. Figure 3 shows
connection pattern for active engager in the network.
Figure 3: Presenting Connection Pattern for "Active Engager" in online discussion network. Circles are presenting
users in the network. Circle filled with black color is "Active Engager". Many arrows pointing towards users from
"Active Engager" presents that "Active Engager" mention/retweet many other users tweet in the network.
2.4. Network builder
Despite having a few "out-degree" and a few or none "in-degree" links in online discussion
network, network builder plays an important role in the network. Main role of network builder is
connecting two or more influencers in the network. Figure 4 shows connection pattern for network
builder in the network.
4
Figure 4: Connection Pattern for "Network Builder" in online discussion network. Circles are presenting users in the
network. Circle filled with black color is "network builder". Two arrows pointing towards "Influencers" in the
network is describing basic role of "Network Builder" in the network.
2.5. Information bridge
An information bridge is a user in online discussion network with a few "in-degree" and "out-
degree" links. Information bridge role is to assist influencer and active engager in the network to
connect with other users (Feng 2016). Note that in both case studies, #Panamaleaks and #Nige-
riaDecies which we took for validation. We are unable to find such user in the online discussion
network (see section 5). Figure 5 shows connection pattern for information bridge in the network.
Figure 5: Connection Pattern for "Information Bridge" in online discussion network. Circles are presenting users in
the network. Circle filled with black color is "Information Bridge". Arrow pointing towards "Influencer" in the
network is presenting that "Information Bridge" mention/retweet "Influencer" tweet and arrow from "Active
Engager" towards "Information Bridge" is presenting that same tweet is retweeted by the "Active Engager".
3. Proposed Methodology
3.1. Tool
We choose NodeXl and Gephi as tools to analyze #PanamaLeaks network. NodeXl is an exten-
sible toolkit to download and analyze network data [21]. NodeXl is capable of calculating network
5
matrices like "in-degree", "out-degree", "betweeness", "density", "modularity" etc. NodeXl gen-
erates excel-based reports and it is capable of downloading and analyzing data of several social
network platforms like Twitter, Flickr and Facebook. In Twitter user network, a Twitter user is
vertex in NodeXl and edge represents the relationship between users. Relationship between two
vertices can be direct or un-directed. In Twitter user network, "in-degree" of each vertex is how
many users in network have mentioned or retweeted his/her tweet. Retweets by a user in the
network and other users mentioned by that specific user is out-degree of that vertex.
Along with finding the most central users of #PanamaLeaks network, we aim to visualize
#PanamaLeaks network dynamically to find structural changes in the network. We choose Gephi
social network analysis tool [22] for network visualization due to its capability for visualizing
large, complex and dynamic networks. Gephi is capable of visualizing network with many differ-
ent algorithm like Force-Atlas, Fruchterman-Reingold, Yifan Hu etc [23].
3.2. Data Source
We used NodeXl Twitter Search Network data collector to get tweets having #PanamaLeaks. It
took us six months to collect these tweets because twitter streaming API only allows downloading
previous seven days of tweets.We choose #PanamaLeaks as keyword to download tweets. Our
dataset contains 10612 nodes and 24623 edges exist in the #Panamaleaks network during March
2017 to August 2017.
For validation purpose, we took #NigeriaDecides case study data set is used in [20]. The author
used #NigeriaDecides as a query to download tweets and generated network of tweets, mentions
and replies, which is same as #PanamaLeaks case study. #NigeriaDecides case study data set
consist of 1752 nodes and 6343 edges from 15 April 2015 to 20 April 2015.
In both case studies networks, nodes are the twitter users and edges are the relation between
two twitter users. NodeXl add an edge, when one user tweets, retweets or mention other user/users
in his/her tweet. Edges coming towards one users is "in-degree" of that specific user and edges
going from that user to others in network are "out-degree" of that specific user. If a user creates
new tweet/tweets without mentioning, replying or retweeting another users tweet, NodeXl adds
self-loop around that user in the network.
3.3. Methods
We combine all the data (Tweets downloaded using NodeXl during six months) and then divide
it into six months of different networks according to the dates of tweets from March 2017 to August
2017. We requested NodeXl to generate following matrices "in-degree", "out-degree", "between-
ness centrality", "density", "clustering coefficient", and "modularity" for each month indepen-
dently. "In-degree" is simple count of unique incoming connections/links towards a user/entity in
a directed graph. Whereas "out-degree" is simple count of unique links/connections from a user.
"Betweenness centrality" of the node (A unique user in a network) is how many times a node
appears in the shortest path between other nodes (other users in the same network) [24].
"In-degree", "out-degree" and "betweenness centrality" are the three measures used by Feng
in [18] for identifying most central users in online discussion network. That is the reason we also
used these three measures on #PanamaLeaks case study. We identified top ten central users based
on "betweenness centrality" for each months in the #PanamaLeaks network. We also identified
6
top ten central users in the #NigeriaDecides case study used in [20] for validation purpose. For
visualization of connection patterns for most central users in #PanamaLeaks network, we use Yifan
Hu algorithm for both case studies. Figure 7 shows connection pattern for conversation starter for
#PanamaLeaks and #NigeriaDecies. Figure 8, 10 and 12 shows connection patterns for influencer,
active engager and network builder in the #PanamaLeaks network for each month from April 2017
to August 2017. Figure 9, 11 and 13 shows the connection patterns for #NigeriaDecides network.
We used social network analysis measures like "density", "clustering coefficient", and "mod-
ularity" to analyze overall communication pattern among the participants of the #PanamaLeaks
network. To check the impact of conversation starter and influencer on the online discussion
network, we use number of unique users coming into #PanamaLeaks network every month.
For visualization of overall communication pattern among #PanamaLeaks network participant.
We created dynamic network of #PanamaLeaks using Gephi. We implemented month wise time
stamp on the network based on tweet date. We used Yifan Hu algorithm, one of the many avail-
able algorithm for network visualization in Gephi. Figure 15a, 15b, 15c, 15d, 15e and 15f are
showing communication patterns between all users of #PanamaLeaks network for March, April,
May, June, July and August respectively. Figure 16 shows overall visualization of the complete six
months network from March 2017 to August 2017 using Yifan Hu algorithm. Our overall research
methodology has been shown in figure 6.
Figure 6: Research method.
4. Results
In this section, we present series of experiments carried out in our study.
7
4.1. Conversation starter
According to the two-step flow theory, information flows from mass media to opinion leaders
and then transmitted to the population via opinion leaders [11]. In light of the above, we took
"siasatpk" as our conversation starter as it is a mass media platform. As per the result of NodeXl,
conversation starter topped the list as expected. According to results of March, April, May, June,
and July "in-degree" of "siasatpk" is 211, 137, 203, 446 and 1463 respectively. Whereas, "Out-
degree" of "siasatpk" for March, April, May, June, and July is 1, 3, 2, 7 and 22 respectively.
"siasatpk" who is playing the role as conversation starters in #PanamaLeaks network remains
the first or second most influential participant of the network from March to July. "In-degree" of
"siasatpk" is zero in the month of August because "siasatpk" stop taking participation in discussion
from August (See Table 1).
Table 1: Presenting "in-degree", "out-degree", "betweeness centrality" and "rank" of "siasatpk" playing role as
"Conversation Starter" in the #Panamaleaks network. The number "1" in rank column presents that "conversation
starter" is the most central user in #PanamaLeaks network.
Month
March
April
May
June
July
August
In-degree
211
137
203
446
1463
0
Out-degree
1
3
2
7
22
0
Betweenness
492974.973
461067.857
975715.667
1219538.696
7539507.557
-
Rank
1
2
2
1
1
-
"saharareporters" with (in − degree = 345, out − degree = 13 and betweenness − centrality =
616332.423) is playing the role of conversation starter in the #NigeriaDecides case study, which
we used for validation. As far as the connection pattern for conversation starter of #PanamaLeaks
network, Figures 7a,7b,7c,7d and 7e are showing the five months connection pattern of conversa-
tion starter. Mostly isolates are pointing towards the conversation starter (mentioning or retweet-
ing tweets of conversation starter). Conversation starter is acting as a hub in the #PanamaLeaks
network. Results of the #NigeriaDecides case study used for validation revels the same pattern of
communication between conversation starter and other participants of the network. (See Figure
7f).
8
(a) "Conversation Starter" of March
(b) "Conversation Starter" of April
(c) "Conversation Starter" of May
(d) "Conversation Starter" of June
(e) "Conversation Starter" of July
(f) "Conversation Starter" of the #NigeriaDecides
Figure 7: Connection Pattern for "Conversation Starter" of every month. Middle node of every figure is
"Conversation Starter". Size and color of nodes is according to their degree. Thus, the nodes bigger in size are high
degree nodes and smaller nodes are nodes having low degree. Whereas, green nodes are nodes having lowest degree
and color tends to change towards white with increase in degree.
9
4.2. Influencer
There can be more than one influencer in the online discussion network as result shows. Here
we present top three influencer in #PanamaLeaks network of each month based on "betweenness
centrality". In March, "qaiserthethia" with (in−degree = 139, out−degree = 12) is the third most
central user of the network. Fourth most central user of the March network is "alirazatweets" with
(in − degree = 150, out − degree = 1). "xaifoo official" is the fifth most central user in March
network with (in − degree = 90, out − degree = 1).
In April, "ptiofficial" is the most central user of the network acting as an influencer in the
network with (in − degree = 266, out − degree = 1) which means 266 other users have mentioned
or retweeted "ptiofficial" tweets. Third most central user is "qaiserthethia" with (in − degree =
107, out − degree = 12) and "amranafahad" with (in − degree = 116, out − degree = 2) is fourth
most central user of April network.
In May, the most central user is "khaleejmag" with (in − degree = 347, out − degree = 1).
"diyarahman99" is the third most central user of May network with (in − degree = 176, out −
degree = 1) and "maryamnsharif" with (in − degree = 59, out − degree = 0) is the fourth most
central user of May network.
In June, second, fourth and sixth most central users are "dunyanews", "imrankhanpti" and
"ptiofficial" with (in − degree = 290, out − degree = 17), (in − degree = 105, out − degree = 0)
and (in − degree = 80, out − degree = 1) respectively playing role as influencers in the network.
In July, "imrankhanpti" with (in − degree = 181, out − degree = 0), "dunyanews" with (in −
degree = 122, out − degree = 15) and "defencepk" with (in − degree = 111, out − degree = 1)
are the second, fourth and fifth most central user in the network.
In August, "Shahzad ind" with (in − degree = 721, out − degree = 2) and "yadavtejashwi"
with (in − degree = 622, out − degree = 0) are the top two most central users in network.
The overall results of the top three influencers of each month is shown in table 2.
10
Table 2: Top Three "Influencers" of #PanamaLeaks network for every month based on "Betweenness Centrality"
Month
March
April
May
June
July
August
Name of User
qaiserthethia
alirazatweets
xaifoo official
ptiofficial
qaiserthethia
amranafahad
khaleejmag
diyarahman99
maryamnsharif
dunyanews
imrankhanpti
ptiofficial
imrankhanpti
dunyanews
defencepk
shehzad ind
yadavtejashwi
In-Degree
139
150
90
266
107
116
347
176
59
290
105
80
181
122
111
721
622
Out-Degree Betweenness
315421.518
12
251914.020
1
1
200590.403
596473.970
1
329445.157
12
2
288166.206
1313558.254
1
608312.772
1
0
551766.163
836335.327
17
288851.658
0
213124.288
1
0
800178.225
705731.185
15
601869.039
1
2
328635.667
194985.667
0
Rank
3
4
5
1
3
4
1
3
4
2
4
6
2
4
5
1
2
Figure 8a shows the connection pattern of "qaiserthethia, who is playing role as influencer in
the month of March. Figure 8b shows connection pattern "ptiofficial", acting as top influencer in
the month of March. Many arrows are pointing towards this node can be seen in figure 8b and most
of these nodes are small. Which means mostly isolates like to mention or retweet influencer in the
network. "khaleejmag" is the top influencer of May network. Connection pattern of "khaleejmag"
is shown in 8c. June result shows, that conversation starter and active engager of June both
mentioned top influencer of that month. However, most nodes connecting with the "imrankhanpti"
are small, which means they are also isolates having low connectivity in the network. Figure 8d 8e
8f are showing the connection patterns of top influencer of June, July and August respectively.All
of the above figures are showing same pattern, which shows connection pattern of influencer in
the network remain similar.
11
(a) Top "Influencer" of March
(b) Top "Influencer" of April
(c) Top "Influencer" of May
(d) Top "Influencer" of June
(e) Top "Influencer" of July
(f) Top "Influencer" of August
Figure 8: Connection Pattern for "Influencer" of every month. Middle node of every figure is "Influencer". Size and
color of nodes is according to their degree. Thus, the nodes bigger in size are high degree nodes and smaller nodes
are nodes having low degree. Whereas, green nodes are nodes having lowest degree and color tends to change
towards white with increase in degree.
12
In #NigeriaDecides network, "thisisbuhari", "mbuhari","inecnigeria" are the top three influ-
encers ranked by "betweenness centrality" playing the role of influencer with (in − degree =
262, out−degree = 0, betweenness−centrality = 215550.136), (in−degree = 169, out−degree =
0, betweenness − centrality = 199496.055) , (in − degree = 67, out − degree = 0, betweenness −
centrality = 142580.817). Figure 9 shows the top influencer "thisisbuhari" of #NigeriaDecides.
Results are consistant with #PanamaLeaks case study as well as Feng study [18].
Figure 9: Top "Influencer" of #NigeriaDecides case study. Node in the center named as "thisisbuhari" is the top
"Influencer" of #NigeriaDecides network. Size and color of nodes is according to their degree. Thus, the nodes
bigger in size are high degree nodes and smaller nodes are nodes having low degree. Whereas, blue nodes are nodes
having lowest degree and color tends to change towards white with increase in degree.
4.3. Active engager
Result shows that in the network of March second most central user with (in − degree =
0, out − degree = 65) is "sugar9940" an active engager. In network of April "sugar9940" again
act as an active engager with (in − degree = 0, out − degree = 41) and became fifth most central
user in the network. Seventh most central user "umj3rry" is active engager in network of May with
(in − degree = 0, out − degree = 56) and in June it's once again "sugar9940" with (in − degree =
0, out − degree = 96). In network of July and August "lavajatonews" with (in − degree = 0, out −
degree = 65), (in− degree = 0, out − degree = 14) respectively is active engager. "lavajatonews"
is third most central user of July network and seventh most central user of August network playing
role as active engager (See table 3).
13
Table 3: Presenting "in-degree", "out-degree", "betweeness centrality" and "Betweeness wise rank" of the top
"Active Engager" of each month in the #PanamaLeaks network.
Month User name
sugar9940
March
April
sugar9940
umj3rry
May
sugar9940
June
July
lavajatonews
lavajatonews
August
In-degree
0
0
0
0
0
0
Out-degree Betweenness
356338.123
65
41
216878.111
357661.301
56
530891.138
96
65
798249.408
1360.000
14
Rank
2
5
7
3
3
7
Figures 10 is showing connection pattern for active engagers from March to August.
In
March, "sugar9940" is playing the role of active engager by retweeting/mentioning other par-
ticipants of the network. "sugar9940" mentiond participant having high degree like "qaiser-
thethia","alirazatweets" and "siasatpk", connection pattern of March active engager can be seen
in 10a."sugar9940" is again playing the role of active engager in April, Figure 10b shows the con-
nection pattern of "sugar9940". Mentioning "qaiserthethia","maryamnsharif" and "imrankhanpti"
three influencers in April network is the reason of his central position in the network. "umj3rry"
takes the role of active enager in May network. Figure 10c shows the connection pattern of
"umj3rry". By mentioning conversation starter, two influecers and other participants in June
"sugar9940" again is the active engager as shown in figure 10d. Figure 10e 10f shows the con-
nection pattern for active engager of July and August month respectively. Interesting thing to note
is that, in-degree for active engagers of all the months is zero. Which means either no participant
has mentioned or retweeted active engager's tweet.
14
(a) Top "Active engager" of March
(b) Top "Active engager" of April
(c) Top "Active engager" of May
(d) Top "Active engager" of June
(e) Top "Active engager" of July
(f) Top "Active engager" of August
Figure 10: Connection Pattern for "Active engager" of every month. Middle node of every figure is "Active engager".
Size and color of nodes is according to their degree. Thus, the nodes bigger in size are high degree nodes and smaller
nodes are nodes having low degree. Whereas, green nodes are nodes having lowest degree and color tends to change
towards white with increase in degree.
15
"wakiligentleman" is playing role as active engager in the network of #NigeriaDecides with
in − degree = 1 and out − degree = 26. He is the seventh most central user of the network. "Be-
tweenness centrality" of "wakiligentleman" is 112865.285. By mentioning/retweeting influencers
as well as conversation starter in his tweets, he got high betweenness centrality. Figure 11 shows
the connection pattern of "wakiligentleman", results are consistant with #PanamaLeaks case study
with many out-going connections.
Figure 11: Connection Pattern for "Active Engager" of #NigeriaDecides network. Node in the middle of figure is
"Active Engager". Size and color of nodes is according to their degree. Thus, the nodes bigger in size are high degree
nodes and smaller nodes are nodes having low degree. Whereas, blue nodes are nodes having lowest degree and
color tends to change towards white with increase in degree.
4.4. Network builder
"shahwar125" with only (in− degree = 0, out − degree = 2) is interestingly sixth most central
user of the March network playing role as network builder. With only (in − degree = 0, out −
degree = 7) "ambitiousfree" is again the sixth most central user of April netowork because he
mentioned two influencers "maryamnsharif" and "amranafahad" in his tweets and build a strategic
location in the network like "shahwar125" in the network of March month. "ali axhar" with
(in−degree = 20, out−degree = 8), "deziggnerumer" with (in−degree = 0, out−degree = 18) are
the network builders for month of May and June respectively. In July we could find " waqas788"
as network builder on thirteenth position with (in−degree = 5, out−degree = 21). In August with
(in − degree = 0, out − degree = 3) "foroneindia" is the network builder. He is the fourth most
central user in the netwrok. No influencer in the network of all months has mentioned network
builders in his/her tweet but still by connecting two or more Influential, network builders got
central positions in the network. The overall results of top network builder in the network is
shown in table 4.
16
Table 4: Presenting "in-degree", "out-degree", "betweeness centrality" and "rank" of top "Network Builder" of each
month in the #Panamaleaks network based on "Betweenness Centrality".
In-degree
Month User name
0
shahwar125
March
0
April
ambitiousfree
ali axhar
May
20
deziggnerumer 0
June
July
waqas788
5
0
foroneindia
August
Out-degree Betweenness
186462.694
2
7
162629.964
295700.335
8
267362.714
18
21
276354.023
2880.000
3
Rank
6
6
10
5
13
4
Node in the middle of Figure 12a "shahwar125" is network builder of March. With only two
out-degree links, he is the sixth most central user in network. "shahwar125" built a strategic loca-
tion in network by mentioning/retweeting only two participants having high degree. Figures 12b
12c 12d 12e 12f shows the connection pattern for network builder of April, May, June, July and
August respectively. All the above figures show similar pattern of communication. All network
builders have few "in-degree" and "out-degree" links; however, they build strategic location in the
#PanamaLeaks network by mentioning influencers or conversation starter.
17
(a) Top "Network builder" of March
(b) Top "Network builder" of April
(c) Top "Network builder" of May
(d) Top "Network builder" of June
(e) Top "Network builder" of July
(f) Top "Network builder" of August
Figure 12: Connection Pattern for "Network Builder" of every month. Middle node of every figure is "Network
builder". Size and color of nodes is according to their degree. Thus, the nodes bigger in size are high degree nodes
and smaller nodes are nodes having low degree. Whereas, green nodes are nodes having lowest degree and color
tends to change towards white with increase in degree.
18
"teamagbaje2015" is playing the role as network builder in #NigeriaDecides network with
in − degree = 13 and out − degree = 3. He is the fifth most centeral user of #NigeriaDecides net-
work by only mentioning two influencer "thisisbuhari", "demolarewaju" and conversation starter
"saharareporters" of the network. This result is also consistent with #PanamaLeaks network. Fig-
ure 13 is showing the links of network builder of #NigeriaDecides network.
Figure 13: Connection Pattern for "Network Builder" of #NigeriaDecides network. Node in the middle of figure is
"Active Engager". Size and color of nodes is according to their degree. Thus, the nodes bigger in size are high degree
nodes and smaller nodes are nodes having low degree. Whereas, blue nodes are nodes having lowest degree and color
tends to change towards white with increase in degree.
4.5. Information bridge
Results reveal that there is no information bridge in #PanamaLeaks six months network. In-
formation bridge is the user, who mention/retweets influencer tweet and that same tweet is again
retweeted by active engager [18]. We could not find any user with few "in-degree" and "out-
degree" links, who has retweeted influencer tweet and then that same tweet is retweeted by active
engager. We applied this aproach to #NigeriaDecides case study [20] for validation purpose and
according to the results; there exist no user like information bridge. Although, we were able to
find conversation starter, influencer, active engager and network builder in #NigeriaDecides case
study also.
4.6. Structural analysis
Figure 14a shows the number of unique users participating in #PanamaLeaks online discus-
sion every month. Number of unique users coming into #PanamaLeaks discussion network was
1277 in March. In April and May 1412 and 1750 unique users came into the network respec-
tively. 1487 unique users joined discussion in June and 3626 joined discussion in July. However,
there is a sudden decrease in number of unique users participating in #PanamaLeaks discussion
in August with 880 new unique users coming into the network. In September, there are negligi-
ble number of users discussing the issue of Panama Leaks anymore. That is the reason we only
analyzed this network until August. Figure 14b shows the density of #PanamaLeaks network.
Gradual decrees in the density of the network can be seen. However, there is a sudden increase
19
in density after July. Average clustering coefficient of #PanamaLeaks from March to August is
shown in Figure 14c. Average clustering coefficient of the network starts from 0.049 on March
and with gradual increase ends at 0.312 on August. Modularity of the #PanamaLeaks network is
0.773821, 0.656387, 0.696806, 0.579446, 0.49243 and 0.381433 for March, April, May, June, July
and August respectively (See Figure 14d).
(a) Unique users
(b) Density
(c) Avg. Clustering coefficient
(d) Modularity
Figure 14: Number of Unique users are shown in 14a. Overall Density of #PanamaLeaks network is shown in 14b.
14c is showing Average Clustering Cofficient of the network. Figure 14d is showing Modularity of the netwrok.
Figure 15 shows interaction patterns of users, there exist many isolates pointing towards the
influencers and conversation starter in the network. Figure 15a shows the network of March and
communities forming around conversation starter and influencers can be seen. These communities
keep on growing until July, which can be seen in figure 15b, 15c, 15d, 15e and 15f. However, in
August when major influencers and conversation starter left the discussion, communities started
to dissolve which can be seen in figure 15f. A combine visualization of #PanamaLeaks network
20
from March to August is shown in figure 16. A circle of participants around the graph can be seen.
These participants are not connected to any influencer or conversation starter in the #PanamaLeaks
network.
21
(a) March
(b) April
(c) May
(d) June
(e) July
(f) August
Figure 15: Dynamic Graph Visualization of #PanamaLeaks network for each by Gephi using Yifan Hu algorithm.
Communities forming around "Conversation Starter" and "Influencers" are presented in different colors.
22
Figure 16: Overall network structure of complete six months of #PanamaLeaks using Gephi.
5. Discussion
5.1. Conversation starter
A conversation starter is one, who is center of the network and connects many "isolates" who
otherwise have few or no links in the network [18]. These are the participants with high between-
ness [25]. Our results reveled the same as many "isolates" retweeted or mentioned "siasakpk"
in their tweets. There were some influential mentioning conversation starter in their tweets but
they are very few, mostly "isolates" tends to connect with conversation starter to gain informa-
tion. Twitter users with high connectivity are better at influencing information flow in Twitter
network [26]. This makes the conversation starter center of the network by various incoming
connections. However, when conversation starter stops taking participation in the network (Stop
Tweeting about the Topic) "isolates" also lose interest in the online conversation. As results rev-
eled that in August when conversation starter is no more in the network, there is sudden decrease
in the people discussing about the topic online. However, until the conversation starter keeps on
participating in the discussion. Conversation starter remains on the top central positions in the
network.(See Figure 17).
23
Figure 17: Changes in Ranking of Central users from March 2017 to August 2017. Months are shown on x-axis and
betweenness wise rank are shown along with y-axis.
5.2. Influencer
There exist influencers in the online discussion network [18] with plentiful "in-degree" and
few "out-degree" links. They are called opinion leaders in the network and isolates like to mention
them in their tweets. Isolates also like to retweet opinion leader's tweet and these opinion leaders
are usually mass media organizations or celebrities in different fields of life [18]. Opinion leaders
create many tweets to influence other users in online discussion. In this way, they act to influence
opinion in an online discussion network. Information is going from opinion leaders to users with
less connectivity and this supports the argument by [27, 28] that opinion leaders by using their
network connectivity replicate asymmetric offline power in online discussion. The participant like
influencer who has high degree in network act as hub in the network [29]. However, Opinion
leader's influence is not consistent as the results show in #PanamaLeaks study their influence can
increase/decrease with the passage of time. There can be changes in the"betweenness centrality"
of network influencers as well. Figure 18 shows the changing in betweenness centrality of five
selected influencers in the #PanamaLeaks network.
24
Figure 18: Changes in "Betweenness Centrality" of selected "Influencers" in #PanamaLeaks network.
5.3. Active engager
A user with many "out-degree" and none or few "in-degree" links is active engager in the
network [18]. Results also reveal that there always exist an active engager in the network from
start of conversation until end. However, position of active engager is not consistent and other
active engager can take his/her place with the passage of time. Active engager is also among the
top ten most central users of the network. Results show that active engager is one who is active
and with intention to get information. However, there are usually few or no user in the network
to follow or mention him in their tweets. From the centrality point of view, active engager is an
important user. However, Active engager in a socity is a person with special knowledge, who has
potential to become influencer [30].
5.4. Network builder
Network builder in a network has few or none "in-degree" and few "out-degree" links [18]. His
basic role in the network is to associate two or more influential nodes in network. By this, network
builder builds a strategic location in network due to which it gets high centrality. However, in [18]
"wnkr" is a network builder and its in-degree is "0". Which means no one either has mentioned
or retweet "wnkr" in their tweets. In #PanamaLeaks network, network builders follow the same
tendency. In this context, we can conclude that network builder do help in creating connection
between two or more influencers in the online discussion network. However, influencers usually
do not mention or reply on their tweets. Therefore, their impact on the opinion in a network is
petite.
5.5. Information bridge
Information bridge is a user with few "in-degree" and "out-degree" links, who connects an
influencer and active engager as noted in [18]. However, results of six months of network shows
that there is no user such as information bridge exist in the network. We implemented this concept
on the dataset #NigeriaDecides used in [20] for validation purpose. Result shows that in the
#NigeriaDecides, there does not exist any user who has retweeted influencer tweet and that tweet
25
is retweeted by active engager. Active engager's basic role in network is to get engage with other
users [18], and for this purpose; active engager likes to retweet mostly influencer/conversation
starter tweets. Active engagers do not mostly retweet/mention "isolates" in their tweets. In this
context, we can conclude that there is very less chance that an active engager retweets same tweet
in which a person with few "in-degree" and "out-degree" has mentioned influencer.
5.6. Network structure
Unique users have increased until June and then there is a sudden decrease in the number
of unique users as shown in figure 14a. When conversation starter stop taking participation in
the online discussion there is a sudden decrease in number of unique users participation. Users
with high connectivity like conversation starter can influence the participation of users [31]. In
this context, opinion leaders have the power to keep isolates interested in the online discussion.
Network density can decrease with the number of increase users in the network and increase when
number of participants decrease [8], density of the network is showing same tendency. Participant
of the online discussion tends to cluster around the influential participants and with the passage of
time in presence of conversation starter and influencers, participant became less independent as
modularity decreased [25]. However, with many participants having low degree pointing towards
the conversation starter and influencer. We can conclude that they play role as hub in the online
discussion network.
26
Reference
References
[1] Sheela Gole and Bharat Tidke. Frequent itemset mining for big data in social media using clustbigfim algorithm.
In Pervasive Computing (ICPC), 2015 International Conference on, pages 1–6. IEEE, 2015.
[2] Itai Himelboim, Stephen McCreery, and Marc Smith. Birds of a feather tweet together: Integrating network and
content analyses to examine cross-ideology exposure on twitter. Journal of Computer-Mediated Communication,
18(2):40–60, 2013.
[3] Victor R Martinez, Miguel A Escalante, Mariano Beguerisse-D´ıaz, Elmer Garduno, and Victor M Gonzalez.
Understanding human behavior in urban spaces using social network data: A mobility graph approach. 2016.
[4] Eugene Ch'ng. The bottom-up formation and maintenance of a twitter community: analysis of the# freejahar
twitter community. Industrial Management & Data Systems, 115(4):612–624, 2015.
[5] Seung Ik Baek and Young Min Kim. Longitudinal analysis of online community dynamics. Industrial Manage-
ment & Data Systems, 115(4):661–677, 2015.
[6] Justine I Blanford, Zhuojie Huang, Alexander Savelyev, and Alan M MacEachren. Geo-located tweets. enhanc-
ing mobility maps and capturing cross-border movement. PloS one, 10(6):e0129202, 2015.
[7] Alireza Abbasi and Naim Kapucu. A longitudinal study of evolving networks in response to natural disaster.
Computational and mathematical organization theory, 22(1):47–70, 2016.
[8] Mi Kyung Lee, Ho Young Yoon, Marc Smith, Hye Jin Park, and Han Woo Park. Mapping a twitter scholarly
communication network: a case of the association of internet researchers conference. Scientometrics, pages
1–31, 2017.
[9] Evelien Otte and Ronald Rousseau. Social network analysis: a powerful strategy, also for the information
sciences. Journal of information Science, 28(6):441–453, 2002.
[10] Everett M Rogers. Diffusion of innovations. free press. New York, page 551, 2003.
[11] Elihu Katz and F Paul. Lazarsfeld (1955), personal influence. The Part Played by People in the Flow of Mass
[12] Ronald S Burt. The social capital of opinion leaders. The Annals of the American Academy of Political and
Communication. New York, 1955.
Social Science, 566(1):37–54, 1999.
[13] Rosa Borge Bravo and Marc Esteve Del Valle. Opinion leadership in parliamentary twitter networks: A matter
of layers of interaction? Journal of Information Technology & Politics, pages 1–14, 2017.
[14] Abolfazl Aleahmad, Payam Karisani, Maseud Rahgozar, and Farhad Oroumchian. Olfinder: Finding opinion
leaders in online social networks. Journal of Information Science, 42(5):659–674, 2016.
[15] Baocheng Huang, Guang Yu, and Hamid Reza Karimi. The finding and dynamic detection of opinion leaders in
social network. Mathematical Problems in Engineering, 2014, 2014.
[16] Feng Li and Timon C Du. Who is talking? an ontology-based opinion leader identification framework for
word-of-mouth marketing in online social blogs. Decision Support Systems, 51(1):190–197, 2011.
[17] Xiaofei Zhang and Dahai Dong. Ways of identifying the opinion leaders in virtual communities. International
Journal of Business and Management, 3(7):21, 2009.
[18] Yang Feng. Are you connected? evaluating information cascades in online discussion about the# racetogether
campaign. Computers in Human Behavior, 54:43–53, 2016.
[19] Pamela L Cross and Braek RJ Urquhart. The panama papers: Official statements from caribbean countries.
Trusts & Trustees, 23(1):8–13, 2017.
[20] Collins Udanor, Collins Udanor, Stephen Aneke, Stephen Aneke, Blessing Ogechi Ogbuokiri, and Bless-
ing Ogechi Ogbuokiri. Determining social media impact on the politics of developing countries using social
network analytics. Program, 50(4):481–507, 2016.
[21] Marc A Smith, Ben Shneiderman, Natasa Milic-Frayling, Eduarda Mendes Rodrigues, Vladimir Barash, Cody
Dunne, Tony Capone, Adam Perer, and Eric Gleave. Analyzing (social media) networks with nodexl.
In
Proceedings of the fourth international conference on Communities and technologies, pages 255–264. ACM,
2009.
27
[23] Ken Cherven. Mastering Gephi network visualization. Packt Publishing Ltd, 2015.
[24] Linton C Freeman. A set of measures of centrality based on betweenness. Sociometry, pages 35–41, 1977.
[25] Weiai Wayne Xu, Ji-young Park, and Han Woo Park. Longitudinal dynamics of the cultural diffusion of kpop
on youtube. Quality & Quantity, 51(4):1859–1875, 2017.
[26] Weiai Wayne Xu, Yoonmo Sang, Stacy Blasiola, and Han Woo Park. Predicting opinion leaders in twitter
activism networks: The case of the wisconsin recall election. American Behavioral Scientist, 58(10):1278–
1293, 2014.
[27] Lincoln Dahlberg. Rethinking the fragmentation of the cyberpublic: from consensus to contestation. New media
& society, 9(5):827–847, 2007.
[22] Mathieu Bastian, Sebastien Heymann, Mathieu Jacomy, et al. Gephi: an open source software for exploring and
manipulating networks. Icwsm, 8:361–362, 2009.
[28] Graham Murdock and Peter Golding. Dismantling the digital divide: Rethinking the dynamics of participation
and exclusion. Toward a political economy of culture: Capitalism and communication in the twenty-first century,
pages 244–260, 2004.
[29] Manju K Ahuja, Dennis F Galletta, and Kathleen M Carley. Individual centrality and performance in virtual
r&d groups: An empirical study. Management science, 49(1):21–38, 2003.
[30] Daniele Quercia, Michal Kosinski, David Stillwell, and Jon Crowcroft. Our twitter profiles, our selves: Predict-
ing personality with twitter. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational
Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on, pages 180–185.
IEEE, 2011.
[31] Jinlou Zhao, Hongyu Gao, Yongli Li, and Jiaguo Liu. Which factors affect the duration of hot topics on social
media platforms? Quality & Quantity, 51(5):2395–2407, 2017.
28
|
1704.03913 | 2 | 1704 | 2018-01-05T03:35:00 | Higher-order clustering in networks | [
"cs.SI",
"cond-mat.stat-mech",
"physics.soc-ph",
"stat.ML"
] | A fundamental property of complex networks is the tendency for edges to cluster. The extent of the clustering is typically quantified by the clustering coefficient, which is the probability that a length-2 path is closed, i.e., induces a triangle in the network. However, higher-order cliques beyond triangles are crucial to understanding complex networks, and the clustering behavior with respect to such higher-order network structures is not well understood. Here we introduce higher-order clustering coefficients that measure the closure probability of higher-order network cliques and provide a more comprehensive view of how the edges of complex networks cluster. Our higher-order clustering coefficients are a natural generalization of the traditional clustering coefficient. We derive several properties about higher-order clustering coefficients and analyze them under common random graph models. Finally, we use higher-order clustering coefficients to gain new insights into the structure of real-world networks from several domains. | cs.SI | cs |
Higher-order clustering in networks
Hao Yin∗
Institute for Computational and Mathematical Engineering, Stanford University, Stanford, CA, 94305, USA
Department of Computer Science, Cornell University, Ithaca, NY, 14850, USA
Austin R. Benson†
Computer Science Department, Stanford University, Stanford, CA, 94305, USA
(Dated: January 8, 2018)
Jure Leskovec‡
A fundamental property of complex networks is the tendency for edges to cluster. The extent
of the clustering is typically quantified by the clustering coefficient, which is the probability that
a length-2 path is closed, i.e., induces a triangle in the network. However, higher-order cliques
beyond triangles are crucial to understanding complex networks, and the clustering behavior with
respect to such higher-order network structures is not well understood. Here we introduce higher-
order clustering coefficients that measure the closure probability of higher-order network cliques
and provide a more comprehensive view of how the edges of complex networks cluster. Our higher-
order clustering coefficients are a natural generalization of the traditional clustering coefficient. We
derive several properties about higher-order clustering coefficients and analyze them under common
random graph models. Finally, we use higher-order clustering coefficients to gain new insights into
the structure of real-world networks from several domains.
I.
INTRODUCTION
Networks are a fundamental tool for understanding
and modeling complex physical, social,
informational,
and biological systems [1]. Although such networks are
typically sparse, a recurring trait of networks through-
out all of these domains is the tendency of edges to ap-
pear in small clusters or cliques [2, 3].
In many cases,
such clustering can be explained by local evolutionary
processes. For example, in social networks, clusters ap-
pear due to the formation of triangles where two indi-
viduals who share a common friend are more likely to
become friends themselves, a process known as triadic
closure [2, 4]. Similar triadic closures occur in other net-
works: in citation networks, two references appearing in
the same publication are more likely to be on the same
topic and hence more likely to cite each other [5] and in
co-authorship networks, scientists with a mutual collab-
orator are more likely to collaborate in the future [6]. In
other cases, local clustering arises from highly connected
functional units operating within a larger system, e.g.,
metabolic networks are organized by densely connected
modules [7].
The clustering coefficient quantifies the extent to
which edges of a network cluster in terms of triangles.
The clustering coefficient is defined as the fraction of
length-2 paths, or wedges, that are closed with a trian-
gle [3, 8] (Fig. 1, row C2). In other words, the clustering
coefficient measures the probability of triadic closure in
∗ [email protected]
† [email protected]
‡ [email protected]
1. Start with 2. Find an adjacent edge 3. Check for an
(ℓ + 1)-clique
to form an ℓ-wedge
an ℓ-clique
C2
C3
C4
FIG. 1. Overview of higher-order clustering coefficients as
clique expansion probabilities. The ℓth-order clustering co-
efficient Cℓ measures the probability that an ℓ-clique and an
adjacent edge, i.e., an ℓ-wedge, is closed, meaning that the
ℓ − 1 possible edges between the ℓ-clique and the outside node
in the adjacent edge exist to form an (ℓ + 1)-clique.
the network. However, the clustering coefficient is in-
herently restrictive as it measures the closure probabil-
ity of just one simple structure-the triangle. Moreover,
higher-order structures such as larger cliques are crucial
to the structure and function of complex networks [9–
11]. For example, 4-cliques reveal community structure
in word association and protein-protein interaction net-
works [12] and cliques of sizes 5–7 are more frequent than
triangles in many real-world networks with respect to cer-
tain null models [13]. However, the extent of clustering
of such higher-order structures has not been well under-
stood nor quantified.
Here, we provide a framework to quantify higher-order
clustering in networks by measuring the normalized fre-
quency at which higher-order cliques are closed, which
we call higher-order clustering coefficients. We derive our
higher-order clustering coefficients by extending a novel
interpretation of the classical clustering coefficient as a
form of clique expansion (Fig. 1). We then derive sev-
eral properties about higher-order clustering coefficients
and analyze them under the Gn,p and small-world null
models.
Using our theoretical analysis as a guide, we analyze
the higher-order clustering behavior of real-world net-
works from a variety of domains. We find that each
domain of networks has its own higher-order clustering
pattern, which the traditional clustering coefficient does
not show on its own. Conventional wisdom in network
science posits that practically all real-world networks ex-
hibit clustering; however, we find that not all networks
exhibit higher-order clustering. More specifically, once
we control for the clustering as measured by the classical
clustering coefficient, some networks do not show signifi-
cant clustering in terms of higher-order cliques. In addi-
tion to the theoretical properties and empirical findings
exhibited in this paper, our related work also demon-
strates a connection between higher-order clustering and
community detection [14].
II. DERIVATION OF HIGHER-ORDER
CLUSTERING COEFFICIENTS
In this section, we derive our higher-order clustering
coefficients and some of their basic properties. We first
present an alternative interpretation of the classical clus-
tering coefficient and then show how this novel interpre-
tation seamlessly generalizes to arrive at our definition
of higher-order clustering coefficients. We then provide
some probabilistic interpretations of higher-order clus-
tering coefficients that will be useful for our subsequent
analysis.
A. Alternative interpretation of the classical
clustering coefficient
Here we give an alternative interpretation of the clus-
tering coefficient that will later allow us to generalize
it and quantify clustering of higher-order network struc-
tures (this interpretation is summarized in Fig. 1). Our
interpretation is based on a notion of clique expansion.
First, we consider a 2-clique K in a graph G (that is,
a single edge K; see Fig. 1, row C2, column 1). Next,
we expand the clique K by considering any edge e adja-
cent to K, i.e., e and K share exactly one node (Fig. 1,
row C2, column 2). This expanded subgraph forms a
wedge, i.e., a length-2 path. The classical global cluster-
ing coefficient C of G (sometimes called the transitivity
of G [15]) is then defined as the fraction of wedges that
are closed, meaning that the 2-clique and adjacent edge
induce a (2 + 1)-clique, or a triangle (Fig. 1, row C2, col-
2
umn 3) [8, 16]. The novelty of our interpretation of the
clustering coefficient is considering it as a form of clique
expansion, rather than as the closure of a length-2 path,
which is key to our generalizations in the next section.
Formally, the classical global clustering coefficient is
C =
6K3
W
,
(1)
where K3 is the set of 3-cliques (triangles), W is the
set of wedges, and the coefficient 6 comes from the fact
that each 3-clique closes 6 wedges-the 6 ordered pairs
of edges in the triangle.
We can also reinterpret the local clustering coeffi-
cient [3] in this way.
In this case, each wedge again
consists of a 2-clique and adjacent edge (Fig. 1, row C2,
column 2), and we call the unique node in the intersection
of the 2-clique and adjacent edge the center of the wedge.
The local clustering clustering coefficient of a node u is
the fraction of wedges centered at u that are closed:
C(u) =
2K3(u)
W (u)
,
(2)
where K3(u) is the set of 3-cliques containing u and W (u)
is the set of wedges with center u (if W (u) = 0, we say
that C(u) is undefined). The average clustering coeffi-
cient ¯C is the mean of the local clustering coefficients,
¯C =
C(u),
(3)
1
eV Xu∈ eV
where eV is the set of nodes in the network where the
local clustering coefficient is defined.
B. Generalizing to higher-order clustering
coefficients
Our alternative interpretation of the clustering coef-
ficient, described above as a form of clique expansion,
leads to a natural generalization to higher-order cliques.
Instead of expanding 2-cliques to 3-cliques, we expand
ℓ-cliques to (ℓ + 1)-cliques (Fig. 1, rows C3 and C4). For-
mally, we define an ℓ-wedge to consist of an ℓ-clique and
an adjacent edge for ℓ ≥ 2. Then we define the global ℓth-
order clustering coefficient Cℓ as the fraction of ℓ-wedges
that are closed, meaning that they induce an (ℓ+1)-clique
in the network. We can write this as
(ℓ2 + ℓ)Kℓ+1
Cℓ =
(4)
,
Wℓ
where Kℓ+1 is the set of (ℓ + 1)-cliques, and Wℓ is the set
of ℓ-wedges. The coefficient ℓ2 + ℓ comes from the fact
that each (ℓ + 1)-clique closes that many wedges: each
(ℓ + 1)-clique contains ℓ + 1 ℓ-cliques, and each ℓ-clique
contains ℓ nodes which may serve as the center of an ℓ-
wedge. Note that the classical definition of the global
clustering coefficient given in Eq. 1 is equivalent to the
definition in Eq. 4 when ℓ = 2.
We also define higher-order local clustering coefficients:
Cℓ(u) =
ℓKℓ+1(u)
Wℓ(u)
,
(5)
where Kℓ+1(u) is the set of (ℓ + 1)-cliques containing
node u, Wℓ(u) is the set of ℓ-wedges with center u (where
the center is the unique node in the intersection of the
ℓ-clique and adjacent edge comprising the wedge; see
Fig. 1), and the coefficient ℓ comes from the fact that
each (ℓ+1)-clique containing u closes that many ℓ-wedges
in Wℓ(u). The ℓth-order clustering coefficient of a node
is defined for any node that is the center of at least one
ℓ-wedge, and the average ℓth-order clustering coefficient
is the mean of the local clustering coefficients:
¯Cℓ =
Cℓ(u),
(6)
1
eVℓ Xu∈ eVℓ
where eVℓ is the set of nodes that are the centers of at
To understand how to compute higher-order clustering
least one ℓ-wedge.
coefficients, we substitute the following useful identity
Wℓ(u) = Kℓ(u) · (du − ℓ + 1),
where du is the degree of node u, into Eq. 5 to get
Cℓ(u) =
ℓ · Kℓ+1(u)
(du − ℓ + 1) · Kℓ(u)
.
(7)
(8)
From Eq. 8, it is easy to see that we can compute all
local ℓth-order clustering coefficients by enumerating all
(ℓ + 1)-cliques and ℓ-cliques in the graph. The compu-
tational complexity of the algorithm is thus bounded by
the time to enumerate (ℓ+1)-cliques and ℓ-cliques. Using
the Chiba and Nishizeki algorithm [17], the complexity
is O(ℓaℓ−2m), where a is the arboricity of the graph, and
m is the number of edges. The arboricity a may be as
large as √m, so this algorithm is only guaranteed to take
polynomial time if ℓ is a constant. In general, determin-
ing if there exists a single clique with at least ℓ nodes is
NP-complete [18].
For the global clustering coefficient, note that
Wℓ = Xu∈V
Wℓ(u).
(9)
3
C. Probabilistic interpretations of higher-order
clustering coefficients
To facilitate understanding of higher-order clustering
coefficients and to aid our analysis in Section III, we
present a few probabilistic interpretations of the quanti-
ties. First, we can interpret Cℓ(u) as the probability that
a wedge w chosen uniformly at random from all wedges
centered at u is closed:
Cℓ(u) = P [w ∈ Kℓ+1(u)] .
(10)
The variant of this interpretation for the classical clus-
tering case of ℓ = 2 has been useful for graph algorithm
development [19].
For the next probabilistic interpretation, it is useful to
analyze the structure of the 1-hop neighborhood graph
N1(u) of a given node u (not containing node u). The
vertex set of N1(u) is the set of all nodes adjacent to u,
and the edge set consists of all edges between neighbors
of u, i.e., {(v, w) (u, v), (u, w), (v, w) ∈ E}, where E is
the edge set of the graph.
Any ℓ-clique in G containing node u corresponds to a
unique (ℓ − 1)-clique in N1(u), and specifically for ℓ = 2,
any edge (u, v) corresponds to a node v in N1(u). There-
fore, each ℓ-wedge centered at u corresponds to an (ℓ−1)-
clique K and one of the du − ℓ + 1 nodes outside K (i.e.,
in N1(u)\K). Thus, Eq. 8 can be re-written as
ℓ · Kℓ(N1(u))
(du − ℓ + 1) · Kℓ−1(N1(u))
,
(11)
where Kk(N1(u)) denotes the number of k-cliques in
N1(u).
If we uniformly at random select an (ℓ − 1)-clique K
from N1(u) and then also uniformly at random select a
node v from N1(u) outside of this clique, then Cℓ(u) is
the probability that these ℓ nodes form an ℓ-clique:
Cℓ(u) = P [K ∪ {v} ∈ Kℓ(N1(u))] .
(12)
Moreover, if we condition on observing an ℓ-clique from
this sampling procedure, then the ℓ-clique itself is se-
lected uniformly at random from all ℓ-cliques in N1(u).
Therefore, Cℓ−1(u) · Cℓ(u) is the probability that an
(ℓ − 1)-clique and two nodes selected uniformly at ran-
dom from N1(u) form an (ℓ + 1)-clique. Applying this
recursively gives
Thus, it suffices to enumerate ℓ-cliques (to compute Wℓ
using Eq. 7) and to count the total number of ℓ-cliques.
In practice, we use the Chiba and Nishizeki to enumerate
cliques and simultaneously compute Cℓ and Cℓ(u) for all
nodes u. This suffices for our clustering analysis with
ℓ = 2, 3, 4 on networks with over a hundred million edges
in Section IV.
ℓYj=2
Cj(u) = Kℓ(N1(u))
(cid:0)du
ℓ(cid:1)
.
(13)
In other words, the product of the higher-order local clus-
tering coefficients of node u up to order ℓ is the ℓ-clique
density amongst u's neighbors.
u
u
u
C2(u)
C3(u)
C4(u)
1
1
1
d
2(d − 1)
≈
1
2
0
0
d−2
4d−4 ≈
1
4
d − 4
2d − 4
d − 6
2d − 6
≈
≈
1
2
1
2
FIG. 2. Example 1-hop neighborhoods of a node u with degree
d with different higher-order clustering. Left: For cliques,
Cℓ(u) = 1 for any ℓ. Middle: If u's neighbors form a complete
bipartite graph, C2(u) is constant while Cℓ(u) = 0, ℓ ≥ 3.
Right: If half of u's neighbors form a star and half form a
clique with u, then Cℓ(u) ≈ pC2(u), which is the upper
bound in Proposition 1.
III. THEORETICAL ANALYSIS AND
HIGHER-ORDER CLUSTERING IN RANDOM
GRAPH MODELS
We now provide some theoretical analysis of our
higher-order clustering coefficients. We first give some
extremal bounds on the values that higher-order clus-
tering coefficients can take given the value of the tradi-
tional (second-order) clustering coefficient. After, we an-
alyze the values of higher-order clustering coefficients in
two common random graph models-the Gn,p and small-
world models. The theory from this section will be a
useful guide for interpreting the clustering behavior of
real-world networks in Section IV.
A. Extremal bounds
We first analyze the relationships between local higher-
order clustering coefficients of different orders. Our tech-
nical result is Proposition 1, which provides essentially
tight lower and upper bounds for higher-order local clus-
tering coefficients in terms of the traditional local cluster-
ing coefficient. The main ideas of the proof are illustrated
in Fig. 2.
Proposition 1. For any fixed ℓ ≥ 3,
0 ≤ Cℓ(u) ≤pC2(u).
Moreover,
(14)
1. There exists a finite graph G with a node u such
that the lower bound is tight and C2(u) is within ǫ
of any prescribed value in [0, ℓ−2
2. There exists a finite graph G with a node u such
that Cℓ(u) is within ǫ of the upper bound for any
prescribed value of C2(u) ∈ [0, 1].
ℓ−1 ].
4
Proof. Clearly, 0 ≤ Cℓ(u) if the local clustering coefficient
is well defined. This bound is tight when N1(u) is (ℓ− 1)-
partite, as in the middle column of Fig. 2. In the (ℓ− 1)-
partite case, C2(u) = ℓ−2
ℓ−1 . By removing edges from this
extremal case in a sufficiently large graph, we can make
C2(u) arbitrarily close to any value in [0, ℓ−2
ℓ−1 ].
To derive the upper bound, consider the 1-hop neigh-
borhood N1(u), and let
δℓ(N1(u)) = Kℓ(N1(u))
(15)
(cid:0)du
ℓ(cid:1)
denote the ℓ-clique density of N1(u). The Kruskal-
Katona theorem [20, 21] implies that
δℓ(N1(u)) ≤ [δℓ−1(N1(u))]ℓ/(ℓ−1)
δℓ−1(N1(u)) ≤ [δ2(N1(u))](ℓ−1)/2.
Combining this with Eq. 8 gives
Cℓ(u) ≤ [δℓ−1(N1(u))]
1
ℓ−1 ≤pδ2(N1(u)) =pC2(u),
where the last equality uses the fact that C2(u) is the
edge density of N1(u).
The upper bound becomes tight when N1(u) consists
of a clique and isolated nodes (Fig. 2, right) and the
neighborhood is sufficiently large. Specifically, let N1(u)
consist of a clique of size c and b isolated nodes. When
ℓ = 2,
(c + b − 1)(c + b) →(cid:18) c
(c − 1)c
c + b(cid:19)2
Cℓ(u) = (cid:0)c
2(cid:1)
2 (cid:1) =
(cid:0)c+b
ℓ ·(cid:0)c
ℓ(cid:1)
and by Eq. 11, when 3 ≤ ℓ ≤ c,
(c + b − ℓ + 1) ·(cid:0) c
ℓ−1(cid:1) =
Cℓ(u) =
c − ℓ + 1
c + b − ℓ + 1 →
c
c + b
.
By adjusting the ratio c/(b + c) in N1(u), we can con-
struct a family of graphs such that C2(u) takes any value
in the interval [0, 1] as du → ∞ and Cℓ(u) →pC2(u) as
du → ∞.
The second part of the result requires the neighbor-
hoods to be sufficiently large in order to reach the upper
bound. However, we will see later that in some real-world
data, there are nodes u for which C3(u) is close to the
upper bound pC2(u) for several values of C2(u).
Next, we analyze higher-order clustering coefficients
in two common random graph models: the Erdos-R´enyi
model with edge probability p (i.e., the Gn,p model [22])
and the small-world model [3].
B. Analysis for the Gn,p model
Now, we analyze higher-order clustering coefficients
in classical Erdos-R´enyi random graph model, where
each edge exists independently with probability p (i.e.,
the Gn,p model [22]). We implicitly assume that ℓ is
small in the following analysis so that there should be
at least one ℓ-wedge in the graph (with high probabil-
ity and n large, there is no clique of size greater than
(2 + ǫ) log n/ log(1/p) for any ǫ > 0 [23]). Therefore, the
global and local clustering coefficients are well-defined.
In the Gn,p model, we first observe that any ℓ-wedge
is closed if and only if the ℓ − 1 possible edges between
the ℓ-clique and the outside node in the adjacent edge
exist to form an (ℓ + 1)-clique. Each of the ℓ − 1 edges
exist independently with probability p in the Gn,p model,
which means that the higher-order clustering coefficients
should scale as pℓ−1. We formalize this in the following
proposition.
Proposition 2. Let G be a random graph drawn from
the Gn,p model. For constant ℓ,
1. EG [Cℓ] = pℓ−1
2. EG [Cℓ(u) Wℓ(u) > 0] = pℓ−1 for any node u
3. EG(cid:2) ¯Cℓ(cid:3) = pℓ−1
Proof. We prove the first part by conditioning on the set
of ℓ-wedges, Wℓ:
E[Cℓ] = EG [EWℓ [Cℓ Wℓ]]
= EGhEWℓh 1
= EGhEWℓh 1
= EG(cid:2)pℓ−1(cid:3)
= pℓ−1.
WℓPw∈Wℓ
WℓPw∈Wℓ
P [w is closed]ii
pℓ−1ii
As noted above, the second equality is well defined (with
high probability) for small ℓ. The third equality comes
from the fact that any ℓ-wedge is closed if and only if the
ℓ − 1 possible edges between the ℓ-clique and the outside
node in the adjacent edge exist to form an (ℓ + 1)-clique.
The proof of the second part is essentially the same,
except we condition over the set of possible cases where
Wℓ(u) > 0.
least one ℓ-wedge. To prove the third part, we take the
Recall that eV is the set of nodes at the center of at
conditional expectation over eV and use our result from
the second part.
The above results say that the global, local, and av-
erage ℓth order clustering coefficients decrease exponen-
tially in ℓ.
It turns out that if we also condition on
the second-order clustering coefficient having some fixed
value, then the higher-order clustering coefficients still
decay exponentially in ℓ for the Gn,p model. This will be
useful for interpreting the distribution of local clustering
coefficients on real-world networks.
Proposition 3. Let G be a random graph drawn from
the Gn,p model. Then for constant ℓ,
EG [Cℓ(u) C2(u), Wℓ(u) > 0]
=(cid:2)C2(u) − (1 − C2(u)) · O(1/d2
≈ (C2(u))ℓ−1.
u)(cid:3)ℓ−1
Proof. Similar to the proof of Proposition 3, we look at
the conditional expectation over Wℓ(u) > 0:
5
1
EG [Cℓ(u) C2(u), Wℓ(u) > 0]
= EG(cid:2)EWℓ(u)>0 [Cℓ(u) C2(u), Wℓ(u)](cid:3)
= EGhEWℓ(u)>0h
Wℓ(u)Pw∈Wℓ(u)
Now, note that N1(u) has m = C2(u)·(cid:0)du
ing that w ∈ Wℓ(u) accounts for(cid:0)ℓ−1
symmetry, the other q = m−(cid:0)ℓ−1
the remaining r =(cid:0)du
2(cid:1) −(cid:0)ℓ−1
at random. There are (cid:0)r
which (cid:0)r−ℓ+1
q−ℓ+1(cid:1) would close the wedge w. Thus,
P [w is closed C2(u)]
= (r−ℓ+1)!q!
=
P [w closed C2(u)]ii .
2(cid:1) edges. Know-
2 (cid:1) of these edges. By
2 (cid:1) edges appear in any of
2 (cid:1) pairs of nodes uniformly
q(cid:1) ways to place these edges, of
(q−ℓ+1)!r! = (q−ℓ+2)(q−ℓ+3)···q
(r−ℓ+2)(r−ℓ+3)···r .
(r−ℓ+1
q−ℓ+1)
(r
q)
Now, for any small nonnegative integer k,
q − k
r − k
=
C2(u)·(du
2 )−(ℓ−1
2 )−k
2 )−(ℓ−1
(du
2 )−k
= C2(u) − (1 − C2(u))(cid:20)
(ℓ−1
2 )+k
2 )−(ℓ−1
= C2(u) − (1 − C2(u)) · O(1/d2
u).
(du
2 )−k(cid:21)
(Recall that ℓ is constant by assumption, so the big-O no-
tation is appropriate). The above expression approaches
(C2(u))ℓ−1 when C2(u) → 1 as well as when du → ∞.
Proposition 3 says that even if the second-order local
clustering coefficient is large, the ℓth-order clustering co-
efficient will still decay exponentially in ℓ, at least in the
limit as du grows large. By examining higher-order clique
closures, this allows us to distinguish between nodes u
whose neighborhoods are "dense but random" (C2(u) is
large but Cℓ(u) ≈ (C2(u))ℓ−1) or "dense and structured"
(C2(u) is large and Cℓ(u) > (C2(u))ℓ−1). Only the latter
case exhibits higher-order clustering. We use this in our
analysis of real-world networks in Section IV.
C. Analysis for the small-world model
We also study higher-order clustering in the small-
world random graph model [3]. The model begins with a
ring network where each node connects to its 2k nearest
neighbors. Then, for each node u and each of the k edges
(u, v) with v following u clockwise in the ring, the edge
is rewired to (u, w) with probability p, where w is chosen
uniformly at random.
With no rewiring (p = 0) and k ≪ n, it is known that
¯C2 ≈ 3/4 [3]. As p increases, the average clustering coef-
ficient ¯C2 slightly decreases until a phase transition near
p = 0.1, where ¯C2 decays to 0 [3] (also see Fig. 3). Here,
we generalize these results for higher-order clustering co-
efficients.
.
f
f
e
o
c
.
t
s
u
c
.
l
g
v
A
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
-
C2
-
C3
-
C4
10-3
10-2
10-1
100
Rewiring probability (p)
FIG. 3. Average higher-order clustering coefficient ¯Cℓ as a
function of rewiring probability p in small-world networks for
ℓ = 2, 3, 4 (n = 20, 000, k = 5). Proposition 4 shows that the
ℓth-order clustering coefficient when p = 0 predicts that the
clustering should decrease modestly as ℓ increases.
Proposition 4.
rewiring (p = 0),
In the small-world model without
¯Cℓ → (ℓ + 1)/(2ℓ)
for any constant ℓ ≥ 2 as k → ∞ and n → ∞ while
2k < n.
Proof. Applying Eq. 8, it suffices to show that
Kℓ(u) =
ℓ
(ℓ − 1)! · kℓ−1 + O(kℓ−2)
(16)
as
Cℓ(u) =
ℓ · (ℓ+1)kℓ
ℓ!
(2k − ℓ + 1) · ℓkℓ−1
(ℓ−1)!
,
which approaches ℓ+1
2ℓ as k → ∞.
Now we give a derivation of Eq. 16. We first label the
2k neighbors of u as 1, 2, . . . , 2k by their clockwise order-
ing in the ring. Since 2k < n, these nodes are unique.
Next, define the span of any ℓ-clique containing u as the
difference between the largest and smallest label of the
ℓ − 1 nodes in the clique other than u. The span s of
any ℓ-clique satisfies s ≤ k − 1 since any node is directly
connected with a node of label difference no greater than
k − 1. Also, s ≥ ℓ − 2 since there are ℓ − 1 nodes in an ℓ-
clique other than u. For each span s, we can find 2k−1−s
pairs of (i, j) such that 1 ≤ i, j ≤ 2k and j − i = s. Fi-
nally, for every such pair (i, j), there are(cid:0)s−1
ℓ−3(cid:1) choices of
ℓ − 3 nodes between i and j which will form an ℓ-clique
together with nodes u, i, and j. Therefore,
Kℓ(u) =Pk−1
=Pk−1
=Pk−ℓ+2
s=ℓ−2(2k − 1 − s) ·(cid:0)s−1
ℓ−3(cid:1)
s=ℓ−2(2k − 1 − s) · (s−1)(s−2)···(s−ℓ+3)
(2k + 2 − t − ℓ) · t(t+1)···(t+ℓ−4)
.
(ℓ−3)!
(ℓ−3)!
t=1
If we ignore lower-order terms k and note that t = O(k),
we get
6
Kℓ(u) =Pk
= 1
(ℓ−3)! + O(kℓ−3)i
t=1(2ktℓ−3 − tℓ−2) + O(kℓ−2).
ℓ−1i + O(kℓ−2),
t=1h (2k−t)tℓ−3
(ℓ−3)!Pk
(ℓ−3)!h2k · kℓ−2
ℓ−2 − kℓ−1
(ℓ−1)! · kℓ−1 + O(kℓ−2).
= 1
= ℓ
Proposition 4 shows that, when p = 0, ¯Cℓ decreases
as ℓ increases. Furthermore, via simulation, we observe
the same behavior as for ¯C2 when adjusting the rewiring
probability p (Fig. 3). Regardless of ℓ, the phase tran-
sition happens near p = 0.1. Essentially, once there is
enough rewiring, all local clique structure is lost, and
clustering at all orders is lost. This is partly a conse-
quence of Proposition 1, which says that Cℓ(u) → 0 as
C2(u) → 0 for any ℓ.
IV. EXPERIMENTAL RESULTS ON
REAL-WORLD NETWORKS
We now analyze the higher-order clustering of real-
world networks. We first study how the higher-order
global and average clustering coefficients vary as we in-
crease the order ℓ of the clustering coefficient on a collec-
tion of 20 networks from several domains. After, we con-
centrate on a few representative networks and compare
the higher-order clustering of real-world networks to null
models. We find that only some networks exhibit higher-
order clustering once the traditional clustering coefficient
is controlled. Finally, we examine the local clustering of
real-world networks.
A. Higher-order global and average clustering
We compute and analyze the higher-order clustering
for networks from a variety of domains (Table I). We
briefly describe the collection of networks and their cat-
egorization below:
1. Two synthetic networks-a random instance of an
Erdos-R´enyi graph with n = 1, 000 nodes and edge
probability p = 0.2 and a small-world network with
n = 20, 000 nodes, k = 10, and rewiring probability
p = 0.1;
2. Four neural networks-the complete neural sys-
tems of the nematode worms P. pacificus and C.
elegans as well as the neural connections of the
Drosophila medulla and mouse retina;
3. Four online social networks-two Facebook friend-
ship networks between students at universities from
2005 (fb-Stanford, fb-Cornell) and two complete
online friendship networks (Pokec and Orkut);
Network
Erdos-R´enyi [22]
Small-world [3]
P. pacificus [24]
C. elegans [3]
Drosophila-medulla [25]
mouse-retina [26]
Nodes
1,000
20,000
50
297
1,781
1,076
99,831
100,000
576
2,148
32,311
577,350
fb-Stanford [27]
fb-Cornell [27]
Pokec [28]
Orkut [29]
11,621
18,660
568,330
790,777
1,632,803 22,301,964
3,072,441 117,185,083
arxiv-HepPh [30]
arxiv-AstroPh [30]
congress-committees [31]
DBLP [32]
12,008
18,772
871
317,080
email-Enron-core [33]
email-Eu-core [14, 30]
CollegeMsg [34]
wiki-Talk [35]
148
1005
1,899
2,394,385
118,505
198,050
248,848
1,049,866
1356
16064
41,579
4,659,565
oregon2-010526 [36]
as-caida-20071105 [36]
p2p-Gnutella31 [30, 37]
as-skitter [36]
11,461
26,475
62,586
32,730
53,381
147,892
1,696,415 11,095,298
Edges
C2
C3
C4
¯C2
¯C3
¯C4
0.200 0.040 0.008
0.480 0.359 0.229
0.200 0.040 0.008
0.489 0.350 0.205
0.015 0.051 0.035
0.181 0.080 0.056
0.000 0.002 0.001
0.008 0.038 0.029
0.157 0.107 0.116
0.136 0.106 0.121
0.047 0.044 0.046
0.041 0.022 0.019
0.659 0.749 0.788
0.318 0.326 0.359
0.037 0.080 0.063
0.306 0.634 0.821
0.383 0.245 0.192
0.267 0.170 0.135
0.004 0.005 0.003
0.002 0.011 0.010
0.037 0.085 0.097
0.007 0.012 0.015
0.004 0.003 0.000
0.005 0.007 0.011
0.073 0.052 0.034
0.308 0.137 0.062
0.116 0.061 0.024
0.033 0.100 0.085
0.253 0.181 0.157
0.225 0.169 0.148
0.122 0.084 0.061
0.170 0.131 0.110
0.698 0.586 0.519
0.677 0.609 0.561
0.082 0.142 0.126
0.732 0.613 0.517
0.496 0.363 0.277
0.450 0.329 0.264
0.053 0.017 0.006
0.201 0.081 0.051
0.494 0.294 0.300
0.333 0.159 0.134
0.010 0.001 0.000
0.296 0.126 0.109
7
eV2/V eV3/V eV4/V
1.000
1.000
0.999
1.000
1.000
1.000
0.880
0.949
0.803
0.998
0.955
0.973
0.900
0.978
0.876
0.932
1.000
0.864
0.966
0.887
0.829
0.262
0.711
0.625
0.542
0.871
0.580
0.926
0.616
0.996
0.922
0.951
0.675
0.949
0.723
0.839
1.000
0.675
0.946
0.847
0.591
0.077
0.269
0.171
0.067
0.633
0.440
0.808
0.425
0.994
0.877
0.923
0.508
0.878
0.567
0.740
1.000
0.489
0.946
0.784
0.332
0.027
0.121
0.060
0.001
0.335
TABLE I. Higher-order clustering coefficients on random graph models, neural connections, online social networks, collaboration
networks, human communication, and technological systems. Broadly, networks from the same domain have similar higher-
order clustering characteristics. Since eVℓ is the set of nodes at the center of at least one ℓ-wedge (see Eq. 6), eVℓ/V is the
fraction of nodes at the center of at least one ℓ-wedge (the higher-order average clustering coefficient ¯Cℓ is only measured over
those nodes participating in at least one ℓ-wedge).
4. Four collaboration networks-two co-authorship
networks constructed from arxiv submission cat-
egories (arxiv-AstroPh and arxiv-HepPh), a co-
authorship network constructed from DBLP, and
the co-committee membership network of United
States congresspersons (congress-committees);
(email-Enron-core,
5. Four human communication networks-two email
networks
email-Eu-core), a
Facebook-like messaging network from a college
(CollegeMsg), and the edits of user talk pages by
other users on Wikipedia (wiki-Talk); and
6. Four technological systems networks-three au-
tonomous
as-caida-
20071105, as-skitter) and a peer-to-peer connection
network (p2p-Genutella31).
(oregon2-010526,
systems
In all cases, we take the edges as undirected, even if the
original network data is directed.
Table I lists the ℓth-order global and average clustering
coefficients for ℓ = 2, 3, 4 as well as the fraction of nodes
that are the center of at least one ℓ-wedge (recall that
the average clustering coefficient is the mean only over
higher-order local clustering coefficients of nodes partici-
pating in at least one ℓ-wedge; see Kaiser [38] for a discus-
sion on how this can affect network analyses). We high-
light some important trends in the raw clustering coeffi-
cients, and in the next section, we focus on higher-order
clustering compared to what one gets in a null model.
Propositions 2 and 4 say that we should expect the
higher-order global and average clustering coefficients
to decrease as we increase the order ℓ for both the
Erdos-R´enyi and small-world models, and indeed ¯C2 >
¯C3 > ¯C4 for these networks. This trend also holds for
most of the real-world networks (mouse-retina, congress-
committees, and oregon2-010526 are the exceptions).
Thus, when averaging over nodes, higher-order cliques
are overall less likely to close in both the synthetic and
real-world networks.
The relationship between the higher-ordrer global clus-
tering coefficient Cℓ and the order ℓ is less uniform
over the datasets. For the three co-authorship net-
works (arxiv-HepPh, arxiv-AstroPh, and DBLP) and the
three autonomous systems networks (oregon2-010526, as-
caida-20071105, and as-skitter), Cℓ increases with ℓ, al-
though the base clustering levels are much higher for co-
authorship networks. This is not simply due to the pres-
ence of cliques-a clique has the same clustering for any
order (Fig. 2, left). Instead, these datasets have nodes
that serve as the center of a star and also participate
in a clique (Fig. 2, right; see also Proposition 1). On
the other hand, Cℓ decreases with ℓ for the two email
networks and the two nematode worm neural networks.
Finally, the change in Cℓ need not be monotonic in ℓ.
8
C. elegans
fb-Stanford
arxiv-AstroPh
email-Enron-core
oregon2-010526
original CM MRCN original CM MRCN original CM MRCN original CM MRCN original CM MRCN
¯C2
¯C3
0.31
0.14
0.15∗ 0.31
0.04∗ 0.17†
0.25
0.18
0.03∗ 0.25
0.00∗ 0.14∗
0.68
0.61
0.01∗ 0.68
0.00∗ 0.60
0.50
0.36
0.23∗ 0.50
0.08∗ 0.35
0.49
0.29
0.25∗ 0.49
0.10∗ 0.14∗
TABLE II. Average higher-order clustering coefficients for five networks as well as the clustering with respect to two null
models: a Configuration Model (CM) that samples random graphs with the same degree distribution [39, 40], and Maximally
Random Clustered Networks (MRCN) that preserve degree distribution as well as ¯C2 [41, 42]. For the random networks, we
report the mean over 100 samples. An asterisk (∗) denotes when the value in the original network is at least five standard
deviations above the mean and a dagger (†) denotes when the value in the original network is at least five standard deviations
below the mean. Although all networks exhibit clustering with respect to CM, only some of the networks exhibit higher-order
clustering when controlling for ¯C2 with MRCN.
In three of the four online social networks, C3 < C2 but
C4 > C3.
Overall, the trends in the higher-order clustering co-
efficients can be different within one of our dataset cat-
egories, but tend to be uniform within sub-categories:
the change of ¯Cℓ and Cℓ with ℓ is the same for the two
nematode worms within the neural networks, the two
email networks within the communication networks, and
the three co-authorship networks within the collabora-
tion networks. These trends hold even if the (classical)
second-order clustering coefficients differ substantially in
absolute value.
While the raw clustering values are informative, it is
also useful to compare the clustering to what one expects
from null models. We find in the next section that this
reveals additional insights into our data.
B. Comparison against null models
For one real-world network from each dataset category,
we also measure the higher-order clustering coefficients
with respect to two null models (Table II). First, we com-
pare against the Configuration Model (CM) that samples
uniformly from simple graphs with the same degree dis-
In real-world networks, ¯C2 is much
tribution [39, 40].
larger than expected with respect to the CM null model.
We find that the same holds for ¯C3.
Second, we use a null model that samples graphs pre-
serving both degree distribution and ¯C2. Specifically,
these are samples from an ensemble of exponential graphs
where the Hamiltonian measures the absolute value of
the difference between the original network and the sam-
pled network [41]. Such samples are referred to as as
Maximally Random Clustered Networks (MRCN) and
are sampled with a simulated annealing procedure [42].
Comparing ¯C3 between the real-world and the null net-
work, we observe different behavior in higher-order clus-
tering across our datasets. Compared to the MRCN null
model, C. elegans has significantly less than expected
higher-order clustering (in terms of ¯C3), the Facebook
friendship and autonomous system networks have signif-
icantly more than expected higher-order clustering, and
the co-authorship and email networks have slightly (but
not significantly) more than expected higher-order clus-
tering (Table II). Put another way, all real-world net-
works exhibit clustering in the classical sense of triadic
closure. However, the higher-order clustering coefficients
reveal that the friendship and autonomous systems net-
works exhibit significant clustering beyond what is given
by triadic closure. These results suggest the need for
models that directly account for closure in node neigh-
borhoods [43, 44].
Our finding about the lack of higher-order cluster-
ing in C. elegans agrees with previous results that 4-
cliques are under-expressed, while open 3-wedges re-
lated to cooperative information propagation are over-
expressed [9, 45, 46]. This also provides credence for the
"3-layer" model of C. elegans [46]. The observed clus-
tering in the friendship network is consistent with prior
work showing the relative infrequency of open ℓ-wedges
in many Facebook network subgraphs with respect to
a null model accounting for triadic closure [47]. Co-
authorship networks and email networks are both con-
structed from "events" that create multiple edges-a pa-
per with k authors induces a k-clique in the co-authorship
graph and an email sent from one address to k others in-
duces k edges. This event-driven graph construction cre-
ates enough closure structure so that the average third-
order clustering coefficient is not much larger than ran-
dom graphs where the classical second-order clustering
coefficient and degree sequence is kept the same.
We emphasize that simple clique counts are not suffi-
cient to obtain these results. For example, the discrep-
ancy in the third-order average clustering of C. elegans
and the MRCN null model is not simply due to the
presence of 4-cliques. The original neural network has
nearly twice as many 4-cliques (2,010) than the samples
from the MRCN model (mean 1006.2, standard deviation
73.6), but the third-order clustering coefficient is larger in
MRCN. The reason is that clustering coefficients normal-
ize clique counts with respect to opportunities for closure.
Thus far, we have analyzed global and average higher-
order clustering, which both summarize the clustering of
the entire network. In the next section, we look at more
localized properties, namely the distribution of higher-
order local clustering coefficients and the higher-order
average clustering coefficient as a function of node degree.
A
B
C
D
E
9
.
f
f
e
o
c
.
t
s
u
c
.
l
g
v
A
100
10-1
10-2
10-3
100
-
C2
-
C3
-
C4
C. elegans
101
Degree
102
.
f
f
e
o
c
.
t
s
u
c
.
l
g
v
A
100
10-1
10-2
100
fb-Stanford
101
102
Degree
103
.
f
f
e
o
c
.
t
s
u
c
.
l
g
v
A
100
10-1
10-2
100
arxiv-AstroPh
101
102
103
Degree
.
f
f
e
o
c
.
t
s
u
c
.
l
g
v
A
100
email-Enron-core
10-1
101
Degree
102
.
f
f
e
o
c
.
t
s
u
c
.
l
g
v
A
100
10-1
10-2
10-3
100
oregon2_010526
101
102
Degree
103
FIG. 4. Top row: Joint distributions of (C2(u), C3(u)) for (A) C. elegans (B) Facebook friendship, (C) arxiv co-authorship,
(D) email, and (E) autonomous systems networks. Each blue dot represents a node, and the red curve tracks the average over
logarithmic bins. The upper trend line is the bound in Eq. 14, and the lower trend line is expected Erdos-R´enyi behavior from
Proposition 3. Bottom row: Average higher-order clustering coefficients as a function of degree.
A
B
.
f
f
e
o
c
.
t
s
u
c
.
l
g
v
A
100
10-1
10-2
10-3
102
Erd s Rényi
103
Degree
.
f
f
e
o
c
.
t
s
u
c
.
l
g
v
A
100
10-1
10-2
Small-world
101
Degree
-
C2
-
C3
-
C4
102
FIG. 5.
Analogous plots of Fig. 4 for synthetic (A)
Erdos-R´enyi and (B) small-world networks. Top row: Joint
distributions of (C2(u), C3(u)). Bottom row: Average higher-
order clustering coefficients as a function of degree.
C. Higher-order local clustering coefficients and
degree dependencies
We now examine more localized clustering properties
of our networks. Figure 4 (top) plots the joint distribu-
tion of C2(u) and C3(u) for the five networks analyzed
in Table II, and Fig. 5 (top) provides the analogous plots
for the Erdos-R´enyi and small-world networks. In these
plots, the lower dashed trend line represents the expected
Erdos-R´enyi behavior, i.e., the expected clustering if the
edges in the neighborhood of a node were configured ran-
domly, as formalized in Proposition 3. The upper dashed
trend line is the maximum possible value of C3(u) given
C2(u), as given by Proposition 1.
For many nodes in C. elegans, local clustering is nearly
random (Fig. 4A, top), i.e., resembles the Erdos-R´enyi
joint distribution (Fig. 5A, top). In other words, there
are many nodes that lie on the lower trend line. This
provides further evidence that C. elegans lacks higher-
order clustering.
In the arxiv co-authorship network,
there are many nodes u with a large value of C2(u) that
have an even larger value of C3(u) near the upper bound
of Eq. 14 (see the inset of Fig. 4C, top). This implies that
some nodes appear in both cliques and also as the center
of star-like patterns, as in Fig. 2. On the other hand,
only a handful of nodes in the Facebook friendships, En-
ron email, and Oregon autonomous systems networks are
close to the upper bound (insets of Figs. 4B,4D, and 4E,
top).
Figures 4 and 5 (bottom) plot higher-order average
clustering as a function of node degree in the real-world
and synthetic networks. In the Erdos-R´enyi, small-world,
C. elegans, and Enron email networks, there is a distinct
gap between the average higher-order clustering coeffi-
cients for nodes of all degrees. Thus, our previous find-
ing that the average clustering coefficient ¯Cℓ decreases
with ℓ in these networks is independent of degree. In the
Facebook friendship network, C2(u) is larger than C3(u)
and C4(u) on average for nodes of all degrees, but C3(u)
and C4(u) are roughly the same for nodes of all degrees,
which means that 4-cliques and 5-cliques close at roughly
the same rate, independent of degree, albeit at a smaller
rate than traditional triadic closure (Fig. 4B, bottom).
In the co-authorship network, nodes u have roughly the
same Cℓ(u) for ℓ = 2, 3, 4, which means that ℓ-cliques
close at about the same rate, independent of ℓ (Fig. 4C,
bottom).
In the Oregon autonomous systems network,
we see that, on average, C4(u) > C3(u) > C2(u) for
nodes with large degree (Fig. 4E, bottom). This explains
how the global clustering coefficient increases with the
order, but the average clustering does not, as observed
in Table I.
V. DISCUSSION
We have proposed higher-order clustering coefficients
to study higher-order closure patterns in networks, which
generalizes the widely used clustering coefficient that
measures triadic closure. Our work compliments other
recent developments on the importance of higher-order
information in network navigation [11, 48] and on tem-
poral community structure [49]; in contrast, we examine
higher-order clique closure and only implicitly consider
time as a motivation for closure.
Prior efforts in generalizing clustering coefficients have
focused on shortest paths [50], cycle formation [51], and
triangle frequency in k-hop neighborhoods [52, 53]. Such
approaches fail to capture closure patterns of cliques, suf-
fer from challenging computational issues, and are dif-
ficult to theoretically analyze in random graph models
more sophisticated than the Erdos-R´enyi model. On
the other hand, our higher-order clustering coefficients
are simple but effective measurements that are analyz-
10
able and easily computable (we only rely clique enumer-
ation, a well-studied algorithmic task). Furthermore, our
methodology provides new insights into the clustering be-
havior of several real-world networks and random graph
models, and our theoretical analysis provides intuition
for the way in which higher-order clustering coefficients
describe local clustering in graphs.
Finally, we focused on higher-order clustering coeffi-
cients as a global network measurement and as a node-
level measurement, and in related work we also show
that large higher-order clustering implies the existence
of mesoscale clique-dense community structure [14].
ACKNOWLEDGMENTS
This research has been supported in part by NSF IIS-
1149837, ARO MURI, DARPA, ONR, Huawei, and Stan-
ford Data Science Initiative. We thank Will Hamil-
ton and Marinka Zitnik for insightful comments. We
thank Mason Porter and Peter Mucha for providing the
congress committee membership data.
[1] M. E. J. Newman, SIAM Review 45, 167 (2003).
[2] A. Rapoport, The Bulletin of Mathematical Biophysics
[18] R. M. Karp, in Complexity of computer computations
(Springer, 1972) pp. 85–103.
15, 523 (1953).
[3] D. J. Watts and S. H. Strogatz, Nature 393, 440 (1998).
[4] M. S. Granovetter, American Journal of Sociology , 1360
(1973).
[19] C. Seshadhri, A. Pinar, and T. G. Kolda, in Proceed-
ings of the 2013 SIAM International Conference on Data
Mining (SIAM, 2013) pp. 10–18.
[20] J. B. Kruskal, Mathematical Optimization Techniques
[5] Z.-X. Wu and P. Holme, Physical Review E 80, 037101
10, 251 (1963).
(2009).
[21] G. Katona, in Theory of Graphs: Proceedings of the Col-
[6] E. M. Jin, M. Girvan, and M. E. J. Newman, Physical
loquium held at Tihany, Hungary (1966) pp. 187–207.
Review E 64, 046132 (2001).
[22] P. Erdos and A. R´enyi, Publicationes Mathematicae (De-
[7] E. Ravasz and A.-L. Barab´asi, Physical Review E 67,
brecen) 6, 290 (1959).
026112 (2003).
[8] A. Barrat and M. Weigt, The European Physical Jour-
nal B: Condensed Matter and Complex Systems 13, 547
(2000).
[23] B. Bollob´as and P. Erdos, in Mathematical Proceedings of
the Cambridge Philosophical Society, Vol. 80 (Cambridge
University Press, 1976) pp. 419–427.
[24] D. J. Bumbarger, M. Riebesell, C. Rodelsperger, and
[9] A. R. Benson, D. F. Gleich, and J. Leskovec, Science
R. J. Sommer, Cell 152, 109 (2013).
353, 163 (2016).
[10] O. N. Yaveroglu, N. Malod-Dognin, D. Davis, Z. Lev-
najic, V. Janjic, R. Karapandza, A. Stojmirovic, and
N. Przulj, Scientific Reports 4 (2014).
[11] M. Rosvall, A. V. Esquivel, A. Lancichinetti, J. D. West,
and R. Lambiotte, Nature Communications 5 (2014).
[12] G. Palla, I. Der´enyi, I. Farkas, and T. Vicsek, Nature
435, 814 (2005).
[13] N. Slater, R. Itzchack, and Y. Louzoun, Network Science
2, 387 (2014).
[14] H. Yin, A. R. Benson, J. Leskovec, and D. F. Gleich, in
Proceedings of the 23rd ACM SIGKDD international con-
ference on Knowledge discovery and data mining (2017)
(To appear).
[15] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and
D.-U. Hwang, Physics reports 424, 175 (2006).
[16] R. D. Luce and A. D. Perry, Psychometrika 14, 95 (1949).
[17] N. Chiba and T. Nishizeki, SIAM Journal on Computing
14, 210 (1985).
[25] S.-y. Takemura, A. Bharioke, Z. Lu, A. Nern, S. Vita-
ladevuni, P. K. Rivlin, W. T. Katz, D. J. Olbris, S. M.
Plaza, P. Winston, et al., Nature 500, 175 (2013).
[26] M. Helmstaedter, K. L. Briggman, S. C. Turaga, V. Jain,
H. S. Seung, and W. Denk, Nature 500, 168 (2013).
[27] A. L. Traud, P. J. Mucha, and M. A. Porter, Physica
A: Statistical Mechanics and its Applications 391, 4165
(2012).
[28] L. Takac and M. Zabovsky, in International Scientific
Conference and International Workshop Present Day
Trends of Innovations, Vol. 1 (2012).
[29] A. Mislove, M. Marcon, K. P. Gummadi, P. Dr-
uschel,
in Proceedings of
the 5th ACM/Usenix Internet Measurement Conference
(IMC'07) (San Diego, CA, 2007).
and B. Bhattacharjee,
[30] J. Leskovec, J. Kleinberg, and C. Faloutsos, ACM Trans-
actions on Knowledge Discovery from Data (TKDD) 1,
2 (2007).
[31] M. A. Porter, P. J. Mucha, M. E. J. Newman,
and
C. M. Warmbrand, Proceedings of the National Academy
of Sciences 102, 7057 (2005).
[43] U. Bhat, P. Krapivsky, R. Lambiotte, and S. Redner,
Physical Review E 94, 062302 (2016).
[32] J. Yang and J. Leskovec, Knowledge and Information
[44] R. Lambiotte, P. Krapivsky, U. Bhat, and S. Redner,
11
Systems 42, 181 (2015).
[33] B. Klimt and Y. Yang, in CEAS (2004).
[34] P. Panzarasa, T. Opsahl, and K. M. Carley, Journal of
the Association for Information Science and Technology
60, 911 (2009).
[35] J. Leskovec, D. P. Huttenlocher, and J. M. Kleinberg, in
Proceedings of the Internatonal Conference on Web and
Social Media (2010).
[36] J. Leskovec, J. Kleinberg, and C. Faloutsos, in Proceed-
ings of the eleventh ACM SIGKDD international con-
ference on Knowledge discovery in data mining (ACM,
2005) pp. 177–187.
[37] M. Ripeanu, A. Iamnitchi, and I. Foster, IEEE Internet
Computing 6, 50 (2002).
[38] M. Kaiser, New Journal of Physics 10, 083042 (2008).
[39] B. Bollob´as, European Journal of Combinatorics 1, 311
(1980).
[40] R. Milo, N. Kashtan, S. Itzkovitz, M. E. J. Newman, and
Physical Review Letters 117, 218301 (2016).
[45] R. Milo, S. Shen-Orr, S.
Itzkovitz, N. Kashtan,
D. Chklovskii, and U. Alon, Science 298, 824 (2002).
[46] L. R. Varshney, B. L. Chen, E. Paniagua, D. H. Hall,
and D. B. Chklovskii, PLOS Computational Biology 7,
e1001066 (2011).
[47] J. Ugander, L. Backstrom, and J. Kleinberg, in Proceed-
ings of the 22nd international conference on World Wide
Web (ACM, 2013) pp. 1307–1318.
[48] I. Scholtes, arXiv:1702.05499 (2017).
[49] V. Sekara, A. Stopczynski, and S. Lehmann, Proceedings
of the National Academy of Sciences 113, 9977 (2016).
[50] A. Fronczak,
and
J. Sienkiewicz, Physica A: Statistical Mechanics and its
Applications 316, 688 (2002).
J. A. Ho lyst, M. Jedynak,
[51] G. Caldarelli, R. Pastor-Satorras,
and A. Vespignani,
The European Physical Journal B: Condensed Matter
and Complex Systems 38, 183 (2004).
U. Alon, arXiv preprint cond-mat/0312028 (2003).
[52] R. F. Andrade, J. G. Miranda, and T. P. Lobao, Physical
[41] J. Park and M. E. J. Newman, Physical Review E 70,
Review E 73, 046101 (2006).
066117 (2004).
[42] P. Colomer-de Sim´on, M. ´A. Serrano, M. G. Beir´o, J. I.
Alvarez-Hamelin, and M. Bogun´a, Scientific Reports 3,
2517 (2013).
[53] B. Jiang and C. Claramunt, Environment and Planning
B: Planning and Design 31, 151 (2004).
|
1902.02372 | 1 | 1902 | 2019-02-06T19:30:15 | Modeling and Analysis of Tagging Networks in Stack Exchange Communities | [
"cs.SI",
"physics.soc-ph",
"stat.ML"
] | Large Question-and-Answer (Q&A) platforms support diverse knowledge curation on the Web. While researchers have studied user behavior on the platforms in a variety of contexts, there is relatively little insight into important by-products of user behavior that also encode knowledge. Here, we analyze and model the macroscopic structure of tags applied by users to annotate and catalog questions, using a collection of 168 Stack Exchange websites. We find striking similarity in tagging structure across these Stack Exchange communities, even though each community evolves independently (albeit under similar guidelines). Using our empirical findings, we develop a simple generative model that creates random bipartite graphs of tags and questions. Our model accounts for the tag frequency distribution but does not explicitly account for co-tagging correlations. Even under these constraints, we demonstrate empirically and theoretically that our model can reproduce a number of statistical properties of the co-tagging graph that links tags appearing in the same post. | cs.SI | cs | Modeling and Analysis of Tagging Networks in Stack Exchange Communities
Xiang Fu∗, and Shangdi Yu∗, and Austin R. Benson
Computer Science Department
{xf74, sy543}@cornell.edu, [email protected]
Cornell University
9
1
0
2
b
e
F
6
]
I
S
.
s
c
[
1
v
2
7
3
2
0
.
2
0
9
1
:
v
i
X
r
a
Abstract
Large Question-and-Answer (Q&A) platforms support diverse
knowledge curation on the Web. While researchers have stud-
ied user behavior on the platforms in a variety of contexts,
there is relatively little insight into important by-products
of user behavior that also encode knowledge. Here, we ana-
lyze and model the macroscopic structure of tags applied by
users to annotate and catalog questions, using a collection of
168 Stack Exchange websites. We find striking similarity in
tagging structure across these Stack Exchange communities,
even though each community evolves independently (albeit
under similar guidelines). Using our empirical findings, we
develop a simple generative model that creates random bi-
partite graphs of tags and questions. Our model accounts for
the tag frequency distribution but does not explicitly account
for co-tagging correlations. Even under these constraints, we
demonstrate empirically and theoretically that our model can
reproduce a number of statistical properties of the co-tagging
graph that links tags appearing in the same post.
1
Introduction
Question-and-Answer (Q&A) platforms are now a standard
context for social interaction on the Web with platforms such
as Quora and Stack Exchange supporting large user bases. As
a result, the social networks that these platforms support have
undergone a great deal of study, including, for example, how
people find interesting and popular questions on Quora (Wang
et al. 2013), prediction of "best answer" selection on Yahoo
Answers (Adamic et al. 2008), market design for knowledge
base construction with Google Answers (Chen, Ho, and Kim
2010), and badge collection on Stack Overflow (Anderson et
al. 2013). These studies have largely focused on models and
analysis of the user behavior. However, the users also create
other types of richly structured data. In this paper, we model
and analyze the structure revealed by tags on Stack Exchange,
which are used to annotate and catalog questions. Thus, our
principal object of study is the tags (and their relationships
through co-tagging), rather than the users; however, tags are
still a by-product of user behavior since users apply the tags.
A Stack Exchange website is a Q&A forum for a partic-
ular community. The platform began with Stack Overflow,
which is a community for computer programming. Stack
Overflow is the the largest and arguably most well-known
∗The first two authors contributed equally to this work.
Stack Exchange community, but the Stack Exchange ecosys-
tem supports a diverse set of communities ranging from pet
ownership1 to coffee2 to philosophy.3 For the most part, these
Stack Exchange communities evolve independently under the
same Q&A format (Fig. 1). A linchpin of every Stack Ex-
change community is the tagging system. When posting a
question, users are encouraged to apply a small number of
tags (at least one and at most five) that provide a reasonable
abstraction of the question's topics. In addition to describing
the question's content, tags also serve users in information re-
trieval of similar questions as well as questions they might be
able to answer. Tags on Stack Exchange are not taken lightly --
users cannot immediately create new tags and are encouraged
to use existing and popular tags (Fig. 1, bottom); moreover,
there are also official tagging guidelines.4 Thus, tags on Stack
Exchange are fundamentally different from, e.g., hashtags
on social media platforms such as Twitter which are largely
free from regulation. The value placed on tags means that
they can contain rich information about the community. For
example, tag frequencies can show popular topics and the
change of tag frequency over time can reveal the change of a
community's interests over time.
Here, we provide the first large-scale study of the macro-
scopic structure of tagging behavior by analyzing a collection
of 168 Stack Exchange communities. We frame our study
through the lens of network analysis, focusing on two net-
works constructed from the tagging behavior of users. The
first is the bipartite network of tags and questions, where
there is an edge between a tag and all of the questions to
which the tag was applied. The second is the co-tagging net-
work, or the projection of the first network onto the tags; in
this case, two tags are connected by an edge if the two tags
jointly annotate at least one question. (We also consider a
weighted version of the second network, where the weight is
the number of questions containing the two tags.)
Oftentimes, network analyses suffer from the fact that there
is only "one sample" of a social system to study. For example,
there is only one Facebook friendship graph (Ugander et al.
2011) and one Twitter follower network (Kwak et al. 2010)
1https://pets.stackexchange.com/
2https://coffee.stackexchange.com/
3https://philosophy.stackexchange.com/
4https://stackoverflow.com/help/tagging
ing the "co-tagging network" induced by the bipartite tag-
question network. Specifically, we analyze the graph where
the nodes are tags and there is an edge connecting two tags if
they are "co-tagged" on at least one question (with possible
weighting on edges corresponding to the number of ques-
tions on which the two tags appear). Our analysis focuses on
three macroscopic properties of the data. First, the weighted
number of co-tags of a given tag is well-approximated by a
linear function of the number of questions in which the tag
appears. Second, the number of unique co-tags of a given tag
is well-approximated by a simple third-degree polynomial
of the number of the tag frequency. Qualitatively, as we in-
crease the number of questions that a tag has appeared in,
the number of unique co-tags will also increas; however, this
growth tapers for popular tags, when it is difficult to accumu-
late more unique co-tags. Third, we measure three versions
of the clustering coefficient for weighted and unweighted
networks networks and find various levels of clustering and
find that the unweighted clustering coefficient is only mildly
correlated with the size of the Stack Exchange community
(as measured by the number of questions), but two versions
of the weighted versions both negatively correlate with size.
All three macroscopic properties are replicated by our
model, which we validate with both empirical and theoretical
analysis across the collection of 168 Stack Exchange net-
works. Importantly, the model does not bake in any notions
of correlation or clustering in the co-tagging but can still
replicate important co-tagging network properties. Thus, we
can conclude that these network properties could actually
be simply explained by our simple generative model that
only makes a strong assumption on the frequency distribution
of the tags. These findings contrast sharply with traditional
social network analysis in measuring clustering. Standard
random graph models for social networks that do not bake in
clustering structure do not exhibit the same clustering levels
as the real-world social system (Newman 2003). However,
in our case, the co-tagging network constructed from our bi-
partite tag-question generative model matches the clustering
levels in the empirical data.
2 Related Work
We summarize below how our research relates to several areas
in social media, information retrieval, and network science.
Online Q&A platforms Question-and-Answer (Q&A)
platforms have been a staple of online discussion for sev-
eral years, involving major web companies such as Ya-
hoo!, Google, and Quora. Research on these platforms has
spanned a variety of topics, including reputation mecha-
nisms (Bosu et al. 2013; Paul, Hong, and Chi 2012), answer
quality measurement (Wang et al. 2013; Posnett et al. 2012;
Anderson et al. 2012), network structure (Adamic et al. 2008;
Paranjape, Benson, and Leskovec 2017); social behav-
ior (Yang et al. 2011); answer prediction (Adamic et al. 2008;
Tian, Zhang, and Li 2013); topic popularity (Maity, Sahni,
and Mukherjee 2015); and expertise evaluation (MacLeod
2014; Posnett et al. 2012; Pal, Chang, and Konstan 2012).
This research has largely focused on the questions, answers,
and user behavior. Our paper, in contrast, treats tags as the
Figure 1: Stack Exchange tagging. (Top) A question
on the COFFEE Stack Exchange community with two
tags: espresso and nespresso (https://coffee.
stackexchange.com/q/1572). We study the tag fre-
quency distributions across a large collection of Stack
Exchange communities, as well as networks constructed
(Bottom)
from tags applied to the same questions.
User
tagging guidelines on the COFFEE
Stack Exchange (https://coffee.stackexchange.
com/questions/ask). The last rule says that users can-
not immediately create new tags without due process; thus,
tagging is fundamentally different from hashtags on other
social media platforms such as Twitter or Instagram.
interface of
to analyze. While such studies provide valuable insights into
real-world social systems, it is also well-known that there
can be randomness in the evolution of social networks when
crafted in a controlled setting (Salganik 2006). The Stack Ex-
change communities provide a unique opportunity to study
a collection of similar networks of tags with highly similar
dynamics that have evolved largely independently and dif-
fer most in the community topic (and implications of the
community topic, such as the number of users).
We begin with an empirical analysis on the frequency
distribution of the tags across our collection of 168 Stack Ex-
change communities. We find that this distribution is heavy-
tailed and well-approximated by a lognormal distribution,
and the two parameters of this distribution are themselves
well-approximated by a normal distribution when estimated
over the large collection of Stack Exchange communities.
From our findings, we devise a simple generative model for
creating random bipartite graphs with links connecting tags
to questions. The model takes as input the desired number of
questions, number of tags, number of total tag occurrences,
and two parameters of a lognormal distribution, and produces
as output a bipartite graph linking tags to questions.
We futher explore the Stack Exchange data by analyz-
fundamental object of study. Furthermore, most prior work
has only examined at most a few Q&A web sites, whereas
we study a large collection of Stack Exchange networks.
Folksonomy The tag-question network that we study is
related to the idea of folksonomy, a term coined by Thomas
Vander Wal to describe the practice of users tagging in-
formation for personal retrieval in an open social environ-
ment (Vander Wal 2005). Folksonomy has been a lens for
analysis on social media platforms such as CiteULike,
del.icio.us, and BibSonomy (Cattuto et al. 2007;
Capocci and Caldarelli 2008; Cattuto et al. 2009). A ma-
jor difference of these folksonomy studies and the present
work is that folksonomies are much less restricted in the
annotations -- users can add many (possibly new) annotations
freely -- whereas the Stack Exchange system is restricted (be-
tween one and five tags with systematic vetting of new tags).
And again, we analyze a large collection of Stack Exchange
communities and not just a few folksonomies.
Bipartite network models and co-tagging networks Bi-
partite graph (network) models are employed across a broad
range of scientific disciplines, including ecology (Bascompte,
Jordano, and Olesen 2006), biomedicine (Goh et al. 2007),
and information science (Akoglu, Chandy, and Faloutsos
2013). The model that we develop in this paper is a genera-
tive (random) model for a bipartite graph (network) between
tags and questions. Other generative models for bipartite (or
multipartite) graphs include the bipartite stochastic block
model (Larremore, Clauset, and Jacobs 2014), evolution-
ary affiliation networks (Lattanzi and Sivakumar 2009), and
generative models for folksonomy (Chojnacki and Kłopotek
2010). In contrast to prior research, the goal with our model
is to develop a simple generative model that captures the
empirical properties that we observe to persist across Stack
Exchange communities. Our model is designed to capture
the tag frequency distribution amongst questions, but we find
that properties of the co-tagging network -- where tags are
connected if they have appeared in a question together -- are
still replicated with our model. Properties and statistics of
co-tagging networks, such as clustering coefficients, char-
acteristic path lengths, and number of co-tags have been
used to analyze online communities such as del.icio.us
and BibSonomy, have been studied (Cattuto et al. 2007;
Halpin, Robu, and Shepherd 2007). Co-tagging networks
have also been used for application on connecting users with
similar interests (Wang, Liu, and Fan 2011).
3 Data Description and Preliminary Analysis
A Stack Exchange is a self-moderating online Q&A forum,
and each Stack Exchange community centers on a different
topic. Questions are annotated with at least one and at most
five tags that serve as essential descriptors of the question
(Fig. 1). Importantly, these platforms also largely evolve inde-
pendently, allowing us to perform a better statistical analysis
compared to analyzing a single Stack Exchange community.
We now describe our dataset collection and provide prelim-
inary statistical analyses that will serve the development of
our generative model in the next section.
Figure 2: Number of unique tags (green squares), number
of questions (yellow circles), and tag-question pairs (blue
triangles) of the 168 Stack Exchange communities that we
analyze in this paper. Datasets are sorted in ascending order
by number of questions. The APPLE and COFFEE communi-
ties are annotated as examples. In this paper, we analyze and
model the relationships between tags and questions.
Data Collection
We collected data from https://archive.org/
details/stackexchange, which hosts the entire his-
tory of every Stack Exchange community, including the tags
used to annotate questions. In total, we collected the sets of
tags applied to each question from 168 Stack Exchange com-
munities. In order to ensure that we could analyze data by
inspection, we omitted communities where the predominant
language was not English (thus, we do not consider the ES,
JA, PT, RU, RUS, and UKRAINIAN communities). However,
we do include Stack Exchange communities such as RUS-
SIAN, where people discuss the Russian language in English.
We also omitted so-called "meta" communities that discuss a
particular Stack Exchange community since these meta com-
munities have a different set of goals as well as a dependence
on the community that they discuss. Finally, we also omitted
Stack Overflow, which is over an order of magnitude larger
than any other community, and has already been the subject
of much research (Anderson et al. 2012; Bosu et al. 2013;
Wang et al. 2013). We will release our processed dataset
collection with the publication of this paper.
Figure 2 presents an overview of the basic statistics of our
collection of tags. Among the 168 Stack Exchange commu-
nities that we study in this paper, the number of unique tags
ranges from 70 (ARABIC) to 5,318 (SUPERUSER), and the
number of questions ranges from 122 (again, ARABIC) to
994,983 (MATH). Although the Stack Exchange communities
vary in size and topic and also evolve largely independently,
we see in the next section (and later in the paper) that there
are broad similarities across the communities.
Lognormal Distribution of Tag Frequencies
In this section, we study the distribution of tag frequen-
cies, i.e., the number of times that a tag is applied to a
question or, when normalized, the fraction of questions that
contains a given tag. One consistent trait is that tags used
Datasets101102103104105106CountsAPPLE: 90213APPLE: 256698APPLE: 1065COFFEE: 937COFFEE: 1849COFFEE: 107Tag-Question PairsQuestionsTagsFigure 3: Tag frequencies of four diverse Stack Exchange
communities (APPLE -- 90,213 questions and 1,065 tags; COF-
FEE -- 937 questions and 107 tags; MATH -- 994,983 questions
and 1,749 tags; FITNESS -- 7,626 questions and 393 tags). We
find that tag frequencies are well-modeled by a lognormal
distribution in Stack Exchange communities (Fig. 4).
only a few times are much more common than tags used
many times, and the distribution of tags is heavy-tailed.
Many communities have tags appearing at much higher fre-
quencies than most other tags; as an extreme example, the
magic-the-gathering tag appears in more than 3000
questions in the BOARDGAMES community, while all other
tags appear in fewer than 500 questions.
Such heavy-tailed distributions are common on the Web
and other domains (Mitzenmacher 2004; Clauset, Shalizi,
and Newman 2009). Here, we find that the tag frequencies
are well-modeled by a lognormal distribution. Figure 3 illus-
trates four representative cases and also provides a compar-
ison against other commonly-used heavy-tailed probability
distributions such as a power law, truncated power law, and
stretched exponential. (Fig. 3 shows four such cases). We find
that a lognormal tends to match both the head and tail of the
distribution, while other common heavy-tailed distributions
can only capture either the head or tail of the distribution
(e.g., in Fig. 3, the truncated power law captures the head of
the tag frequency distribution in APPLE but not the tail and
the tail of the COFFEE distribution but not the head). The lone
outlier is the PATENT community, which does not seem to
be well-approximated by any commonly-used heavy-tailed
distribution.
More formally, we fit the parameters of a lognormal, power
law, truncated power law, and stretched exponential distri-
butions to the tag frequency of each Stack Exchange com-
munity using the powerlaw Python package (Alstott, Bull-
more, and Plenz 2013). Figure 4 (top left) shows the fitted
parameters, which are themselves approximately normally
distributed. We use two standard procedures for evaluating
the fit of the lognormal: the Kolmogorov-Smirnov (KS) statis-
tic and the likelihood ratio test comparing the lognormal to
other heavy-tailed degree distributions (Clauset, Shalizi, and
Newman 2009). The distribution of the KS statistics is much
(Top Left) The distribution of fitted lognormal
Figure 4:
parameters for tag frequency across 167 Stack Exchange
communities (we exclude the outlier PATENT), which are ap-
proximately normally distributed. (Top Right) The CDF of
the KS Statistic (D) of fitted heavy-tailed distribution to the
empirical data. The lognormal distribution has the smallest
statistics, and D < 0.06 for 80% of datasets; the only com-
munity with D > 0.15 is PATENT. (Bottom) The p-values
for comparing an alternative heavy tailed degree distribution
hypothesis to the null hypothesis of the lognormal (left) and
the distribution of the p value with the log-likelihood ratio
R (right). The small p-values and positive log-likelihood ra-
tios indicate that the lognormal is a better fit for the data
compared to other common heavy-tailed distributions.
smaller for the lognormal compared to the other distributions
(Fig. 4, top right) and is less than 0.06 for 80% of the Stack
Exchange communities. Furthermore, the p-values from the
likelihood ratio test show that the power law, truncated power
law, and stretched exponentials are not likely alternatives to
the null of a lognormal (Fig. 4, bottom).
To summarize, a lognormal distribution is an appropriate
model for the distribution of tag frequencies. In the next
section, we describe a simple generative model for random
bipartite graphs of tags and questions based on this lognormal
distribution. We will then later see that this model matches
the real data in a number of characteristics related to the
co-tagging, i.e., how multiple tags are used on the same
question.
4 A Generative Model for Bipartite
Tag-Question Networks
In this section, we propose a simple generative model for the
bipartite tag-question network. Later, we will see that this
model is able to recover many properties of the co-tagging
network of Stack Exchange communities, i.e, the graph where
nodes correspond to tags, and edges connect tags that have
been applied to the same question. Formally, the bipartite
tag-question graph B consists of disjoint vertex sets T and
Q, each corresponding to the set of tags and questions, as
well as a set of undirected edges E; where (t, q) ∈ E with
t ∈ T and q ∈ Q signifies that tag t is applied to question q.
The frequency, or number of occurrences, of a tag t is then
100101102103104Tag Occurrences106104102100CDFAPPLEPower LawTrunc. Power LawStretched Exp.Empirical DataLognormal100101102Tag Occurrences102101100CDFCOFFEE101103105Tag Occurrences104102100CDFMATH100101102103Tag Occurrences103102101100CDFFITNESS42024Parameters of Lognormal Fits0.00.51.01.5FrequencyN(2.46, 0.89)N(1.59, 0.24)0.00.10.20.30.4KS Statistic0.000.250.500.751.00CDFLognormalPower LawTrunc. Power LawStretched Exp.0.00.20.40.60.81.0p-value for Distribution Comparisons0.000.250.500.751.00CDFPower LawTrunc. Power LawStretched Exp.p = 0.1010203040R values10171013109105101Max(p, 1e-16)Power LawTrunc. Power LawStretched Exp.corrections.
Algorithm 1: Simple generative model for creating ran-
dom bipartite graphs of tags and questions.
Input: number of tags NT ; number of questions NQ;
target number of tag occurrences m; µ, σ2
Output: tag-question bipartite graph B = (T ∪ Q, E)
/* Sample tag occurrences and compute
*/
t ∼ LogNormal(µ, σ2), t = 1, . . . , NT .
1 x(cid:48)
2 xt ← round(m · x(cid:48)
t), t = 1, . . . , NT .
3 Solve NQ − NQ exp(−m/ NQ) = NQ for NQ.
4 NQ ← round( NQ).
/* Construct bipartite graph
5 T ← {1, . . . , NT}, Q ← {1, . . . , NQ}.
6 for each tag t ∈ T do
7
8
9 end
10 Q ← {q ∈ Q ∃t ∈ T for which (t, q) ∈ E}
Qt ← uniform sample of xt questions from Q.
for q ∈ Qt do add edge (t, q) to edge set E.
t/(cid:80)NT
t=1 x(cid:48)
*/
are scaled by a constant so that(cid:80)
simply the degree of t in the graph B.
Our random network model has two basic steps. First,
given NT = T, NQ = Q, and the parameters µ and σ of
a lognormal distribution, we first generate a sequence of tag
occurrence counts xt ∼ Lognormal(µ, σ2). These samples
t xt = m (where m is
the total number of tag occurrences in the original dataset)
and then rounded to an integer. Since scaling a lognormal
random variable by a constant is still lognormally distributed,
we maintain this property of the tag distribution, and this
preserves the total number of tag-question pairs in the dataset.
Second, we assign tag t to xt questions chosen uniformly at
random without replacement. In this simplified version of the
model, the output deviates from the Stack Exchange networks
in two ways: (i) it is possible that a question has no tags and
(ii) it is possible that a question is assigned more than five
tags. We now show how to account for these deviations, and
Algorithm 1 describes the full algorithm.
Correction for question counts To fix the problem where
questions can have no tags, we make a "correction" in the
number of questions. More specifically, we increase the num-
ber of questions from NQ to NQ so that after the random
assignment, the expected number of questions with at least
one tag is close in expectation to NQ, the number of questions
in the empirical dataset. We then simply discard questions
with no tags (Algorithm 1).
We approximate the expected number of questions with no
tags under a simplification where tags can be duplicated in
questions (the approximation is not necessary, but it makes
the calculations simpler, has small variance theoretically, and
provides good results empirically). Here, the probability that
a question gets 0 tags is the same for each question -- it is just
the probability that all tags are assigned to the other NQ − 1
Figure 5: (Left) The CDF of the ratio of the (theoretical)
standard deviations to the corrected number of questions.
The small ratio (less than 0.008 for 80% of datasets) shows
that our correction for the number of questions is accurate.
(Right) The CDF of the fraction of questions with more than
five tags in one sample of the random graph for each dataset.
This fraction is small -- less than 0.045 for 80% of datasets,
which justifies the relaxation in our random graph model.
questions:
NT(cid:89)
xi−1(cid:89)
(cid:104)
i=1
j=0
(cid:105) ≈ (1 − 1/ NQ)m,
1 − 1/( NQ − j)
where m is total number of tag occurrences. Thus, since NQ
and m are generally large, when assigning tags uniformly at
random to NQ questions, the expected number of questions
with 0 tags is
NQ(1 − 1/ NQ)m ≈ NQ exp(−m/ NQ).
There are NQ questions if the following equation is satisfied:
NQ − NQ exp(−m/ NQ) = NQ.
(1)
We claim that Eq. (1) has a unique positive solution NQ >
NQ. Since m and NQ are positive constants, the left hand
side of Eq. (1) is a function f of NQ. Moreover, the function
f is continuous and monotonically increasing in NQ, and
f (NQ) = NQ(1 − exp(−m/NQ)) < NQ. Therefore, the
above equation has a unique positive solution for NQ that
is larger than NQ. We can find the solution efficiently with
binary search, and then round NQ to the nearest integer.
In our experiments, using the corrected number of ques-
tions with our model is accurate, even with our approxima-
tions. Generating one sample for each dataset, the relative
error between the number of questions with at least one tag
in the model deviates from the true number of questions by
0.32% on average and by at most 3.75% across all datasets.
While these statistics are for just one sample in each network,
the variance in the number of questions with 0 tags is ap-
proximately NQp(1 − p). The ratio between the theoretical
standard deviation and the corrected number of questions is
small -- -less than 0.008 for 80% of the datasets (Fig. 5, left).
Number of tags per question We next justify our second
model deviation, which is that questions can be assigned more
than five tags. Our argument is that only a small fraction of
questions are actually assigned more than five tags with our
generative model. We generated tag-question bipartite graphs
0.000.010.020.03Standard dev.\ NQ0.000.250.500.751.00CDF0.0000.0250.0500.0750.100Fraction of Questions with More Than 5 Tags0.000.250.500.751.00CDFFigure 6: Distributions of number of tags per post. Markers
indicate number of tags: 1 -- blue triangle; 2 -- yellow 'Y';
3 -- green diamond; 4 -- red square; and 5 -- purple '+'. (Left)
Fraction of questions with a given number of tags as a func-
tion of the number of questions in a datasets. The distribution
of tags per post is roughly independent of the size of the Stack
Exchange community. (Right) Comparison of the distribu-
tion of the number of tags per post in the data and a sample
from our generative model. The distributions are strongly
correlated (shown in legend).
with Algorithm 1 for each Stack Exchange community using
the fitted lognormal parameters (Fig. 4, bottom). The mean
fraction of questions with more than 5 tags in the generated
networks across 168 Stack Exchange platforms is only 2.5%
and more than 80% of datasets have less than a 4.5% of
questions with more than five tags (Fig. 5, right).
Summary Algorithm 1 is a simple generative model for bi-
partite tag-question networks that generates tag occurrences
with the lognormal distribution that we found to be common
across nearly all Stack Exchange communities. As a first
look at how our model matches the empirical data, we con-
sider the distribution of the number of tags per question. In
the empirical data, this distribution tends to be uncorrelated
with the size of the dataset (Fig. 6, left). We also find that
the distribution of the number of tags per question in the
model closely matches the empirical data (Fig. 6, right). In
the next section, we analyze co-tagging, i.e., how tags jointly
annotate questions. Our model has no built-in notion of corre-
lations in co-tagging, yet we find that the model still matches
macroscopic co-tagging properties in the data.
5 Co-tagging Analysis
In addition to the bipartite tag-question network, we also
build a "co-tagging network" for each Stack Exchange com-
munity. Recall that the tag-question network B = (T ∪ Q, E)
is given by vertex sets T and Q corresponding to tags and
questions and has edges (t, q) ∈ E connecting tags to ques-
tions. The co-tagging network G is the projection of this
graph onto the set of tags. Formally, G = (T, F ), where
(s, t) ∈ F if and only if there is some question q ∈ Q such
that (s, q), (t, q) ∈ E. In this case, we say that s and t co-tag
with each other. We also associate a weight with each edge in
G corresponding to the number of questions containing the
two tags (the number of times that two nodes are co-tagged):
(2)
In the rest of this section, we show that co-tagging net-
works constructed from samples of our generative model
ws,t = {q ∈ Q (s, q), (t, q) ∈ E}.
Figure 7: (Left) The weighted number of co-tags is approx-
imately a linear function of tag frequency. Here, we show
the distribution of slopes from the linear regression over
our collection of Stack Exchange communities. The regres-
sion has an r2 value greater than 0.95 in 95% of the empir-
ical datasets and greater than 0.97 in 97% of the generated
datasets. (Right) The relationship between the fitted slope
on the data and in the model across the Stack Exchange
communities, which are strongly correlated.
(Algorithm 1) match statistical properties of the co-tagging
networks of empirical data, even though our model does not
explicitly account for co-tagging behavior. Again, we use
the lognormal parameters µ and σ fitted for each dataset
(Fig. 4) to generate a random graph for each Stack Exchange
network. We focus our attention on three properties of the
co-tagging network: (i) the expected number of co-tags (i.e.,
the weighted degree in G) as a function of tag frequency; (ii)
the expected number of unique co-tags (i.e., the unweighted
degree in G), again as a function of tag frequency; and (iii)
weighted and unweighted versions of the clustering coeffi-
cient of the graph G.
co-tags of tag t is kt =(cid:80)
Weighted Co-tags and Tag Frequency
We first examine the relationship between the number of
co-tags of a given tag as a function of its frequency (the
number of questions in which it appears). Here, we consider
the number of co-tags to be weighted, i.e., the number of
s∈T ws,t, following Eq. (2). In the
empirical data, this relationship is essentially linear -- a linear
model of the number of co-tags in regressed on the number of
questions containing the tag has a coefficient of determination
(r2 value) greater than 0.95 in 95% of the Stack Exchange
communities. Figure 7 (left) shows the distribution of the
slopes, which concentrate around 1.82.
We now show why we would also expect this behavior
from our model. Recall that the generative model samples tag
frequencies xt ∼ LogNormal(µ, σ2) and then scaled so that
these variables to match the total number of tag occurrences.
The number of co-tags between s and t then follows ws,t ∼
Hypergeom( NQ, xs, xt), where NQ is the corrected number
of questions in Algorithm 1. Thus, the expected number of
co-tags kt of a given tag t is
(cid:88)
E[kt] =
xsxt
NQ
=
t(cid:54)=s,s=1,...,NT
(m − xt)xt
,
NQ
where m is the target number of tag occurrences (the first
equality comes from the independence in assignment of the
102103104105106Number of Questions0.00.20.40.60.8Fraction of Questions0.00.20.40.60.8Fraction (Model)0.00.20.40.60.8Fraction (Data)c1=0.96c2=0.77c3=0.92c4=0.96c5=0.9212Slope (Data)0.000.250.500.751.00Frequencymean=1.82median=1.87123Slope (Model)12Slope (Data)Corr = 0.932Figure 8: (Left) The CDF of the mean-squared error in third-
degree and first-degree (linear) polynomial models of of the
log number of unique co-tags in terms of the log of tag fre-
quency in both the data and the samples from the generative
model. The third-degree polynomial is a good approximation
and matches the expected value of the model (Fig. 9). (Right)
The CDF of the mean error in the expected number of unique
co-tags in the model and the actual number of co-tags in the
dataset. The error is less than 0.5 in 80% of the datasets. The
model slightly over-estimates the number of unique co-tags
by not taking into account tag correlations (see also Fig. 9).
d
dxt
tags). Although there is a quadratic relationship between
kt and xt, we know that xt is typically small compared to
m. Thus, the gradient is well-approximated by the linear
kt ≈ m/ NQ, independent of xt.
function m/ NQ, i.e.,
Our analysis here is independent of the lognormal distribution
of the tag frequency -- we only relied on independence in the
way that tags are assigned to questions.
In actual random samples, the linear relationship holds.
We performed the same linear regression on random samples
from our generative model using the fitted parameters in
Fig. 4 as we did for the empirical datasets. In the model, 97%
of the 168 datasets have a correlation coefficient r2 > 0.97.
Furthermore, the slopes from the regression on the generated
data are highly correlated with the slopes on the empirical
data (the correlation is 0.932; Fig. 7, right), and the mean
squared error between the slope derived from a sample from
the generative model and the computed slope on the empirical
data across all Stack Exchange communities is just 0.10.
Unique Co-tags and Tag Frequency
In the above analysis, we saw that the number of co-tags of a
given tag is approximately linear in the number of questions
in which the tag appears -- in both the empirical data and our
model-generated data. In this section, we instead consider
the number of unique co-tags of a given tag t as a function
of the number of questions containing tag t. In this case, the
number of unique co-tags is equal to the unweighted degree
of tag t in the co-tagging network G defined above.
We find that the log of the number of unique co-tags is
well-approximated as a third-degree polynomial of the log
of the number of question that contain the tag. Formally, let
dt denote the unweighted degree of tag t in the co-tagging
network G and xt the number of questions containing tag t.
We then fit a the following polynomial model:
log(d(t) + 1) =
ai log(xt + 1)i.
(3)
3(cid:88)
i=0
Figure 9: Relationship between the number of unique co-
tags and tag frequency on four Stack Exchange communities,
which is well-approximated by a degree-three polynomial
(see also Fig. 8). The model has the same shape, albeit slightly
above the data.
Figure 8 (left) shows the CDF of the mean-squared error of
the polynomial fit. The third-degree polynomial is a good
fit for both the empirical data and the model across the col-
lection of Stack Exchange communities. Figure 9 shows the
distributions and fit of the third-degree polynomial for a few
representative networks. In these cases, the polynomial fit
is accurate and captures the fact that the number of unique
co-tags does not grow linearly with tag frequency. Instead,
the growth in unique co-tags tapers for some of the most
frequently used tags. This happens because there is a limited
total number of tags (Fig. 2), so tags that occur frequently
have fewer options to increase the number of unique co-tags.
Interestingly, the fitted third-degree polynomial coeffi-
cients {ai}, when taken as a collection across the Stack
Exchange communities, largely lie on a lower-dimensional
subspace. In the empirical datasets, the first principal compo-
nent explains 86% of the variability, and the second principal
component explains an additional 13% of the variability. Sim-
ilar results hold for the fitted coefficients in datasets generated
with our model -- 89% of the variability is explained with the
first principal component and an addition 10% is explained
by the second principal component.
We can easily compute the expected number of unique
co-tags with a simple summation. We argued in the previous
section that the weighted number of co-tags between tags s
and t is ws,t ∼ Hypergeom( NQ, xs, xt). Thus, the expected
number of unique co-tags dt of tag t is
(cid:88)
s(cid:54)=t
E[dt] =
P(ws,t > 0) =
=
(cid:88)
(cid:88)
s(cid:54)=t
s(cid:54)=t
1 −
1 − P(ws,t = 0)
,
(cid:1)
(cid:0) NQ−xs
(cid:0) NQ
(cid:1)
xt
xt
where xs is the sampled number of questions for tag s in
0.00.10.20.3MSE0.00.20.40.60.81.0CDFDegree 3 Fit (Model)Degree 1 Fit (Model)Degree 3 Fit (Data)Degree 1 Fit (Data)0.250.500.751.00Mean Error (ln(Expected+1) - ln(Data+1))0.000.250.500.751.00CDF100101102103104Number of Tag Occurrences, xi100101102103Number of Unique Cotags, kUAPPLEData fitModel fitDataModelExpected100101102Number of Tag Occurrences, xi100101102Number of Unique Cotags, kUCOFFEE100101102103104105Number of Tag Occurrences, xi100101102103Number of Unique Cotags, kUMATH.STACKEXCHANGE.COM100101102103Number of Tag Occurrences, xi100101102Number of Unique Cotags, kUFITNESSu,v = w(cid:48)
u,v/ maxx,y w(cid:48)
x,y and summations over
u,v = 0 (i.e., with no edge) are ignored.
where w(cid:48)
cases where w(cid:48)
Figure 10 (top row) shows that all three clustering coef-
ficients are approximately normally distributed across the
collection of Stack Exchange communities. Furthermore,
the unweighted coefficients are only weakly correlated with
the size of the community, measured by the log-number of
questions on the Stack Exchange (Fig. 10, middle row). We
conclude that the size of a Stack Exchange community is
likely not a driving factor in the unweighted clustering of
the network, which backs up conventional wisdom for the
analysis of real-world networks (Newman 2003), differs from
the behavior of random graph models that produce heavy-
tailed degree distributions, where clustering decreases with
size (Bollob´as and Riordan 2004). On the other hand, the
weighted clustering coefficients tend to decrease with the size
of the Stack Exchange community (Fig. 10, middle row).
The co-tagging networks derived from samples of our gen-
erative model reproduce these clustering coefficients remark-
ably closely and with strong positive correlations (Fig. 10,
bottom row). Again, we emphasize that our model does not
bake in any explicit notion of clustering. Instead, our model
only matches the lognormal distribution of the tag frequency
and the total number of tags applied to all questions. Thus,
clustering in the co-tagging in Stack Exchange communities
could be explained simply by these simpler statistics. This
finding contrasts sharply with typical (social) network analy-
sis, where clustering is exhibited at a much higher level than
is expected by random graph models (Newman 2003). The
key difference is that our model is based on a projection of a
bipartite tag-question graph rather than directly modeling the
co-tagging network. This type of modeling has a long history
in sociology (Breiger 1974) but has received relatively less
theoretical attention in social network analysis (Lattanzi and
Sivakumar 2009).
6 Discussion
In addition to providing answers to questions, the users of
Q&A platforms create knowledge through annotation of ques-
tions. With their tagging system, Stack Exchange provides a
unique opportunity to study these annotations for two main
reasons. First, tags cannot be created freely and there are
community guidelines for their application, which differs
substantially from tagging norms on other social media plat-
forms. Second, there is a collection of Stack Exchange com-
munities that have largely evolved independently, enabling us
to model and analyze tagging with more statistical evidence.
And we indeed found similarities in macroscopic tagging
structure -- in terms of tag frequency and co-tagging network
structure -- across 168 Stack Exchange communities span-
ning a diverse range of topics. This contrasts from typical
network analyses that study a single snapshot of a social
network. Previously, researchers have circumvented this is-
sue by looking at, for example, sets of disparate subgraphs
from a larger graph (Traud, Mucha, and Porter 2012; Patania,
Petri, and Vaccarino 2017); samples of ego networks (Ugan-
der, Backstrom, and Kleinberg 2013; Benson et al. 2018;
Mcauley and Leskovec 2014); and collections of snapshots
Figure 10: (Top) The clustering coefficients of the Stack Ex-
change communities are approximately normally distributed.
(Middle) The unweighted clustering coefficient C has a weak
correlation with respect to the size of the community as mea-
sured by the log-number of questions; the weighted versions
are negative correlated. (Bottom) The clustering coefficients
in the co-tagging networks generated by our model are similar
to the clustering coefficients of the empirical Stack Exchange
communities.
Algorithm 1 and NQ is the corrected number of questions.
Figure 9 shows that the generated model data matches this
expectation.
Clustering in the co-tagging networks
Finally, we analyze the clustering coefficient of the co-
tagging networks, which is one of the fundamental measure-
ments in networks (Watts and Strogatz 1998; Newman 2003).
Let ∆u, du, and wu,v be the number of triangles containing
node u, the unweighted degree of du, and the weight of edge
(u, v) in the co-tagging graph G. We consider three clustering
coefficients:
1. The unweighted clustering coefficient (Watts and Strogatz
1998):
(cid:88)
u∈T
C =
1
T
2∆u
du(du − 1)
(cid:88)
v,z
(cid:88)
v,z
2. The weighted clustering clustering coefficient:
Cw =
1
T
1
du(du − 1)
( wu,v wu,z wv,z)1/3,
where wu,v = wu,v/ maxx,y wx,y (Onnela et al. 2005).
We will analyze log(Cw).
3. The log-weighted clustering coefficient, which is the same
as the mean weighted clustering coefficient, except the
weight wu,v is replaced by w(cid:48)
u,v = log(wu,v + 1):
Clw =
1
T
1
du(du − 1)
( w(cid:48)
u,v w(cid:48)
u,z w(cid:48)
v,z)1/3,
(cid:88)
u∈T
n(cid:88)
u∈T
0.20.40.6C0246FrequencyN(0.56, 0.06)864ln(Cw)0.00.10.20.3FrequencyN(-5.09, 1.28)0.10.2Clw01020FrequencyN(0.12, 0.03)103105Number of Questions0.20.40.6CCorr = 0.160103105Number of Questions864ln(Cw)Corr = -0.934103105Number of Questions0.10.2ClwCorr = -0.7120.20.40.60.8C (model)0.20.40.6C (data)Corr = 0.786642ln(Cw) (model)864ln(Cw) (data)Corr = 0.8390.10.2Clw (model)0.00.10.2Clw (data)Corr = 0.798of time-evolving networks (Yaveroglu et al. 2014).
One macroscopic property across communities is that the
distribution of tag frequencies is well-modeled by a lognor-
mal distribution. The fitted parameters of the lognormal dis-
tributions (Fig. 4) themselves are approximately normally
distributed across our collection of Stack Exchange communi-
ties. Thus, one could incorporate this information as a simple
prior in bayesian modeling of tag-question networks.
We used the tag frequency distribution to develop a simple
generative model for random tag-question bipartite graphs,
which was able to reproduce a number of the co-tagging
and clustering properties of the datasets, without explicitly
modeling correlations or clustering in the co-tagging process.
Further understanding of the process producing this distri-
bution is an avenue for future research. For example, multi-
plicative growth models are a well-known generative process
for lognormal distributions (Mitzenmacher 2004). Although
outside the scope of this paper, the availability of temporal
information from Stack Exchange provides a path towards
more robust understanding of the underlying processes of tag
use, similar to other methods for estimating growth on the
Web and in social networks (Huberman and Adamic 1999;
Overgoor, Benson, and Ugander 2018).
Code and data. Code to reproduce our results, along with
processed data, are available at https://github.com/
yushangdi/stack-exchange-cotagging.
Acknowledgments. This research was supported by NSF
award DMS-1830274 and ARO award 86798.
References
[Adamic et al. 2008] Adamic, L. A.; Zhang, J.; Bakshy, E.;
and Ackerman, M. S. 2008. Knowledge sharing and yahoo
answers: Everyone knows something. In Proceedings of the
17th International Conference on World Wide Web (WWW),
665 -- 674.
[Akoglu, Chandy, and Faloutsos 2013] Akoglu, L.; Chandy,
R.; and Faloutsos, C. 2013. Opinion fraud detection in
online reviews by network effects. In International AAAI
Conference on Web and Social Media (ICWSM), volume 13,
2 -- 11.
[Alstott, Bullmore, and Plenz 2013] Alstott, J.; Bullmore, E.;
and Plenz, D. 2013. Powerlaw: a python package for analysis
of heavy-tailed distributions.
[Anderson et al. 2012] Anderson, A.; Huttenlocher, D.; Klein-
berg, J.; and Leskovec, J. 2012. Discovering value from com-
munity activity on focused question answering sites: a case
study of Stack Overflow. In Proceedings of the 18th ACM
SIGKDD International Conference on Knowledge Discovery
and Data Mining (KDD).
[Anderson et al. 2013] Anderson, A.; Huttenlocher, D.; Klein-
berg, J.; and Leskovec, J. 2013. Steering user behavior with
badges. In Proceedings of the 22nd International Conference
on World Wide Web (WWW).
[Bascompte, Jordano, and Olesen 2006] Bascompte, J.; Jor-
dano, P.; and Olesen, J. M. 2006. Asymmetric coevolu-
tionary networks facilitate biodiversity maintenance. Science
312(5772):431 -- 433.
[Benson et al. 2018] Benson, A. R.; Abebe, R.; Schaub, M. T.;
Jadbabaie, A.; and Kleinberg, J. 2018. Simplicial closure
and higher-order link prediction. Proceedings of the National
Academy of Sciences 115(48):E11221 -- E11230.
[Bollob´as and Riordan 2004] Bollob´as, B., and Riordan,
O. M. 2004. Mathematical results on scale-free random
graphs. In Handbook of Graphs and Networks. Wiley. 1 -- 34.
[Bosu et al. 2013] Bosu, A.; Corley, C. S.; Heaton, D.; Chat-
terji, D.; Carver, J. C.; and Kraft, N. A. 2013. Building
reputation in StackOverflow: An empirical investigation. In
Working Conference on Mining Software Repositories, 89 --
92.
[Breiger 1974] Breiger, R. L. 1974. The duality of persons
and groups. Social Forces 53(2).
[Capocci and Caldarelli 2008] Capocci, A., and Caldarelli, G.
2008. Folksonomies and clustering in the collaborative sys-
tem citeulike. Journal of Physics A: Mathematical and Theo-
retical 41(22).
[Cattuto et al. 2007] Cattuto, C.; Schmitz, C.; Baldassarri, A.;
Servedio, V. D. P.; Loreto, V.; Hotho, A.; Grahl, M.; and
Stumme, G. 2007. Network properties of folksonomies. AI
Communications 20(4):245 -- 262.
[Cattuto et al. 2009] Cattuto, C.; Barrat, A.; Baldassarri, A.;
Schehr, G.; and Loreto, V. 2009. Collective dynamics of
social annotation. Proceedings of the National Academy of
Sciences 106(26):10511 -- 10515.
[Chen, Ho, and Kim 2010] Chen, Y.; Ho, T.-H.; and Kim, Y.-
M. 2010. Knowledge market design: A field experiment
at google answers. Journal of Public Economic Theory
12(4):641 -- 664.
[Chojnacki and Kłopotek 2010] Chojnacki, S., and Kłopotek,
M. 2010. Random graph generative model for folksonomy
network structure approximation. Procedia Computer Sci-
ence 1(1):1683 -- 1688.
[Clauset, Shalizi, and Newman 2009] Clauset, A.; Shalizi,
C.; and Newman, M. 2009. Power-law distributions in
empirical data. SIAM Review 51(4):661 -- 703.
[Goh et al. 2007] Goh, K.-I.; Cusick, M. E.; Valle, D.; Childs,
B.; Vidal, M.; and Barabasi, A.-L. 2007. The human disease
network. Proceedings of the National Academy of Sciences
104(21):8685 -- 8690.
[Halpin, Robu, and Shepherd 2007] Halpin, H.; Robu, V.;
and Shepherd, H. 2007. The complex dynamics of col-
laborative tagging. In Proceedings of the 16th International
Conference on World Wide Web (WWW).
[Huberman and Adamic 1999] Huberman, B. A.,
and
Adamic, L. A. 1999. Growth dynamics of the world-wide
web. Nature 401(6749):131 -- 131.
[Kwak et al. 2010] Kwak, H.; Lee, C.; Park, H.; and Moon, S.
2010. What is Twitter, a social network or a news media? In
Proceedings of the 19th International Conference on World
Wide Web (WWW).
[Larremore, Clauset, and Jacobs 2014] Larremore, D. B.;
Clauset, A.; and Jacobs, A. Z. 2014. Efficiently inferring
community structure in bipartite networks. Physical Review
E 90(1).
2005.
Folk-
http://www.vanderwal.net/random/
[Ugander, Backstrom, and Kleinberg 2013] Ugander,
J.;
Backstrom, L.; and Kleinberg, J. 2013. Subgraph frequen-
cies: mapping the empirical and extremal geography of large
graph collections. In Proceedings of the 22nd International
Conference on World Wide Web (WWW).
[Ugander et al. 2011] Ugander, J.; Karrer, B.; Backstrom, L.;
and Marlow, C. 2011. The anatomy of the facebook social
graph. arXiv:1111.4503.
[Vander Wal 2005] Vander Wal, T.
sonomy.
entrysel.php?blog=1622.
[Wang et al. 2013] Wang, G.; Gill, K.; Mohanlal, M.; Zheng,
H.; and Zhao, B. Y. 2013. Wisdom in the social crowd: An
analysis of quora. In Proceedings of the 22nd International
Conference on World Wide Web (WWW), 1341 -- 1352.
[Wang, Liu, and Fan 2011] Wang, X.; Liu, H.; and Fan, W.
2011. Connecting users with similar interests via tag network
inference. In Proceedings of the 20th ACM International
Conference on Information and Knowledge Management,
1019 -- 1024.
[Watts and Strogatz 1998] Watts, D. J., and Strogatz, S. H.
1998. Collective dynamics of 'small-world' networks. Nature
393(6684):440 -- 442.
[Yang et al. 2011] Yang, J.; Morris, M. R.; Teevan, J.;
Adamic, L. A.; and Ackerman, M. S. 2011. Culture matters:
A survey study of social Q&A behavior. In International
AAAI Conference on Web and Social Media (ICWSM).
[Yaveroglu et al. 2014] Yaveroglu, O. N.; Malod-Dognin, N.;
Davis, D.; Levnajic, Z.; Janjic, V.; Karapandza, R.; Sto-
jmirovic, A.; and Przulj, N. 2014. Revealing the hidden
language of complex networks. Scientific Reports 4(1).
[Lattanzi and Sivakumar 2009] Lattanzi, S., and Sivakumar,
D. 2009. Affiliation networks. In Proceedings of the 41st
annual ACM Symposium on Theory of Computing (STOC).
[MacLeod 2014] MacLeod, L. 2014. Reputation on Stack Ex-
change: Tag, you're it! In 28th International Conference on
Advanced Information Networking and Applications Work-
shops, 670 -- 674.
[Maity, Sahni, and Mukherjee 2015] Maity, S.; Sahni,
J.
S. S.; and Mukherjee, A. 2015. Analysis and Prediction
of Question Topic Popularity in Community Q&A Sites: A
Case Study of Quora. In International AAAI Conference on
Web and Social Media (ICWSM).
[Mcauley and Leskovec 2014] Mcauley, J., and Leskovec, J.
2014. Discovering social circles in ego networks. ACM
Transactions on Knowledge Discovery from Data 8(1):1 -- 28.
[Mitzenmacher 2004] Mitzenmacher, M. 2004. A brief his-
tory of generative models for power law and lognormal dis-
tributions. Internet Mathematics 1(2):226 -- 251.
[Newman 2003] Newman, M. E. J. 2003. The structure and
function of complex networks. SIAM Review 45(2):167 -- 256.
[Onnela et al. 2005] Onnela, J. P.; Saramki, J.; Kertsz, J.; and
Kaski, K. 2005.
Intensity and coherence of motifs in
weighted complex networks. Physical Review E.
[Overgoor, Benson, and Ugander 2018] Overgoor, J.; Ben-
son, A. R.; and Ugander, J. 2018. Choosing to grow
a graph: Modeling network formation as discrete choice.
arXiv:1811.05008.
[Pal, Chang, and Konstan 2012] Pal, A.; Chang, S.; and Kon-
stan, J. A. 2012. Evolution of experts in question answering
communities. In International AAAI Conference on Web and
Social Media (ICWSM).
[Paranjape, Benson, and Leskovec 2017] Paranjape, A.; Ben-
son, A. R.; and Leskovec, J. 2017. Motifs in temporal
networks. In Proceedings of the Tenth ACM International
Conference on Web Search and Data Mining.
[Patania, Petri, and Vaccarino 2017] Patania, A.; Petri, G.;
and Vaccarino, F. 2017. The shape of collaborations. EPJ
Data Science 6(1).
[Paul, Hong, and Chi 2012] Paul, S. A.; Hong, L.; and Chi,
E. H. 2012. Who is authoritative? understanding reputation
mechanisms in Quora. In Collective Intelligence.
[Posnett et al. 2012] Posnett, D.; Warburg, E.; Devanbu, P.;
and Filkov, V. 2012. Mining Stack Exchange: Expertise is ev-
ident from initial contributions. In International Conference
on Social Informatics, 199 -- 204.
[Salganik 2006] Salganik, M. J. 2006. Experimental study of
inequality and unpredictability in an artificial cultural market.
Science 311(5762):854 -- 856.
[Tian, Zhang, and Li 2013] Tian, Q.; Zhang, P.; and Li, B.
2013. Towards predicting the best answers in community-
based question-answering services. In International AAAI
Conference on Web and Social Media (ICWSM).
[Traud, Mucha, and Porter 2012] Traud, A. L.; Mucha, P. J.;
and Porter, M. A. 2012. Social structure of Facebook net-
works. Physica A: Statistical Mechanics and its Applications
391(16):4165 -- 4180.
|
1904.05329 | 3 | 1904 | 2019-08-14T22:37:02 | GraSPy: Graph Statistics in Python | [
"cs.SI",
"stat.ML"
] | We introduce GraSPy, a Python library devoted to statistical inference, machine learning, and visualization of random graphs and graph populations. This package provides flexible and easy-to-use algorithms for analyzing and understanding graphs with a scikit-learn compliant API. GraSPy can be downloaded from Python Package Index (PyPi), and is released under the Apache 2.0 open-source license. The documentation and all releases are available at https://neurodata.io/graspy. | cs.SI | cs |
GraSPy: Graph Statistics in Python
Jaewon Chung1, †, Benjamin D. Pedigo1, †, Eric W. Bridgeford2, Bijan K.Varjavand1, Hayden S. Helm3,
and Joshua T. Vogelstein1, 3, 4, (cid:63)
1Department of Biomedical Engineering, Johns Hopkins University, Baltimore, MD 21218
2Department of Biostatistics, Johns Hopkins University of Public Health, Baltimore, MD 21218
3Center for Imaging Science, Johns Hopkins University, Baltimore, MD 21218
4Kavli Neuroscience Discovery Institute, Institute for Computational Medicine, Johns Hopkins Univer-
sity, Baltimore, MD 21218
†Denotes equal contribution
(cid:63)Corresponding author
We introduce GraSPy, a Python library devoted to statistical inference, machine learning, and
visualization of random graphs and graph populations. This package provides flexible and easy-
to-use algorithms for analyzing and understanding graphs with a scikit-learn compliant
API. GraSPy can be downloaded from Python Package Index (PyPi), and is released under the
Apache 2.0 open-source license. The documentation and all releases are available at https:
//neurodata.io/graspy.
1 Introduction
Graphs, or networks, are a mathematical representation of data that consists of discrete objects (nodes
or vertices) and relationships between these objects (edges). For example, in a brain, regions of in-
terest can be vertices, the edges represent the presence of a structural connection between them [1].
Since graphs necessarily deal with relationships between nodes, classical statistical assumptions about
independence are violated. Thus, novel methodology is required for performing statistical inference on
graphs and populations of graphs [2]. While the theory for inference on graphs is highly developed, to
date, there has not existed a numerical package implementing these methods. GraSPy fills this gap
by providing implementations of algorithms with strong statistical guarantees, such as graph and multi-
graph embedding methods, two-graph hypothesis testing, and clustering of vertices of graphs. Many
of the algorithms implemented in GraSPy are flexible and can operate on graphs that are weighted
or unweighted, as well as directed or undirected. Table 1 provides a comparison of GraSPy to other
existing graph analysis packages [3 -- 5].
2 Library Overview
GraSPy includes functionality for fitting and sampling from random graph models, performing dimen-
sionality reduction on graphs or populations of graphs (embedding), testing hypotheses on graphs,
and plotting of graphs and embeddings. The following provides brief overview of different modules of
GraSPy. An example workflow using these modules is shown in Figure 1. More detailed overview
and code usage can be found in the tutorial section of GraSPy documentation at https://graspy.
neurodata.io/tutorial. All descriptions here correspond to GraSPy version 0.1.1.
Simulations Several random graph models are implemented in GraSPy, including the Erdos-Rényi
(ER) model, stochastic block model (SBM), degree-corrected Erdos-Rényi (DCER) model, degree-
corrected stochastic block model (DCSBM), and random dot product graph (RDPG) [6 -- 8]. The
1
Graph Theory
Statistical Modeling
Other
al
ers
v
tra
package
GraSPy 0.1.1
NetworkX 2.3
graph-tool 2.29
Snap.py 4.1
stats.
ork
etw
n
s
nitie
u
m
m
o
c
d
e
b
m
e
d
e
b
m
e
ult.
m
fit
el
d
o
m
s
n
ulatio
sim
st
te
p.
y
h
g
plottin
stall
in
pip
Table 1: Qualitative comparison of Python graph analysis packages. GraSPy is largely complementary
to existing graph analysis packages in Python. GraSPy does not implement many of the essential
algorithms for operating on graphs (rather, it leverages NetworkX for these implementations). The
focus of GraSPy is on statistical modeling of populations of networks, with features such as multiple
graph embeddings, model fitting, and hypothesis testing. A is given for packages that implement the
respective feature, a for packages that partially implement the respective feature, and a is given
for packages that do not implement the respective feature. Note that while a shows that the feature
exists in the corresponding package, it does not imply that the specific algorithms are the same for all
packages.
Figure 1: Illustration of modules and procedure for statistical inference on graphs, populations of graphs,
or simulated data. A detailed description of each module is given in Section 2.
2
SimulationsSample random graphsSingle graphInput dataMultiple graphsInput dataUtilsImport, preprocessingPlotVisualize graphs, graph embeddingsEmbedGraph, graph population dimensionality reductionModelsFit graph models to dataClusterCluster vertex or graph embeddingsInferenceTest graph hypothesessimulations module allows the user to sample random graphs given the parameters of one of
these models. Additionally, the user can specify a distribution on the weights of graph edges.
Utils GraSPy includes a variety of utility functions for graph and graph population importing and
preprocessing. GraSPy can import graphs represented as NetworkX objects or NumPy arrays.
Preprocessing examples include finding the largest connected component of a graph, finding the
intersection or union of connected components across multiple graphs, or checking whether a
graph is directed.
Embed Inferences on random graphs can leverage low-dimensional Euclidean representations of the
vertices, known as latent positions. Adjacency spectral embedding (ASE) and Laplacian spectral
embedding (LSE) are methods for embedding a single graph [2]. Omnibus embedding and mul-
tiple adjacency spectral embedding (MASE) allows for embedding multiple graphs into the same
subspace such that the embeddings can be meaningfully compared [9, 10]. GraSPy includes a
method for choosing the number of embedding dimensions automatically [11].
Models GraSPy includes classes for fitting random graph models to an input graph (Figure 2). Cur-
rently, ER, SBM, DCER, DCSBM, and RDPG are supported for model estimation. After fitting
a model to data, the model class can also output goodness-of-fit metrics (mean squared error,
likelihood) and the number of estimated model parameters, allowing for model selection. The
model classes can also be used to sample new simulated graphs based on the fit model.
Inference Given two graphs, a natural question to ask is whether these graphs are both random
samples from the same generative distribution. GraSPy provides two types of test for this null
hypothesis: a latent position test and a latent distribution test. Both tests are framed under the
RDPG model, where the generative distribution for the graph can be modeled as a set of latent
positions. The latent position test can only be performed on two graphs of the same size and with
known correspondence between the vertices of the two graphs [13]. The latent distribution test
can be performed on graphs without vertex alignment, or even with slightly different numbers of
vertices [14].
Cluster GraSPy extends Gaussian mixture models (GMM) and k-means from scikit-learn to
sweep over a specified range of parameters and choose the best clustering [15]. The number
of clusters and covariance structure for each GMM is chosen by Bayesian information criterion
(BIC), which is a penalized likelihood function to evaluate the quality of estimators [16]. Silhouette
score is used to choose the number of clusters for k-means [17]. Clustering is often useful for
computing the the community structure of vertices after embedding.
Plot GraSPy extends seaborn to visualize graphs as adjacency matrices and embedded graphs as
paired scatter plots [18]. Individual graphs can be visualized using heatmap function, and multiple
graphs can be overlaid on top of each other using gridplot. The nodes in both graph visualizations
can be sorted by various node metadata, such as node degree or assigned node labels. Pairplot
can visualize high dimensional data, such as embeddings, as a pairwise scatter plot.
3
Figure 2: Connectome model fitting using GraSPy. Heatmaps show the probability of potential edges
for models of graphs fit to the Drosophila larva right mushroom body connectome (unweighted, di-
rected) [12]. The node labels correspond to cell types: P) projection neurons, O) mushroom body
output neurons, I) mushroom body input neurons. The graph models are: inhomogeneous Erdos-Rényi
(IER) model in which all potential edges are specified, random dot product graph (RDPG), degree-
corrected stochastic block model (DCSBM), degree-corrected Erdos-Rényi (DCER), stochastic block
model (SBM), and Erdos-Rényi (ER). Blocks (cell types) are sorted by number of member vertices and
nodes are sorted by degree within blocks. The code used to generate the figure is tutorial section at
https://neurodata.io/graspy.
4
IERRDPGDCSBMDCERSBMERKPOIKPOIKPOIKPOIKPOIKPOIKPOIKPOIKPOIKPOIKPOIKPOI0.00.20.40.60.81.03 Code example
Given the connectomes of the Drosophila larva left and right mushroom bodies, one natural question
to ask is: how similar are these graphs [12]? We can frame this question as whether these graphs are
generated from the same distribution of latent positions [14]. We can use the latent distribution test to
test this hypothesis:
from graspy.datasets import load_drosophila_left, load_drosophila_right
from graspy.inference import LatentDistributionTest
# Load data
left_graph = load_drosophila_left()
right_graph = load_drosophila_right()
# Initialize hypothesis test object and compute p-value
ldt = LatentDistributionTest(n_components=3, n_bootstraps=500)
p_value = ldt.fit(left_graph, right_graph)
print("p-value: " + str(p_value))
p-value: 0.002
4 Conclusion
GraSPy is an open-source Python package to perform statistical analysis on graphs and graph popu-
lations. Its compliance with the scikit-learn API makes it an easy-to-use tool for anyone familiar
with machine learning in Python [19].
In addition, GraSPy is implemented with an extensible class
structure, making it easy to modify and add new algorithms to the package. As GraSPy continues to
grow and add functionality, we believe it will accelerate statistically principled discovery in any field of
study concerned with graphs or populations of graphs.
Acknowledgements
This work is graciously supported by the DARPA, under agreement numbers FA8650-18-2-7834 and
FA8750-17-2-0112. We thank all the contributors for assisting with writing GraSPy. We thank the
NeuroData Design class, the NeuroData lab, and Carey E. Priebe at Johns Hopkins University for
helpful feedback.
5
Bibliography
[1] J. T. Vogelstein, E. W. Bridgeford, B. D. Pedigo, J. Chung, K. Levin, B. Mensh, and C. E. Priebe,
"Connectal coding: discovering the structures linking cognitive phenotypes to individual histories,"
Current Opinion in Neurobiology, vol. 55, pp. 199 -- 212, 2019.
[2] A. Athreya, D. E. Fishkind, M. Tang, C. E. Priebe, Y. Park, J. T. Vogelstein, K. Levin, V. Lyzinski,
Y. Qin, and D. L. Sussman, "Statistical
inference on random dot product graphs: a survey,"
Journal of Machine Learning Research, vol. 18, no. 226, pp. 1 -- 92, 2018. [Online]. Available:
http://jmlr.org/papers/v18/17-448.html
[3] A. Hagberg, P. Swart, and D. S Chult, "Exploring network structure, dynamics, and function using
networkx," Los Alamos National Lab.(LANL), Los Alamos, NM (United States), Tech. Rep., 2008.
[4] T. P. Peixoto,
"The graph-tool python library," figshare, 2014.
[Online]. Available:
http:
//figshare.com/articles/graph_tool/1164194
[5] J. Leskovec and R. Sosic, "Snap: A general-purpose network analysis and graph-mining library,"
ACM Transactions on Intelligent Systems and Technology (TIST), vol. 8, no. 1, p. 1, 2016.
[6] P. W. Holland, K. B. Laskey, and S. Leinhardt, "Stochastic blockmodels: First steps," Social net-
works, vol. 5, no. 2, pp. 109 -- 137, 1983.
[7] B. Karrer and M. E. Newman, "Stochastic blockmodels and community structure in networks,"
Physical review E, vol. 83, no. 1, p. 016107, 2011.
[8] S. J. Young and E. R. Scheinerman, "Random dot product graph models for social networks,"
in International Workshop on Algorithms and Models for the Web-Graph. Springer, 2007, pp.
138 -- 149.
[9] K. Levin, A. Athreya, M. Tang, V. Lyzinski, and C. E. Priebe, "A central limit theorem for an omnibus
embedding of multiple random dot product graphs," pp. 964 -- 967, 2017.
[10] J. Arroyo, A. Athreya, J. Cape, G. Chen, C. E. Priebe, and J. T. Vogelstein, "Inference for multiple
heterogeneous networks with a common invariant subspace," arXiv preprint arXiv:1906.10026,
2019.
[11] M. Zhu and A. Ghodsi, "Automatic dimensionality selection from the scree plot via the use of profile
likelihood," Computational Statistics & Data Analysis, vol. 51, no. 2, pp. 918 -- 930, 2006.
[12] K. Eichler, F. Li, A. Litwin-Kumar, Y. Park, I. Andrade, C. M. Schneider-Mizell, T. Saumweber,
A. Huser, C. Eschbach, B. Gerber et al., "The complete connectome of a learning and memory
centre in an insect brain," Nature, vol. 548, no. 7666, p. 175, 2017.
[13] M. Tang, A. Athreya, D. L. Sussman, V. Lyzinski, Y. Park, and C. E. Priebe, "A semiparametric two-
sample hypothesis testing problem for random graphs," Journal of Computational and Graphical
Statistics, vol. 26, no. 2, pp. 344 -- 354, 2017.
[14] M. Tang, A. Athreya, D. L. Sussman, V. Lyzinski, and C. E. Priebe, "A nonparametric two-sample
hypothesis testing problem for random dot product graphs," Journal of Computational and Graphi-
cal Statistics, Sep. 2014.
6
[15] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Pretten-
hofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and
E. Duchesnay, "Scikit-learn: Machine learning in Python," Journal of Machine Learning Research,
vol. 12, pp. 2825 -- 2830, 2011.
[16] G. Schwarz et al., "Estimating the dimension of a model," The annals of statistics, vol. 6, no. 2, pp.
461 -- 464, 1978.
[17] P. J. Rousseeuw, "Silhouettes: a graphical aid to the interpretation and validation of cluster analy-
sis," Journal of computational and applied mathematics, vol. 20, pp. 53 -- 65, 1987.
[18] M. Waskom, O. Botvinnik, D. O'Kane, P. Hobson, J. Ostblom, S. Lukauskas, D. C.
Gemperline, T. Augspurger, Y. Halchenko, J. B. Cole, J. Warmenhoven, J. de Ruiter,
C. Pye, S. Hoyer, J. Vanderplas, S. Villalba, G. Kunter, E. Quintero, P. Bachant, M. Martin,
K. Meyer, A. Miles, Y. Ram, T. Brunner, T. Yarkoni, M. L. Williams, C. Evans, C. Fitzgerald,
Brian, and A. Qalieh, "mwaskom/seaborn: v0.9.0 (july 2018)," Jul. 2018. [Online]. Available:
https://doi.org/10.5281/zenodo.1313201
[19] L. Buitinck, G. Louppe, M. Blondel, F. Pedregosa, A. Mueller, O. Grisel, V. Niculae, P. Pretten-
hofer, A. Gramfort, J. Grobler, R. Layton, J. VanderPlas, A. Joly, B. Holt, and G. Varoquaux, "API
design for machine learning software: experiences from the scikit-learn project," in ECML PKDD
Workshop: Languages for Data Mining and Machine Learning, 2013, pp. 108 -- 122.
[20] D. G. Albertson and J. Thompson, "The pharynx of caenorhabditis elegans," Phil. Trans. R. Soc.
Lond. B, vol. 275, no. 938, pp. 299 -- 325, 1976.
[21] J. G. White, E. Southgate, J. N. Thomson, and S. Brenner, "The structure of the nervous system
of the nematode caenorhabditis elegans," Philos Trans R Soc Lond B Biol Sci, vol. 314, no. 1165,
pp. 1 -- 340, 1986.
[22] H. Akaike, "A new look at the statistical model identification," in Selected Papers of Hirotugu Akaike.
Springer, 1974, pp. 215 -- 222.
7
|
1912.00634 | 1 | 1912 | 2019-12-02T08:50:27 | Meta-Path Constrained Random Walk Inference for Large-Scale Heterogeneous Information Networks | [
"cs.SI",
"cs.LG"
] | Heterogeneous information network (HIN) has shown its power of modeling real world data as a multi-typed entity-relation graph. Meta-path is the key contributor to this power since it enables inference by capturing the proximities between entities via rich semantic links. Previous HIN studies ask users to provide either 1) the meta-path(s) directly or 2) biased examples to generate the meta-path(s). However, lots of HINs (e.g., YAGO2 and Freebase) have rich schema consisting of a sophisticated and large number of types of entities and relations. It is impractical for users to provide the meta-path(s) to support the large scale inference, and biased examples will result in incorrect meta-path based inference, thus limit the power of the meta-path. In this paper, we propose a meta-path constrained inference framework to further release the ability of the meta-path, by efficiently learning the HIN inference patterns via a carefully designed tree structure; and performing unbiased random walk inference with little user guidance. The experiment results on YAGO2 and DBLP datasets show the state-of-the-art performance of the meta-path constrained inference framework. | cs.SI | cs | Meta-Path Constrained Random Walk Inference
for Large-Scale Heterogeneous Information Networks
Chenguang Wang
Amazon Web Services
[email protected]
9
1
0
2
c
e
D
2
]
I
S
.
s
c
[
1
v
4
3
6
0
0
.
2
1
9
1
:
v
i
X
r
a
Abstract
Heterogeneous information network (HIN) has
shown its power of modeling real world data as a
multi-typed entity-relation graph. Meta-path is the
key contributor to this power since it enables infer-
ence by capturing the proximities between entities
via rich semantic links. Previous HIN studies ask
users to provide either 1) the meta-path(s) directly
or 2) biased examples to generate the meta-path(s).
However, lots of HINs (e.g., YAGO2 and Freebase)
have rich schema consisting of a sophisticated and
large number of types of entities and relations. It
is impractical for users to provide the meta-path(s)
to support the large scale inference, and biased ex-
amples will result in incorrect meta-path based in-
ference, thus limit the power of the meta-path. In
this paper, we propose a meta-path constrained in-
ference framework to further release the ability of
the meta-path, by efficiently learning the HIN infer-
ence patterns via a carefully designed tree structure;
and performing unbiased random walk inference
with little user guidance. The experiment results on
YAGO2 and DBLP datasets show the state-of-the-
art performance of the meta-path constrained infer-
ence framework.
1 Introduction
Heterogeneous information networks (HINs) consisting of
multi-typed entities and relations have been extensively stud-
ied recently, and shown the power against many other state-
of-the-art data models in lots of real world applications, such
as link prediction [Taskar et al., 2003; Lu and Zhou, 2011]
and classification [Ji et al., 2010; Wang et al., 2016a], etc.
The main reason behind the success of the HIN studies is the
concept of meta-path [Sun et al., 2011a]. Meta-path is a se-
quence of consecutive entity types and relation types captur-
ing semantic proximity between entities in HINs, thus pro-
vides the opportunities to deeply understand the data.
Most HIN tasks can be formalized as inference with meta-
paths problems in HINs. The goal of HIN inference is
to find the best assignment to the output variables accord-
ing to the given model and input instances. HIN infer-
ence particularly leverages the proximities between the in-
1
put and output variables provided by the meta-paths, i.e.,
y∗ = arg maxy f (θ, Φ(x, P, y)), where f is an HIN model,
θ is the model parameters, Φ is a set of representation (i.e.,
feature) functions based on input instance x, output variables
y and meta-paths P relevant to x and y. For example, in HIN
based link prediction task, given the linear regression based
prediction model f and the feature function set Φ built upon
source entity s and target entity t (e.g., x = [s, t]), meta-path
based link prediction can be seen as finding the best assign-
ment to output variable y (one-dimension vector, e.g., [1] rep-
resents link exists, [0] represents link doesn't exist), via the
meta-paths P between x and y. As we can see, the power of
the inference in HINs is brought by meta-path(s). The ability
of how well we can handle the meta-paths is the key to better
inference in HINs.
However, there are two possible limits in the current infer-
ence methods in large scale HINs.
User needs to provide the meta-path(s). Most of the
previous HIN studies ask users or experts to provide meta-
path(s) as explicit inference rules to perform relevant tasks in
HINs, such as similarity search [Sun et al., 2011a]. Since in
traditional HINs, such as DBLP, there are only four types of
entities, Paper, Venue, Author and Term and relevant relation
types between the entities. It will be possible for users to pro-
vide high-quality meta-paths. However, in large scale HINs,
such as YAGO, it consists of a sophisticated and large num-
ber of entity types (e.g., millions) and relation types (e.g.,
hundreds). Users will feel harder to provide meta-paths in
such cases. Moreover, multi-order (length larger than one)
meta-paths could carry more important information for infer-
ence than that of first-order meta-path (length equals to one).
Thus it becomes harder to rely on users to provide the relevant
meta-paths for inference in large scale HINs.
Biased examples lead to incorrect inference. To relieve
the efforts of users, random walk based inference [Lao et al.,
2011a; Lao et al., 2011b] is proposed for large scale HINs.
Existing random walk procedure aims to enumerate the meta-
paths within fixed length l, then perform jointly inference.
Since the time complexity of enumerating the meta-paths
grows exponentially with the length of the meta-paths, tradi-
tional random walk will be impractical in large scale network.
Besides, another potential problem is that the inference per-
formance is very sensitive to l. For example, if l is small (e.g.,
equals to 1), multi-order and meaningful meta-paths will be
ignored; if l is large, meaningless and duplicated meta-paths
will be generated. Meng et al. [Meng et al., 2015] recently
provides a more general inference framework by requiring
users to provide example entity pairs. Then the meta-paths
are generated if relevant meta-paths are of high proximity be-
tween the entity pairs. The algorithm generates meta-paths
by considering the local (near) randomly generated negative
examples. Since there could be some positive examples intro-
duced by randomly producing negative samples, the negative
examples could be biased and noisy towards the inference.
We thus consider an efficient HIN inference framework that
could further release the power of meta-path based inference
in large scale HINs by relieving the aforementioned issues.
In this paper, we propose a meta-path constrained inference
framework for large scale HIN. Since for a particular HIN in-
ference task, we may only care about a (or a set of) relevant
inference rules, then the parts of the network only distantly
connected to inference goals are likely to have a small in-
fluence. Intuitively, we consider the HIN inference as graph
random walk inference with constraints. We carefully design
an efficiency-optimized meta-path tree data structure to con-
strain the random walk to follow the tree structure. Compared
to the running time of the original random walk, the proposed
meta-path constrained random walk can improve efficiency
by mostly two orders of magnitude. The proposed inference
scheme is initialized with several sample pairs to capture the
inference target. Then based on the meta-path based prox-
imities in the samples, the scheme iterates random walk in-
ference in the meta-path tree until it becomes convergence.
Notice that the inference method is weakly supervised. The
supervision information complies with the intuition that the
inference is only relevant to parts of the HINs.
below:
which is important and has broad applications.
The main contributions of this paper can be highlighted as
• We study the problem of large scale HIN inference,
• We propose a meta-path constrained inference frame-
work, where many of the HIN tasks can be unified under
this framework. In particular, we propose a meta-path
tree constrained random walk inference method, which
is weakly supervised and efficient to model the inference
targets.
• We conduct experiments on two large scale HIN. Our
proposed inference method has demonstrated its effec-
tiveness and efficiency compared to the state-of-the-arts
inference methods on typical HIN tasks (link prediction
and similarity search).
The rest of this paper is organized as below. We first in-
troduce the HIN inference framework in Section 2. Next in
Section 3, we present HIN inference as meta-path tree con-
strained random walk inference. The experimental results are
shown in Section 4. We finally discuss the related work and
conclude in Section 5 and Section 6 respectively.
2 Problem Definition
In this section, we introduce a general HIN inference frame-
work that could specifically take meta-paths in HIN into con-
2
sideration, and perform large scale inference according par-
ticular task. Before that, some basic concepts of HIN are in-
troduced as below.
2.1 Heterogeneous Information Network
Definition 1 A heterogeneous information network (HIN) is
a graph G = (V,E) with an entity type mapping φ: V → A
and a relation type mapping ψ: E → R, where V denotes the
entity set, E denotes the link set, A denotes the entity type set,
and R denotes the relation type set, and the number of entity
types A > 1 or the number of relation types R > 1.
Notice that, in large scale HINs, such as YAGO, the rela-
tion type mapping is an one-to-one mapping, while the entity
type mapping could be one-to-N mapping. For example, a
specific triplet (Larry Page, alumniOf, Stanford) in YAGO,
the relation type mapping ψ(< LarryP age, Stanf ord >
) = {alumniOf }, while the entity mapping φ(Stanf ord) =
{Organization, University}. The reason why an entity
could be mapping to multiple entity types in YAGO or Free-
base is that, the entities types are often organized in a hierar-
chical manner. For example, as shown in Figure 1, University
is a subtype of Organization, Politician is a subtype of Per-
son. All the types or attributes share a common root, called
Object. The hierarchy of the entity organization raises an-
other challenge on how to infer useful information in HINs.
Figure 1: Hierarchy of entity types.
Definition 2 Given an HIN G = (V,E) with the entity type
mapping φ: V → A and the relation type mapping ψ:
E → R, the network schema for network G, denoted as
TG = (A,R), is a graph with nodes as entity types from A
and edges as relation types from R.
The network schema provides a high-level description of
a given heterogeneous information network. Another impor-
tant concept, meta-path [Sun et al., 2011b], is proposed to
systematically define relations between entities at the schema
level.
Definition 3 A meta-path P is a path defined on the graph of
network schema TG = (A,R), and is denoted in the form of
R2−−→ . . . RL−−→ AL+1 , which defines a composite
A1
relation R = R1 · R2 · . . . · RL between types A1 and AL+1,
where · denotes relation composition operator, and L is the
length of P. When L = 1, we specifically call it as first-order
meta-path; when L > 1, we call it as multi-order meta-path.
We say a path p = (v1 − v2 − . . . − vL+1) between v1 and
vL+1 in network G follows the meta-path P, if ∀l, φ(vl) = Al
R1−−→ A2
l
and each edge el = (cid:104)vl, vl+1(cid:105) belongs to each relation type
Rl in P. We call these paths as path instances of P, denoted
as p ∈ P. R−1
represents the reverse order of relation Rl.
For example, in the YAGO network, the composite relation
two Person co-founded an Organization can be described as
meta-path P = Person found−−−→ Organization found−1
−−−−−→ Person. A
path instance of P is p = Larry Page found−−−→ Google found−1
−−−−−→
Sergey Brin.
2.2 Heterogeneous Information Network Inference
Framework
Meta-paths carry rich information about the semantic rela-
tionships between entities, thus capture subtle proximities in
HINs via several meta-path based similarity measures, such
as Path Count [Sun et al., 2011a], Random Walk [Lao et al.,
2011a], and Pathsim [Sun et al., 2011a]. The proximities
are very important and useful for inference problems, such
as link prediction. Assume that direct links (first-order meta-
paths) are missing between two entities with types Person and
−−−−→
Profession, if there is a multi-order meta-path Person workAt
Organization employ−−−−→ Profession between the entities, and the
meta-path based similarity (e.g., Path Count) of two entities
is large (i.e., number of path instances between two entities
satisfying the meta-path is large), we will have higher confi-
dence in inferring the missing link between the entities based
on the multi-order meta-path.
Traditional
inference framework in machine learn-
ing [Chang et al., 2012] aims to model relevant inference
problems as stochastic processes involving both output vari-
ables and input or observed variables. The framework mainly
includes a model parameter vector θ, corresponding to a
set of representation or feature functions {Φ}. For an in-
put instance x and an output assignment y, the "score" of
the instance can be expressed as a model function f with
the parameter vector and representation functions: score =
f (θ, Φ(x, y)). When the model is evaluated on test instance
x, the inference framework aims to find the best assignment
to the output variables,
y∗ = arg max
y
f (θ, Φ(x, y))
(1)
Notice that a representation function φ ∈ Φ usually focuses
on producing homogeneous flat features and ignores the link
or structure information in both input variables x and output
variables y. As we know, the multi-typed links (meta-paths)
is very important for HIN inference. However, the framework
doesn't model meta-path information; besides it is not trivial
to efficiently incorporate the extra information provided by
meta-paths into the framework. We therefore formally define
the HIN inference framework as below.
Definition 4 Heterogeneous Information Network Infer-
ence (HINI) aims to enable inference with meta-paths in
large scale HINs. To be more specific, HINI aims to infer the
best assignment to the output variables given an HIN model
with meta-paths. HINI is formalized as:
y∗ = arg max
y
f (θ, Φ(x, P, y))
(2)
3
where f is the model or score function and θ is the model pa-
rameters. Different from Eq. 1, Φ aims to leverage the prox-
imities carried by the meta-paths P regarding to the input
instance x or output variable y.
HINI (Eq. 2) could support many mining tasks in HINs,
such as link prediction and similarity search in HINs, as we
will see later. If meta-paths set P is empty. HINI will de-
generate to traditional inference as shown in Eq. 1. We find
there are mainly two challenges in HINI: 1) how to efficiently
generate useful meta-paths P from large-scale HINs consist-
ing of millions of entities and billions of relations? And 2)
how to model the meta-path based proximities to improve the
representation power of Φ? In next section, we will describe
our proposed inference method that could efficiently gener-
ate meta-paths as well as compute meta-path based similarity
simultaneously.
3 HIN Random Walk Inference with
Meta-Path Dependency Tree Search
In this section, we first introduce meta-path constrained HIN
random walk inference with weak supervision,
then talk
about how to leverage the supervision to conduct efficient
HIN random walk inference via a carefully designed data
structure.
3.1 Weakly Supervised HIN Random Walk
Inference
As aforementioned, meta-paths are very important since they
infer important semantic relationships between entities in
HINs, thus capture semantic proximities of entities, which
is very useful for HIN inference as shown in Eq. 2. Most
of existing inference methods are focusing on enumerating
the meta-paths within a fixed length in the full underlying
network [Lao et al., 2011a]. However, this solution is im-
practical in large scale HINs, since it has been proven that
the number of possible meta-paths grows exponentially with
the length of a meta-path. As we find, for a particular infer-
ence task, it is not necessary to do inference in the full HIN,
since only a part of the network or meta-paths relevant to the
inference. To copy with these challenges, we propose a meta-
path constrained random walk method to infer with weak hu-
man supervision in HINs. Weak supervision here provides
guidance to the random walk process, together with the meta-
path generation process by pruning the searching space. Our
method aims to copy with the two HINI challenges in the pre-
vious section.
Given an HIN G = (V,E), similar to [Meng et al.,
2015], we ask users to provide example entity pairs Λ =
{(si, ti)i = 1,··· , N} as supervision to imply meta-paths.
Formally, we are aiming to find a meta-paths set PΛ =
{Pii = 1,··· , M} that could infer high proximities between
entities in Λ. An efficient way to generate PΛ given Λ will
be described in next section.
Now assume when we have Λ, we also get PΛ. For a meta-
path P = A1
Ri−−→ . . . RL−−→ AL+1 ∈
PΛ, we define the following meta-path constrained random
walk starting from s and reaching at s following only path in-
stances p ∈ P. It defines a distribution f (s, tP) recursively
R2−−→ . . . Ai
R1−−→ A2
as below.
f (s, tP1,··· ,L) =
f (s, t
(cid:48)P1,··· ,L−1)
(cid:88)
t(cid:48)∈χ(Ai+1ei;Ri)
·
χ(Ai+1ei; Ri) ,
s.t. f (s, tP) = 1, if s = t; otherwise, f (s, tP) = 0,
1
(3)
1
where χ(Ai+1ei; Ri) indicates the entity set where each entity ei
can be linked via relation type Ri to at least one entity with type
Ai+1.
χ(Ai+1ei;Ri) means a one-step random walk starting from
an entity t(cid:48) ∈ χ(Ai+1ei; Ri) via relation type Ri.
For example, consider a path instance from s to t following a
−−−−→ Organization employ−−−−→ Profession. Sup-
meta-path Person workAt
pose a random walk starts at an entity s (e.g., s=Larry Page). If Org
is the set of Organizations in the HIN that Larry Page has worked
at, after one step, the walker will have probability
1Org of being at
any entity e ∈ Org (e.g., e= Google). Similarly, if Pro is the set of
Professions in the HIN that Google has employed, the walker will
Org·Pro being at any entity t ∈ Pro (e.g., t
have probability of
= Computer Science). It is useful that proximity provided by meta-
path constrained random walk infers the prior probability of t being
the Profession for Person s.
To be more general, we then propose a linear model to com-
bine the single meta-path constrained random walk scores. i.e., for
each meta-path P ∈ PΛ, the HIN inference with joint random walk
model (HINI-JRW) is formalized as below.
1
f (s, tPΛ; ) = θ1f (s, tP1) + θ2f (s, tP2) + ···
+θif (s, tPi) + ··· + θM f (s, tPM ),
(4)
where is the model parameter vector, each element means the weight
or importance of certain meta-path based inference score. The pa-
rameter vector can either be explicitly set by users or implicitly
learned according different HIN inference tasks. By tuning the pa-
rameters, we can avoid the bias induced by certain meta-path(s) and
ensure the model's robustness and stability.
Now let's revisit the relationship between the joint HIN inference
model (Eq. 4) and HINI framework (Eq. 2). In short, the input in-
stance of HINI x = [s, t], the output variable of HINI y is the ran-
dom walk based probabilities or proximities, and meta-paths set P
of HINI equals to PΛ. Similarly, other inference models can also be
unified into HINI framework.
3.2 Efficient Inference via Meta-Path Dependency
Tree Search
To copy with the main challenge of large scale HIN inference, i.e.,
to do efficient inference, we carefully design a tree structure that sig-
nificantly accelerate the above meta-path constrained random walk
inference in HINs. More importantly, the new tree structure enables
doing inference through model f in Eq. 4 and automatically gen-
erate meta-path based inference rules PΛ given the user provided
samples Λ simultaneously.
Even we do not need to enumerate the meta-paths in an HIN, it
is still intractable to find the optimal meta-path set PΛ given the
examples pairs in Λ [Van Horn and Martinez, 1994]. Selecting rel-
evant meta-paths is NP-hard even when some of the path instances
are given. It has been shown as an NP-hard problem [Amaldi and
Kann, 1998; Van Horn and Martinez, 1994]. Inspired by forward
selection algorithms [Koller and Sahami, 1996], we introduce meta-
path dependency tree search algorithm, and enable efficient infer-
ence of HINI-JRW via doing search in the meta-path dependency
tree. Since we do not know the relevant paths beforehand, thus PΛ
4
is empty. The meta-path dependency tree search algorithm is thus
used to insert meta-paths into PΛ and compute the inference score
while searching. There are three differences compared to the method
proposed in [Meng et al., 2015]: 1) our tree search algorithm doesn't
leverage random generated negative examples, which could induce
biased inference; 2) our algorithm doesn't require iterative process
of the algorithm to guide the tree search, which is more efficient; and
3) we do not set hard threshold to terminate the algorithm, which is
very sensitive and could prevent the algorithm from generating more
meaningful meta-paths.
Figure 2: Meta-path dependency tree node structure.
Let's first introduce the meta-path dependency tree structure.
Each tree edge is annotated with an relation type, and each tree node
represents a list of entities pairs with their HINI-JRW scores and a
priority score S. The node structure is shown in Figure 2. The node
stores tuple in the form < (s, t), f (s, tPi) >, where (s, t) repre-
sents a path instance in the graph by its starting and current graph
entities, respectively; Pi is the meta-path starting from s to t. The
edges of the tree are relation types in the HIN. f (s, tPi) is the RW
score for this meta-path according to Eq. 3. The priority score S
determines which is the next tree node to search. We compute the
value of S as follows:
(cid:80)
(cid:80)
u
u
max(ru)·(cid:80)
(cid:80)
max(ru)·(cid:80)
(cid:80)
c(u)
v max(ru)
c(u)
v max(ru)
v f (u,vP)
v f (u,vP)
S =
· βL
(cid:64)(u, v) ∈ Λ
· βL + 1 ∃(u, v) ∈ Λ
(5)
where (u, v) is the entity pairs in the tree node, max(ru) is the
maximum weight among entity pairs starting with u, and c(u) is
the number of example pairs starting with u. From Eq. 5, we can
see that the priority score S is defined as a weighed combination of
random walk score referred as Eq. 3 of the given entity pair in the
tree node. This means that if the entity pair in the tree node exhibit
higher proximity along the corresponding meta-path, they will have
higher probability to be more similar along the new meta-paths gen-
erated through the searching process. This is the reason why the
search algorithm will be introduced soon guide its search as random
walker to the tree node with larger S. Because of this, the priority
score proposed in [Meng et al., 2015] will have the possibility to
generate meta-paths that do not contain example entity pairs in Λ.
This will guide search to find leaf tree node with the largest S among
all the leaf nodes, which will lead to no meta-path generated during
the search, thus suffer from relatively low efficiency. To avoid this,
considering the value of S is normally smaller than one, this slight
modification will ensure the target node t could be reached through
the search, and generate the meta-paths in a more efficient way. In
addition, in order to avoid generating meta-path with infinite length,
we follow [Meng et al., 2015] to add a decay factor β ranging from
0 to 1.
Through searching the meta-path dependency tree, inference and
meta-path generation in HINs can be done at the same time. We
present the details of our proposed meta-path dependency tree search
(MPDTS) in Algorithm 1. In short, we search the tree by moving to
out-neighbor nodes on the graph until a meta-path can be found or
the graph is completely traversed. We first target the tree node with
weights r, Meta-Path Dependency Tree T
corresponding meta-path P
largest priority and examine whether its tuples are example entity
pairs.
If so, we store random walk scores computed by Eq. 3 in
the corresponding tree node, and add the meta-paths into PΛ. If
no example pairs are encountered, then we extend each entity pair
by moving to an out-neighbour. We insert this new pair with its
random walk score to a child node, and compute its priority score.
Notice that, the generated meta-path only contains relation types,
similar to [Meng et al., 2015], we also leverage the Lowest Common
Ancestor (LCS) of type hierarchy of the entities in the HIN to fill
the entity types in the generated meta-path P, to form the complete
meta-paths.
Algorithm 1 MPDTS(G, Λ,T )
Require: an HIN G(V,E), example pairs Λ, example pairs
Ensure: Meta-path P, random walk scores vector y of the
1: while T is not fully traversed do
2: Q ← the largest S score node in T 's child node set L;
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
end if
end for
if y is not empty then
P ← the path from root node to Q;
Remove Q from L;
break;
for Each entity pair (u, v) ∈ Q do
R ←relation type of edge from v to w;
if There is no edge of type R from Q to child
node Z then
y ← {0, . . . , 0};
for Each entity pair (u, v) ∈ Q do
y(u, v) ← f (u, vP) computed based on Eq. 3;
for Each out-neighbour w of v in G do
if (u, v) ∈ Λ then
else
18:
19:
20:
21:
22:
23:
Create child node Z for Q;
Insert child node Z into L;
end if
P ←the path from root node to Z;
Insert a new tuple (cid:104)(u, v), f (u, vP)(cid:105) into Z,
where f (u, vP) is computed based on Eq. 3;
Compute the priority scoreS of Z based on
Eq. 5;
Remove Q from L;
end for
end for
24:
25:
26:
27:
28: end while
29: return P, y
end if
Finally, we obtain the joint random walk scores/probabilities
along the meta-paths PΛ according to HINI-JRW (Eq. 4). The joint
version of MPDTS (Algorithm 1) is shown as JMPDTS in Algo-
rithm 2. We can simply obtain the joint random walk score for cer-
tain entity pair (s, t) ∈ Λ by summing over the rows of Y, since
each entry in the row means a random walk score from s to t fol-
lowing one meta-path. By doing so, we have done inference and
automatic meta-path generation in large scale HINs, which copies
with the two challenges of HINI framework.
There are several advantages for using the tree structure for ran-
5
Algorithm 2 JMPDTS(G, Λ, r)
Require: an HIN G(V,E), example pairs Λ, example pairs
weights r
matrix Y
Ensure: Meta-path set PΛ with size M, random walk scores
1: m ← 0; PΛ ← ∅; Y ← ∅
2: while True do
3:
4:
5:
6:
7:
8:
9: end while
10: return PΛ, Y
if T is not fully traversed then
Pm, ym ← MPDTS(G, Λ, r);
PΛ ← PΛ
m ← m + 1;
Y ← Y(cid:83) ym;
(cid:83)Pm;
end if
dom walk inference we proposed. Firstly, during the search process
of the tree, the node to expand is selected by applying supervision
provided by user examples and the search space can be reduced.
Secondly,during the process, path instances that represent the same
meta-paths are gathered in a single tree node, yet avoid duplicate
calculation. Thirdly, the whole meta-path dependency tree structure
is preserved in the memory and can be reused in the whole iterative
process while traversing the tree.
4 Experiments
In this section, we evaluate our approach using two typical HIN
tasks, link prediction and similarity search.
4.1 HINI for Link Prediction
In this subsection, we validate our algorithm's efficiency and effec-
tiveness by performing link prediction tasks. We chose link pre-
diction for the evaluation because it provides quantitative way to
measure the performance of different methods.
Task Description
For link predication, we propose to use logistic regression model
to leverage the random walk score of each meta-path [Lao et al.,
2011a]. Formally, Given a relation R and a set of entity pairs
{(si, ti)}, we can construct a training dataset D = (xi, ri), where
xi is a vector of all the meta-path based features for the pair
(si, ti) -- i.e., the j-th component of x is f (si, tiPj), and ri indi-
cates whether R(si, ti) is true. Parameter θ is estimated by max-
imizing the regularized objective function proposed in [Lao et al.,
2011a]. Then the link predication model is defined as below:
p(ri = 1xi; θ) =
exp(θT xi)
1 + exp(θT xi)
.
(6)
Dataset
We perform link prediction experiments on a representative dataset
for large scale HIN: YAGO.
YAGO: YAGO1 is a semantic knowledge base, derived from
Wikipedia, WordNet and GeoNames. Currently, YAGO2 has knowl-
edge of more than 10 million entities (like persons, organizations,
cities, etc.) and contains more than 120 million facts about these en-
tities. It contains 350,000 entity types organized in type hierarchy,
and 100 relation types.
1http://www.mpi-inf.mpg.de/departments/
databases-and-information-systems/research/
yago-naga/yago/
Efficiency Study
Figure 3 presents the running time of our method compared to
PCRW models with fixed length, and when varying the number of
example pairs given as input. It can be observed that generally, the
algorithm running time increases sub-linearly in the number of ex-
ample pairs. The increase is due to the PCRW random walks which
need to be performed concurrently for each example pair, but the
number of meta-paths in the model does not increase at the same
rate.
In particular, the algorithm performs better than models of
paths longer than 2 by a factor of up to two orders of magnitude.
However, the models of short path length have limited predictive
power, despite their better running time. In comparison, our algo-
rithm is capable of generating long and meaning meta-paths and
performing efficient inference.
Effectiveness Study
For a certain type of link in YAGO, for instance citizenOf, we re-
move all such links and try to predict them with the above logistic
regression model that leverages the random walk scores as features.
We randomly select a number of pairs of entity pairs with the ac-
cording relation labels as training data, and validate the model using
a test set of an equal number of pairs. We compared our link pre-
diction model with PCRW [Lao et al., 2011a] based models which
generate paths of finite length in 1,2,3,4. The PCRW models also
use the logistic regression model to combine these meta-paths. Be-
sides, we also compare our model with the state-of-the-art FSPG
based prediction model in [Meng et al., 2015]. Following [Meng et
al., 2015], we set β as 0.6 in meta-path dependency tree to avoid
producing meta-paths with infinite length. We use Area Under ROC
Curve (AUC) as the evaluation measure. AUC calculate the area
under Receiver Operating Characteristics (ROC) curve. The x-axis
of ROC is false positive rate, and the y-axis of ROC represents true
positive rate. Thus a large AUC value, a large accuracy in predica-
tion.
Table 1 presents the results for link prediction for three types of
links: citizenOf andadvisorOf in YAGO. For each of these links, we
generated 100 training and 100 test pairs, as described above. The
result shows that fixed-length PCRW suffers from several issues.
When the maximum length is too small (1 or 2), meta-paths can-
not connect example pairs, and as such the model is not better than
a random guess and the model will have low recall. When the max-
imum length is too big, the model introduces too many meta-paths.
For length 3, there are 135 meta-paths, and over 2,000 for length 4.
Notice that our method outperforms FSPG, the reason is that FSPG
incorporates randomly generated negative examples which may lead
to biased inference, while our method does not use.
Table 1: Comparison of link prediction performance (AUC)
Advisor
Our method
FSPG
PCRW-1
PCRW-2
PCRW-3
PCRW-4
citizenOf
0.854
0.822
0.594
0.752
0.567
0.525
advisorOf
0.654
0.647
0.498
0.613
0.545
0.569
Figure 3: Running time of our method (MPG)
4.2 HINI for Similarity Search
In this subsection, we mainly focus on user study of our HINI frame-
work via a typical HIN task, i.e., similarity search, to get a better
understanding of why our method is effective.
Our model is clearly better in predicting the links, and it generates
only a limited number of meta-paths. For instance, the advisorOf
link in YAGO has a model of only 13 meta-paths. Moreover, these
meta-paths are highly relevant and serve as good explanation of the
proximity links. For example, we find the meta-path illustrating the
fact that a person is a strong influencer to another person is the best
predictor of advisorOf, but other, longer, paths are also highly rele-
vant. Compared with PCRW with maximum length 2, it has higher
recall because it also detected longer important meta-paths, for in-
stance, Person win−−→ Award win−1−−−−→ Person. Knowledge bases, such
as YAGO, often suffer from incompletion problem. We thus can use
these multi-order meta-paths as inference rules to predict the direct
links between entities.
Whereas considering direct links is widely done when querying
large scale networks, multi-order meta-paths can improve query re-
sult accuracy. For instance, in advisorOf prediction, only one type of
direct links between people and country exists, namely, influencer.
By leveraging multi-order meta-paths, it will provide us a better
chance to still perform good link prediction when the direct links
are missing. The result shows the power of our HINI framework in
doing large scale inference in HINs.
Task Description
In general, similarity search aims to find similar entities given a
query entity in HINs. Formally, similarity search can be regarded
as random walk, but implemented by commuting matrix manipula-
tion for a meta-path, to generate the similarity score of each targeting
entity. The community matrix is defined as below.
Definition 5 Commuting matrix. Given a network G = (V,E)
and its network schema TG, a commuting matrix MP for a
meta-path P = (A1 − A2 − . . . − AL+1 ) is defined as MP =
WA1A2WA2A3 . . . WALAL+1, where WAiAj is the adjacency
matrix between types Ai and Aj. MP (i, j) represents the num-
ber of path instances between objects xi and yj, where φ(xi) = A1
and φ(yj) = AL+1, under meta-path P.
Given f (s, tP), we can infer:
(cid:88)
MP =
θi · MPi .
(7)
i
Thus in general, if the entry of MP is large, the similarity between
two entities based on meta-path P will be large.
6
Table 2: Meta-path examples generated based on example pairs
Venue publishIn−1
−−−−−−→Paper authorOf−1
−−−−−−→Author authorOf
−−−−→Paper publishIn
−−−−−→Venue
Meta-paths
Venue publishIn−1
Venue publishIn−1
−−−−−−→Paper cite−−→Paper publishIn
−−−−−−→Paper cite−1−−−→Paper publishIn
−−−−−→Venue
−−−−−→Venue
Table 3: Case study on similarity search results
Ranking (Query)
1
2
3
4
5
6
7
8
9
10
KDD
ICML
SIGMOD
ICDM
CIKM
VLDB
SIGIR
WWW
TKDE
ICDE
Machine Learning
Computational Linguistics
ACL
COLING
NAACL
EACL
LREC
EMNLP
SIGIR
IJCAI
AAAI
INTERSPEECH
VLDB
SIGMOD
ICDE
TODS
TKDE
PODS
EDBT
PVLDB
CIKM
IS
VLDB Journal
Dataset
Most of the similarity search research in HINs are evaluated on
DBLP dataset, we also use it for our experiments. DBLP is a bibli-
ographic information network which is frequently used in the study
of heterogeneous networks. We use a subset of DBLP used in [Sun
et al., 2011a] containing scientific papers in four areas: databases,
data mining, artificial intelligence, and information retrieval. The
dataset has four classes of nodes: Paper, Author, Topic, and Venue.
It also has four edge types between different entity types. In totally,
the subset contains 14,376 papers, 14,475 authors, 8,920 topics, and
20 venues. Besides, there are 170,794 links.
Case Study of Similarity Search Results
We select ten groups of similar venues according to different areas
in DBLP, and use them as input example pairs to generate the meta-
paths. Then we compute the commuting matrices for the meta-paths.
When given a query venue, we rank the venues based on the scores
in the row of certain commuting matrix for meta-path. By doing
this, we could find the most similar venues to the query.
In Table 2 and Table 3, we show the generated meta-paths, and
the search results based on the meta-paths. From the results, we
find that 1) meta-paths carry rich proximity information between
the given pairs; and 2) all the search results are very relevant to the
query. This shows the insight of why our HIN inference framework
is able to handle automatic meta-path generation and effective infer-
ence. By providing these two HIN tasks, we can conclude that the
proposed inference framework is not limited to use only in these two
tasks, it will be effective in other HIN tasks, such as recommenda-
tion, classification, etc.
5 Related Work
5.1 Knowledge Base/Network Inference
Although there is a great deal of recent research on extracting knowl-
edge from text [Agichtein and Gravano, 2000; Etzioni et al., 2005;
Snow et al., 2006; Pantel and Pennacchiotti, 2006; Banko et al.,
2007; Yates et al., 2007], much less progress has been made on
the problem of drawing reliable inferences from this imperfectly
extracted knowledge.
In particular, traditional logical inference
methods are too brittle to be used to make complex inferences
from automatically-extracted knowledge, and probabilistic infer-
ence methods [Richardson and Domingos, 2006] suffer from scal-
ability problems, since they cannot generate inference rules directly
and use the full rule set to perform inference. Recently, Ni Lao
et al. [Lao et al., 2011a] provides a probabilistic way to perform
random walk inference, however, it is still costful since it needs to
enumerate the network to generate the meta-paths. However, we
carefully design a tree structure which would efficiently generate
the meta-paths.
5.2 Meta-Path Generation
The first approach regarding to automatic meta-path generation is
proposed by [Lao et al., 2011a]. Their solution enumerate all the
meta-paths within a fixed length L. However, it is not clear how
L should be set. More importantly, L can significantly affect the
meta-paths generated: (a) if L is large, then many redundant meta-
paths may be returned, leading to curse-of dimensionality effects;
and (b) if L is small, important meta-paths with length larger than
L might be missed. Our experiments have shown that the run-
ning time of the meta-path generation process grows exponentially
with length L. Moreover, the accuracy can also drop with increase
in L. Recent studies also propose efficient meta-path generation
algorithms based on localized random walk [Wang et al., 2015a;
Wang et al., 2015b; Wang et al., 2016a; Wang et al., 2016b]. Re-
cently, Meng et al. [Meng et al., 2015] propose to leverage positive
and negative examples to generate meta-paths. However, our so-
lution does not leverage the negative examples, which is randomly
generated and would lead to biased inference.
5.3 Link Prediction
Since the main focus of our work is to generate meta-paths, we only
use link prediction to quantify our advantage compared with the ex-
isting meta-path generation methods. Compared with [Nickel et al.,
2012], our method predicts the relationship between different en-
[Nickel et al.,
tities, rather than predicting the types of entities.
2011] use the factorization of a three-way tensor to perform rela-
tional learning; it only considered simple node types and is not ap-
plicable to our experiment which has both complex node classes and
7
edge types. Besides, our method is aiming to support efficient link
prediction via HINI with random walk.
5.4 Similarity Search
Similarity measures have been a hot research topic for years. They
can be categorized broadly into two types: entity similarity mea-
sures and relation similarity measures. Similarity measures, such as
SimRank [Jeh and Widom, 2002], P-Rank [Zhao et al., 2009], Path-
Sim [Sun et al., 2011a], PCRW [Lao et al., 2011a] and RoleSim [Jin
et al., 2011] capture entity similarity. Recent studies also focus
on similarity search in schema-rich networks [Wang et al., 2015c;
Wang et al., 2016c; Wang et al., 2017c; Wang et al., 2018]. Recent
studies on entity similarity also find rules/meta-paths very useful.
Path ranking algorithm [Lao et al., 2011a], rule mining [Gal´arraga
et al., 2013] and meta-path generation [Meng et al., 2015] have
demonstrated the effectiveness of using the mined rules or meta-
paths for link prediction-like tasks based on entity similarity, while
our work is for leveraging the power of efficient HINI random walk
inference method to perform similarity search.
6 Conclusion
In this paper, we study the problem of large scale HIN inference,
which is important and has broad applications (e.g., link predica-
tion, similarity search). We propose a meta-path constrained in-
ference framework, where many of the existing inference methods
can be unified under this framework.
In particular, we propose a
efficiency-optimized meta-path tree constrained random walk in-
ference method for HIN inference, which is weakly supervised to
model the inference target and is approximated in time independent
of the network size. We conduct experiments on two large scale
HIN, and our proposed inference method has demonstrated its ef-
fectiveness and efficiency compared to the state-of-the-arts inference
methods on typical HIN tasks (link prediction and similarity search).
The effectiveness of the inference method is not limited to the two
tasks, in the future, we plan to apply our method to more real world
applications (e.g., NLP tasks [Wang et al., 2013; Wang et al., 2017b;
Wang et al., 2017a; Wang et al., 2019]).
References
[Agichtein and Gravano, 2000] Eugene Agichtein and Luis Gra-
vano. Snowball: Extracting relations from large plain-text col-
lections. In Proceedings of the fifth ACM conference on Digital
libraries, pages 85 -- 94, 2000.
[Amaldi and Kann, 1998] Edoardo Amaldi and Viggo Kann. On
the approximability of minimizing nonzero variables or unsatis-
fied relations in linear systems. Theoretical Computer Science,
209(1):237 -- 260, 1998.
[Banko et al., 2007] Michele Banko, Michael J Cafarella, Stephen
Soderland, Matthew Broadhead, and Oren Etzioni. Open infor-
mation extraction from the web. In IJCAI, volume 7, pages 2670 --
2676, 2007.
[Chang et al., 2012] Ming-Wei Chang, Lev-Arie Ratinov, and Dan
Roth. Structured learning with constrained conditional models.
Machine Learning, 88(3):399 -- 431, 2012.
[Etzioni et al., 2005] Oren Etzioni, Michael Cafarella, Doug
Downey, Ana-Maria Popescu, Tal Shaked, Stephen Soderland,
Daniel S Weld, and Alexander Yates. Unsupervised named-entity
extraction from the web: An experimental study. Artificial intel-
ligence, 165(1):91 -- 134, 2005.
[Gal´arraga et al., 2013] Luis Antonio Gal´arraga,
Christina
Teflioudi, Katja Hose, and Fabian Suchanek. Amie: asso-
ciation rule mining under incomplete evidence in ontological
knowledge bases. In WWW, pages 413 -- 422, 2013.
[Jeh and Widom, 2002] Glen Jeh and Jennifer Widom. Simrank: a
measure of structural-context similarity. In KDD, pages 538 -- 543,
2002.
[Ji et al., 2010] Ming Ji, Yizhou Sun, Marina Danilevsky, Jiawei
Han, and Jing Gao. Graph regularized transductive classifica-
In ECML, pages
tion on heterogeneous information networks.
570 -- 586, 2010.
[Jin et al., 2011] Ruoming Jin, Victor E Lee, and Hui Hong. Ax-
iomatic ranking of network role similarity. In KDD, pages 922 --
930, 2011.
[Koller and Sahami, 1996] Daphne Koller and Mehran Sahami. To-
ward optimal feature selection. 1996.
[Lao et al., 2011a] Ni Lao, Tom Mitchell, and William W Cohen.
Random walk inference and learning in a large scale knowledge
base. In EMNLP, pages 529 -- 539, 2011.
[Lao et al., 2011b] Ni Lao, Tom Mitchell, and William W Cohen.
Random walk inference and learning in a large scale knowledge
base. In EMNLP, pages 529 -- 539, 2011.
[Lu and Zhou, 2011] Linyuan Lu and Tao Zhou. Link prediction in
complex networks: A survey. Physica A: Statistical Mechanics
and its Applications, 390(6):1150 -- 1170, 2011.
[Meng et al., 2015] Changping Meng, Reynold Cheng, Silviu Ma-
niu, Pierre Senellart, and Wangda Zhang. Discovering meta-paths
in large heterogeneous information networks. In Proceedings of
the 24th International Conference on World Wide Web, pages
754 -- 764. International World Wide Web Conferences Steering
Committee, 2015.
[Nickel et al., 2011] Maximilian Nickel, Volker Tresp, and Hans-
Peter Kriegel. A three-way model for collective learning on
In Proceedings of the 28th international
multi-relational data.
conference on machine learning (ICML-11), pages 809 -- 816,
2011.
[Nickel et al., 2012] Maximilian Nickel, Volker Tresp, and Hans-
Peter Kriegel. Factorizing yago: scalable machine learning for
linked data. In Proceedings of the 21st international conference
on World Wide Web, pages 271 -- 280. ACM, 2012.
[Pantel and Pennacchiotti, 2006] Patrick Pantel and Marco Pennac-
chiotti. Espresso: Leveraging generic patterns for automatically
harvesting semantic relations. In Proceedings of the 21st Inter-
national Conference on Computational Linguistics and the 44th
annual meeting of the Association for Computational Linguis-
tics, pages 113 -- 120. Association for Computational Linguistics,
2006.
[Richardson and Domingos, 2006] Matthew Richardson and Pedro
Domingos. Markov logic networks. Machine learning, 62(1-
2):107 -- 136, 2006.
[Snow et al., 2006] Rion Snow, Daniel Jurafsky, and Andrew Y Ng.
Semantic taxonomy induction from heterogenous evidence.
In
Proceedings of the 21st International Conference on Computa-
tional Linguistics and the 44th annual meeting of the Association
for Computational Linguistics, pages 801 -- 808. Association for
Computational Linguistics, 2006.
[Sun et al., 2011a] Yizhou Sun, Jiawei Han, Xifeng Yan, Philip S
Yu, and Tianyi Wu. Pathsim: Meta path-based top-k similarity
search in heterogeneous information networks. VLDB, 2011.
8
sim: Relation similarity search in schema-rich heterogeneous in-
formation networks. In SDM, pages 621 -- 629, 2016.
[Wang et al., 2017a] Chenguang Wang, Alan Akbik, Laura Chiti-
cariu, Yunyao Li, Fei Xia, and Anbang Xu. CROWD-IN-THE-
LOOP: A hybrid approach for annotating semantic roles.
In
EMNLP, pages 1913 -- 1922, 2017.
[Wang et al., 2017b] Chenguang Wang, Laura Chiticariu, and Yun-
yao Li. Active learning for black-box semantic role labeling with
neural factors. In IJCAI, pages 2908 -- 2914, 2017.
[Wang et al., 2017c] Chenguang Wang, Yangqiu Song, Haoran Li,
Yizhou Sun, Ming Zhang, and Jiawei Han. Distant meta-path
similarities for text-based heterogeneous information networks.
In CIKM, pages 1629 -- 1638, 2017.
[Wang et al., 2018] Chenguang Wang, Yangqiu Song, Haoran Li,
Ming Zhang, and Jiawei Han. Unsupervised meta-path selection
for text similarity measure based on heterogeneous information
networks. Data Min. Knowl. Discov., 32(6):1735 -- 1767, 2018.
[Wang et al., 2019] Chenguang Wang, Mu Li, and Alexander J.
CoRR,
Language models with transformers.
Smola.
abs/1904.09408, 2019.
[Yates et al., 2007] Alexander Yates, Michael Cafarella, Michele
Banko, Oren Etzioni, Matthew Broadhead, and Stephen Soder-
land. Textrunner: open information extraction on the web. In Pro-
ceedings of Human Language Technologies: The Annual Confer-
ence of the North American Chapter of the Association for Com-
putational Linguistics: Demonstrations, pages 25 -- 26. Associa-
tion for Computational Linguistics, 2007.
[Zhao et al., 2009] Peixiang Zhao, Jiawei Han, and Yizhou Sun. P-
rank: a comprehensive structural similarity measure over infor-
mation networks. In CIKM, pages 553 -- 562, 2009.
[Sun et al., 2011b] Yizhou Sun, Jiawei Han, Xifeng Yan, Philip S.
Yu, and Tianyi Wu. Pathsim: Meta path-based top-k similarity
search in heterogeneous information networks. PVLDB, pages
992 -- 1003, 2011.
[Taskar et al., 2003] Ben Taskar, Ming-Fai Wong, Pieter Abbeel,
and Daphne Koller. Link prediction in relational data. In NIPS,
2003.
[Van Horn and Martinez, 1994] Kevin S Van Horn and Tony R
Martinez. The minimum feature set problem. Neural Networks,
7(3):491 -- 494, 1994.
[Wang et al., 2013] Chenguang Wang, Nan Duan, Ming Zhou, and
Ming Zhang. Paraphrasing adaptation for web search ranking. In
ACL, pages 41 -- 46, 2013.
[Wang et al., 2015a] Chenguang Wang, Yangqiu Song, Ahmed El-
Kishky, Dan Roth, Ming Zhang, and Jiawei Han. Incorporating
world knowledge to document clustering via heterogeneous in-
formation networks. In SIGKDD, pages 1215 -- 1224, 2015.
[Wang et al., 2015b] Chenguang Wang, Yangqiu Song, Haoran Li,
Ming Zhang, and Jiawei Han. Knowsim: A document similarity
measure on structured heterogeneous information networks. In
ICDM, pages 1015 -- 1020, 2015.
[Wang et al., 2015c] Chenguang Wang, Yangqiu Song, Dan Roth,
Chi Wang, Jiawei Han, Heng Ji, and Ming Zhang. Constrained
information-theoretic tripartite graph clustering to identify se-
mantically similar relations. In IJCAI, pages 3882 -- 3889, 2015.
[Wang et al., 2016a] Chenguang Wang, Yangqiu Song, Haoran Li,
Ming Zhang, and Jiawei Han. Text classification with heteroge-
neous information network kernels. In AAAI, 2016.
[Wang et al., 2016b] Chenguang Wang, Yangqiu Song, Dan Roth,
Ming Zhang, and Jiawei Han. World knowledge as indirect super-
vision for document clustering. TKDD, 11(2):13:1 -- 13:36, 2016.
[Wang et al., 2016c] Chenguang Wang, Yizhou Sun, Yanglei Song,
Jiawei Han, Yangqiu Song, Lidan Wang, and Ming Zhang. Rel-
9
|
1907.09395 | 2 | 1907 | 2019-11-11T02:40:35 | Mining Temporal Evolution of Knowledge Graph and Genealogical Features for Literature-based Discovery Prediction | [
"cs.SI",
"cs.LG"
] | Literature-based knowledge discovery process identifies the important but implicit relations among information embedded in published literature. Existing techniques from Information Retrieval and Natural Language Processing attempt to identify the hidden or unpublished connections between information concepts within published literature, however, these techniques undermine the concept of predicting the future and emerging relations among scientific knowledge components encapsulated within the literature. Keyword Co-occurrence Network (KCN), built upon author selected keywords (i.e., knowledge entities), is considered as a knowledge graph that focuses both on these knowledge components and knowledge structure of a scientific domain by examining the relationships between knowledge entities. Using data from two multidisciplinary research domains other than the medical domain, capitalizing on bibliometrics, the dynamicity of temporal KCNs, and a Long Short Term Memory recurrent neural network, this study proposed a framework to successfully predict the future literature-based discoveries - the emerging connections among knowledge units. Framing the problem as a dynamic supervised link prediction task, the proposed framework integrates some novel node and edge-level features. Temporal importance of keywords computed from both bipartite and unipartite networks, communities of keywords, built upon genealogical relations, and relative importance of temporal citation counts used in the feature construction process. Both node and edge-level features were input into an LSTM network to forecast the feature values for positive and negatively labeled non-connected keyword pairs and classify them accurately. High classification performance rates suggest that these features are supportive both in predicting the emerging connections between scientific knowledge units and emerging trend analysis. | cs.SI | cs |
MINING TEMPORAL EVOLUTION OF KNOWLEDGE GRAPHS AND
GENEALOGICAL FEATURES FOR LITERATURE-BASED
DISCOVERY PREDICTION
A PREPRINT
Nazim Choudhury
Department of Computer Science and Engineering
University of South Florida
Tampa, FL 33620
[email protected]
Fahim Faisal∗
Dept. of Computer Science and Engineering
Islamic University of Technology
Dhaka, Bangladesh
[email protected]
Matloob Khushi
School of Computer Science
The University of Sydney
Sydney, NSW 2006, Australia
[email protected]
November 12, 2019
ABSTRACT
Literature-based discovery process identifies the important but implicit relations among information
embedded in published literature. Existing techniques from Information Retrieval (IR) and Natural
Language Processing (NLP) attempt to identify the hidden or unpublished connections between
information concepts within published literature, however, these techniques overlooked the concept
of predicting the future and emerging relations among scientific knowledge components encapsulated
within the literature. Keyword Co-occurrence Network (KCN), built upon author selected keywords
(i.e., knowledge entities), is considered as a knowledge graph that focuses both on these knowledge
components and knowledge structure of a scientific domain by examining the relationships between
knowledge entities. Using data from two multidisciplinary research domains other than the medical
domain, capitalizing on bibliometrics, the dynamicity of temporal KCNs, and a recurrent neural
network, this study develops some novel features to successfully predict the future literature-based
discoveries - the emerging connections among knowledge units. Temporal importance extracted from
both bipartite and unipartite networks, communities defined by genealogical relations, and the relative
importance of temporal citation counts were used in the feature construction process. Both node
and edge-level features were input into a recurrent neural network to forecast the feature values and
predict the future relations between different scientific concepts represented by the author selected
keywords. High performance rates suggest that these features are supportive both in predicting the
future literature-based discoveries and emerging trend analysis.
Keywords Literature-based Knowledge Discovery · Dynamic Supervised Link Prediction · Keyword Co-occurrence
Network (KCN) · Genealogical Community · Weighted Temporal Citation.
1
Introduction
Statistical bibliography or bibliometrics [1] has been supporting researchers to address the challenges related to
the rapid growth of scholarly publications and scientific knowledge. Employing two network-based methods (i.e.,
∗Corresponding Author.
co-citation and keyword co-occurrences network), bibliographic coupling [2] method in bibliometrics enabled us
to explore the structure of scientific and technical knowledge. While the co-citation focuses on the structure of
scientific communication by analyzing citation links, keyword co-occurrence network (KCN) or co-word network,
focuses on knowledge components and knowledge structure by examining co-appearances of keywords found in the
literature. Therefore, it is also known as knowledge graph [3]. Associated as metadata information within the scholarly
publications, the author selected keywords are considered as the carriers of knowledge units, or knowledge entities
[4]. These hand-picked signal words/terms/themes/conceptual keywords denote authors' understandings of their work,
the thematic context of their research, and facilitate knowledge discovery [5]. Further, these topical concepts or
themes are also used for indexing purpose in digital libraries. The co-appearance of two author selected keywords in an
article defines a certain intrinsic relationship between them whereas multiple such instances denote the strength of their
relationships [6]. Representing such co-occurring relationships between the knowledge entities, KCN is bears both
theoretical and practical implications including literature-based discovery [7].
Literature-based discovery [8], widely spelled as Literature Based Discovery (LBD), is the process that seeks to
discover new knowledge (innovation) from the information embedded in published literature. In both automated and
semi-automated ways, it identifies the hidden (implicit) and important connections among knowledge components.
Rapid growth of scholarly publications and associated scientific knowledge prompted scholars to restrict themselves
within their narrow specialties (i.e., fragments within a broad domain) and cite only from the related articles [9].
Consequently, useful connections between fragmented information remain unnoticed due to the lack of awareness of
work from mutually exclusive fragments. LBD addresses this problem of knowledge overspecialization and strives to
identify the implicit and novel connections from the concepts explicitly published in the scientific literature. Preiss
et al.
[10] reported different applications of this approach including identification of treatments for diseases, drug
re-purposing, disease candidate gene discovery, and drug side effect prediction. Similarly, Henry et al. [11] reported
application areas outside the biomedical domain such as efficient water purification systems, development acceleration
of developing countries, potential bio-warfare agents categorization, climate change studies, and identification of
promising research collaborations.
Most methodologies addressing LBD are based on Swanson's 'ABC' model [12] and predominantly rely on text
analysis [13]. Further, most studies in LBD used MEDLINE as the literature database. Sebastian et al. [14] divided
existing techniques of literature-based knowledge discovery from scientific literature into two categories: (i) traditional,
and (ii) emerging approaches. The traditional approach dominates the current research landscape. These are mainly
knowledge-based and comprised of lexical statistics or graph-theoretic methods that require domain knowledge. On the
other hand, emerging approaches prompt new trends and unprecedented paradigm shifts in the knowledge discovery
process. These methods consider the occurrence and co-occurrence frequencies of keywords, probability distributions,
association rule mining, graph data structure, temporal features, relational attributes, and supervised classification
approach. A literature review on these methods is presented in the Related Works section. Being a knowledge network
representation technique, KCN inherently fits best in the LBD process. However, despite their success in mapping
scientific knowledge structure, the evolutionary dynamics of KCN, and metadata information (e.g.authors, citations)
associated with scholarly articles [15] are underutilized in the existing LBD techniques. Temporal changes of metadata
information, and communities of keywords extracted from dynamic KCN can also be considered as non-trivial factors
than mere frequencies or connectivity information in predicting the underlying complex and implicit relations between
keywords. Most importantly, existing methods in LBD concentrates on identifying the implicit or undisclosed relations
between keywords in the published literature instead of predicting their future relations those are yet to emerge. This
can facilitate emerging trend analysis which can be supportive for both researchers and science policymakers. To
this end, by formulating the LBD prediction problem as a dynamic supervised link prediction problem, we propose
a recurrent neural network (RNN)-based method to predict the emerging associations (i.e., co-occurrences) between
author selected keywords found in the scientific literature. This prediction process incorporated features constructed by
leveraging the temporal dynamics of KCNs, evolutionary metadata information (authors, citation) and genealogical
communities of keywords Due to the temporal nature of the constructed features and binary supervised classification
task, we considered the Long Short Term Memory (LSTM) - an artificial RNN architecture, suitable for sequence
classification. The research objective of this study is to predict the co-evolution of knowledge entities (author selected
keywords) found in the scientific literature to facilitate the prediction of future LBD. Since the prediction problem was
framed as a supervised learning process, the scientific contribution of this study is the development of representative
features to describe and successfully classify instances (non-connected keyword pairs). By considering dynamic KCNs,
this study develops some novel features by leveraging the temporal dynamics of KCNs, metadata information (i.e.,
authors, articles, citations), and finally, communities defined via deriving ancestral lineages of keywords extracted
from the dynamic KCNs . The prediction performances of the proposed features, applied over scholarly datasets on
2
two topics 2 ( i.e., Obesity, Sleep Apnea), are also reported. These generic features are domain independent and can be
applied to any multidisciplinary scientific disciplines to predict the emerging trends.
Related Works
Literature-based discovery (LBD) identifies the implicit relations from the explicit information. It is principally used in
biomedical research where running experiments is expensive. This knowledge discovery process broadly encompasses
lexical and semantic text analyses of articles found in the MEDLINE database. Most of the LBD techniques employed
frequency-based approaches. The underlying assumption is that discoveries are likely to arise from logical connections
among source, intermediate, and target concepts (keywords) based on either their frequent/infrequent (co)occurrences
in the literature, or common/rare connections to a knowledge base [16]. Gordon and Dumais [17] took the advantages
of both co-occurrence frequencies and Latent Semantic Indexing (LSI) used in analyzing relationships between a set
of documents. Hristovski et al [18] used association rule mining and Unified Medical Language Systems (UMLS)
to discover the relationships between medical concepts. Yetisgen-Yildiz and Pratt developed [19] 'LitLinker' that
incorporated knowledge-based methodologies with statistical approach considering the background distribution of
keyword probabilities. With the help of Fuzzy Set Theory and probabilistic model of relationships, Wren et al. [20]
developed a computational method to identify large sets of relationships between unrelated items within scientific
reports.
Ensemble-based approaches combined both statistical and temporal features to find the intermediate keywords con-
necting both source and target keywords. These approaches were explored to find meaningful links between two
disparate sets of articles in MEDLINE [21]. Relational techniques [22, 23] used the explicit semantic relationships (i.e.,
predicates) between concepts where such predicates were typically obtained from structured background knowledge
or known a priori via domain experts. Few approaches focused on graph data structures to discover knowledge from
the literature by creating subgraphs based on the binary relationships between literary concepts. These relationships
were also drawn from semantic predications which were extracted directly from assertions in MEDLINE literature.
By weighting links using degree centrality, Wilkowski et al. [24] developed such a graph-theoretic approach. Their
approach used an iterative greedy strategy to create the 'best' subgraph with the help of semantic predications. Cameron
et al. [16] also used semantic predication graph and introduced a method to automatically find clusters of contextually
similar paths in the graph. These clusters were then used to identify the latent associations between disjoint concepts in
the literature to reconstruct eight scientific discoveries. Like most LBD methods, these graph-based data structures were
also primarily constructed in the biomedical domain using predicative relations extracted from MEDLINE literature.
Contemporary approaches developed heterogeneous networks capable of encoding richer information and better
semantics between various real world objects [25]. Known as Heterogeneous Bibliographic Information Network
(HBIN), these networks represent a collection of scientific publications as a network of heterogeneous bibliographic
objects (e.g., keywords, authors etc.). HBIN allowed various information to flow across different types of objects and
links to capture the previously unknown associations between research articles. It also harnessed the meta-path features
found in HBIN networks to discover the latent associations. Sebastian et al. [26] used lexico-citation features of HBIN
networks to predict the co-citation links between articles from previously disconnected research areas. Similarly, Ding
et al. [15] used information from the literature in the form of an 'entitymetrics' graph. The objective was to model
the latent relationships among biomedical entities (e.g. diseases, drugs) based on the existing citation relationships
among the corresponding articles. Apart from predicting the implicit and/or hidden relationships between disjoint
sets of articles, researchers [27, 28] also used HBIN to predict the citation count. HBIN-based LBD used simple
statistics and does not require sophisticated and domain-specific NLP tools and ontologies. It also facilitated the
utilization of metadata information in constructing features for prediction task. However, to predict future links between
author selected keywords instead of links between articles, processing HBIN and calculating meta-path features will be
computationally intensive.
One of the emerging approaches [29] conjectured the task of predicting implicit relationships as a classification task
by leveraging the link prediction methodology of network science. It describe the associations between different
concepts/keywords/topics using networks where the links represent their semantic or co-occurrence relationships.
This approach was primarily used in predicting the implicit links within a co-occurrence network of Medical Subject
Headings (MeSH) terms. Crichton et al. [30] recently investigated how inputs from four node representation algorithms
affect the performance of a neural link predictor on random- and time-sliced biomedical graphs (i.e., Drug-Target
Interactions, Protein-Protein Interaction and LBD) containing information relevant to drugs, protein and literature.
Katukuri et al. [31] used manually-created features in a supervised link prediction task on a large-scale biomedical
network of concepts co-occurrences. The objective was to predict links those represented scientific hypotheses in
2datasets and codes are available in https://github.com/faisal-iut
3
a time-sliced corpus. The authors extracted relevant information from the biomedical corpus to generate a concept
network and concept-author map. They also developed a set of heterogeneous features by exploiting random walk,
network neighborhood and common authorship. Wang and Zeng [32] used two-layer graphical model, called restricted
Boltzmann machine, to perform similar link prediction task on Drug-Target Interactions (DTI) network. Their objective
was to predict multiple types of DTIs, unknown drug-target relationships or drug's modes of action. However, Lu et
al. [33] pointed out the limitation of such machine learning models in DTI predictions despite their high performance.
This included the absence of additional information about the characteristics of drugs, targets and DTIs, (e.g.,chemical
structure, genome sequence, binding types, causes of interactions, etc.). Therefore, the authors used topological
similarity indices, such as Common Neighbours and Katz [34] index from complex network theory, to predict links in
a DTI network. Our study is probably closer to this set of machine-learning based studies however it differs in different
ways which is described later in this section.
In summary, existing research used combinations of lexical distributional statistics, graph-theoretic measures, hetero-
geneous network-based methods, and machine learning models. Predominantly capitulated on MEDLINE database,
most existing methods require domain knowledge to interpret relations between knowledge entities (drug, target,
protein, gene etc.). Graph-theoretic methods considered static networks which is unable to capture the temporal aspects
of network evolution such as 'recency', genealogical traits (origins of relationships), and time-variant frequencies
crucial for predicting the emerging associations in evolving networks. Despite the merits of existing approaches, there
exists lack of generalized predictive features applicable to any research domain. These features should be free from
any domain-specific knowledge-base for predicative relationships or relax the requirements of domain experts for
interpretation. It should accommodate metadata information which is commonly associated with any scientific literature
like authors, keywords, affiliation etc, and integrate the temporal information since scientific knowledge structure is
inherently dynamic. These facts are the motivation behind this study. Further, in most cases, these methods focused
only on identifying implicit(hidden) relationships between scientific concepts which are yet to be recognized from their
explicit relations instead of predicting the future relations those are yet to emerge. To this end, this study develops a
recurrent neural network-based method to predict emerging LBD instead of identifying the hidden relations between
keywords/concepts. It manifests the knowledge evolution as a dynamic process and leverages the evolutionary aspects
of knowledge graphs, temporal recency and citation information to develop hand-crafted features suitable for the
prediction task.
2 Scholarly Datasets
We extracted our scholarly datasets on two topics and the source of these datasets is 'Scopus' -the largest abstract and
citation database of peer-reviewed literature. The first search keyword was 'sleep apnea', also spelled as sleep apnoea,
and the second keyword was 'obesity'. The first topic is related to the serious sleep disorder that occurs when a person's
breathing is interrupted or a person experiences periods of shallow breathing during sleep. The second topic is related
to overweight and represents a complex disorder involving the accumulation of excessive body fat to an extent such that
it may have negative impact on health of individuals. Article metadata information including publication year, article
title, authors, affiliations, author selected keywords and citation count were extracted from the Scopus digital library by
considering the following constraints: (i) article published in English journals, (ii) the search keywords are present in
the article's titles and abstracts, and (iii) articles published within the duration 2007-2016. For the sake of brevity, Gs
and Go will be used to denote the dataset related to sleep apnea and obesity respectively for the rest of the article.
Dataset
Gs
Go
# Articles
29203
107745
# Keywords
12721
11643
Duration
2007-2016
2007-2016
Table 1: Statistics of two datasets
The author selected keywords are crucial to know about the thematic context, topics and related concepts of the
corresponding scholarly articles. Recent advances in network science [35] have prompted researchers to address the
mapping and understanding of scientific knowledge evolution via different types of bibliometric networks. These
networks consist of nodes representing different scholarly items like publications, journals, researchers, or keywords
and edges indicating the relations between pairs of nodes. According to Van Eck and Waltman [36], the most commonly
studied types of relations are: (i) citation relations, (ii) keyword co-occurrence relations, and (iii) co-authorship relations.
To predict the emerging relations between different scientific concepts/keywords, we took the advantage of temporal
keyword co-occurrence relations and constructed dynamic KCNs in both Gs and Go for each year. Therefore, as an
integral part of dynamic KCN construction. we extracted author selected keywords appeared in more than one articles.
4
Keywords failed to gain such minimum attention from the research community were considered to be irrelevant to the
corresponding research and thus discarded. Keyword extraction phase was followed by the text processing phase that
includes text cleaning and transformation. Authors used different spellings and acronyms to represent their keywords
those represent same semantic meaning. Firstly, any unwanted space and other discriminators were eliminated from the
keyword list with the help of NLTK text pre-processing tools [37]. This step also included lower-casing all keywords,
removing singular-plural differences (e.g., epidemiological studies ↔ epidemiological study, dilator muscles ↔ dilator
muscle) and lemmatization of some commonly used keywords (e.g., dreaming ↔ dream). Secondly, semantically
related common keywords were uniformly presented by using one representative word for all (e.g., aspect ↔ feature).
Most widely used abbreviated keywords were kept unchanged however others were changed to it's full forms (e.g.,
bmi ↔ body mass index). There were some abbreviations with different full forms (e.g., egfr ↔ (estimated glomerular
filtration rate, epidermal growth factor receptor)). In these cases, the content of the corresponding article was verified to
identify the right full form. Besides, all numbers and their corresponding roman forms were used in number format.
Basic dataset statistics including the number of these cleaned and transformed keywords are presented in Table 1.
It is noteworthy that although the data collection period includes 2007, however, in the experiment, we considered
2008-2014 duration as our actual training period. This fact will be explained in the later section.
Table 2: Yearly statistics of nodes and edges in keyword co-occurrence networks (KCNs) in
Gs=Sleep Apnea and Go=Obesity
Gs
Go
Nodes
Edges
Nodes
Edges
2007
388
689
2109
9569
2008
459
773
2356
10282
2009
470
688
2092
10477
2010
496
786
2298
12001
2011
536
977
2408
14271
2012
584
1054
2579
16158
2013
634
1280
2582
15851
2014
583
1144
3217
18238
3 Background
3.1 Knowledge Evolution and Dynamic KCN
Currently, scientific knowledge creation is dynamic and interdisciplinary in nature where different avenues of research
converge and new connections emerge among disjoint and existing areas of science [38]. This knowledge is generally
incremental except few revolutionary and fundamental changes. The development and evolution of science and
technology create new knowledge from the previously accumulated and ubiquitous information [39]. New hypotheses
are being postulated by encompassing existing scientific concepts from multiple domains. Agusti Canals [40] pointed
out that the diffusion of scientific knowledge can be mapped into a network structure where knowledge propagates via
interactions among networked agents. A knowledge graph (network) is a specific kind of knowledge representation
technique that uses a semantic network structure where nodes are keywords and links represent their causal relationships
[3] Statistically significant and non-trivial co-occurrence patterns of keywords not only represent their semantic affinity
[41] and relatedness [42] but also their causal relationships [43]. Therefore, using the extracted, cleaned, and processed
keywords, as described above, dynamic Keyword Co-occurrence Networks (KCNs) were constructed for each year in
2008-2015. KCN is defined as an undirected network G(V, E) where nodes V is the set of author selected keywords
and E is the set of edges where each edge represents the co-appearance of two keywords in the same article. Multiple
such co-appearances define the edge weights which is ignored in this study. Dynamic KCNs are the temporal networks
Gt = (vt, et) for time period t = 1, 2, ..., T where vt is the set of nodes or keywords and et is the set of edges
connecting the set of keywords vt ∈ V at time t. These edges at time t can be new or recurring. Table 2 provides
In Table 3, we
statistics of the number of nodes (keywords) and edges (co-occurrences) per year in both datasets.
present the basic statistics of the evolutionary patterns observed in dynamic KCN for both Go and Gs. The dynamicity
of keyword co-occurrences denotes that new research topics, hypotheses, or directions emerge over time through
co-appearances of existing keywords.
Three different scenarios can be observed in dynamic KCNs. As observable in Table 3, firstly, new edges emerge
each year when new keywords co-appear in articles. Secondly, new keywords form edge with old (existing) keywords
(appeared in previous years). Finally, edges are formed in a year between two old keywords from the previous year(s),
where these old keywords appeared in different articles but not co-appeared in the same article. The term 'old' in any
particular year t denotes the set of keywords appeared in year(s) prior to t. e.g., in Gs for the year 2010, the number
of Vo is 668 which denotes that out of Vt = 1000 keywords in 2010, 668 keywords appeared within 2007-2009. It
is observable from the table that the number of new keywords normally decreases. When a new hypothesis gains
considerable attentions in the subsequent years, the related keywords become significant. This fact prompts expansion
of these keywords' degree through new or recurring relations. Besides, new relations between old keywords Eo↔o were
5
Table 3: Evolutionary statistics of nodes (author selected keywords) and edges (co-occurrences in the same article) for two datasets
in this study. Vt = keywords in year t, Vn = new keywords each year, Vo = old keywords from the previous year(s), E = edges,
Eo↔o = recurring edges between v ∈ Vo, E(cid:48)
o↔o = new edges between v ∈ Vo, En↔o = edges between v ∈ Vo and v ∈ Vn, En↔n
= edges between v ∈ Vn. The term 'old' in a particular year denotes the set of keywords appeared in previous year(s)
Gs
Go
year
2007
2008
2009
2010
2011
2012
2013
2014
2015
2007
2008
2009
2010
2011
2012
2013
2014
2015
Vt
857
968
978
1000
1172
1240
1328
1367
1262
3207
3515
4206
4696
5059
5426
5418
4283
4466
Vn
857
572
438
332
345
279
272
291
157
3207
1217
1709
1152
658
364
77
738
367
Vo
0
396
540
668
827
961
1056
1076
1105
0
2298
2497
3544
4401
5062
5341
3545
4099
E
1486
1690
1587
1648
2264
2399
2715
2728
2347
15725
16826
21122
24093
29261
32663
32076
22410
23606
Eo↔o
0
144
202
264
387
271
424
500
512
0
3167
4515
6578
6514
9944
11702
6522
8043
E(cid:48)
o↔o
0
530
609
800
1166
1524
1692
1605
1530
0
8995
9091
13154
19962
20900
19987
12386
13860
En↔o
0
777
636
483
599
531
539
502
235
0
4336
6695
4094
2698
1744
382
3251
1548
En↔n
1486
239
140
101
112
73
60
121
70
15725
328
821
267
87
75
5
251
155
found to be dominating which is the generic trend in inter-disciplinary research. Further, the growth of edges in E(cid:48)
o↔o
implies that most new hypotheses emerge across existing keywords, topics, and/or concepts. Conversely, sporadic
nature of new hypothesis generation across new keywords can be observed through the decreasing number of edges in
En↔n. Delayed consumption of new concepts by the scientific communities can be attributed as a cause. In case of
En↔o, we observed that a lot of edges are formed with the most central keywords within the research domain which is
true for knowledge network evolution (preferential attachment).
3.2 Preferential Attachment and Recursive Centrality
The generation of author selected keywords is governed by the inherent rules of scholarly communication which
is also known as preferential attachment
[44]. In citation-based scholarly communication, few articles within a
research area will draw most attention and subsequently acquire most citations. These articles are considered as the
representatives of the corresponding research area. Essentially, authors select keywords for their new articles either from
the existing pool of keywords previously used or newly generated keywords conjoined with the existing ones. Therefore,
few representative keywords having high degree centrality can always be found in KCNs [7]. This phenomenon is
demonstrated in Figure 1 using two keywords Life course and Endothelial dysfunction (green coloured) from Go
(a-c) and Gs (d-f) respectively in three different times. In these figures, the red and navy coloured keywords are the
existing keywords where the former denote the representative keywords in the respective research domain. The size
variances of the keywords represent their degree of connections in the KCN of the corresponding time. The edge
thickness represents the edge weights. From these network snapshots, it is observable that although new keywords
emerge in association with less-acquainted (relatively low profile) keywords in the corresponding research area at the
beginning, however, gradually, they tend to co-appear with the representative keywords (e.g., cardiovascular disease in
Go and metabolic syndrome in Gs). For example, the endothelial dysfunction formed association with the keyword
erectile dysfunction in the year 2008. In the year 2011, it form associations with the high degree keywords such as
inflammation, hypoxia, metablic syndrome. In the year 2014, it acquire connections with more divergent high degree
keywords of the domain (e.g., hypertension, sleep). Consequently, the rich club phenomena is also evident in dynamic
KCN which can be captured by the degree centrality of the corresponding representative keywords. Alongside the
classical degree centrality measure, researchers attempted to define custom metrics to denote nodal importance. In one
such study, Klimek et al. [45] developed a bipartite relations using term -- document matrix and proposed a recursively
defined document centrality measure to denote the importance of scientific documents. According to their assumption, a
list of documents is considered central if these consume a large number of central terms those in turn also are consumed
6
(b) G0: 2011 (Life course)
(c) Go: 2014 (Life Course)
(a) Go: 2008 (Life course)
(d) Gs: 2008 (Endothelial
dysfunction)
(e) Gs: 2011 (Endothelial dysfunction)
(f) Gs: 2014 (Endothelial dysfunction)
Figure 1: Temporal evolution of associations between new and existing keywords demonstrated by two example keywords Life
course and Endothelial dysfunction in Go and Gs respectively. All network snapshots are timestamped and present the evolving
connection patterns of the example keywords (green coloured) with the existing keywords (red and navy coloured) of the respective
research domain. The red coloured keywords are the representative keywords of the research domain and acquire more connections
over time. The size of the node represents to the corresponding keyword's degree of connections. The thickness of the edges
represents corresponding edge weights.
Notation
kgp, kp, kc, kg
vau
t
, vat
t
N au
t
, N at
t
Table 4: Frequently Used Notations
Description
Four keyword types: Grandparent, Parent, Children, Guest
Two variants of recursive centrality values for keyword v at time t (year)
calculated from keyword-author and keyword-article bipartite relations
Sets of top N central keywords in year t
considering the bipartite network centrality measures
by a large number of central documents. Following their conceptualization of recursive document centrality measures,
two recursive keyword centrality measures were developed for each keyword v in each year t of the training period.
Before jumping into the detail of this recursive centrality definition, Table 4 provides descriptions of some notations
those will be used frequently in the sections below.
The first centrality measure considers the keyword-author bipartite relations whereas the second, considered the
keyword-article relation. In case of the first bipartite relations, the intuition behind a keyword's importance is defined
by the number of central authors who, in turn, also use a large number of central keywords. After the initial textual
cleaning and data processing, we filtered out keywords which appeared in only one article. This category denotes
the specialized keywords not related to the wide majority of the scientific articles. With the remaining keywords, we
7
hysterectomylife courseobesityobesityepidemiologyepidemiologypreventionpreventionbody weightbody weightusausamortalitymortalitysocioeconomic statussocioeconomic statusraceracecardiovascular disease risk factorcardiovascular disease risk factordisabilitydisabilitylife courselife coursefamilyfamilychildhoodchildhoodosteoarthritisosteoarthritisknee painknee painsocial classsocial classbirth cohortbirth cohortsocial mobilitysocial mobilitymexicomexicounited kingdomunited kingdomlatent class analysislatent class analysisembodimentembodimentobesityobesitydiabetesdiabetesblood pressureblood pressuredepression symptomdepression symptommortalitymortalityepidemiologyepidemiologyhypertensionhypertensionethnicityethnicityinflammationinflammationdepressiondepressioncohortcohortfertilityfertilityeducationeducationgendergenderpregnancypregnancyagingagingdisabilitydisabilityadolescent healthadolescent healthcohort studycohort studyagedagedunderweightunderweightobesity paradoxobesity paradoxchinachinametabolic risk factormetabolic risk factorsocioeconomic statussocioeconomic statusbrazilbrazilalspacalspacgestational weight gaingestational weight gainusausarace/ethnicityrace/ethnicitylife courselife courseself-rated healthself-rated healthsocioeconomic positionsocioeconomic positionbirth cohortbirth cohorttrajectorytrajectorysocial mobilitysocial mobilitydisadvantagedisadvantageerectile dysfunctionendothelial dysfunctionmetabolic syndromemetabolic syndromehypoxiahypoxiabiomarkerbiomarkerinflammationinflammationendothelial dysfunctionendothelial dysfunctionmandibular advancementmandibular advancementatherosclerosisatherosclerosisdiseasediseaseinflammatory markerinflammatory markerinflammationinflammationsleepsleepmetabolic syndromemetabolic syndromehypertensionhypertensionatherosclerosisatherosclerosisinsulin resistanceinsulin resistancehypoxiahypoxiacerebrovascular circulationcerebrovascular circulationintermittent hypoxiaintermittent hypoxiabaroreflex sensitivitybaroreflex sensitivityendothelial dysfunctionendothelial dysfunctionreviewreviewendotheliumendotheliuminflammatory markerinflammatory markercarbon monoxidecarbon monoxideultrasonographyultrasonographyasymmetric dimethylarginineasymmetric dimethylargininemicroalbuminuriamicroalbuminuriaconstructed a keyword-author adjacency matrix MAxK for each year t in the training period. It is worth mentioning
that we considered the first name and last name of the authors and manually verified with the affiliation information
to perform author name disambiguation. Although the objective of this manual author name disambiguation was to
find all publications that belong to a given author and distinguish them from publications of other authors who share
the same name, however, exploration of other methods for the same purpose is left for future studies. The adjacency
matrix M is a binary matrix of size A × K where A and K denote the set of authors and keywords respectively
in year t. An entry in matrix M is 1 if the author a ∈ A uses the keyword k ∈ K in his/her article. Starting with an
example author ai in year t, for each keyword ki used by this author, we can reach all other authors who also used ki in
their article. Iterating this procedure twice, we reach all the authors in two-hop distance from ai. These authors used
keyword(s) that is also used by author(s) sharing some keywords with author ai. Figure 2 demonstrates the iteration
procedure with some example keywords. This measure accumulates the number of different paths available among
authors through their keyword usages. Higher number represents that the corresponding keyword is pervasive across
(cid:80)
the research domain and thus more central and familiar to the key authors. To calculate recursive keyword centrality in
this way, two vectors ψk and ψa are defined recursively:
a M (t)ψa(n − 1, t)
(cid:80)
k M (t)ψk(n − 1, t)
(1)
as ψk(0, t) = (cid:80)
ψk(n, t) =
a∈A M (t) and ψa(0, t) = (cid:80)
with n represents the number of iterations as portrayed in Figure 2. ψk(0, t) and ψa(0, t) denote the initial conditions
k∈K M (t). The values of ψk can have different interpretations. The
ψk(0, t)
, ψa(n, t) =
ψa(0, t)
Figure 2: Computation of recursive keyword centrality measure using keyword-author relations. The computation is an iterative
procedure that starts at an author, a0. The first iteration counts the number of authors that used a keyword which is also used by a0.
Then this iteration continues until it reaches the terminating condition
initial condition ψk(0, t) denotes the degree centrality of a keyword. For different values of n = 1, 2, 3..., values of ψk
assign weights to individual keywords considering the number of authors consuming them in their articles. Therefore,
high values of ψk corresponds to the keywords selected by a large number of authors those used large number of such
keywords. Conversely, low values represent the keywords' specificity and relevance to limited number of research
issues. Similar observations are also true in case of psia. The number of iteration converged and found stable at n = 20.
We also attempted higher value of n however. found similar recursive centrality values returned by the algorithm. Thus,
for each year t in the training period, we calculated a vector of z-score normalized recursive keyword centrality values
t by following the algorithm, from the keyword-author bipartite relations. Likewise, another recursive keyword
C au
centrality measure C at
t was constructed from the keyword-article bipartite relations in each year t during the training
interval. In addition to these recursive centrality measures, to compare the results with a traditional centrality measure,
we also calculated degree centrality values of keywords C d
t , extracted from the unipartite keyword-keyword relations in
KCN for each year t. Future studies can calculate other centrality values to compare the results further.
8
diabetescortisolobesityacculturationestrogendiabetes,cortisol,obesitydiabetes,insulin,obesityestrogen,acculturation,cortisolinsulindiabetescortisolobesityacculturationestrogeninsulindiabetes,cortisol,obesitydiabetes,insulin,obesityestrogen,acculturation,cortisol3.3 Genealogical Typology
As mentioned earlier, due to prevailing preferential attachment in KCN, there exists a set of most central keywords
which exercise greater influence over the structure of the network. It was observed that other keywords generally tend
to form relations by co-appearing with these rich keywords. To predict the future co-evolution of keywords, this fact is
needed to take into consideration. In this study, we capitalize the idea of preferential attachment, but in a different way.
Figure 3: Genealogical communities of keywords by considering a set of keywords with high recursive centrality values (i.e., N au
t−1)
computed from keyword-author bipartite relationships. Keywords with high centrality values at timestamp t − 1 are designated as
grandparents (kgp at timestamp t. Direct neighbours of these grandparents belong to parents (kp) community, and two-hop
neighbours are designated as children (kc).Rest of the keywords are designated as guests (kg).
We defined a keyword's genealogical community membership in each year that denotes it's current ancestral relation
with the central keywords of the previous year. The underlying objective here was to capture the evolution of the a
keyword's lineage to its ancestry. Genealogy is the study of family tree and a genealogy graph is used to portray the
complex evolving relation originating from the ancestors. In the same way, we defined a keyword's family relationship
in a particular year t based on it's relation with the central keywords from previous year t − 1. The centrality of
keywords was measured by considering two recursive centrality measures defined above and one degree centrality. This
approach would label keywords according to the type of their ancestral relationships (e.g., grandparents, parents, child
or guest) and help us understanding the impact of these relationship types in their co-occurrences. The construction of
the genealogical communities is described below:
In our dynamic KCN, we defined four types of communities for keywords, namely, grandparents (kgp), parents (kp),
children (kc) and guests (kg). Firstly, we defined the grandparents. If we consider identifying community membership
of keywords in year t, then grandparents kgp keywords are the top-N central keywords from year t − 1. Here, the
word 'central' denotes higher values of a chosen centrality measure from the three aforementioned centrality measures
(i.e., two recursive and one degree centrality). In other words, these are the most frequent and influential keywords
both in regards to the contents of metadata information (e.g.,author and article) and in forming relations with other
keywords. We experimented with the number of grandparents ranging from 10 − 200 by considering two recursive
centrality measures. Interestingly, we found that having N (cid:62) 20 grandparents in each year does not change the
prediction performance (described later) significantly in both datasets. Therefore, we designated the top 20 keywords as
grandparents by considering the chosen centrality measures. In this way, we got three sets of top-20 central keywords
based on our three centrality measures (i.e., C au
t−1). Secondly, we define the parents, children and
guests. Keywords having direct relations (i.e., an edge is observed between them) with kgp are labeled as parents (kp)
in the year t. Subsequently, children (kc) are the direct neighboring nodes of kp keywords but not Kgp. Alternatively,
kp keywords are considered as common neighbours between kgp and kc. Once these three communities of keywords
(i.e. kgp, kp, kc) are labeled, rest of the are designated as guests (kg). These guests keywords had maximum distance
t−1, and C d
t−1, C at
9
asfbdlkngprtvmhjwueyear tacfszdcpcagrqgggtplfrom the grandparents. In this way, we defined the genealogical communities of all keywords appearing in a particular
year. In our experimental setup, we use top-20 keywords from year (t = 0) (i.e., 2007) for the first training year (t = 1)
(i.e., 2008), though this year (t = 0) is not included within our training period. This fact was mentioned in the earlier
section Scholarly Datasets. For the purpose of constructing link prediction features, we assigned each keyword a score
(a) Gs: 2011 (keyword-article)
(b) Gs: 2011 (keyword-author)
(c) Gs: 2011 (degree)
(d) Gs: 2014 (keyword-article)
(e) Gs: 2014 (keyword-author)
(f) Gs: 2014 (degree)
Figure 4: Temporal variations of genealogical traits demonstrated by keywords depending on the centrality measures used in Go
dataset. All network snapshots are timestamped including the centrality measure used to identify the genealogical traits. The color
codes represent the genealogical communities of keywords: red (grandparent), green (parent) and blue (child). The size of the node
represents to the keyword's corresponding centrality measures.
according to its genealogical community membership. The successive order of keyword's genealogical community
score is: score(kgp) >> score(kp) > score(kc) > score(kg).
Being most influential in the previous year, the grandparents (i.e., kgp) were assigned the highest score in a year.
Scores for the other three keyword types (i.e., kp,kc,kg) were defined according to their distance from the grandparents
kgp. Being the most distant ones, kg (guests) are assigned with lowest community score. The process of assigning
10
diagnosisbehaviourmorbid obesitycomplianceexcessive daytime sleepinessatherosclerosisdiagnosisbehaviourmorbid obesitycomplianceexcessive daytime sleepinessatherosclerosisdiagnosisbehaviourmorbid obesitycomplianceexcessive daytime sleepinessatherosclerosiscomplianceexcessive daytime sleepinessmorbid obesitybehaviourdiagnosisatherosclerosiscomplianceexcessive daytime sleepinessmorbid obesitybehaviourdiagnosisatherosclerosiscomplianceexcessive daytime sleepinessmorbid obesitybehaviourdiagnosisatherosclerosist
t
t
, vat
t and vd
extracted from keyword-author relations.
a keyword's genealogical community scores is depicted in figure 3. The relative size of each keyword in this figure
represents the weight of the score (i.e. greater size for higher value). In this figure, N au
t−1 denotes the set of ton-N
central keywords by considering recursive centrality values vau
Considering three sets of centrality measures of keywords (i.e., vau
t ), a keyword belonging to one genealog-
ical community (e.g., grandparent) in one set, might belong to different community(e.g., parent) in another. This
effectively means that if a keyword becomes grandparent by considering the vau
, it may not necessarily be true if the
other centrality measures (i.e., vat
t or degree centrality) were considered. Likewise, considering the same centrality
measure, a keyword can belong to different genealogical community in different year(s). In Figure 4, a comparative
representation of these variations is presented for some keywords in Gs datasets. In this figure, top two rows present
network snapshots in Gs considering six keywords (i.e., atherosclerosis, morbid obesity, diagnosis, excessive daytime
sleepiness, behavior, and compliance). (It is evident that there exists some commonality of keywords in both datasets
since some of these keywords resemble to those in the Go dataset. Since the commonality is out of the scope of this
study, we leave it for future studies where domain experts can contribute towards literature based discovery related
to these two domains together.) The first row in this figure presents the network snapshots in the year 2011 and the
second presents snapshots in the year 2014. In each row, the left snapshot presents the genealogical typologies (i.e.,
communities) of keywords identified by considering the recursive centrality (i.e., vat
t ) from keyword-article bipartite
relations. The snapshots in the middle column present the genealogical typologies of keywords identified by considering
the recursive centrality (.i.e., vau
) from keyword-author bipartite relations. The right column presents the similar
by considering the keyword's degree centrality. Color codes represent different types of the keywords: grandparent
(red), parent (green), and child (blue). The sizes of the nodes and labels denote corresponding centrality values. It is
observable that keywords can belong to different communities in different years by considering different centrality
measures used in this study. Consider the genealogical communities of the keyword diagnosis. In the year 2011, it
was designated as 'grandparent' by considering vat
t , whereas considering the same centrality measure, it belonged
to 'parent' community in 2014. Surprisingly, the later is also true ('parent') when recursive centrality measure vau
was considered in the year 2011. Similar observations are evident in case of the keyword behaviour There are some
domain-specific keywords (e.g.sleep, apnea, obesity) which were found as 'grandparents' in all centrality variants since
they are the representative keywords of the respective domain.
t
t
Table 5: Number of nodes (keywords) according to different genealogical typologies (i.e., communities) defined in this study and
edges (keyword pairs) between different typologies of keywords. GP represents the grandparents keywords, P represents the
parents, C represents the children and G represents the guests keywords. Similarly, EP denotes the edges between parent
keywords, and EGP ↔ P denotes the edges between grandparent and parent keywords.
C
EP EP↔C EP↔G EC EC↔G EG
91
89
97
112
151
156
141
3729
3626
4072
4628
5723
5582
6903
70
62
48
64
94
121
140
1083
968
1148
925
1024
1375
2200
86
95
101
115
104
114
66
283
242
302
258
190
211
310
15
13
9
13
19
23
31
72
63
69
37
48
73
193
46
30
34
41
49
49
64
38
44
25
34
12
30
54
26
32
26
25
23
24
27
3
0
5
10
1
1
4
Year
P
2008
2009
2010
2011
2012
2013
2014
2008
2009
2010
2011
2012
2013
2014
197
179
189
225
243
273
235
1765
1614
1752
1963
2109
2117
2252
95
84
98
116
127
167
156
430
360
409
334
368
370
793
27
32
29
29
51
45
53
66
65
70
81
103
99
100
G EGP↔P EGP↔C EGP↔G
Gs
52
56
58
52
49
52
35
Go
67
32
43
27
26
41
51
679
664
556
665
757
726
869
185
157
153
125
131
148
323
147
187
189
175
194
174
172
141
98
117
91
82
75
155
3.4 Genealogical Community and KCN Evolution
In Table 5, basic statistics of nodes (keywords) and different types of edges (keyword co-occurrences) formed between
keywords belonging to different genealogical communities are presented. In this table, we ignored the grandparent
keywords since for each year it was the top-20 keywords from the previous year. Consequently, edges among the
11
Figure 5: Percentage of different types edges among keywords from different genealogical communities with respect to the total
number of edges in the test year (i.e., 2015)
grandparent keywords were also ignored since they were trivial in comparison to the other types of edges. In both
datasets, we found that edges among keywords belonging to the parent community dominate in numbers. This fact is
correlated with the increase of number of edges between grandparents and parents over time. Considering the sizes (i.e.,
number of articles and keywords) of both datasets, Gs harbours more guest keywords and edges. However, the ratio
of edges between children and guest keywords are similar in both datasets. The children and guest keywords tend to
form edges with parents more than the grandparents. This chronology of descendants not only helped us understand the
temporal trends of topics and research hypotheses developments but also attribute specificity in preferential attachment.
For example, in absence of such typologies, we would consider grandparents and parents keywords not only in the
same category and but also the richest since these would acquire most of the emerging edges. From this table, we can
also observe contrasting phenomenon which signifies the fact that the richest does not always remain so as they grow
oldest. Such classification on genealogical traits will allow us to comprehend the evolutionary growth of KCNs better
and thus help in science mapping.
In Figure 5, we observe how this ancestral relationships helped us to classify the edge types in the test year (i.e., 2015).
In this figure, we present the percentage of different types of edges, as presented in Table 5, with respect to the total
number of edges. It is evident from this figure that the keywords belonging to the parent community play crucial roles
in emerging relations than any other keyword types. In both datasets, the parent keywords dominate in attracting both
descendants and antecedents to form emerging relations.
4 Research Methodology
We frame the future LBD prediction problem as a learning-based link prediction task. Predicting co-evolution of
author selected keywords or identifying implicit relationships between them can be mapped to the dynamic supervised
link prediction model from network science. In this section, we describe our research methodology to construct such
a predictive model that incorporates both nodal and edge features, and a recurrent neural network for both feature
forecasting and classification.
4.1 Dynamic Supervised Link Prediction
For the purpose of link prediction, the total duration in each dataset was split into two non-overlapping intervals, T and
T + 1, known as the training and test phase. The primary objective of dynamic supervised link prediction framework is
to analyse the temporal topological structure and nodes' attributes in the network of training phase GT (VT , ET ) to
predict the emergence of future edges in the network of test phase GT +1(VT , ET +1). In dynamic network perspective,
12
EGPEGPPEPEPCECECGEG/070,9439508
7,.94341949,0/08 GsGoGT is sampled using an aggregation granularity to generate a time series of network snapshots. Due to the data
collection granularity this study used yearly window size to sample the network GT and generate time series of network
snapshots. It is impractical to predict the edges between nodes those are absent in the training network. Therefore, VT
is the set of nodes appeared in both phases. Then, we prepared our classification dataset consists of the instances of
non-connected keyword-pairs in the training phase. Each instance is labeled either positive or negative based on it's
presence as a true link in the test network. Supervised method for link prediction problems needs to predict the emerging
edges by successfully discriminating the positive and negatively labelled keyword-pairs within the classification dataset.
Hence, supervised link prediction is considered as a binary classification task by learning positive and negative instances
with the help of interesting features describing each instance. Classification model requires effective features for the
training purposes. To perform this task, we constructed novel features (described later) by incorporating temporal
information, network structure, and genealogical community memberships of author selected keywords. The feature
values for both positive and negative instances were computed by considering each network snapshot at timestamps
t0, t1, t2, ...tn ∈ T . Here, each timestamp represents a year in the training phase T (i.e., 2008-2014) . A recurrent
neural network (described below) was also employed to forecast the feature values for each instance in the test phase.
These forecasted feature values were input into a classifier for the classification purpose.
To measure performance of the classification, there are mainly two categories of evaluation metrics in a supervised
learning problem: (i) Fixed threshold metrics like accuracy, precision, recall (ii) k-equivalents and Threshold curves
like precision-recall (P -- R) curve and the area under the ROC curve (AUC) [46]. The threshold curves like ROC curve
and P-R curve are two dimensional curves. In ROC curve, true positive rates are plotted on the Y-axis and false positive
rates are plotted on the X-axis. In P-R curve, Y-axis is for precision and X-axis is for recall. P-R curve provides
better measurement in case of class distribution with large skewness. It also performs better in providing more insight
regarding the exposure of class differences.
4.2 Feature Engineering
To support supervised link prediction task, we constructed different features by taking advantages of different recursive
centrality measures and genealogical communities extracted from temporal KCN. These features assessed the influence
of keyword in regards to authors and articles and leveraged the temporal significance of evolving networks. Before
generating features for keyword pairs (edge-level), we first identified different characteristics of individual keyword's
importance. The rationale behind this is to contemplate different levels of significance each keyword carries in regards
to both network importance and ancestral lineages. We also considered accumulated citation score over time for each
keyword to construct citation-based features. Since, these features only pertain to one keyword, some aggregation
functions are needed to combine/aggregate the individual feature value of the corresponding keywords in a keyword pair.
To illustrate further, consider the fact that if either(or both) of the keywords are prolific or belong to the same community,
it is more likely that they will co-occur. Before aggregation, the individual measure denotes the proliferation rate of
individual keyword, its community membership, or temporal activeness (number of co-occurrences). Aggregation of
these individual features yields the aggregated features which are meaningful for the pair of keywords in dynamic link
prediction. Therefore, keyword-specific features were then aggregated to develop features for each keyword pairs. In
this study's context, we assume that the higher the aggregated feature values for a keyword pair, the more likely that
those two keywords will co-occur. In the following section, we describe the features used in the classification task.
4.2.1 Keyword centrality
For each keyword, we considered three centrality measures as node-level features. Two recursive centrality measures
were based on the keyword-author (vau
t ) bipartite relations as defined in section Recursive
centrality. The final centrality measure was the corresponding keyword's degree centrality (vd
t ).
) and keyword-article (vat
t
4.2.2 Temporal community importance
This is the first edge-level aggregated feature we computed for each non-connected keyword pair for the link prediction
purpose. The objective of this feature was to capitalize both the origin information (genealogical community) and
current activeness (centrality measures) of both keywords in a keyword pair. Chenhao Tan [47] investigated how the
origin of a community connects to its future growth and demonstrated that the history of the early members allows us to
understand the emergence of communities (i.e., tracing the origin of a community). In regards to the future community
growth, the author believed that the emerging process of a community is analogous to complex contagion that requires
dense connections between early adopters. In our case the early adopters are the members of the grandparent and parent
communities. Therefore, we first multiply individual keyword's community score with its corresponding centrality
value for each year in the training period. The former denotes the keyword's relation with previous year's central
keyword (i.e., keyword's family lineage) and the later denotes its importance which was originally used to determine its
13
community membership. This will augment the community importance scores of grandparent and parent keywords
more than children and guests, and subsequently determine the individual temporal community importance score of a
keyword in each training year. Finally, for each keyword pair, the temporal community importance score was computed
by summing their aggregated individual score in each year t. Thus, the first edge-level feature at each timestamp t in
the training period, known as temporal community importance score for a keyword pair, can be computed as:
t · va
t · vb
t
scoreH
t + gb
t and va
t (a, b) = ga
(2)
where ga
t denote the genealogical community score and the corresponding centrality score of keyword a.
By considering the temporal sequences of individual community score and centrality values of both keywords, we
built a time series of this aggregated feature for each instance of non-connected keyword pair. Since we considered
t ) for each keyword v to determine its community score, the following
three centrality values (i.e., vau
notations will be used to denote three variants of this feature value: scoreH
au(a, b) to denote the temporal community
importance score for an edge (a, b) where recursive centrality measures of keywords a and b were extracted from
at(a, b) will denote the same feature value where recursive centrality
the keyword-author relations. Similarly, scoreH
measures were extracted from the keyword-article relations. Finally, scoreH
d (a, b) will be used to denote the same
feature value where degree centrality values of keywords a and b were considered.
t and vd
, vat
t
4.2.3 Citation-weighted Recency
An individual keyword's citation count represent its influence factor over other keywords. However, domain-specific
and representative keywords can achieve higher citation counts then the others. Relative influence factor should also be
brought into consideration. For example, old keywords accumulate more citation over time then new keywords. In
contrast, some new keywords can gain significance quickly and acquire relatively high citation then other insignificant
but old keywords. Therefore, we considered the temporal factors of keyword's appearances such as current or distant
appearances over time. Considering our training period (e.g., 2008-2014), an article published in 2008 gets more time
to be cited than a article published in 2014. Despite, the later one carries more impact, the former one is weighted more
based on the numbers. Further, training year closer to the test period (e.g., 2014) is more significant than earlier years
since recently co-appeared keywords are more likely to come together in near future, a fact known as 'recency' in link
prediction task [48].
Considering the aforementioned facts on temporal significance and citation count, we constructed our second edge-level
feature for keyword pairs by accommodating both temporal recency and citation counts over time. Since citation count
and temporal recency are applicable to individual keywords, it requires to aggregate these counts for keyword-pairs. For
each keyword pair in year t, we aggregated their total citation counts. Further, we assigned temporal recency score
depending on the appearances of both keywords in a particular year. The recent their appearances are, or alternatively,
the closer their co-appearances towards the test year, the higher the recency score. Considering the keyword-pair (a, b),
let t denotes the training year t ∈ [1, 2, 3, ...T ], hu
t denote the total number of citation counts of the articles in
year t where keywords a and b appears respectively, then the weighted-citation recency is calculated as follows:
t and hv
scoreW
(3)
Here, γ amplifies the recency effect and its value is two if both keywords in a keyword-pair appear in a year, one if
either of the keyword appear, or zero (0) otherwise. ha
t will be assigned zero value if keyword a does not appear in an
article that received any citation. However, the feature value will be augmented depending on the current appearances
of the keywords (i.e., multiplied by value of t). The assumption here is that, keywords having high citation in the recent
years will have high probability to appear together since they represent the recent trends.
t (a, b) = (ha
t + hb
t) · γt
4.3 Feature Forecasting and Classification
Considering temporal KCN Gt(Vt, Et), constructed for each year t during the training period, we constructed time
series of features for non-connected keywords pairs. Like other supervised dynamic link prediction study [49], we
employed deep-learning framework to forecast the future values of constructed features during the test phase (i.e.,
2015). We use a Long Short Term Memory network [50] which is a special kind of Recurrent Neural Network (RNN)
for both forecasting and classification tasks. An LSTM takes sequential data as input and is considered well-suited
in classifying temporal sequence. The LSTM used in this study consisted of two blocks of memory-cells with two
different layers of hidden units. A simple LSTM cell unit takes three inputs (Xt, ht−1, Ct−1). Xt is the input of the
current time step, ht−1 is the output from the previous LSTM unit and Ct−1 is the "memory" of the previous unit. As
for outputs, ht is the output of the current unit and Ct is the memory of the current unit.
14
In our experiment, time series of feature values was input into a 2-layer LSTM network. The number of timesteps for
each training sample is seven since the training period is seven years (2008-2014) long. To forecast numerical features
values, linear activation function and MSE (Mean Squared Error) loss function were used. Categorical features were
encoded as one-hot vectors. In this case, softmax activation function and categorical cross-entropy (loss function) were
used. In all cases, adam optimization technique was used. Further, these forecasted feature values were then fed as
the training samples for our classification task. This classification task was implemented by adding another LSTM
netwrok in the pipeline which includes a dense layer with a single neuron as output layer. A dense layer is a fully
connected layer which means each neuron here receives input from all the neurons in the previous layer, thus densely
connected. In this layer, we used a logistic activation function named sigmoid which is ideal for assisting in binary
mutual exclusive classification problem. This output layer takes the forecasted feature values and predict the class
(positive/negative) of the keyword pairs.
5 Results
In this section we present our feature forecasting and link prediction results. We first present the feature forecasting
performance followed by the classification performance demonstrated by the LSTM.
5.1 Feature Forecasting Performance
Table 6: Normalized RMSE values (0-1) calculated on forecasted feature values against true feature values in the test year. Features
include both node-level (keyword features) and edge-level (aggregated features for keyword-pairs). scoreP A(a, b) represents the
preferential attachment score. vat
t denotes degree centrality
t denote two recursive centrality values of keywords and vd
t , and vau
values of keywords.
Datasets
Number of Iteration
scoreH
at(a, b)
scoreH
au(a, b)
scoreH
d (a, b)
scoreW
t (a, b)
scoreP A(a, b)
vat
t
vau
t
vd
t
Citation
100
0.027
0.025
0.017
0.006
0.016
0.136
0.119
0.027
0.003
Gs
500
1000
100
Aggregated Features (Keyword pairs)
0.023
0.020
0.010
0.004
0.015
0.024
0.022
0.010
0.005
0.015
Individual Features (Keyword)
0.135
0.112
0.021
0.002
0.135
0.110
0.020
0.002
0.002
0.002
0.002
0.001
0.005
0.077
0.070
0.003
0.0004
Go
500
0.003
0.002
0.001
0.001
0.004
0.071
0.063
0.002
0.0004
1000
0.003
0.002
0.001
0.001
0.004
0.060
0.057
0.002
0.0004
We used LSTM to forecast the constructed feature values (Feature Engineering) for the test period. For each keyword pair,
time series of both keyword features (Keyword centrality) and aggregated features (Temporal community importance
and Citation-weighted Recency), computed during the training period, were input in LSTM. To evaluate the performance
of this forecasting model, we computed the RMSE (root mean squared error) values by considering the actual feature
values in the test year against the forecasted values. Table 6 present the RMSE values to measure the performance
of LSTM in forecasting. We trained the LSTM model for different number of iterations (i.e. epochs). The effect of
iteration number is visible in the rmse values. In most cases, higher number of iteration results in more robust model
training. The range of actual values for different features can be varied significantly. So we presented the normalized
RMSE values in the range of 0-1. RMSE values in Go denote that in this dataset, the forecasting errors were smaller
than those in Gs which can be attributed to the size of the dataset. In this table, forecasting performance for both the
keyword feature and aggregated features are presented. For comparison's sake, we also calculated RMSE in forecasting
the preferential attachment score which is a widely used metric in link prediction task. It is noteworthy that preferential
attachment is an aggregated network feature which is computed by multiplying the number of neighbours of each
keyword in a keyword pair.
5.2 Link Prediction Performance
The supervised link prediction framework is subject to highly imbalanced data with a very large number of instances
with negative label. In practice, only a few pairs of keywords participate in true emerging edges out of every possible
pairs. Therefore, following other studies like in [7], the ratio of positive and negative class instances was set to 1:10.
15
Figure 6: P-R and ROC curves in both datasets (Gs and Go) to demonstrate the classification performance of the LSTM classifier
using the feature values constructed in this study. Traditional topological similarity metric 'Preferential Attachment' was also used to
compare the performance with the constructed features. 'Heredity (author)' denotes the aggregated feature temporal community
importance scoreH
au(a, b). Similarly,'Heredity (article)' denotes the temporal community importance scoreH
at(a, b).
We also used 30% of the instances for validation and evaluation purposes. Similar to forecasting performance, Go
dataset was found to demonstrate high performance in comparison to Gs. The AUCROC (i.e., Area Under ROC Curve)
is commonly used for evaluating such imbalanced classification problems. It introduces a probability value to quantify
the uncertainty associated with the classifiers. In case of binary classification, AUCROC enforces larger weight on
smaller class by using this threshold value. In Table 7, we present both the accuracy and AUCROC scores computed in
both Gs and Go datasets. For comparison's sake, we also present the performance of Preferential Attachment metric
which is a well-known topological similarity metric widely used in supervised link prediction task. In comparison to
this topological similarity metric, it is evident from Table 7 that the features constructed in this study outperformed the
traditional and widely prevalent metric for link prediction in KCNs, the preferential attachment. Better performance
was observed in Go rather than Gs which can be attributed to the greater number of instances. It is also evident that the
first aggregated feature (temporal community importance) performed better than the citation weighted recency scores.
Table 7: Dynamic supervised link prediction performance using AUCROC (AUC) and Accuracy (Acc%) values.
Gs
Go
scoreH
at(a, b)
scoreH
au(a, b)
scoreH
d (a, b)
scoreW
t (a, b)
scoreP A(a, b)
AUC
0.749
0.759
0.765
0.680
0.698
Acc(%)
89.3
88.7
89.5
88.9
88.8
AUC
0.783
0.800
0.794
0.776
0.753
Acc(%)
90.9
91.0
91.0
90.7
90.2
Considering other evaluation metrics, the P-R (precision - recall) curve depicts the precision-recall trade-off for a
classifier. This measurement is widely used in information retrieval. Reviewing both precision and recall is useful in
cases where there is an imbalance in the instances between the two classes. The reason for this is that typically the
16
!70.843 , !#.:7;0(Gs)
%7:0!489;0#,90 - # .:7;0(Gs)070/9 ,:947 070/9 /0700 9,943090/70.03.!70107039,,99,.2039
#0.,
!70.843 . !#.:7;0(Go)
,80!489;0#,90
%7:0!489;0#,90 / # .:7;0(Go)070/9 ,:947 070/9 /0700 9,943090/70.03.!70107039,,99,.2039large number of negative class instances means we are less interested in the skill of the model at predicting negative
class instances correctly, (i.e., high true negatives). The most crucial thing of P-R curve is that this calculation does not
make use of the true negatives. It is only concerned with the correct prediction of the minority class, the positive class
instances. A P-R curve is a plot of the precision in y-axis and the recall in x-axis. In ROC curve, the goal is to have a
model be at the upper left corner, which is basically getting no false positives. Whereas, in P-R curve, the goal is to
have a model be at the upper right corner, which is basically getting only the true positives with no false positives and
no false negatives. In Figure 6, we present both the ROC and P-R curves of our features (solid lines) including the
Preferential Attachment (dashed lines) metrics. The top row represents P-R and ROC curves in Gs and the bottom
row represents the same in Go. Like the aforementioned performance measurements, in most cases of this figure, the
features constructed in this study outperformed the preferential attachment metric in both datasets.
5.3 Distribution of Aggregated Feature Values
In Figure 7, we present the distributions of feature values for the constructed aggregated features (i.e., temporal
community importance scoreH
au(a, b) and citation weighted recency). For all positive and negatively labelled keyword
pairs (samples), the normalized feature values for both aggregated features are presented as kernel density plots.
Distribution of the feature values for the positive samples (true keyword pairs in the test year) are presented in green
color and the negative samples are presented in red color. It is noteworthy that, for temporal community importance
score, we only consider the recursive centrality values extracted from the keyword-author relations.
Figure 7: Positive and negative class density of two aggregated features: temporal community importance score scoreH
where the recursive centrality measures were extracted from the keyword-author relations and Citation weighted recency
au(a, b)
scoreW
t (a, b) in both datasets
Two observations are evident from these figures. Firstly, since the overlap between the red and green colored regions
may trigger classification errors, the lower the overlap, the higher the classification performance. The amount of overlap
signifies that the aggregated features constructed in this study have non-trivial discriminatory characteristics. Secondly,
in contrast to topological similarity metrics where high value of the metrics corresponds to higher similarity between
17
0389/897-:943%02547,.422:3925479,3.0
9,943090/70.03.Gs0,9;08,2508!489;08,2508
472,0/10,9:70;,:0
0389/897-:943
472,0/10,9:70;,:0
GoFigure 8: Two different centrality values (i) recursive centrality values extracted from the keyword-author relations (left) and (ii)
degree centrality of the keywords participating in the positively labeled edges during the test year in both datasets.
a pair of nodes (e.g., having more common neighbours between two nodes in a network), we found that positively
labelled keyword pairs have high density in lower feature values. This denotes that instead of higher values of the
features, comparatively lower features values have high probability in forming emerging relationships. Although, in Go,
we observe high feature values for positively labeled edge instance in the test period. This fact is contrary to our initial
assumption, mentioned in Feature Engineering that higher values denote higher probability of keyword co-occurrences.
Although, exploring the reason behind this is out of the scope of this study, however, in Figure 8, we present the
normalized keyword feature values (recursive centralities and degree centrality) computed for the test year (i.e., 2015)
in both datasets. The lower feature values can be attributed to the number of children and guest keywords including the
variances in normalized centrality values of the parent keywords. It is noteworthy that from the aforementioned figures
and tables, we have observed that the parent community dominates the merging link formations.
6 Discussion and Conclusion
Scientific progress depends on formulating verifiable and deductible hypotheses generation. This requires both
understanding and informed inferences from existing knowledge and information [51]. Rapid growth of scientific
knowledge and over specializations (domain-specific fragmentation) may engender opportunities to derive solutions
from one domain to address problems in another, although the underlying relationship may remain implicit or the
concerned groups from both domains are unaware of the work of each other [52]. However, the continuous surge
in published scientific literature limits the scope of analyses an individual can accomplish to extract these novel
and implicit relationships between disjoint concepts, topics and domains [20]. Proliferation of scientific production
inhibits scientists and policy makers to detect trending subject areas and the linkages among these areas in their
research fields, and mapping the dynamics of science to plan for research progress [53]. human comprehension of
such massive information and knowledge is challenging when it exceeds the scale of human analytical skills. For
example, as mentioned by Spangler et al.
[54], it is inconceivable for a scholar to possibly assimilate, recall and
accurately process all the known facts relevant to protein functions, relationships between proteins and identifications
of roles of a particular protein related to a disease while there are over 70000 articles on a single protein - the tumour
18
472,0/.0397,9;,:0#0.:78;0.0397,9
0700.0397,9Gs7,3/5,7039!,7039/:089
441047/8
472,0/.0397,9;,:0
441047/8
Gosuppressor 'p53'. Thus, there is a great difference between what is known, and what we know as individuals from
the collective and multidisciplinary knowledge within a given domain. Further, the specialization or fragmentation
of literature may promote poor communication between specialties since scientists tend to communicate more within
their fragments than the broader community engaged within the domain [55]. According to Ganiz et al. [9] Literature
Based Discovery (LBD) addresses the challenge of seemingly boundless increases in scientific knowledge including
knowledge overspecialization faced by the scientific communities. However, existing LBD models suffers from the
lack of generalized predictive model to successfully predict the emerging trends in such discoveries. Despite their
success, LBD techniques including text analysis, information retrieval and natural language processing are deprived
of the benefits of bibliometrics, specially the analytical advantages of temporal keyword co-occurrence networks
(KCNs). These KCNs and network analysis methods are found to be supportive in identifying technological trends,
analyse research topics and follow their evolution and track the development of innovation system research [56].
Further, temporal dynamics of KCN and community-aware features are underutilized in the process of literature-based
hypotheses generation. To this end, this study proposed a predictive framework that integrates temporal evolution of
KCN, genealogical communities, citation counts of keywords, and an LSTM based forecasting and prediction model.
The KCNs in this study are comprised on author selected keywords which best describe the research themes referred by
the corresponding authors and are also considered as knowledge entities. This framework includes feature engineering
process that builds novel features for both keywords (node) and keyword pairs (edge defined by co-occurrence). In this
study, we developed two recursive centrality measures by considering two types of bipartite relations: keyword-author
and keyword-article. We also considered the degree centrality of keywords extracted from temporal unipartite KCNs.
These centrality measures were used to define temporal communities based genealogical relationships among keywords.
Temporal citation counts of keywords were also used as keyword features. Bipartite recursive centrality values including
the degree centrality, genealogical community information and relative importance of temporal citation counts were
used to construct edge-level (keyword pairs) features. Seven years of training period was used to built time series of both
node and edge-level features those were input into an LSTM network to forecast the feature values in the test year. If
we forecasted only the edge-level features, then the individual node-level significance of keywords would have lost due
to the aggregation of mixed data types (eg. numerical, categorical) in edge-level. For example, in case of the temporal
community importance score, originating from the recursive centrality values, extracted from keyword-author bipartite
relations, the feature vector includes both centrality values of two keywords as well as their corresponding community
and the aggregated feature value. The centrality values are numerical, however, the community is categorical which
was represented as one-hot vector. This can easily be handled in LSTM instead of other forecasting technique. With
relatively trivial forecasting error, the forecasted feature values were used in supervised link prediction to classify both
positive and negatively labeled non-connected keyword pairs. The performance of the LSTM classifier was measure
using well-known performance metrics and also compared against well-known network topological similarity metric
used in link prediction. High performance of the constructed feature indicates that these features are not only supportive
in dynamic supervised link prediction but also can be beneficial in predicting literature based knowledge discovery or
emerging trend detection.
Despite the better performance measurements, this study is not free from its limitation. The first limitation comes
from the lack of accommodating domain experts in identifying semantic similarity of keywords and various forms of
abbreviations. Secondly, in this study we used manual name disambiguation instead of any standard methods to clean
the author names including which can further be explored in future studies. The semantic relationships between textual
contents were ignored in this study. The reason behind is that we only considered the author selected keywords those are
not semantically presented in the scientific literature but only co-appears if the corresponding authors recognize them as
relevant. Finally,lack of any such deep learning-based predictive framework in literature based discovery to compare
the performance of the proposed framework instead of relying on tradition link prediction metric. This study can further
be extended in various ways. Firstly, this study considered previous year's information to identify communities of
keywords in the current year. However, future studies can consider more historical information can be used (more than
one previous year information) to determine such communities. Other centrality measures and network community
detection algorithm can used to compare the performance of link prediction using community-aware features. Further,
some weighting strategies can be followed to assign weights on edges between keywords belonging to either same
community or different communities.
7 References
References
[1] A. Pritchard, et al., Statistical bibliography or bibliometrics, Journal of documentation 25 (4) (1969) 348 -- 349
(1969).
19
[2] M. M. Kessler, Bibliographic coupling between scientific papers, American documentation 14 (1) (1963) 10 -- 25
(1963).
[3] R. Popping, Knowledge graphs and network text analysis, Social Science Information 42 (1) (2003) 91 -- 106
(2003).
[4] H.-N. Su, P.-C. Lee, Mapping knowledge structure by keyword co-occurrence: a first look at journal papers in
technology foresight, Scientometrics 85 (1) (2010) 65 -- 79 (2010).
[5] M. Song, N.-G. Han, Y.-H. Kim, Y. Ding, T. Chambers, Discovering implicit entity relation with the gene-citation-
gene network, PloS one 8 (12) (2013) e84639 (2013).
[6] Y. Yang, M. Wu, L. Cui, Integration of three visualization methods based on co-word analysis, Scientometrics
90 (2) (2011) 659 -- 673 (2011).
[7] N. Choudhury, S. Uddin, Time-aware link prediction to explore network effects on temporal knowledge evolution,
Scientometrics 108 (2) (2016) 745 -- 776 (2016).
[8] R. N. Kostoff, Method for data and text mining and literature-based discovery, uS Patent 6,886,010 (Apr. 26 2005).
[9] M. C. Ganiz, W. M. Pottenger, C. D. Janneck, Recent advances in literature based discovery, Journal of the
American Society for Information Science and Technology, JASIST (Submitted) (2005).
[10] J. Preiss, M. Stevenson, R. Gaizauskas, Exploring relation types for literature-based discovery, Journal of the
American Medical Informatics Association 22 (5) (2015) 987 -- 992 (2015).
[11] S. Henry, B. T. McInnes, Literature based discovery: models, methods, and trends, Journal of biomedical
informatics 74 (2017) 20 -- 32 (2017).
[12] D. R. Swanson, Fish oil, raynaud's syndrome, and undiscovered public knowledge, Perspectives in biology and
medicine 30 (1) (1986) 7 -- 18 (1986).
[13] D. R. Swanson, N. R. Smalheiser, An interactive system for finding complementary literatures: a stimulus to
scientific discovery, Artificial intelligence 91 (2) (1997) 183 -- 203 (1997).
[14] Y. Sebastian, E.-G. Siew, S. O. Orimaye, Emerging approaches in literature-based discovery: Techniques and
performance review, The Knowledge Engineering Review 32 (2017).
[15] Y. Ding, M. Song, J. Han, Q. Yu, E. Yan, L. Lin, T. Chambers, Entitymetrics: Measuring the impact of entities,
PloS one 8 (8) (2013) e71416 (2013).
[16] D. Cameron, R. Kavuluru, T. C. Rindflesch, A. P. Sheth, K. Thirunarayan, O. Bodenreider, Context-driven
automatic subgraph creation for literature-based discovery, Journal of biomedical informatics 54 (2015) 141 -- 157
(2015).
[17] M. D. Gordon, S. Dumais, Using latent semantic indexing for literature based discovery, Journal of the American
Society for Information Science 49 (8) (1998) 674 -- 685 (1998).
[18] D. Hristovski, J. Stare, B. Peterlin, S. Dzeroski, Supporting discovery in medicine by association rule mining in
medline and umls, Studies in health technology and informatics (2) (2001) 1344 -- 1348 (2001).
[19] M. Yetisgen-Yildiz, W. Pratt, Using statistical and knowledge-based approaches for literature-based discovery,
Journal of Biomedical informatics 39 (6) (2006) 600 -- 611 (2006).
[20] J. D. Wren, R. Bekeredjian, J. A. Stewart, R. V. Shohet, H. R. Garner, Knowledge discovery by automated
identification and ranking of implicit relationships, Bioinformatics 20 (3) (2004) 389 -- 398 (2004).
[21] N. R. Smalheiser, V. I. Torvik, W. Zhou, Arrowsmith two-node search interface: a tutorial on finding meaningful
links between two disparate sets of articles in medline, Computer methods and programs in biomedicine 94 (2)
(2009) 190 -- 197 (2009).
[22] C. B. Ahlers, D. Hristovski, H. Kilicoglu, T. C. Rindflesch, Using the literature-based discovery paradigm
to investigate drug mechanisms, in: AMIA Annual Symposium Proceedings, Vol. 2007, American Medical
Informatics Association, 2007, p. 6 (2007).
[23] X. Hu, G. Li, I. Yoo, X. Zhang, X. Xu, A semantic-based approach for mining undiscovered public knowledge
from biomedical literature, in: 2005 IEEE International Conference on Granular Computing, Vol. 1, IEEE, 2005,
pp. 22 -- 27 (2005).
[24] B. Wilkowski, M. Fiszman, C. M. Miller, D. Hristovski, S. Arabandi, G. Rosemblat, T. C. Rindflesch, Graph-based
methods for discovery browsing with semantic predications, in: AMIA annual symposium proceedings, Vol. 2011,
American Medical Informatics Association, 2011, p. 1514 (2011).
20
[25] Y. Sun, J. Han, Mining heterogeneous information networks: principles and methodologies, Synthesis Lectures on
Data Mining and Knowledge Discovery 3 (2) (2012) 1 -- 159 (2012).
[26] Y. Sebastian, E.-G. Siew, S. O. Orimaye, Learning the heterogeneous bibliographic information network for
literature-based discovery, Knowledge-Based Systems 115 (2017) 66 -- 79 (2017).
[27] X. Ren, J. Liu, X. Yu, U. Khandelwal, Q. Gu, L. Wang, J. Han, Cluscite: Effective citation recommendation by
information network-based clustering, in: Proceedings of the 20th ACM SIGKDD international conference on
Knowledge discovery and data mining, ACM, 2014, pp. 821 -- 830 (2014).
[28] X. Liu, Y. Yu, C. Guo, Y. Sun, L. Gao, Full-text based context-rich heterogeneous network mining approach for
citation recommendation, in: IEEE/ACM Joint Conference on Digital Libraries, IEEE, 2014, pp. 361 -- 370 (2014).
[29] A. Kastrin, T. C. Rindflesch, D. Hristovski, Link prediction on a network of co-occurring mesh terms: towards
literature-based discovery, Methods of information in medicine 55 (04) (2016) 340 -- 346 (2016).
[30] G. Crichton, Y. Guo, S. Pyysalo, A. Korhonen, Neural networks for link prediction in realistic biomedical graphs:
a multi-dimensional evaluation of graph embedding-based approaches, BMC bioinformatics 19 (1) (2018) 176
(2018).
[31] J. R. Katukuri, Y. Xie, V. V. Raghavan, A. Gupta, Hypotheses generation as supervised link discovery with
automated class labeling on large-scale biomedical concept networks, in: BMC genomics, Vol. 13, BioMed
Central, 2012, p. S5 (2012).
[32] Y. Wang, J. Zeng, Predicting drug-target interactions using restricted boltzmann machines, Bioinformatics 29 (13)
(2013) i126 -- i134 (2013).
[33] Y. Lu, Y. Guo, A. Korhonen, Link prediction in drug-target interactions network using similarity indices, BMC
bioinformatics 18 (1) (2017) 39 (2017).
[34] L. Katz, A new status index derived from sociometric analysis, Psychometrika 18 (1) (1953) 39 -- 43 (1953).
[35] K. Börner, S. Sanyal, A. Vespignani, Network science, Annual review of information science and technology
41 (1) (2007) 537 -- 607 (2007).
[36] N. J. Van Eck, L. Waltman, Visualizing bibliometric networks, in: Measuring scholarly impact, Springer, 2014, pp.
285 -- 320 (2014).
[37] S. Bird, E. Klein, E. Loper, Natural Language Processing with Python, 1st Edition, O'Reilly Media, Inc., 2009
(2009).
[38] R. K. Pan, S. Sinha, K. Kaski, J. Saramäki, The evolution of interdisciplinarity in physics research, Scientific
reports 2 (2012) 551 (2012).
[39] S. Lee, B. Yoon, Y. Park, An approach to discovering new technology opportunities: Keyword-based patent map
approach, Technovation 29 (6-7) (2009) 481 -- 497 (2009).
[40] A. Canals, Knowledge diffusion and complex networks: a model of high-tech geographical industrial clusters, in:
Proceedings of the 6th European conference on organizational knowledge, Learning, and Capabilities, 2005, pp.
1 -- 21 (2005).
[41] M. A. Montemurro, D. H. Zanette, Keywords and co-occurrence patterns in the voynich manuscript: An
information-theoretic analysis, PloS one 8 (6) (2013) e66344 (2013).
[42] S. Schulz, C. M. Costa, M. Kreuzthaler, J. A. Miñarro-Giménez, U. Andersen, A. B. Jensen, B. Maegaard,
Semantic relation discovery by using co-occurrence information, Proceedings of BioTxtM 220 (2014).
[43] C. McNorgan, R. A. Kotack, D. C. Meehan, K. McRae, Feature-feature causal relations and statistical co-
occurrences in object concepts, Memory & Cognition 35 (3) (2007) 418 -- 431 (2007).
[44] W. Zhao, J. Mao, K. Lu, Ranking themes on co-word networks: Exploring the relationships among different
metrics, Information Processing & Management 54 (2) (2018) 203 -- 218 (2018).
[45] P. Klimek, A. S. Jovanovic, R. Egloff, R. Schneider, Successful fish go with the flow: citation impact prediction
based on centrality measures for term -- document networks, Scientometrics 107 (3) (2016) 1265 -- 1282 (2016).
[46] Y. Yang, R. Lichtenwalter, N. Chawla, Evaluating link prediction methods, Knowledge and Information Systems
45 (3) (2015) 751 -- 782 (12 2015). doi:10.1007/s10115-014-0789-0.
[47] C. Tan, Tracing community genealogy: How new communities emerge from the old, CoRR abs/1804.01990
(2018). arXiv:1804.01990.
URL http://arxiv.org/abs/1804.01990
21
[48] Y. Yang, N. Chawla, Y. Sun, J. Hani, Predicting links in multi-relational and heterogeneous networks, in: 2012
IEEE 12th international conference on data mining, IEEE, 2012, pp. 755 -- 764 (2012).
[49] P. R. da Silva Soares, R. B. C. Prudêncio, Time series based link prediction, in: The 2012 international joint
conference on neural networks (IJCNN), IEEE, 2012, pp. 1 -- 7 (2012).
[50] S. Hochreiter, J. Schmidhuber, Lstm can solve hard long time lag problems, in: Advances in neural information
processing systems, 1997, pp. 473 -- 479 (1997).
[51] B.-K. Choi, T. Dayaram, N. Parikh, A. D. Wilkins, M. Nagarajan, I. B. Novikov, B. J. Bachman, S. Y. Jung, P. J.
Haas, J. L. Labrie, et al., Literature-based automated discovery of tumor suppressor p53 phosphorylation and
inhibition by nek2, Proceedings of the National Academy of Sciences 115 (42) (2018) 10666 -- 10671 (2018).
[52] D. Hristovski, B. Peterlin, S. Dzeroski, Literature-based discovery support system and its application to disease
gene identification, in: Proceedings of the AMIA Symposium, American Medical Informatics Association, 2001,
p. 928 (2001).
[53] Q. He, Knowledge discovery through co-word analysis (1999).
[54] S. Spangler, A. D. Wilkins, B. J. Bachman, M. Nagarajan, T. Dayaram, P. Haas, S. Regenbogen, C. R. Pickering,
A. Comer, J. N. Myers, et al., Automated hypothesis generation based on mining scientific literature, in: Proceed-
ings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, 2014,
pp. 1877 -- 1886 (2014).
[55] D. R. Swanson, Asist award of merit acceptance speech: On the fragmentation of knowledge, the connection
explosion, and assembling other people's ideas, Bulletin of the American Society for Information Science and
Technology 27 (3) (2001) 12 -- 14 (2001).
[56] F. Dotsika, A. Watkins, Identifying potentially disruptive trends by means of keyword network analysis, Techno-
logical Forecasting and Social Change 119 (2017) 114 -- 127 (2017).
Author contributions
N.C. conceived the manuscript idea, collected data, design experiments and contributed in writing, and F.F cleaned the
datasets, conducted the experiment(s), developed features, analysed the results, and wrote the research methodology
section. M.K. contributed in writing and reviewed the manuscript.
8 Dataset and Code
The dataset and programming codes used in this study is available a https://github.com/faisal-iut/linkPrediction
22
|
1612.06115 | 2 | 1612 | 2016-12-24T11:40:36 | Complex Network Tools to Understand the Behavior of Criminality in Urban Areas | [
"cs.SI",
"physics.soc-ph"
] | Complex networks are nowadays employed in several applications. Modeling urban street networks is one of them, and in particular to analyze criminal aspects of a city. Several research groups have focused on such application, but until now, there is a lack of a well-defined methodology for employing complex networks in a whole crime analysis process, i.e. from data preparation to a deep analysis of criminal communities. Furthermore, the "toolset" available for those works is not complete enough, also lacking techniques to maintain up-to-date, complete crime datasets and proper assessment measures. In this sense, we propose a threefold methodology for employing complex networks in the detection of highly criminal areas within a city. Our methodology comprises three tasks: (i) Mapping of Urban Crimes; (ii) Criminal Community Identification; and (iii) Crime Analysis. Moreover, it provides a proper set of assessment measures for analyzing intrinsic criminality of communities, especially when considering different crime types. We show our methodology by applying it to a real crime dataset from the city of San Francisco - CA, USA. The results confirm its effectiveness to identify and analyze high criminality areas within a city. Hence, our contributions provide a basis for further developments on complex networks applied to crime analysis. | cs.SI | cs | Complex Network Tools to Understand the
Behavior of Criminality in Urban Areas
Gabriel Spadon, Lucas C. Scabora, Marcus V. S. Araujo, Paulo H. Oliveira,
Bruno B. Machado, Elaine P. M. Sousa, Caetano Traina-Jr, Jose F. Rodrigues-Jr
{spadon, lucascsb, pholiveira, araujo}@usp.br
{brandoli, parros, caetano, junio}@icmc.usp.br
University of Sao Paulo, Brazil
6
1
0
2
c
e
D
4
2
]
I
S
.
s
c
[
2
v
5
1
1
6
0
.
2
1
6
1
:
v
i
X
r
a
Abstract -- Complex networks are nowadays employed in sev-
eral applications. Modeling urban street networks is one of them,
and in particular to analyze criminal aspects of a city. Several
research groups have focused on such application, but until now,
there is a lack of a well-defined methodology for employing
complex networks in a whole crime analysis process, i.e. from
data preparation to a deep analysis of criminal communities.
Furthermore, the "toolset" available for those works is not
complete enough, also lacking techniques to maintain up-to-date,
complete crime datasets and proper assessment measures. In
this sense, we propose a threefold methodology for employing
complex networks in the detection of highly criminal areas within
a city. Our methodology comprises three tasks: (i) Mapping of
Urban Crimes; (ii) Criminal Community Identification; and (iii)
Crime Analysis. Moreover, it provides a proper set of assessment
measures for analyzing intrinsic criminality of communities,
especially when considering different crime types. We show our
methodology by applying it to a real crime dataset from the city of
San Francisco -- CA, USA. The results confirm its effectiveness to
identify and analyze high criminality areas within a city. Hence,
our contributions provide a basis for further developments on
complex networks applied to crime analysis.
I. INTRODUCTION
Complex networks have long been used to model social
behavior, spatial patterns, spreading of epidemics, and urban
structures. They are capable of representing neural connec-
tions, data transmission schemes, electric power grids, airports,
as well as street, rail and subway networks [1]. In the context
of street networks, which are of particular interest for this
work, complex networks are able to describe flow relationships
and social behavior in an urban zone [2].
As dynamic organisms, cities evolve (shrink or enlarge)
with respect to their space and population, causing changes in
their structures. Such structures are of high relevance as they
directly influence the flow within the cities and, consequently,
the behavior of their citizens. Nevertheless, violence and social
disorder may also be related to the urban structure of a given
city. For instance, low-flow areas tend to be propitious for
crime events, since such areas end up being less surveilled
when compared to high-flow areas. For that reason, crime
events usually occur within regions that can be detected
based on their structural and behavioral properties [3]. In this
context, it is our contention that, by means of computational
techniques, it is possible to identify and understand the crime
dynamics in an urban network. As so, this paper provides a
methodology for aiding the analysis of urban criminality --
e.g. how specific crimes occur in certain areas and how their
types are related to each other by being in neighboring areas,
that is, by being similar.
The hypothesis of this work is that by employing network
mapping techniques, allied to distance-based properties of
graphs, it is possible to identify and trace the relationship
between areas that are highly criminal within a city. Our
assumption is that similar crimes occur in adjacent regions.
Such crimes emerge from, among other factors, the urban
organization, and their inter-similarity carries correspondence
to the distance from one region to the other. Technically,
our proposal is based on: (i) community detection algorithms
applied to datasets of isolated crime types; (ii) pattern and
similarity analyses, which compare crimes occurred in distinct
regions within the same city. Based on those techniques, we
propose a threefold methodology consisted of: (i) Mapping
of Urban Crimes -- we describe how to combine a city's
georeferenced urban structure with crime records into a com-
plex network with potential for analytical tasks; (ii) Criminal
Community Identification -- we show how to detect criminal
communities by exploring geographical as well as structural
properties; (iii) Crime Analysis -- we methodologically com-
pare crime patterns by identifying relationships between their
communities, especially in the face the of diverse crime types.
Our methodology contributes to the understanding of crimi-
nality in the context of urban organization. We work on issues
related to: (i) an approach to identify highly criminal areas;
(ii) the characterization of the city space by inferring the
homogeneity of its crimes; (iii) the identification of city sectors
that present behaviors related to the sparsity of their crimes;
and (iv) the delineation of the city space by identifying regions
that are related, acting as crime spots for different crime types.
The remainder of the paper is structured as follows. Sec-
tion II presents the related work, discussing how our method-
ology stands out from theirs. Section III describes the dataset
used in this work and the methodology proposed. Section IV
discusses the results obtained from the application of our
methodology to the crimes dataset, which describes a real
scenario from the street network of the North American city
of San Francisco. Finally, Section V presents the conclusion.
II. RELATED WORK
Several works in the literature have dealt with the topics of
urban networks and criminality. This section describes some of
these works organized into two categories related to the phases
of our proposal: Mapping of Urban Crimes, which focuses
on representing raw crime data with a complex network,
and Crime Analysis, which refers to identifying criminal
behaviors and patterns by analyzing urban street networks.
Mapping of Urban Crimes. Spicer et al. [4] describe a
theoretical framework capable of mapping urban crimes into
related locations in a city. Their work discusses the pros and
cons of mapping methods. To represent a city, they use street
networks and GIS software, describing methods for mapping
georeferenced elements into a complex network. However,
their methods associate a crime with the nearest node or
edge based on address geocoding, not having any relation
with graph measures. Moreover, all methods are superficially
introduced, not presenting any formal fundaments.
Shinode and Shinode [5] aim at
introducing a search-
window method to analyze urban crimes in street networks.
They represent a search window as a subarea that concentrates
a high number of crimes in small regions; besides that, the
crimes are used to identify clusters spatially and temporally.
The authors validate their methods through an empirical case
study. However, their criminal data derive from 911-calls made
in 1996; that is, they used a dataset that carries few details and
that is outdated, especially when one considers the conclusions
claimed by the authors. Such information implies a superficial
analysis of the crime behavior and the ways to prevent it.
Those previous works aim at identifying highly criminal
areas to predict future criminal events. They use several
properties of the data to map them into a node, an edge or a
combination of both. However, they use non-graph measures
to build a city scenario, which fails in characterizing the
real world. Our approach, on the other hand, benefits from
modeling the real-world space via a georeferenced complex
network; a better representation of the reality. It allows us to
merge two georeferenced grids, one describing crimes and the
other outlining city elements, which enables us to characterize
crimes and extract their patterns.
Crime Analysis. White et al. [6] represent criminal activities
via a georeferenced complex network, through which they
compare criminal demographics and identify criminal com-
munities. The demographic regions are created by clustering
the urban areas using socioeconomic borders, whereas the
crime network is formed by linking crime locations that are
close according to the Euclidean distance. To identify the
criminal communities, the authors employ a label propagation
technique. Their results show that
the crime network can
be constructed without requiring information about individual
crimes. However, their crime network does not take the urban
topology into account, so their comparison is based only on
socioeconomic information.
Rey et al. [7] employ spatiotemporal techniques to represent
and analyze urban crimes. Their approach provides a way
to quantify neighborhood criminality and is able to identify
patterns from the data. Moreover, they discuss spatial crime
analyses as a way to determine the influence of a crime on
its surroundings, analyzing an entire city and providing an
evaluation of its crimes. However, their work is based on
outdated data, derived from a police district in the period from
2005 to 2009. Besides, their methods rely on black-box GIS
technologies, used to summarize criminal areas by geocoding
each crime into a quarter-mile grid cell. Furthermore, they
analyze only city cells having residential units.
Other works include the proposals of Galbrun et al. [8],
who focus on crime mapping to estimate the probability of a
crime occurrence within a street segment; of Fitterer et al. [9],
who use a statistical model to predict crimes in the city of
Vancouver; and of Bogomolov et al. [10], who predict crime
hotspots in London by using mobile data. Our work differs
from theirs because (i) we consider crimes within a more
complete and up-to-date period; (ii) we map crimes directly,
i.e. there is no space summarization in the crime mapping
phase; and (iii) we benefit from complex networks, which are
a reliable toolset to design georeferenced data.
Considering real crime events and a real-world city, like
those presented in this section, we introduce ways to map and
analyze crimes, supported by criminal communities extracted
from complex networks, allowing outcomes far more detailed
and advanced than the former works. We not only show how to
map crimes into georeferenced complex networks but also how
to analyze their impact on the city, as well as the relationships
among different crime types. Mainly, we describe results from
various points of view, for multiple crime types, and based on
several interrelated metrics.
III. PROPOSED METHODOLOGY
This work aims at analyzing the impact of the urban
structure on city criminal events, providing insights to enhance
the city planning in highly criminal areas. To achieve that goal,
we propose a methodology with three phases: (i) Mapping
of Urban Crimes; (ii) Criminal Community Identification;
and (iii) Crime Analysis. This section describes such phases
according to an application example.
A. Background and Datasets
We refer to an urban street network as a directed georef-
erenced graph G = {V, E} composed of a set E of E
edges (street segments) and another set V of V nodes (streets
intersections). We refer to an edge e ∈ E as an ordered pair
(cid:104)i, j(cid:105), i ∈ V and j ∈ V , in which i is named source and j is
named target. Each node v ∈ V has coordinates lat and lon,
where lat denotes the node's latitude and lon the longitude. We
refer to a set C, C ∩ V = ∅, of crimes, each with coordinates
lat and lon within the area of the city. Each crime c has a
value that belongs to a domain of 39 crime types -- the most
common types are assault, theft, and minor crimes.
Graph Source. Our approach uses electronic cartographic
maps extracted from the OpenStreetMap (OSM)
[11] plat-
form. OSM provides maps representing spatial elements, e.g.
points, lines and polygons, as objects. Such objects, which are
abstractions from the real-world geographical space, are rep-
resented by a triple of attributes that uniquely identifies them
ij = R × cos−1( sin(li
dE
cos(li
at)sin(lj
at)cos(lj
at) +
at)cos((cid:52)lon
ij ) )
(1)
in their set, granting each object an identification number and
georeferenced coordinates. These objects allow to represent
OSM data as a georeferenced graph.
Crime Source. The crime dataset C comes from the San
Francisco OpenData (SFO) initiative 1, a central clearinghouse
for public information about the city of San Francisco -- CA,
USA. SFO provides data concerning public issues. We use a
set of events that corresponds to the period between Jan 1st,
2003 through May 5th, 2016. It has 1,916,911 instances of 39
crime types.
B. Mapping of Urban Crimes
The first phase of our methodology receives the crime
dataset as input, denoted as set C, where each element c ∈ C
corresponds to a crime event occurred in a specific latitude
and longitude. We proceed by mapping the crime events to
the nodes of the urban street network, represented as the graph
G = {V, E}. Given a crime c, its corresponding network node
is the closest node v, v ∈ V , as given by the Euclidean distance
calculated from the coordinates of c and v. This distance refers
to the real length between elements thought the Earth's surface,
which is derived from the law of cosines and defined as:
ij
at are latitudes, (cid:52)lon
at and lj
on and lj
is the difference between
where li
on, R is the earth's radius (6,371km), and
longitudes li
ij denotes the Euclidean distance (E) between points i and j.
dE
All values are represented in radians [12]. With respect to the
georreferenced network, dE
ij also represents an edge's weight,
which refers to the street length (in meters) that connects the
streets' intersections (i.e. nodes) i and j.
Next, we enrich the network representation with a new prop-
erty, making it reflect the geographical distribution of crimes.
The result is a new set of nodes V (cid:48), with each node v ∈ V (cid:48)
having a set with three properties prop(v) = {lat, lon,Cv},
where lat is the latitude, lon is the longitude, and Cv is the
quantity of crimes mapped to node v. Formally, the set of
crimes mapped to a node v, denoted as Cv, is defined as:
Cv = {c ∈ C dE
wc,∀ w ∈ V, v (cid:54)= w}
vc < dE
(2)
Note that this phase is performed separately for each kind
of crime. For example, if performing the mapping for crime
type assault, we get a version of the graph in which the
nodes have a property indicating the number of crimes that
are categorized as an assault. After processing each kind
of crime, we get a new property in the nodes. In a map-
ping perspective, each processing yields a new graph that
differs with respect to the properties of the nodes; formally,
G = {G0, G1, . . . , Gn}, where each G = {V (cid:48), E}, ∀ G ∈ G.
C. Criminal Community Identification
Intuitively, a community is understood as a group of nodes
that have a probability of connecting to each other that is
greater than the probability of connecting to nodes out of the
group [13]. Formally, consider G = {V (cid:48), E} as a city graph
and p(i, j) as the probability of nodes i and j to define a
connection; a community set is understood as a subset of nodes
C. A node i is considered a member of the community c ∈ C if
its probability of connecting to a node j ∈ c is greater than the
probability of connecting to a node j(cid:48) in another community
c(cid:48) ∈ C, as follows:
p(i, j) ≥ p(i, j(cid:48)) i (cid:54)∈ c, i (cid:54)∈ c(cid:48), ∀ j ∈ c, ∀ j(cid:48) ∈ c(cid:48), c (cid:54)= c(cid:48)
The elements of a community define a connected induced
subgraph G(c) in which each node is reachable from all other
nodes of the same community. Formally, G(c) = {V (cid:48)(cid:48), E(cid:48)},
V (cid:48)(cid:48) ⊆ V (cid:48) ⇐⇒ {∀ i ∈ c, ∀ j ∈ c dij < ∞}, where
dij : V (cid:48) × V (cid:48) → R is an arbitrary distance function which
returns the distance from any given pair of nodes.
Next, we proceed with the identification of communities.
To identify them concerning each crime type, we opted for
the tool Nerstrand 2, which carries out a fast multi-thread
detection. This tool, which yields results broadly accepted in
the literature, identifies communities without any information
about how many of them exist in the city. The input for this
phase is an undirected graph, whereas the output is a set
of number-labeled communities. The tool allows the user to
attach weights to the graph elements; for our application, the
edges' weights are the distance between two distinct nodes,
and nodes' properties are the number of mapped crimes.
Our dataset comprises 39 crime types, however, processing
and analyzing all of them would exceed the available space of
this work. Besides, our techniques and results are generalizable
for any number of crime types. For those reasons, we worked
only with the three most recurrent ones, which comprise
i.e.
almost 40% of our dataset and represent: (i) assault,
to inflict injury on a person intentionally; (ii) theft, i.e. to
take a property off a person's possession by stealth, with no
brute force; and (iii) minor crimes, such as offenses that do
not involve any loss or injury. They represent, respectively,
167,832 (8.76%), 392,338 (20.47%) and 204,451 (10.67%)
crimes. As previously explained, for each crime type, we
perform a mapping over the graph, each one with a different
number of crimes mapped into their nodes. Further on, we
discuss that each crime-mapped graph can produce a specific
criminality scenario; that is, when considering each crime type,
we get a different set of communities, each one characterized
by that kind of crime and by the topology of the network.
The next step, after identifying communities, is to filter
out
the less relevant ones for each type of crime. From
the perspective of criminality analysis, relevance here means
choosing the highly criminal communities. This approach
reduces the excessive number of identified communities, as
well as characterizes the most relevant ones. Accordingly,
we worked with the top five highly criminal communities,
which were identified by using two variables: (i) the highest
criminal average, i.e. the average number of crimes per node;
1 Available on "data.sfgov.org".
2 Available on "www-users.cs.umn.edu/ lasalle/nerstrand/".
(ii) community size threshold, which prioritizes communities
containing at
least a specified number of nodes. For the
purpose of this work, the threshold has been set to 100 nodes,
since communities with at least 100 nodes are spatially well
distributed, and can better represent the regions of the city.
This filtering process is depicted in Figure 1, which shows the
average criminality on the x-axis and the number of nodes
on the y-axis. In the figure, we describe the less relevant
communities as the mischaracterized ones, and we show where
the most relevant ones are, considering the previously defined
threshold.
Fig. 1: Filtering process used to identify the relevant commu-
nities while discarding the mischaracterized ones. We sort the
communities by their average criminality, and we eliminate
the spatially-small ones (having less than 100 nodes). The
highlighted area indicates the communities that are, at the
same time, highly populated and highly criminal.
D. Crime Analysis
In this last phase, with the communities already detected,
we proceed to analyze their interrelationship and interaction.
Therefore, here, we consider the communities in pairs of types;
for example, we analyze communities of assault and theft to
verify whether they occur together or if one type of crime
makes the other more intense. The idea is to obtain insights
about their geospatial dependency, pointing to regions that
share space of more than one crime type and, consequently,
are potentially more dangerous. To this end, this phase has
two stages. The first stage obtains the geospatial similarity
between pairs of crime types, which allows determining how
close are their communities and how related are their criminal
activity. The second stage computes the Homogeneity and
Completeness scores, which are useful
to understand the
crimes' behaviors by evaluating specific aspects of each com-
munity set. Combined, both stages lead to a more meaningful
analytical scenario, accomplishing the contributions mentioned
at the end of Section I.
Measuring the Similarity of Communities
A similarity value enables us to characterize the relationship
of distinct events based on their spatial behavior, more specifi-
cally their spatial distribution. Such similarity is based on their
distances and considers the possibility of a non-criminal region
containing crimes as well. This is because a non-criminal area
may have its behavior affected by a close criminal area.
We proceed with the computation of the similarity measure
by considering the previously detected top five highly criminal
communities. The similarity of crime events is based on
the distance between elements belonging to any two sets of
communities E and F, where each one represents a distinct
crime type. Note that, at this point, after communities were
detected based on the topology of the city, we proceed using
only the nodes and their positioning -- i.e. we do not consider
the edges nor the city topology for this processing. Such
additional
information is not necessary since we consider
only the position of highly criminal communities in order to
characterize the geospatial relationship of crime types. Hence,
we define the similarity SK(E, F) : C x C → [0, 1]; the closer
to 0, the more spatially apart are the sets of nodes:
(cid:80)∀u∈E (cid:80)∀v∈F dE
uv
E + F
SK(E, F) = 1 −
Such measure identifies, at
the similarity
between intra-and inter-community elements. The result 1
denotes that the elements within community E are highly close
to each other and to the elements of community F, intra-and
inter-similar respectively, and 0 denotes the opposite.
the same time,
(3)
Identifying the Behavior of Crimes
The characterization of communities identified in a city can
be complemented by the Homogeneity and Completeness
scores. They are derived from an entropy-based cluster evalua-
tion [14], which works by analyzing the presence and absence
of criminality in the network's communities. Such scores
quantify how intensely each crime type manifests across a
community set C. To this end, the Homogeneity score evalu-
ates the criminality in a community by identifying the criminal
distribution among their nodes. Further,
the Completeness
score is used to quantify how intrinsic is the criminality in
a community by measuring their distribution among all the
communities, both in terms of a specific crime type.
Homogeneity. Regarding the top-five criminal communities,
it is desired to know what are their predominant aspects.
For the purpose of achieving a better assessment of criminal
communities, the Homogeneity score is able to measure how
uniform, i.e. homogeneous, a community is. It is defined by
H(C) : C x C → [0, 1] as follows:
where V (cid:48) is the number of nodes in all the communities
of set C (the top five in our example) of a crime type, and
Q = {1, 0}, which, in our scenario, indicates the nodes with
and without crimes, respectively. We used C to denote the
set that contains all communities and Ci ∈ C to indicate a
single community. Finally, Cij, j ∈ Q, represents nodes in
community i in which crimes are present or absent, whereas
Ck, k ∈ Q, represents the same idea but among all commu-
(cid:16)Cij
(cid:80)Q
(cid:80)C
(cid:16)Ck
(cid:17)
(cid:80)Q
Cij
V (cid:48) × log2
Ck
V (cid:48) × log2
V (cid:48)
Ci
k=0
j=0
i=1
(cid:17)
(4)
H(C) = 1 −
10-210-11001011021030100200300400500600700Number of nodesAverage crimeAssaultMinor CrimesTheftThresholdCommunities withhigh criminal activityand high populationHighly criminalcommunityHighly populatedcommunityMischaracterizedcommunitiesnities. For instance, Ck, k = 0, represents all nodes in all
communities that have no crime, while Cij, i = 1, j = 1,
indicates the nodes from community 1 that have crime(s).
The Homogeneity score equals 0 when the presence and
absence of crimes are proportionally similar across all the
communities. Contrarily, the value 1 denotes that all commu-
nities in C have crimes in all their nodes or no crime at all.
It is noteworthy that the Homogeneity score solely is insuffi-
cient to provide the needed comprehension about the criminal
behavior in a city. This is because a single community can
have all its nodes characterizing either crime occurrences or no
crime at all, which, in turn, could yield the same Homogeneity
score. For this reason, we also employ the Completeness
score that, combined with the Homogeneity score, can better
describe the distribution of crimes across a city. By analyz-
ing both scores, we can effectively compare different areas,
regardless of their high or low criminality. Their purpose is
to identify the communities' behaviors, mainly their tendency
for high/low scores to a given crime type.
Completeness. If crimes do not concentrate in a community,
it is likely that there are multiple communities with crimi-
nal nodes spread across the city, demanding surveillance at
multiple criminal spots. Alternatively, if crimes concentrate,
they tend to be grouped within a single community, requiring
police patrols on specific regions. To determine if crimes are
more or less concentrated, we employ the Completeness score,
which is directly obtained from the whole community set. The
Completeness score equals 0 when the presence of crimes is
totally scattered, i.e. equally absent across all communities --
their occurrence is totally distributed. On the other hand, the
higher the value, the more concentrated are the criminal and
safe zones. This is defined in C(C) : C x C → [0, 1] as:
(cid:16)Cij
(cid:80)Q
(cid:80)C
(cid:17)
(cid:16)Ck
(cid:80)C
Cij
V (cid:48) × log2
i=1
Ck
V (cid:48) × log2
Cj
V (cid:48)
k=1
j=0
(cid:17)
C(C) = 1 −
(5)
Hence, if safe and criminal zones are totally apart, the Com-
pleteness score of a community set equals 1. Conversely, if
criminality has a proportionally equivalent participation in all
communities, the score is 0.
IV. RESULTS AND DISCUSSIONS
This section presents and discusses the results of the exper-
iments regarding the three phases of our methodology.
Influence of Crime Mapping. The first experiment aimed at
analyzing the impact of the urban crime mapping (first phase
of our methodology) on the criminal community identification
process. This process was carried out twice: once considering
the topological graph, i.e. the graph that considers only nodes
and edges, and once over the network after the urban crime
mapping, regarding the newly-included edges' weights (dis-
tances in meters) and nodes' weights (number of crimes). As
a result, we obtained the number of 134 communities from
the topological graph and, when considering the information
introduced by the crime mapping phase,
the numbers of
identified communities were: 210 for assault, 215 for theft
and 211 for minor crimes.
As a first result, we noticed the discrepancy between
the numbers of criminal communities for each graph. Such
difference is due to the presence/absence of crime-related
data derived from the crime mapping phase. The Nerstrand
algorithm considers the crime-related data (the nodes' and
edges' weights), ensuring that the nodes within each identified
community share similar characteristics. This behavior is not
the same when considering the topological graph. Since there
is no crime information attached to its nodes and edges,
the algorithm examines only the connections between nodes.
Therefore, considering only the network's topology, there is no
guarantee that the crimes will be optimally grouped among the
identified communities. These findings show that identifying
communities through a topological graph is an inaccurate way
to represent crime relationships in a city.
Communities' Design Aspects. The second experiment aimed
at comparing the results from the previous analysis by consid-
ering their design aspects. Table I presents the most highly
criminal communities obtained directly from the network's
topology and from the three graphs generated via the Crime
Mapping process. The table shows twelve communities sorted
by crime average, among which are the top five criminal ones.
TABLE I: Communities with the highest crime average, iden-
tified from: (i) topology, (ii) assaults, (iii) theft and (iv) minor
crimes. Column Avg denotes the crime average and # denotes
the number of nodes in each community.
Communities identified from:
Topology
Assault
Theft
Avg
1063.00
157.67
116.30
110.75
108.80
77.93
77.50
65.86
44.17
43.88
36.28
35.88
#
2
788
802
4
5
515
2
539
744
1129
635
518
Avg
362.00
230.59
55.26
47.44
41.00
34.69
34.06
29.53
27.42
22.14
15.52
14.20
#
2
17
316
226
2
87
149
238
142
248
281
54
Avg
4030.00
245.00
201.00
60.15
49.74
47.08
37.88
32.25
25.92
25.77
21.79
21.10
#
3
2
17
281
277
156
66
4
296
342
307
371
00
01
02
03
04
05
06
07
08
09
10
11
Minor Crimes
Avg
#
12
545.92
2
457.00
17
356.41
67
281.91
142
140.13
110.15
188
5
73.80
143
72.99
286
71.37
4
68.50
58.72
32
144
54.43
The table describes a higher crime average in communities
derived from topology only. Such higher average occurs be-
cause, in this context, there is a lower number of communities,
each one containing a higher number of criminal nodes.
As shown in the table, the number of crimes per community
still stands out when comparing the graph from topology and
the "complete" graphs -- i.e. the graphs generated by the
Crime Mapping process. This is because the complete graph
used no attribute that characterizes a crime in the community
identification process, so there is no way to assure that they
are related just by being in the same community. Therefore,
hereafter we discuss only the graphs with crime-related data.
Regarding such graphs, Table I shows a significant number
of communities with few nodes. This is evidence that the
Fig. 2: The most highly criminal region from San Francisco -- CA, USA, identified by evaluating the crime density in the city
from 01/01/2003 to 05/18/2016. Each colored area represents the occurrence of a crime type or the intersection of a crime
type with another type of crime. In the legend, each CM (from 1 to 3) denotes a type -- assault, theft and minor crimes.
crimes are not evenly distributed in the network. Therefore, if
someone eventually attempted to eradicate or prevent crimes in
the entire city based on characteristics of a local region, such
attempt would fail because the crimes are not concentrated in
a single criminal community.
San Francisco's Crime Neighborhood. To allow analyzing
a group of communities containing a significant number of
crimes, we have selected the region from the city of San
Francisco that comprises the highest crime indices. This region
contains the five communities, as mentioned earlier, of each
crime type, which are among the twelve communities shown
in Table I. The top five communities of each type also meet
the requirement regarding the number of nodes, previously
determined as a threshold of 100 nodes (see Section III-D).
Specifically, considering the table, the top five communities for
assault are in lines 2, 3, 6, 7 and 8; the top five for theft are
in lines 3, 4, 5, 8 and 9; and the top five for minor-crimes are
in lines 4, 5, 7, 8 and 11. Figure 2 depicts the entire selected
area of San Francisco, as well as highlights each community
(and each geospatial intersection of communities).
To quantify the relationship between communities in the city
space, we used Equation 3 to obtain the similarity between
communities. Through this measure, we compared each pair
of crime types, computing the similarity between community
sets E of one type and community sets F of another type. By
doing so, we achieved a similarity value SK(E, F) of 0.66 for
assault vs. theft, 0.65 for assault vs. minor crimes and 0.58
for theft vs. minor crimes. Such results suggest that there is a
relationship between crimes of different types, especially when
comparing assault vs. theft and assault vs. minor crimes, since
the values 0.65 and 0.66 can be considered significant enough
if one ponders over what these numbers represent -- that the
majority of the area of these two communities might be more
dangerous due to the occurrence of more than one crime type.
More specifically: (i) it is very likely that criminal activities
occur at intersections of multiple crime types, which we call
crime hubs -- regions that attract or disseminate criminality;
(ii) those crimes are spatially related, so it is possible that they
have been caused by the same people or gang; (iii) places,
where more than one crime type occurs, are high-priority
regions for public safety improvement.
Communities' Intrinsic Criminality. The previous section
discussed the geospatial disposition of different crime types
with respect to intersections between criminal regions. This
section, in turn, brings results concerning the Homogeneity
and Completeness scores for the communities in the most
highly criminal area of San Francisco. This experiment aimed
at measuring how intrinsic was the criminality within the
neighborhoods of San Francisco during the studied period.
To understand this measure, recall that the number of crimes
of some nodes is zero. For the assault type, there are 1,071
nodes, of which 132 (12.33%) contain at least one crime and
939 (87.68%) contain none. For theft, there are 903 nodes, of
which 133 (14.73%) are criminal and 770 (85.27%) are not
criminal. For minor crimes, there are 1,352 nodes, of which
177 (13.09%) present crimes and 1,175 (86.91%) do not.
These values and percentages refer to the entire community
set for each crime type.
The presence and absence of crimes were considered to
calculate the scores presented in Table II, which shows that
assault has the lowest values for both measures. Regarding
Homogeneity, the value indicates that this crime type presents
a reduced concentration of criminal nodes within each com-
munity. This is straightly inferable because, besides the low
Homogeneity value indicating an inexpressive occurrence of
crimes, the actual number of crimes is very low; a pattern that
holds for other types of crime as well.
Since the value for Completeness is also the closest to
0, we can reliably assume the occurrence of crimes to be
scattered across all the assault communities. The theft type has
values close to 0 as well, but the highest ones when compared
to the values of other crime types. The greater difference
Highly Criminal AreaSan Francisco MapGraph CommunitiesCM1 - AssaultCM2 - TheftCM3 - Minor CrimesCM1 ∩ CM2CM1 ∩ CM3CM2 ∩ CM3CM1 ∩ CM2 ∩ CM3LegendNinterventions were made by the governors were effective to
prevent them, using time windows and comparing the results
with socioeconomic data.
Acknowledgments. We are grateful to CNPq (National Coun-
sel of Technological and Scientific Development) by the sup-
port (grants 9254-601/M, 444985/2014-0, and 147098/2016-
5), to FAPESP (Sao Paulo Research Foundation) by the assis-
tance (grant 2015/15392-7, 2016/02557-0, 2016/17330-1), to
Capes (Brazilian Federal Agency for Support and Evaluation
of Graduate Education) and to the Databases and Images
Group (GBdI) by the resources ceded to this research.
REFERENCES
[1] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D. U. Hwang,
"Complex networks: Structure and dynamics," Phys. Rep., vol. 424, no.
4-5, pp. 175 -- 308, feb 2006.
[2] S. Porta, E. Strano, V. Iacoviello, R. Messora, V. Latora, A. Cardillo,
F. Wang, and S. Scellato, "Street centrality and densities of retail and
services in Bologna, Italy," Environ. Plan. B Plan. Des., vol. 36, no. 3,
pp. 450 -- 465, 2009.
[3] R. Deryol, P. Wilcox, M. Logan, and J. Wooldredge, "Crime Places
in Context: An Illustration of the Multilevel Nature of Hot Spot
Development," J. Quant. Criminol., vol. 32, no. 2, pp. 305 -- 325, jun
2016.
[4] V. Spicer, J. Song, P. Brantingham, A. Park, and M. A. Andresen, "Street
profile analysis: A new method for mapping crime on major roadways,"
Appl. Geogr., vol. 69, pp. 65 -- 74, apr 2016.
[5] S. Shiode and N. Shiode, "Network-based space-time search-window
technique for hotspot detection of street-level crime incidents," Int. J.
Geogr. Inf. Sci., vol. 27, no. 5, pp. 866 -- 882, may 2013.
[6] H. Serrano, M. Oliveira, and R. Menezes, "The spatial structure of crime
in urban environments," Lect. Notes Comput. Sci. (including Subser.
Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8852, pp. 102 --
111, 2015.
[7] S. J. Rey, E. A. Mack, and J. Koschinsky, "Exploratory Space-Time
Analysis of Burglary Patterns," J. Quant. Criminol., vol. 28, no. 3, pp.
509 -- 531, sep 2012.
[8] E. Galbrun, K. Pelechrinis, and E. Terzi, "Urban navigation beyond
shortest route: The case of safe paths," Inf. Syst., vol. 57, pp. 160 -- 171,
apr 2016.
[9] J. Fitterer, T. A. Nelson, and F. Nathoo, "Predictive crime mapping,"
Police Pract. Res., vol. 16, no. 2, pp. 121 -- 135, 2015.
[10] A. Bogomolov, B. Lepri, J. Staiano, N. Oliver, F. Pianesi, and A. Pent-
land, "Once Upon a Crime," Proc. 16th Int. Conf. Multimodal Interact.
- ICMI '14, vol. 1, pp. 427 -- 434, 2014.
[11] M. Haklay and P. Weber, "OpenStreet map: User-generated street maps,"
IEEE Pervasive Comput., vol. 7, no. 4, pp. 12 -- 18, oct 2008.
[12] T. Konstantopoulos, Introduction to projective geometry. Dover Publi-
cations, 2012.
[13] E. Estrada, M. Fox, D. J. Higham, and G. L. Oppo, Network science:
Complexity in nature and technology. Cambridge university press, 2010.
[14] A. Rosenberg and J. Hirschberg, "V-measure: A conditional entropy-
based external cluster evaluation measure," Proc. Jt. Conf. Empir.
Methods Nat. Lang. Process. Comput. Nat. Lang., vol. 1, no. June, pp.
410 -- 420, 2007.
TABLE II: The Homogeneity and Completeness scores used
to evaluate the quality of each community set and to quantify
how intrinsic is the criminality within them.
Crime type
Theft
Minor Crimes
Assault
Homogeneity
0.015588
0.014014
0.013557
Completeness
0.004159
0.003441
0.003234
corresponded to the Completeness score, whose value suggests
a geospatial crime concentration more elevated. Regarding
Completeness (see Section III-D), such higher concentration
tends to occur in a smaller set of communities rather than
across all of them, which is more likely for the assault type.
A higher crime concentration means that a particular crime
type is less likely to intersect with another crime type. This is
because, in such a case, the criminal nodes would occupy a
smaller area in the city space. Furthermore, such a crime type
could be considered easier to prevent, since its occurrences
would be in a more compact area of the city. On the other
hand, a lower concentration of a crime type means that it exerts
a stronger influence on the network as a whole, being easier to
propagate to remote areas and demanding global approaches
both to eradicate it and to prevent it.
V. CONCLUSION
In this paper, we propose a threefold methodology for
identifying and analyzing criminal spatial patterns in urban
street networks. Our methodology is based on the hypothesis
that by employing network mapping techniques, allied to
distance-based properties of graphs, it is possible to identify
and trace the relationship between areas that are highly
criminal within a city. To demonstrate our methodology, we
analyzed criminal communities from real crime data rep-
resenting assaults,
thefts and minor crimes in the city of
San Francisco -- CA, USA. The methodology comprises the
following phases: (i) Mapping of Urban Crimes, (ii) Criminal
Community Identification and (iii) Crime Analysis. The latter
employs the well-established Homogeneity and Completeness
scores to analyze the identified criminal communities more
deeply. Our main achievement confirm the hypothesis of our
work, allowing us to state that different crime types share
common spaces, characterizing areas that lack strategies for
crime prevention, and that particular crime types are sparser
than others in the city space.
The highlighted contributions are: (i) the use of a complex
network to represent the real-world space, enabling a complete
analysis of the city; (ii) independence from socioeconomic
information, allowing the analyses of crimes based on solely
their spatial disposition; (iii) the assessment of the impact of
criminal regions, considering the similarity between distinct
crime types and their Homogeneity and Completeness scores.
Finally, as future work, we intend to continue expanding
our methodology developing tools to analyze crimes and their
types considering a temporal perspective. Our aim is to provide
insights about the criminal behaviors in a city, allowing to
determine how a crime spreads throughout the city and when
|
1502.02401 | 1 | 1502 | 2015-02-09T09:04:11 | Random Preferential Attachment Hypergraphs | [
"cs.SI",
"physics.soc-ph"
] | The random graph model has recently been extended to a random preferential attachment graph model, in order to enable the study of general asymptotic properties in network types that are better represented by the preferential attachment evolution model than by the ordinary (uniform) evolution lodel. Analogously, this paper extends the random {\em hypergraph} model to a random {\em preferential attachment hypergraph} model. We then analyze the degree distribution of random preferential attachment hypergraphs and show that they possess heavy tail degree distribution properties similar to those of random preferential attachment graphs. However, our results show that the exponent of the degree distribution is sensitive to whether one considers the structure as a hypergraph or as a graph. | cs.SI | cs | Random Preferential Attachment Hypergraphs∗
Chen Avin †§
Zvi Lotker †
David Peleg ‡
November 11, 2018
Abstract
The random graph model has recently been extended to a random preferential attachment
graph model, in order to enable the study of general asymptotic properties in network types
that are better represented by the preferential attachment evolution model than by the ordinary
(uniform) evolution lodel. Analogously, this paper extends the random hypergraph model to a
random preferential attachment hypergraph model. We then analyze the degree distribution
of random preferential attachment hypergraphs and show that they possess heavy tail degree
distribution properties similar to those of random preferential attachment graphs. However, our
results show that the exponent of the degree distribution is sensitive to whether one considers
the structure as a hypergraph or as a graph.
Keywords: Random Hypergraphs, Preferential attachment, Social Networks, Degree Distri-
bution.
5
1
0
2
b
e
F
9
]
I
S
.
s
c
[
1
v
1
0
4
2
0
.
2
0
5
1
:
v
i
X
r
a
†Department of Communication Systems Engineering, Ben Gurion University of the Negev, Beer-Sheva, Israel.
E-mail: {avin,zvilo}@cse.bgu.ac.il.
§Part of this work was done while the author was a long term visitor at ICERM, Brown University
‡Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Rehovot, Israel.
E-mail: [email protected]. Supported in part by the I-CORE program of the Israel PBC and ISF (grant
4/11).
∗Supported in part by the Israel Science Foundation (grant 1549/13).
1
Introduction
Random structures have proved to be an extremely useful concept in many disciplines, including
mathematics, physics, economics and communication systems. Examining the typical behavior of
random instances of a structure allows us to understand its fundamental properties. The founda-
tions of random graph theory were first laid in a seminal paper by Erdos and R´enyi in the late
1950's [7]. Subsequently, several alternative models for random structures, often suitable for other
applications, were suggested. One of the most important alternative models is the preferential
attachment model [2], which was found particularly suitable for describing a variety of phenomena
in nature, such as the "rich get richer" phenomena, which cannot be adequately simulated by the
original Erdos-R´enyi model. It has been shown that the preferential attachment model captures
some universal properties of real world social networks and complex systems, like heavy tail degree
distribution and the "small world" phenomenon [12].
One limitation of graphs is that they only capture dyadic (or binary) relations. In real life, how-
ever, many natural, physical and social phenomena involve k-ry relations for k > 2, and therefore
can be more accurately represented by hypergraphs than by graphs. For example, collaborations
among researchers, as manifested through joint coauthorships of scientific papers, may be bet-
ter represented by hyperedges and not edges. Figure 1(a) depicts the hypergraph representation
for coauthorship relations on four papers: paper 1 authored by {a, b, e, f}, paper 2 authored by
{a, c, d, g}, paper 3 authored by {b, c, d} and paper 4 authored by {e, f}. Likewise, wireless com-
munication networks [1] or social relations captured by photos that appear in Facebook and other
social media also form hyperedges [14]. Affiliation models [10, 13], which are a popular model for
social networks, are commonly interpreted as bipartite graphs, where in fact they may sometimes
be represented more conveniently as hypergraphs. Figure 1(b) presents the bipartite graph repre-
sentation of the hypergraph H of Figure 1(a). Sometimes, one can only access the observed graph
G(H) of the original hypergraph H, that is, only the pairwise relation between players is available
(see Figure 1(c)). In some cases this structure may be sufficient for the application at hand, but in
many other cases the hypergraph structure is more accurate and informative/
The study of hypergraphs, and in particular random hypergraph models, has its roots in a 1976
paper by Erdos and Bollobas [3], which offers a model analogous to the Erdos-R´enyi random graph
model [7]. Recently, several interesting properties regarding the evolution of random hypergraphs
in this model were studied in [5, 6, 8].
The current paper is motivated by the observation that, just as in the random graph case, the
random hypergraph model is not suitable for studying social networks. Our first contribution is in
extending the concept of random preferential attachment graphs to random preferential attachment
hypergraphs. We believe the this natural model will turn out to be useful in the future study of
social networks and other complex systems.
The main technical contribution is that we analyze the degree distribution of random preferen-
tial attachment hypergraphs and show that they possess heavy tail degree distribution properties,
similar to those of random preferential attachment graphs. However, our results show that the ex-
ponent of the degree distribution is sensitive to whether one considers the structure as a hypergraph
or as a graph.
As a reference point, we consider the random preferential attachment graph model of Chung
and Lu [4]. In that model, starting from an initial graph G0, at any time step there occurs an
event of one of two possible types: (1) a vertex-arrival event, occuring with probability p, where a
new vertex joins the network and selects its neighbor among the existing vertices via preferential
2
(a)
(b)
(c)
Figure 1:
of H. (c) The observed graph G(H).
(a) A hypergraph H with 7 vertices and 4 edges. (b) A bipartite graph representation
attachment, or (2) an edge-arrival event, occuring with probability 1−p, where a new edge joins the
network and selects its two endpoints from among the existing vertices via preferential attachment.
It is shown in [4] that the degree distribution of the random preferential attachment graph follows
a power law, i.e., the probability of a random vertex to be of degree k is proportional to k−β, with
βG = 2 + p
2−p . A similar result can be shown in a setting where, at each time step, d edges join the
graph instead of only one (in either a vertex event or an edge event)[12]. This result holds even if
at each step a random number of edges join the network, so long as the expected number of new
edges is d and the variance is bounded.
The model proposed here extends Chung and Lu's [4] model to support hypergrpahs. That is,
the process starts with an initial hypergrpah, and at each time step a random hyperedge joins the
network. With probabilty p this new random hyperedge includes a new vertex, and with probabilty
1 − p it does not. Our model allows the hyperedge sizes to be random (with some restrictions) and
the members of each edge are selected randomly according to preferential attachment.
We show that the degree distribution of the resulting hypergraph (as well as the observed
µ−p , where µ is the expected size of
graph) follows a power law, but with an exponent βH = 2 + p
an hyperedge.
Our results indicate that one should be careful when studying an observed graph of a general
k-ry relation. In particular, it makes a difference if the observed graph was generated by a graph
or by a hypergraph evolution mechanism, since the two generate observed graphs with different
degree distributions.
In the next sections we describe in more detail the preferential attachment model of a hyper-
graph, and then analyze the resulting degree distribution.
2 Preliminaries
A hypergraph H is an ordered pair (V,E), where V is a set of n vertices and E ⊆(cid:83)n
Given a set V and a natural k > 1, let V (k) be the set of all unordered vectors (or multisets) of
k elements from V . A finite undirected graph G is an ordered pair (V, E) where V is a set of n
vertices and E ⊆ V (2) is the set of graph edges (unordered pairs from V , including self loops).
i=2 V (i) is a
set of hyperedges connecting the vertices (including self loops). The rank r(H) of a hypergraph H
is the maximum cardinality of any of the hyperedges in the hypergraph. When all hyperedges have
the same cardinality k, the hypergraph is said to be k-uniform. A graph is thus simply a 2-uniform
3
abcdefg1234c2dga1efb34cdbgaefhypergraph. The degree of a hyperedge e ∈ E is defined to be δ(e) = e. The set of all hyperedges
that contain the vertex v is denoted E(v) = {e ∈ E v ∈ e}. The degree d(v) of a vertex v is the
number of hyperedges in E(v), i.e., d(v) = E(v). H is d-regular if every vertex has degree d.
In the classical preferential attachment graph model [2], the evolution process starts with an
arbitrary finite initial network G0, which is usually set to a single vertex with a self loop. Then this
initial network evolves in time, with Gt denoting the network after time step t. In every time step
t a new vertex v enters the network. On arrival, the vertex v attaches itself to an existing vertex
u chosen at random with probability proportional to u's degree at time t, i.e.,
dt(u)
,
w∈Gt
dt(w)
P [u is chosen] =
where dt(x) is the degree of vertex x at time t.
(cid:80)
3 The nonuniform preferential attachment hypergraph model
Similar to the classical preferential attachment graph model [4], the evolution of the hypergraph
occurs along a discrete time axis, with one event occurring at each time step. We consider two types
of possible events on the hypergraph at time t: (1) a vertex arrival event, which involves adding a
new vertex along with a new hyperedge, and a hyperedge arrival event, where a new hyperedge is
added.
We consider a nonuniform, random hypergraph where self loops (i.e., multiple appearance of a
vertex in a hyperedge) are allowed. We consider self loops as contributing 1 to the vertex degree.
Similar to [4], our preferential attachment model, H(H0, p, Y ), has three parameters:
• A probability 0 < p ≤ 1 for vertex arrival events.
• An initial hypergraph H0 given at time 0.
• A sequence of random independent integer variables Y = (Y0, Y1, Y2, . . . ), for Yi ≥ 2, which
determine the cardinality of the new hyperedge arriving at time t.
The process by which the random hypergraph H(H0, p, Y ) grows in time is as follows.
• We start with the initial hypergraph H0 at time 0.
• At time t > 0, the graph Ht is formed from Ht−1 in the following way:
-- Randomly draw a bit b with probability p for b = 0.
-- If b = 0, then add a new vertex u to V , select Yt − 1 vertices from Ht−1 (possibly
with repetitions) independently in proportion to their degrees in Ht−1, and form a new
hyperedge e that includes u and the Yt − 1 selected vertices∗.
-- Else, select Yt vertices from Ht−1 (possibly with repetitions) independently in proportion
to their degrees in Ht−1, and form a new hyperedge e that includes the Yt selected
vertices.
Hereafter, we consider an initial H0 consisting of a single hyperedge of cardinality Y0 over a
single vertex (recall that self-loops are considered as contributing 1 to the vertex degree).
∗note that as the hypergraph gets larger, the probability of adding a self-loop is vanishing.
4
4 Degree Distribution Analysis
To ensure convergence of the degree distribution we first need to set some conditions on the dis-
tribution of the hyperedge cardinalities. These are somewhat mild conditions that seems to agree
with real data (see Fig. 4 in Section 5). Let Yt be independent (not necessarily identical) random
3 †. Under
variables with constant expectation E[Yt] = µ and bounded support s.t. 2 < Yt < t
these conditions we can show the following.
Theorem 4.1. The degree distribution of a hypergraph H(H0, p, Y ) where E[Yt] = µ follows a
power law with β = 2 + p/(µ − p).
1
Proof. We start with properties of Yt. Let St =(cid:80)t
Lemma 4.2. P(cid:104)St − E[St]) ≥ t
of St from its expected value can be bounded.
2 log t
(cid:105)
√
2
3
< O(1/t4).
1 Yt, so E[St] = µt and St < t
4
3 . The deviation
Proof. By Hoeffding's inequality [9], assuming the random variable Yi satisfies P[Yi ∈ [ai, bi]] = 1
for some reals ai and bi,
P [St − E[St]) ≥ x] ≤ 2 exp
(cid:33)
(cid:32)
(cid:80)t
i=1(bi − ai)2
3 and(cid:80)t
i=1(bi − ai)2 < t
2x2
−
.
2
Taking x = t
√
2
3
2 log t and noting that (bi − ai)2 < t
4
3 yields the result.
To bound the degree distribution of a non-uniform random hypergraph we closely follow Chung
and Lu's analysis on preferential attachment graphs [4]. Let mk,t denote the number of vertices of
degree k at time t. Note that m1,0 = 0 and m0,t = 0. We derive the recurrence formula for the
expected value E[mk,t]. The main observation here is that a vertex has degree k at time t if either
it had degree k at time t− 1 and was not selected into a hyperedge at time t, or it had degree k − 1
at time t − 1 and was selected into a hyperedge at time t. Letting Ft be the σ-algebra associated
with the probability space at time t, we have for any t > 0 and k > 0:
E[mk,tFt−1] = mk,t−1
(cid:32)
(cid:34)(cid:18)
pEYt
(cid:32)
pEYt
(cid:34)(cid:32)
+mk−1,t−1
+ (1 − p)EYt
(cid:34)(cid:18)
(cid:19)Yt−1(cid:35)
1 − k
(cid:34)(cid:18)
St−1
1 − (1 − k − 1
(cid:18)
1 − k − 1
St
1 −
St
+ (1 − p)EYt
(cid:35)
(cid:19)Yt−1
(cid:19)Yt(cid:33)(cid:35)(cid:33)
)
,
(cid:19)Yt(cid:35)(cid:33)
1 − k
St−1
†The exponent 1
3 is chosen somewhat arbitrarily; the result can be extended to any constant 0 ≤ α < 1
2 .
5
hence
E[mk,tFt−1] = mk,t−1
(cid:32)
p − EYt
St
+1 − p − EYt
(cid:32)
St
(cid:21)
− O
(cid:20) (Yt − 1)kp
(cid:32)
(cid:20) (1 − p)Ytk
(cid:21)
(cid:20) (Yt − 1)p(k − 1)
(cid:21)
(cid:20) (1 − p)Yt(k − 1)
(cid:18) k2
St
St
+EYt
EYt
+ O
S2
t
+mk−1,t−1
(cid:19)(cid:19)
(cid:32)
+mk−1,t−1
(cid:18)
1 − (µ − p)k
(cid:32)
St
or
E[mk,tFt−1] = mk,t−1
Using the bound on St we can find the expectation E[mk,t].
E[mk,t] = (1 − 1/t4)
E[mk,t−1]
1 −
+E[mk−1,t−1]
= E[mk,t−1]
1 −
(µ − p)k
√
2
3
+ O
(cid:32)
µt ± t
(µ − p)(k − 1)
√
µt ± t
2 log t
(µ − p)k
2
3
√
µt ± t
2
3
(cid:32)
2 log t
(µ − p)(k − 1)
µt ± t
2 log t
√
2
3
+ O
(cid:18)
(cid:32)
(cid:32)
For t > 0 and the special case of k = 1 we have
E[m1,tFt] = m1,t−1
1 − (µ − p)k
St
+ O(
(cid:19)2(cid:35)(cid:33)(cid:33)
(cid:19)2(cid:35)(cid:33)(cid:33)
(cid:18) (k − 1)2
S2
t
(cid:19)(cid:19)
.
(cid:34)(cid:18) Ytkp
(cid:32)
(cid:32)
EYt
St
(cid:19)2(cid:35)(cid:33)
(cid:34)(cid:18) (1 − p)Ytk
(cid:34)(cid:18) Ytpk
(cid:19)2(cid:35)(cid:33)
(cid:34)(cid:18) (1 − p)k
St
EYt
− O
− O
(cid:21)
St
+ O
(cid:19)(cid:33)
1
t4 · t4/3
− O
St
St
EYt
EYt
(cid:32)
(cid:18) (µ − p)(k − 1)
(cid:18) k2
(cid:19)(cid:33)(cid:33)
(cid:18) k2
(cid:19)(cid:33)
(cid:18) k2
(cid:19)(cid:33)
(cid:18) k2
(cid:19)
2 log t
+ O
t2
t2
t2
t2
+
k2
S2
t
)
(cid:33)
+ p ,
+ p + O(1/t2) .
+E[mk−1,t−1]
+ O
+ O(1/t2) .
thus
E[m1,t] = E[m1,t−1]
1 −
(µ − p)k
√
µt ± t
2
3
2 log t
+ O(
k2
t2 )
We use the following lemma of [4].
[4] Let (at), (bt), (ct) be three sequences such that at+1 =(cid:0)1 − bt
Lemma 4.3.
b > 0 and limt→∞ ct = c. Then limt→∞(at/t) exists and equals c/(1 + b).
t
(cid:1) at +ct, limt→∞ bt =
We show by induction that limt→∞ E[mk,t]/t exists and has a limit Mk for each k. For k = 1,
apply Lemma 4.3 with
bt =
µ ± t
µ − p
√
2
3
2 log t/t
+ O(k2/t)
and ct = p + O(1/t2)
6
lim
t→∞ bt =
µ − p
µ
and
lim
t→∞ ct = p,
M1 = lim
t→∞
E[m1,t]
t
=
µp
2µ − p
We now assume that limt→∞E[mk−1,t]/t exists and apply Lemma 4.3 again with
bt =
(cid:32)
(µ − p)k
√
µ ± t
2
3
2 log t/t
(µ − p)(k − 1)
µ ± t
2 log t/t
√
2
3
+ O
+ O
ct =
E[mk−1,t−1]
t
.
(cid:19)
(cid:19)(cid:33)
(cid:18) k2
(cid:18) k2
t
t
(cid:18) 1
(cid:19)
t2
.
+ O
and hence
to get
and
Then
(µ − p)k
t→∞ bt = b =
lim
µ
and
t→∞ ct = c = Mk−1(µ − p)(k − 1)/µ ,
lim
and by Lemma 4.3 we get that limt→∞E[mk,t]/t exists and satisfies
Mk = Mk−1
(µ − p)(k − 1)
µ(1 + k(µ − p)/µ)
= Mk−1
(k − 1)
k + µ
µ−p
.
(1)
Recall that a power law distribution has the property that Mk ∝ k−β for large k.
Now if Mk ∝ k−β, then
(cid:18)
(cid:19)β
Mk
Mk−1
=
k−β
(k − 1)−β =
1 − 1
k
= 1 − β
k
+ O
(cid:19)
(cid:18) 1
(cid:18) 1
k2
+ O
k2
.
(cid:19)
,
By Eq. (1),
Mk
Mk−1
=
k − 1
k + µ
µ−p
= 1 − 1 + µ
µ−p
k + µ
µ−p
= 1 − 1 + µ
µ−p
k
so the exponent β of the power law satisfies
β = 1 +
µ
µ − p
= 2 +
p
µ − p
.
A special case of H(H0, p, Yt) is when Yt is the constant function d and the hypergraph becomes
a d-uniform hypergraph denoted as H(H0, p, d).
Corollary 4.4. The degree distribution of a d-uniform hypergraph H(H0, p, d) follows a power law
with β = 2 + p/(d − p).
Figure 2 illustrates the difference in exponents β between preferential attachment graphs (i.e.,
2-uniform hypergraphs) and 3-uniform hypergraphs as a function of p.
In many cases one can only observe the graph G[H] that results of the underlying hypergrph H.
That is, the set of vertices of G(H) is identical to the set of vertices of H and for every hyperedge
e ∈ H we create edges in G(H) to form a clique between all the vertices in e. Now we can prove
the following.
7
Claim 4.5. The degree distribution of the observed graph G(H(H0, p, d)) that results from a d-
uniform hypergraph follows a power law with β = 2 + p/(d − p).
Figure 2: The exponent β of a preferential attachment graph and a 3-uniform hypergraph as a
function of p (the probability of an edge arrival event). In graphs it is between 2 and 3, whereas in
3-hypergraphs it is between 2 and 2.5.
Note that the expected degree of vertices in G(H) in this case is d(d − 1)/2.
Interestingly,
if we generate a new graph G(cid:48) with expected degree d(d − 1)/2 according to the classical graph
preferential attachment model, then its degree distribution will be β(cid:48) = 2 + p/(2 − p). Hence the
observed degree distribution of G(H) and G(cid:48), β and β(cid:48) respectively, will be different. On the other
hand, it we generate G(cid:48) (using the classical preferential attachment model) so that it agrees with the
degree distribution of G, then the average degree will be different. This observation is supported
by simulation results depicted in Figure 3.
This discussion seems to indicate that, in some sense, "the blanket (i.e., of the model) is too
short" and one should be careful in deciding what is the right model that captures the observed
degree distribution, and in particular, if the generative model is of a hypergraph or the classical
graph model.
5 Example
To test the above observations empirically, we studied a coauthorship hypergraph of researchers
in computer science, extracted from DBLP [11], a dataset recording most of the publications in
computer science. This hypergraph consists of hundreds of thousands of vertices (representing
authors) and hyperedges (representing papers). Figure 4 shows the degree distribution of hyperedge
sizes in DBLP for hyperedges sizes at least 3. The hyperedge size distribution closely fits a power
law degree distribution with exponent β = 4.66. This means that the hyperedge size is (with high
probabilty) smaller than m1/3, where m is the number of papers (hyperedges). For the example of
8
H(cid:42),p,3:Β(cid:61)2(cid:43)p3(cid:45)pPAgraph:Β(cid:61)2(cid:43)p2(cid:45)p0.00.20.40.60.81.02.02.22.42.62.83.0pΒFigure 3: Example of the cumulative degree distribution of three networks with n = 10, 000: (1)
A graph G(H(∗, 1, 3)) derived from a 3-uniform hypergraph H(∗, 1, 3), (2) A graph G(H(∗, 1
2 , 3))
derived from a 3-uniform hypergraph H(∗, 1
2 , 3), and (3) A preferential attachment graph with
average degree d(d − 1)/2 = 3. Graphs derived from hypergraphs have lower exponent, also as a
function of p.
DBLP, where the number of papers is m = 2420879, the number of authors on a paper (i.e., the
hyper-edge size) will be with high probability below 134.
Acknowledgements
The authors thank Eli Upfal for helpful discussions about the core ideas of the paper.
9
GH(cid:42),1,3GH(cid:42),12,3PAGraphp(cid:61)1,(cid:60)deg(cid:62)(cid:61)3Β(cid:61)2.43Β(cid:61)2.24Β(cid:61)2.91110100100010(cid:45)40.0010.010.11NodedegreeProbabiltyFigure 4: The degree distribution of hyperedge sizes in DBLP for hyperedge sizes at least 3. The
distribution closely fits a power law degree distribution with exponent β = 4.66.
10
EdgesizefrequencyΒ(cid:61)4.66097510205010010(cid:45)710(cid:45)610(cid:45)510(cid:45)40.0010.010.1EdgeSizenumberofauthorsProbabilityReferences
[1] Avin, C., Lando, Y., and Lotker, Z. Radio cover time in hyper-graphs. Ad Hoc Networks
12 (2014), 278 -- 290.
[2] Barab´asi, A.-L., and Albert, R. Emergence of scaling in random networks. Science 286,
5439 (1999), 509 -- 512.
[3] Bollob´as, B., and Erdos, P. Cliques in random graphs. In Mathematical Proc. Cambridge
Philosophical Soc. (1976), vol. 80, Cambridge Univ Press, pp. 419 -- 427.
[4] Chung, F. R. K., and Lu, L. Complex graphs and networks. No. 107. AMS, 2006.
[5] Cooper, C., Frieze, A., Molloy, M., and Reed, B. Perfect matchings in random r-
regular, s-uniform hypergraphs. Combinatorics, Probability and Computing 5 (1996), 1 -- 14.
[6] Ellis, D., and Linial, N. On regular hypergraphs of high girth.
arXiv preprint
arXiv:1302.5090 (2013).
[7] Erdos, P., and R´enyi, A. On the evolution of random graphs. Publ. Math. Inst. Hungar.
Acad. Sci 5 (1960), 17 -- 61.
[8] Ghoshal, G., Zlati´c, V., Caldarelli, G., and Newman, M. Random hypergraphs and
their applications. Physical Review E 79, 6 (2009), 066118.
[9] Hoeffding, W. Probability inequalities for sums of bounded random variables. J. Amer.
Statistical Assoc. 58, 301 (03 1963), 13 -- 30.
[10] Lattanzi, S., and Sivakumar, D. Affiliation networks. In Proc. 41st ACM Symp. on Theory
of computing (2009), ACM, pp. 427 -- 434.
[11] Ley, M. Dblp: some lessons learned. Proc. VLDB Endowment 2 (2009).
[12] Newman, M. Networks: an Introduction. Oxford University Press, 2010.
[13] Newman, M. E., Watts, D. J., and Strogatz, S. H. Random graph models of social
networks. Proc. Nat. Acad. Sci. 99, suppl 1 (2002), 2566 -- 2572.
[14] Zhang, Z.-K., and Liu, C. A hypergraph model of social tagging networks. J. Statistical
Mechanics: Theory and Experiment 2010, 10 (2010), P10005.
11
|
1609.02839 | 1 | 1609 | 2016-09-09T15:48:50 | Where is the Goldmine? Finding Promising Business Locations through Facebook Data Analytics | [
"cs.SI",
"cs.IR"
] | If you were to open your own cafe, would you not want to effortlessly identify the most suitable location to set up your shop? Choosing an optimal physical location is a critical decision for numerous businesses, as many factors contribute to the final choice of the location. In this paper, we seek to address the issue by investigating the use of publicly available Facebook Pages data---which include user check-ins, types of business, and business locations---to evaluate a user-selected physical location with respect to a type of business. Using a dataset of 20,877 food businesses in Singapore, we conduct analysis of several key factors including business categories, locations, and neighboring businesses. From these factors, we extract a set of relevant features and develop a robust predictive model to estimate the popularity of a business location. Our experiments have shown that the popularity of neighboring business contributes the key features to perform accurate prediction. We finally illustrate the practical usage of our proposed approach via an interactive web application system. | cs.SI | cs | Where is the Goldmine? Finding Promising Business
Locations through Facebook Data Analytics
Jovian Lin, Richard Oentaryo, Ee-Peng Lim, Casey Vu, Adrian Vu, Agus Kwee
Living Analytics Research Centre, Singapore Management University, 80 Stamford Road, Singapore
[email protected], {roentaryo, eplim, caseyanhthu, adrianvu, aguskwee}@smu.edu.sg
6
1
0
2
p
e
S
9
]
I
S
.
s
c
[
1
v
9
3
8
2
0
.
9
0
6
1
:
v
i
X
r
a
ABSTRACT
If you were to open your own cafe, would you not want to ef-
fortlessly identify the most suitable location to set up your shop?
Choosing an optimal physical location is a critical decision for nu-
merous businesses, as many factors contribute to the final choice
of the location.
In this paper, we seek to address the issue by
investigating the use of publicly available Facebook Pages data-
which include user "check-ins", types of business, and business
locations-to evaluate a user-selected physical location with re-
spect to a type of business. Using a dataset of 20,877 food busi-
nesses in Singapore, we conduct analysis of several key factors in-
cluding business categories, locations, and neighboring businesses.
From these factors, we extract a set of relevant features and develop
a robust predictive model to estimate the popularity of a business
location. Our experiments have shown that the popularity of neigh-
boring business contributes the key features to perform accurate
prediction. We finally illustrate the practical usage of our proposed
approach via an interactive web application system.
Keywords
Location analytics, Facebook, feature extraction, machine learning
1.
INTRODUCTION
Motivation. Location is a crucial factor of retail success, as 94%
of retail sales are still transacted in physical stores [24]. To increase
the chance of success for their stores, business owners require not
only the knowledge of where their potential customers are, but
also their surrounding competitors and complementary businesses.
From the property owners' standpoint, it is also important to assess
the potential success values of their property locations so as to de-
termine the appropriate businesses to lease the locations to and for
the right amounts. However, assessing and picking a store location
is a cumbersome task for both business and property owners.
To carry out the above tasks well, many factors need to be taken
into account, each of which requires gathering and analyzing the
relevant data. Traditionally, business and property owners conduct
surveys to assess the value of store locations [3]. Such surveys,
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re-
publish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
HT '16, July 10-13, 2016, Halifax, NS, Canada
c(cid:13) 2016 ACM. ISBN 978-1-4503-4247-6/16/07. . . $15.00
DOI: http://dx.doi.org/10.1145/2914586.2914588
however, are costly and do not scale up well. With fast chang-
ing environments (e.g., neighborhood rental, local population size,
composition, etc.) and emergence of new business locations, one
also needs to continuously reevaluate the value of store locations.
Fortunately, in the era of social media and mobile apps, we have
an abundance of online user-generated data, which capture both
activities of users in social media as well as offline activities at
physical locations. Facebook is one of the world's largest social
media platforms, with more than 1 billion active users everyday
[21]. From the business standpoint, the massive availability of user,
location, and other behavioral data in Facebook is attractive, and
has changed the way people do businesses. For instance, many
small/medium business owners are now setting up Facebook Pages
to: (i) allow customers to find their businesses on Facebook; (ii)
connect with customers via "likes" and "check-ins"; (iii) reach out
to more customers through advertising their business pages on Face-
book; and (iv) conduct analytics of their pages to get a deeper un-
derstanding of their customers and marketing activities.
Consumers are also adapting both their online and offline behav-
iors to the introduction of Facebook Pages for businesses. Other
than "liking" businesses on their Facebook Pages, they can do a
"check-in" whenever they physically visit the respective business
stores. Facebook Pages have turned many offline signals into on-
line behavior that can be analyzed for business insights. In particu-
lar, features such as "likes" and "check-ins" can be used as indica-
tors of popularity, and by extension, success. Similarly, Instagram,
Twitter, and Foursquare also have variants of these quantitative sig-
nals that can be retrieved from their geotagged photos, tweets, and
tips. These data allow us to study the dynamics of brick-and-mortar
stores and discover meaningful patterns and insights that will help
retail and property owners make better decisions.
Objective.
In this work, we make use of data collected from
Facebook Pages to answer important research questions such as:
"Where should an owner set up his physical retail store at, so as to
optimize the store's popularity?", "What are the important factors
influencing a store's popularity?", and "Is there a "local" effect,
whereby businesses can benefit from the presence of more popu-
lar/established neighbors?" To this end, we propose a new location
analytics framework that operates on top of Facebook Pages data.
The centerpiece of our current framework is the following predic-
tion task: Given a target location that a business/property owner
wants to hypothetically set his/her store at, how can we extract the
relevant data of businesses within the vicinity of the target location
and use them to estimate the popularity of the target location?
As an illustration, Figure 1 shows a visualization of our web ap-
plication system that realizes our location analytics framework. For
the system's input, a business/property owner first drops a blue pin
on the map that indicates the hypothetical location of his/her new
• To concretely realize our idea, we have built an interactive
web application that allows a business/property owner to drop
a pin on the map and obtain a predicted "check-in" score
for that location. The application is available at http://
research.larc.smu.edu.sg/bizanalytics/.
Paper outline. Section 2 first provides an overview of related
works. In Section 3, we describe the Singapore Facebook Pages
data we use in our experiments. We subsequently elaborate our pro-
posed location analytics approach in Section 4. Section 5 presents
our experimental setup, followed by the results and analyses in Sec-
tion 6. We present our web application prototype in Section 7, and
finally conclude the paper in Section 8.
2. RELATED WORK
Our work can be viewed as a new type of location analytics [11],
which is an emerging area related to business intelligence (BI) [2].
In recent years, organizations have relied on BI tools to delve into
their data and reveal key insights that can aid their decision-making
processes. With these tools, businesses have been able to make in-
formed decisions based on what happened and when - typically
pertaining to sales figures and supplier transactions. Lately, there
is an important trend for organizations to address the question of
where. Conventional BI systems, however, lack location-related
analytics capabilities, and thus do not consider geographic and de-
mographic factors crucial for consumer analysis, e.g., where to set
up stores, warehouses, or marketing campaigns.
Previously, combining separate BI and location-based approaches
such as geographic information systems (GIS), was privileged only
to large enterprises such as oil/gas-exploration companies, trans-
portation companies, or government agencies [2]. These technolo-
gies involve costly data acquisition processes and specialized la-
bor skills. Moreover, their integration requires complex and time-
consuming implementation. A recent survey by ESRI and IT Me-
dia firm TechTarget [4] discovered that many organizations now
believe that it is important to look at business data in a geograph-
ical context. Today, location-based data are abundant, thanks to
the large volumes of user traces available from social media (such
as Foursquare and Facebook) as well as mobile devices. However,
many organizations are still unaware of the value of location-based
data and struggle to put them to effective use.
Using data from social media to understand the dynamics of a
society has always been a popular research theme, particularly, in
recommending a new location to a user. For example, Facebook
researchers Chang and Sun [1] analyzed Facebook users' "check-
ins" data to develop models that predict where users will "check-in"
next. They were able to predict user-to-user friendships (i.e., friend
recommendation) just by the "check-in" data alone. Gao et al. [9]
explored the use of Foursquare "check-ins" and temporal effects for
the task of location-recommendation; subsequently, the data were
also used to predict a user's location [10].
Recent works on social media-based location analytics largely
focus on detecting events and predicting user mobility patterns, al-
though their use for BI applications are still limited so far. For
instance, Li et al. [14] presented a machine learning method to dis-
cover and profile the user's location based on their following net-
work and tweet contents. Noulas et al. [17] used Foursquare data
to study the problem of predicting the next venue a mobile user
will visit, by exploiting transitions between types of venues, mo-
bility flows between venues, and spatio-temporal patterns of user
"check-ins". Also based on Foursquare data, Karamshuk et al. [13]
demonstrated the power of geographic (e.g., types and density of
nearby places) and user mobility (e.g., transitions between venues
Figure 1: Prediction of "check-ins" based on the location indicated
by the blue pin. The red pins represent nearby existing businesses.
store. Our system then retrieves the relevant information about the
area nearby, which are also occupied by the existing businesses as
indicated by the red pins. Based on these inputs, the system ex-
tracts a set of features and invokes a machine learning algorithm to
predict the "check-in" score for the target location, which in turn
serves as an indicator for the potential popularity of that location.
Contributions. In this paper, we show how publicly available
Facebook Pages data can be analyzed and used to predict the poten-
tial popularity of a business location. To our best knowledge, this
is the first work that demonstrates the feasibility of using Facebook
data for business location analytics and, in particular, for aiding
business and property owners to evaluate the value of a store loca-
tion. It is also worth noting that our work presents a fine-grained
approach that allows the business/property owners to estimate the
popularity of any point on the city map. Our approach can be eas-
ily extended to predict multiple points simultaneously as well. We
summarize our main contributions as follows:
• We present a new study on business location analytics using
Facebook Pages data. Specifically, we conduct detailed anal-
yses on 20,877 Facebook Pages of food-related businesses in
Singapore, which constitute one of the largest business types
in the city with generally healthy visitor traffic. Based on the
analyses, we identify key features that can be used to extract
insights, as well as suitable metric for business popularity.
• We develop a location analytics framework that includes a
rich feature extraction module as well as a fast and accu-
rate predictive model based on gradient boosting machine
(GBM) [8]. Unlike the previous close work on optimal store
placement [13] that outputs a ranked list of discretized ar-
eas (circles) with fixed radius, our approach is much more
fine-grained. That is, our model can estimate on the fly the
popularity of any arbitrary point on the map-which can be
the location of an existing or a new/hypothetical business-
without needing the locations to be discretized a priori.
• Based on our (trained) predictive model, we analyze the con-
tribution of key features that are crucial in predicting the
popularity of a retail business-at both chunk (i.e., a group
of features) and individual feature levels. In particular, we
discover that distance-dependent features such as the total
"check-ins" of businesses within certain radius are of utmost
importance. We then provide an in-depth investigation on
whether businesses, particularly smaller ones, benefit from
the existence of other popular businesses within its vicinity.
or incoming flow of users) features in predicting the best placement
of retail stores. In a similar vein, Georgiev et al. [12] conducted a
study to predict the rise and decline of popularity of the local re-
tail shops during the 2012 London Olympic Games. Most recently,
Zhang et al. [25] extracted traffic and human mobility features from
Manhattan restaurants data and studied how static and dynamic fac-
tors affect the economic outcome of local businesses in the city.
Our approach. Our work differs from all the above studies in
several ways. Firstly, to our best knowledge, our work is the first
to explore the use of Facebook data in business-location analyt-
ics. With 1.55 billion monthly active users and 50 million busi-
ness pages [21], Facebook can provide a more comprehensieve
database of crowdsourced locations than other platforms (by com-
parison, Foursquare only has 55 million monthly active users and
1.3 million business pages [22]). Secondly, instead of recommend-
ing places for users to establish retail stores or analyze on how
unique events will affect businesses,we predict the popularity score
of a user-selected venue, giving the user more freedom to choose
anywhere he/she wants to set up his/her business. Thirdly, among
all the works, Karamshuk et al.'s [13] is the closest to ours. But the
key difference is that their work discretized the city into multiple
circles with fixed radius and treated the issue as a "ranking prob-
lem", i.e., producing a ranked list of discretized circles. In contrast,
we view it as a "prediction problem" and provides a much more
fine-grained approach of estimating the popularity of any point on
the map. Our method also works robustly on a range of radius val-
ues, instead of relying on a single predefined radius as in [13].
3. FACEBOOK PAGES DATASET
In this section, we first provide an overview of the data that we
collected from Facebook, and then describe the important attributes
found in the data. We then conduct a simple analysis on the two
popularity measures-"check-ins" and "likes"-to determine the
better metric for quantifying the popularity of a business.
3.1 Data Harvesting
In this paper, we focus our studies on food-related businesses
found in the Facebook of Singapore. We choose food because it
constitutes one of the largest business types in Singapore with gen-
erally healthy visitor traffic ("check-ins" and "likes"). The food-
related businesses were defined based on a manually-curated list
that consists of 133 food-related categories of business, such as
those containing the words "restaurant", "pub", "bar", etc. In par-
ticular, we consider food-related businesses in Singapore Facebook
Pages that explicitly specify latitute-longitude coordinates, and these
coordinates must be within the physical boundaries of Singapore.
Using Facebook's Graph API [6], we obtained a total of 82,566
business profiles within Singapore boundaries, of which we cat-
egorically filtered 20,877 (25.2%) profiles that are food-related.
All business data were analyzed in aggregate, and no personally-
identifiable information was used.
Figure 2 shows an example of one such business profile, Wimbly
Lu Chocolates, with important attributes (highlighted in bold) such
as: (i) ID, (ii) category (i.e., the primary-category), (iii) category
list (i.e., the sub-categories), (iv) "check-in" count, (v) "like" count,
and (vi) location (including latitude and longitude). Figure 3 shows
the corresponding Facebook Page of the business profile.
3.2 Categories Data
From the 20,877 food-related businesses, we retrieved a total of
357 unique categorical labels (as standardized by Facebook) from
the attribute "category list", which represents the sub-categories of
a business. These categories contain not only food-related labels
Figure 2: Facebook Graph API provides a JSON-formatted data
of a business. Shown here is the Facebook Page of the Wim-
bly Lu Chocolates cafe in Singapore. Source: https://graph.
facebook.com/200823339955298/
Figure 3: The Facebook page of Wimbly Lu Chocolates that shows
key popularity metrics such as 8.131 "likes" and 22K "check-ins".
(i.e., "bakery", "bar", "cafe", "coffee shop"), but also non-food la-
bels such as "movie theatre", "shopping mall", and "train station."
The existence of non-food related labels within food businesses is
Facebook's way of allowing business owners to choose more than
one categorical label for their business profile. For example, a Star-
bucks outlet located at a train station in an airport would likely have
a mixture of food and non-food labels, such as "airport", "cafe",
"coffee shop", and "train station." In addition, there is an intimate
relationship between the categories of a target business and those
of its neighbors. For instance, a family-run cafe will unlikely set it-
self next to an established coffee franchise like Starbucks, whereas
a dessert shop may be located near complementary dining places.
Table 1 shows the top 25 categories of the food businesses in
Singapore, their expected "check-ins", and the percentage of busi-
nesses that perform better than expectation. The proportion of busi-
nesses performing better than expectation ranges from 6 to 28%.
The largest category is "food and restaurant", which is the most
common category-type. From the low percentages of those that
actually perform better than the expectation, we can tell that busi-
nesses obey a long-tail distribution, with the majority of businesses
being unable to achieve the expected "check-ins" or more.
{ "id": "200823339955298", "attire": "Casual", "can_post": false, "category": "Restaurant/cafe", "category_list": [ { "id": "197871390225897", "name": "Cafe" } ], "checkins": 22811, "cover": { "cover_id": 465179196853043, "offset_x": 0, "offset_y": 24, "source": "https://fbcdn-sphotos-g-a.akamaihd.net/hphotos-ak-xaf1/t31.0-8/s720x720/471918_465179196853043_134634759_o.jpg", "id": "465179196853043" }, "description": "Chocolate cafe.", "general_manager": "Rachel Foo", "has_added_app": false, "hours": { "tue_1_open": "12:30", "tue_1_close": "22:30", "wed_1_open": "12:30", "wed_1_close": "22:30", "thu_1_open": "12:30", "thu_1_close": "22:30", "fri_1_open": "12:30", "fri_1_close": "23:00", "sat_1_open": "09:00", "sat_1_close": "23:00", "sun_1_open": "09:00", "sun_1_close": "22:30" }, "is_community_page": false, "is_published": true, "likes": 8134, "link": "https://www.facebook.com/WimblyLuChocolates", "location": { "city": "Singapore", "country": "Singapore", "latitude": 1.3474290978105, "longitude": 103.86750392653, "street": "15-2, Jalan Riang", "zip": "358987" }, "name": "Wimbly Lu Chocolates", "parking": { "lot": 0, "street": 1, "valet": 0 }, "payment_options": { "amex": 0, "cash_only": 0, "discover": 0, "mastercard": 1, "visa": 1 }, "phone": "(65) 62891489", "price_range": "$ (0-10)", "public_transit": "Nearest MRT Serangoon: Take bus 105 from bus interchange or take bus 58 from the bus stop. Alight on the second stop and turn into Jalan Girang road. Take the first left and the second right.\nNearest MRT Lorong Chuan: Exit the MRT and walk towards NYJC and turn into Jalan Girang.\nSee you! :)", "restaurant_services": { "delivery": 0, "catering": 0, "groups": 0, "kids": 0, "outdoor": 0, "reserve": 0, "takeout": 1, "waiter": 1, "walkins": 1 }, "restaurant_specialties": { "breakfast": 0, "coffee": 1, "dinner": 0, "drinks": 1, "lunch": 0 }, "talking_about_count": 185, "username": "WimblyLuChocolates", "website": "www.wimblylu.com", "were_here_count": 22811 } Table 1: Top 25 categories of food-businesses, their expected "check-ins", and those that perform better than the expectation.
Categories
Food & Restaurant
Restaurant
Cafe
Shopping Mall
Coffee Shop
Fast Food Restaurant
Food & Grocery
Bakery
Chinese Restaurant
Food Stand
Bar
Japanese Restaurant
Train Station
Nightlife
Movie Theater
Cafeteria
Seafood Restaurant
Italian Restaurant
Thai Restaurant
Ice Cream Parlor
Sushi Restaurant
Pub
Night Club
Indian Restaurant
Businesses
count
6,758
5,233
3,126
3,101
2,959
2,840
1,449
1,338
1,157
1,099
956
922
879
744
717
661
629
459
437
413
380
369
361
350
Total "check-ins"
5,771,148
8,195,356
3,799,849
5,772,105
2,395,000
3,447,999
1,055,175
394,982
2,376,432
1,454,820
3,234,860
1,297,228
429,740
866,619
1,015,632
421,774
1,786,933
735,620
593,546
744,514
741,305
513,009
1,416,278
538,624
Expected "check-ins" % of Businesses that have "check-ins"
per business
above the expected "check-ins"
853.97
1,566.09
1,215.56
1,861.37
809.40
1,214.08
728.21
295.20
2,053.96
1,323.77
3,383.74
1,406.97
488.90
1,164.81
1,416.50
638.08
2,840.91
1,602.66
1,358.23
1,802.70
1,950.80
1,390.27
3,923.21
1,538.93
13.36%
16.09%
19.10%
15.90%
13.99%
19.12%
6.21%
11.58%
23.16%
10.92%
20.08%
22.02%
26.17%
10.62%
9.09%
11.20%
22.58%
27.67%
26.32%
18.40%
26.58%
20.33%
14.40%
18.00%
3.3 Location Data
Each business profile has a location attribute that contains the
physical address and latitude-longitude coordinates (hereafter known
as "lat-long"). Knowing the location of every business allows us
to calculate the neighborhood of a selected business through the
spatial distribution of other businesses around the vicinity. Specif-
ically, we consider the set Pl = {pdist(p, l) ≤ r} of places p
that lie in a radius r around a target location l. The term dist(p, l)
denotes the Haversine distance [20] between two locations p and l.
We can then create a two-dimensional distance matrix containing
the distance between every pair of business. For efficiency, we only
consider a maximum radius of 1km (i.e., r ≤ 1km). This allows us
to quickly retrieve the k nearest neighbors of any location.
3.4 Visitor Data
Ideally, we would like to analyze customer information, such
as who commented on or "liked" a business' Facebook post, and
match/recommend some user profiles to some businesses. How-
ever, due to privacy concerns, Facebook does not allow us to iden-
tify who has checked-in or liked a particular business. Although
one can still crawl the posts on a business' wall, as of Facebook's
Graph API v2.0 [5] (released in 2014), Facebook no longer supplies
a user's actual ID. Instead, Facebook uses the concept of "app-
scoped user IDs", whereby a user's ID is unique to each app and
cannot be used across different apps. As our crawler is considered
an app, and Facebook limits the number of user posts that an app
can query in a day, we are unable to gather enough posts-and by
extension user IDs-to cover all (food-related) businesses in Sin-
gapore. Having multiple crawlers will not work either, as the same
user ID will be different for any two crawlers.
3.5 Popularity Indicator: "Check-in" vs "Like"
Facebook provides two possible indicators for a business page's
popularity: "check-in" and "like". The "check-in" metric is com-
mon in location-based social media like Facebook and Foursquare.
Meanwhile, the "like" metric (shown as a "thumbs up" button) is
(a) Target business' total "check-
ins" vs. neighbors' total checkins
(b) Target business' total "check-
ins" vs. neighbors' total likes
Figure 4: Pearson correlation coefficient (PCC) of neighboring to-
tal "check-ins" (in red) and neighboring total "likes" (in blue).
more unique to Facebook, allowing users to express their recom-
mendation/support for an entity. A "check-in" is the action of reg-
istering one's physical presence, and the total number of "check-
ins" received by a business gives us a rough estimate of how pop-
ular and well-received it is. In contrast, the number of "likes" lit-
erally reflects an online vote for the business.
Intuitively, there-
fore, a "check-in" should be a more suitable measure of a physical
store's popularity, as it indicates a physical presence. Furthermore,
"check-in" can be repeated, i.e., a user could "check-in" to a place
on Monday and do so again on Tuesday. By contrast, "likes" cannot
be done repeatedly-it is a one-time event.
To prove this point, we compute the Pearson correlation coeffi-
cient (PCC) on two pairs: (i) the target business' "check-ins" w.r.t.
its neighbors' total "check-ins", and (ii) the target business' "check-
ins" w.r.t. its neighbors' total "likes". We only use the number of
"check-ins" for the target business because we are only interested
in the physical presence of customers for the target business. But
for the target business's neighbors, we use both "check-ins" and
"likes", as they reflect the popularity-physical or metaphysical-
of the area in which the target business is located. For the neigh-
bors' total "check-ins" and total "likes", we further partitioned them
based on the relative distance from the target business. Specifically,
for every target business, we calculate the PCC between its "check-
ins" and the total "check-ins" or "likes" of its neighbors within ra-
dius r, where r = {50, 100, 150, 200, . . . , 500}.
Figure 4 shows the PCC of the two popularity indicators, broken
down by the relative distance. It is evident that, between the neigh-
bors' "check-ins" and the neighbors' "likes", the "check-in" fea-
ture is the better indicator as it has a higher PCC score than "likes."
Furthermore, nearer "check-ins" (e.g., 50 meters) have better PCC
than further "check-ins", which suggests that the nearer a target
business is to a popular neighbor, the more "check-ins" it reaps.
On the contrary, the PCC score for "likes" increases as the distance
between a target business and its surrounding neighbors increases.
This can be attributed to the nature of "likes", which reflects an
online support for the business and is not limited to physical prox-
imity, whereas "check-ins" represent the registration of a person's
physical presence, which is determined by physical proximity.
4. PROPOSED FRAMEWORK
Our location analytics framework, as illustrated in Figure 5, con-
sists of two phases: training and prediction. The training phase
involves extracting a set of features from the existing business pro-
files and feeding them to a machine learning algorithm (i.e., gradi-
ent boosting [8]; see Section 4.3) in order to a predictive model for
the "check-in" count. In turn, the prediction phase involves extract-
ing features from a target business profile and invoking the trained
predictive model to generate a (predicted) "check-in" count for that
profile. Note that the training phase is carried out offline, whereas
the prediction phase is done on the fly for a (new) target profile.
The modules in our proposed framework consist of three main
types: (i) input profiles, (ii) feature extractor, and (iii) predictive
model. We shall describe each module type in turn.
4.1
Input Profile
The input profile represents a physical business, and is used in
both training (Figure 5(a)) and prediction (Figure 5(b)) phases. An
input profile contains several attributes of a business, namely:
• The lat-long coordinate of the business. This is used in
both training and prediction phases. Note that, during train-
ing, we only use the lat-long of the existing business profiles,
whereas during prediction the lat-long being queried can be
at an arbitrary (new or existing) location.
• The business categories. Examples include "bar", "cafe",
"dining", "train station", etc.. This information is also used
in both training and prediction phases.
• The "check-in" counts. In the training phase, we feed the
actual "check-in" counts of the existing businesses as the tar-
get variable of our algorithm. In the prediction phase, the
"check-in" counts of the queried locations are assumed to
be unknown and our algorithm is supposed to predict them,
whether it is for an existing or a new location.
All input profiles of the existing businesses are stored in a database
of place profiles (cf. Figure 5). Using this database, we can extract
a set of features for a given business, which include features derived
from its own (input) profile as well as features from its neighbors
(computed based on a range of radius as described in Section 3.3).
The next section describes our feature extraction procedure.
Figure 5: Our location analytics framework.
Target's category
[v][asian restaurant]
[v][bakery]
[v][bar]
[v][cafe]
[v][chinese restaurant]
...
Neighbors' category
[v neighbors][asian rest.]
[v neighbors][bakery]
[v neighbors][bar]
[v neighbors][cafe]
[v neighbors][chinese rest.]
...
Category related
C1
C2
C3
C4
C5
C6
Total "check-ins" of Food Neighbors
[Total "check-ins"][Food neighbors][distance],
where distance ∈ {50m, 100m, ..., 1000m}
Average "check-ins" of Food Neighbors
[Average "check-ins"][Food neighbors][distance],
where distance ∈ {50m, 100m, ..., 1000m}
Total "check-ins" of All Neighbors
[Total "check-ins"][All neighbors][distance],
where distance ∈ {50m, 100m, ..., 1000m}
Average "check-ins" of All Neighbors
[Average "check-ins"][All neighbors][distance],
where distance ∈ {50m, 100m, ..., 1000m}
Hotspots related
Figure 6: A break down of the feature vector into six chunks.
4.2 Feature Extraction
The feature extraction module serves to construct a feature vec-
tor representing a particular business. In this work, we divide our
feature vector into six chunks, which represent different aspects of
a target business. Figure 6 summarizes our feature chunks. The
first two are associated with categorical data, while the remaining
four are about hotspots (i.e., location and "check-ins") data. Table 2
summarizes the unique identifier (ID), description, and the number
of features of each chunk. We describe each chunk below.
Chunk C1: The categories of the target business. This chunk
is represented using a binary feature vector. For example, a cat-
egorical variable with four possible values: "A", "B", "C", and
"D" is encoded using four binary features: [1, 0, 0, 0], [0, 1, 0, 0],
[0, 0, 1, 0], and [0, 0, 0, 1], respectively. To represent multiple cat-
egories, we simply use "0" and "1" to indicate the absence and
presence of each category label respectively. For example, we rep-
resent a profile with categories "A, C" and another with categories
"A, B, C, D" as [1, 0, 1, 0] and [1, 1, 1, 1], respectively. In other
words, we use a one-vs-all scheme where we convert multi-class
labels to binary labels (i.e., belong or does not belong to the class).
As there are a total of 357 unique categories in the dataset of food
venues, the binary feature vector will have 357 elements.
Chunk C2: The categories of the target business' neighbors.
We first select-from our database of place profiles-the neigh-
boring food businesses within r meters from the target business,
after which we extract and sum up the category feature vectors of
the neighbors. To define category neighborhood, we use r = 200
meters, which we found to give optimal performance in our exper-
iments. Similar to C1, chunk C2 is also a 357-long feature vector
that corresponds to the same number of unique categories, except
that each feature value is now an integer. Returning to our toy ex-
ample of the four categories "A", "B", "C", and "D", if a profile
Database
of
Place
Profiles
Feature
Extractor
features
actual
popularity
Gradient
Boos6ng
loca6on
info
neighborhood
info
Feature
Extractor
input
profile
loca6on
info
neighborhood
info
features
predicted
popularity
(a)
Training
(b)
Predic6on
input
profile
input
profile
input
profile
input
profile
input
profile
input
profiles
Predic6on
Model
Table 2: Feature chunks used in our location analytics work.
Chunk ID Chunk Description
#Features
C1
C2
C3
C4
C5
C6
Categories of the profile
Categories of the profile's neighbors
Total "check-ins" of food-related hotspots
Average "check-ins" of food-related hotspots
Total "check-ins" of all hotspots
Average "check-ins" of all hotspots
357
357
20
20
20
20
only has 5 neighbors of category "A" and 7 neighbors of category
"B", its integer feature vector will be [5, 7, 0, 0].
Chunks C3 and C4: Food-related hotspots. The two chunks
are related in that both only use food-related neighbors. In other
words, they exclude neighbors that have no relevance to food, such
as clothing and electronic stores. For each chunk, we are interested
in "hotspots", which are circular areas with the profile in the center
and each area is quantified by the "popularity" of stores within it.
We define 20 hotspots around the profile whereby each hotspot is
demarcated by a maximum distance of r meters, of which r ∈
{50, 100, 150, . . . , 1000}. Finally, the only difference between C3
and C4 is in how "popularity" is defined; the former computes the
(natural) logarithm of the total "check-ins" within a hotspot, while
the latter computes the logarithm of the average "check-ins".
It must be noted that the total and average "check-ins" include
only the "check-in" counts of the neighbors and not the count of the
target business itself (which is assumed to be unknown). Also, the
purpose of applying logarithmic transformation to the "check-in"
counts is to reduce the skewness in the counts distribution (i.e., most
businesses have small "check-ins" counts, but there is a handful
number of businesses with unusually large "check-ins"). In other
words, applying logarithm transformation would allow us to miti-
gate the impact of (unusually) high "check-ins" for popular busi-
nesses. Previously, we conducted an experiment that used the raw
"check-ins" instead of the logarithmic values. Indeed, we observed
that using the logarithm values yielded lower prediction errors than
using the raw counts. As such, we shall focus on the results of the
logarithm-scaled "check-ins" throughout the rest of this paper.
Chunks C5 and C6: All (food + non-food) hotspots. These
chunks are similar to C3 and C4, respectively. The only differ-
ence is that, instead of solely using food-related neighbors, chunks
C5 and C6 use food and non-food neighbors together. The non-
food neighbors include bookshops, transportation facilities like bus
and train stations, furniture stores, universities, etc. We include
non-food hotspots so as to capture the complementary (non-food)
businesses within the neighborhood of a target business.
4.3 Predictive Model
In order to learn the association between the extracted features
and "check-in" scores of a given business. we train a supervised re-
gression model called gradient boosting machine (GBM) [8]. GBM
is a machine learning algorithm that iteratively constructs an en-
semble of weak decision tree learners through boosting mechanism.
Specifically, the boosting procedure consists of training weak learn-
ers and adding them into a final strong model in a forward stage-
wise manner. By combining many weak learners that have high
bias (i.e., high prediction error), GBM yields an accurate and ro-
bust predictive model that has a lower bias than its constituent weak
learners [16]. The GBM allows for the optimization of arbitrary dif-
ferentiable loss functions for classification and/or regression task.
For the purpose of "check-in" regression, however, we shall focus
on the least square loss function [8] in this work.
Another major benefit of using GBM is that it can automatically
derive the so-called feature importance metric [8, 16]. This pro-
vides an important mechanism to interpret the trained model and
identify the key features that contribute substantially to the predic-
tion of the target variable (i.e., "check-in" score).
In particular,
each decision tree in the GBM intrinsically performs feature selec-
tion by choosing the appropriate split points. This information can
then be used to measure the importance of each feature. That is,
the more often a feature is used in the split points of a tree, the
more important that feature is. This notion can be extended to the
tree ensemble by averaging the feature importance of each tree. We
further elaborate our feature importance analysis in Section 6.3.
5. EVALUATION PRELIMINARIES
We preface our evaluation proper by detailing the evaluation met-
rics and procedure, the baseline models against which we compare
GBM, as well as the model variations we considered in our study.
5.1 Evaluation Metrics and Procedure
To measure how accurate our predicted "check-in" scores dif-
fer from the actual (observed) scores, we use two popular regres-
sion quality metrics: mean-squared logarithmic error (MSLE) and
mean absolute logarithmic error (MALE). The MSLE and MALE
metrics are respectively defined as:
n(cid:88)
n(cid:88)
i=1
i=1
M SLE =
M ALE =
1
n
1
n
(log(pi + 1) − log(ai + 1))2
log(pi + 1) − log(ai + 1)
(1)
(2)
where n is the number of samples in the test set, p is the predicted
"check-ins", and a is the actual "check-ins". The MSLE metric
measures the averaged squared errors, which gives a higher penalty
to large logarithmic differences log(pi + 1) − log(ai + 1). On
the other hand, the MALE metric measures the averaged absolute
errors, whereby all the individual differences are weighted equally.
To assess the performance of our predictive model, we perform
a 10-fold cross-validation procedure whereby the dataset is ran-
domly partitioned into 10 equal sized subsamples. A single sub-
sample is retained as the validation data for testing our models,
while the remaining 9 subsamples are used as training data. The
cross-validation process is then repeated 10 times, with each of the
10 subsamples used exactly once as the validation data. We then
report the averaged performance.
Finally, to test for the statistical significance of our results, we
utilize the independent two-sample t-test [19].
In particular, we
look at the p-value of the t-test involving two performance vectors,
at a significance level of 0.01. If the p-value is less than 0.01, we
can conclude the performance difference is statistically significant.
5.2 Baselines
We compare GBM with several regression baseline algorithms.
To foster reproducibility of this work, our implementations of all
these algorithms (including GBM) are based on the scikit-learn li-
brary [18]. The following baselines are used in this work:
• Distance-based nearest neighbors (DNN). This is a simple
baseline that takes the logarithm of the average "check-ins"
of the neighbors that reside within some radius r of a target
business location. DNN works based on a simple intuition:
"the more popular the neighborhood, the more popular the
target location is going to be, all else being equal". We test
on r ∈ {50, 100, . . . , 500} and found that DNN with r =
100m brings about the best results.
• Support vector regression with linear kernel (SVR-Linear)
[7]. This method produces a linear regression model that de-
pends only on a subset of the training data, since the cost
function for building the model ignores any data points close
to the model prediction. For this method, we set the cost
parameter to C = 1 and the epsilon parameter (for control-
ling epsilon-insensitive loss) to = 0.1, which give the best
performance in our experiments.
• Support vector regression with radial basis function ker-
nel (SVR-RBF) [23]. This is the same as SVR-Linear, ex-
cept that now it uses a radial basis function (Gaussian) ker-
nel. As with SVR-Linear, we use C = 1 and = 0.1, which
again constitute the optimal configuration for SVR-RBF.
Last but not least, we configure our GBM algorithm using the
"least squares" loss function, a learning rate of 0.1, a maximum
tree depth of 10, and a maximum tree width of "sqrt" (i.e., the
square root of the total number of features). For the number of
boosting iterations N, we perform an exhaustive grid search on
N ∈ {100, 200, . . . , 5000} and found that N = 1000 produces
the best results. Note that, in each boosting iteration, a new tree
is created and added into the ensemble. As such, the number of
boosting iterations N is equal to the number of trees constructed.
5.3 Model Variations
To evaluate the contributions of different feature chunks, we con-
struct a variation of the predictive models by enumerating all pos-
sible combinations of the six chunks (see Section 4.2). That is, we
construct all possible 26 − 1 = 63 chunk combinations and build a
predictive model for each combination. We represent a model vari-
ant using a binary array of length six, where chunk Ci maps to the
ith element in the array. We use the notation "[model_name]xxxxxx"
to represent a particular model variant, where x ∈ {0, 1}. For ex-
ample, a GBM model using C1, C2, and C4 is denoted as GBM110100.
Note that DNN does not use this notation, since it works based on
spatial distance only, instead of feature chunks. For SVR-Linear,
SVR-RBF and GBM, we run experiments on all 63 variants and
report the best results for each of the three methods.
6. RESULTS AND ANALYSIS
We now present our main experimental results. Our experiments
seek to answer several key research questions (RQs):
RQ1: How well can our predictive model (GBM) estimate the
popularity (i.e., "check-in" scores) of business locations?
RQ2: What are the contributions of different feature chunks? How
robust is our model against different feature combinations?
RQ3: Do the important features found by our model make sense?
What can we learn/conclude from them?
6.1 Performance Assessment (RQ1)
Table 3 compares the cross-validation performances (i.e., av-
eraged MALE and MSLE) of different regression methods. For
SVR-Linear and SVR-RBF, we show both the "full variant" (i.e.,
SVR-Linear111111 and SVR-RBF111111) as well as the variants that
give the best results for the same method (i.e., SVR-Linear111000 and
SVR-RBF100011). We observe that GBM consistently and signifi-
cantly outperforms other models (at p < 0.01), particularly against
SVR-RBF100011, which is the best among all the baselines.
Table 3: Performance comparisons of different models.
Feature Chunks
-
{C1, C2}
Model
DNNr=100m
SVR-Linear111000
SVR-Linear111111
SVR-RBF100011
SVR-RBF111111
GBM111111
*: significant at 0.01 with respect to SVR-RBF100011
{C1, C2, C3, C4, C5, C6}
{C1, C2, C3, C4, C5, C6}
{C1, C2, C3, C4, C5, C6}
{C1, C5, C6}
MALE
1.99305
1.59072
2.12345
1.47518
1.53067
1.16362*
MSLE
7.27499
4.25301
7.35446
3.61863
3.92219
2.56924*
We can explain the results in terms of model complexity. For
instance, we can expect the simplest nearest neighbor method (i.e.,
DNN) to be beaten by other methods, as it only uses spatial dis-
tance. We can also anticipate that SVR-RBF would outperform
SVR-Linear, as the RBF kernel maps the original features into
a high-dimensional space. This expanded feature space provides
SVR-RBF with a greater representation power to model a much
more complex relationship than SVR-Linear. Finally, as GBM
combines weak learners into a strong learner, the aggregate predic-
tion of the ensemble is more accurate than the prediction of any of
its constituent learners. This aggregation also provides GBM with
more robustness to data overfitting, as compared to SVM-RBF.
Additionally, the results in Table 3 suggest that the two SVR
methods are more sensitive to the variation of feature chunks, par-
ticularly to the presence of less relevant (or irrelevant) features.
This can be attributed to the fact that each tree in GBM intrinsically
performs feature selection, for which less important features are un-
likely to be chosen and used in the ensemble. Indeed, we can see
that SVR-Linear with all six chunks (i.e., SVR-Linear111111) is out-
performed by the simpler SVR-Linear variant (i.e., SVR-Linear111000)
that uses only three chunks. Surprisingly, the former is also out-
performed by even the DNN method. The same conclusion can
be made by comparing SVR-RBF111111 and SVR-RBF100011. On
the contrary, GBM is more robust against inconsequential features.
In fact, GBM generally improves its performance as we add more
chunks, as we will see shortly in Section 6.2.
6.2 Contribution of Feature Chunks (RQ2)
The partitioning of the feature vectors into six chunks allows us
to investigate the contribution of each feature group. Table 4(a)
lists the top 10 GBM variants (out of 63 possible variants), sorted
in an ascending order of their MALE scores. Similarly, Table 4(b)
lists the top 10 GBM variants, sorted in ascending order of their
MSLE scores. Note that the top 10 GBM variants happen to be
the same for the two tables, except that they have slightly different
ordering. From the results, it is evident that GBM111111 does not
significantly outperform the other nine variants (at a significance
level of 0.01). This shows that GBM is robust against the variation
of feature chunks. We can also see that the performance of the
GBM improves as we add more feature chunks. Again, this can
be attributed to the feature selection mechanism of each tree in the
ensemble, which helps exclude irrelevant features.
Based on the binary representation of the six chunks, we can
also calculate the relative significance of a chunk by counting the
number of times in which it is present (i.e., when the chunk is as-
signed the value of 1). The sum of each chunk's presence in the 10
GBM variants is shown at the last row of Tables 4(a) and 4(b), enti-
tled "Count". We see that the categories of the target business (i.e.,
chunk C1) is present in all the top 10 GBM variants, indicating that
it is an essential feature. This may seem to suggest that the nature
Table 4: Cross-validation results of the top 10 GBM variants.
(a) MALE results of the top 10 GBM variants.
Feature Chunks
C5
C4
C3
C2
C1
Model
GBM111111 Yes Yes Yes Yes Yes Yes
–
–
GBM111100 Yes Yes Yes Yes
Yes
GBM111010 Yes Yes Yes
–
–
–
GBM110011 Yes Yes
Yes Yes
–
Yes Yes Yes Yes
–
GBM101111 Yes
–
Yes Yes
–
GBM101100 Yes
–
Yes Yes
–
GBM100011 Yes
–
–
GBM111000 Yes Yes Yes
–
–
–
–
Yes
–
–
GBM110010 Yes Yes
–
Yes
–
Yes
–
GBM101010 Yes
Count
10
6
7
4
7
4
C6 MALE
1.163618
1.172693
1.173910
1.175062
1.177136
1.182053
1.184053
1.184895
1.189258
1.191831
(b) MSLE results of the top 10 GBM variants.
–
–
Feature Chunks
C5
C4
C3
C2
C1
Yes
Model
C6
GBM111111 Yes Yes Yes Yes Yes Yes
GBM111010 Yes Yes Yes
–
Yes Yes Yes Yes
GBM101111 Yes
–
GBM111100 Yes Yes Yes Yes
–
Yes Yes
–
GBM110011 Yes Yes
–
–
Yes Yes
–
GBM101100 Yes
–
GBM100011 Yes
–
–
–
Yes Yes
–
–
–
GBM111000 Yes Yes Yes
–
Yes
–
–
GBM110010 Yes Yes
–
Yes
–
Yes
–
GBM101010 Yes
Count
10
6
7
4
7
4
MSLE
2.569236
2.608927
2.609254
2.610255
2.615818
2.627101
2.628505
2.653032
2.660369
2.667292
of the business itself plays a pivotal role. However, as described
in Section 3.2, food businesses on Facebook may contain non-food
labels such as "airport" and "shopping mall" (e.g., for a cafe lo-
cated in the shopping mall of an airport). In turn, this suggests that
the "environment" around a selected business is also a key factor.
The method of chunk counting presented in this section is a coarse-
grained analysis and is not sufficient to validate this conjecture. We
will further analyze this in Section 6.3, where we employ a more
fine-grained analysis of the individual feature's importance.
Moving on, we also notice that the total "check-ins" chunks (i.e.,
chunks C3 and C5) are ranked higher than the average "check-ins"
(i.e., C4 and C6), i.e., the counts are 7/10 vs. 4/10. This suggests
that the total "check-ins" have more discriminatory power than the
average "check-ins", which could be due to the averaging failing to
account for the number of business nearby. On the other hand, total
"check-ins" (of an area) gives a more accurate reflection of the po-
tential human traffic that an area has. Finally, we see no substantial
performance difference between food-related hotspots and all (i.e.,
food + non-food) hotspots (both have a count sum of 7 + 4 = 11).
This implies that the presence of non-food-related categories does
not contribute significantly to the prediction quality.
6.3 Analysis of Feature Importance (RQ3)
The analysis of the six chunks of the feature vectors in the previ-
ous section represents a coarse-grained analysis. To perform a more
fine-grained analysis, we look into the full feature vector (with all
six chunks included) in the GBM111111 model and try to compute
the relative importance of each individual feature. GBM derives
this automatically, by measuring how many times a feature is used
in the split points of a tree [8] (see also Section 4.3).
Figure 7(a) shows the relative importance of the top 20 features
in descending order of importance, while Figure 7(b) shows the
relative importance of the 71st to the 90th features. (We do not
include the results for the 21st to 70th features here, as the changes
in the feature importance score are fairly smooth.) Accordingly, we
can make the following observations:
• Chunks C3 to C6 (black bars in Figure 7) dominate the top
80 feature importance positions (not fully shown in Figure 7),
and it is not until the 81st top feature that chunks C1 and C2
show up. This suggests that hotspot features play a very cru-
cial role: the more "check-ins" a target business' neighbors
have, the more popular the target business is likely to be.
• From Figure 7(a), 14 out of 20 hotspot features are below
500m, suggesting that nearer "check-ins" are used as a strong
signal to make a split in the decision tree. This is not surpris-
ing, as it may be physically tiring for customers to travel far-
ther than 500m, and most will settle all their outdoor needs
in a specific area, such as a shopping mall.
• Comparing the total and average "check-ins" in Figure 7(a),
14 out of 20 features belong to the former. This indicates
that total "check-ins" is a better input feature/signal for split
points in the GBM's trees. This finding is generally in agree-
ment with what we have found in Section 6.2.
• Figure 7(a) also shows that the type of neighbors (i.e., "food-
only" or "all") are equally matched with 10 counts each.
Again, this finding conforms with the earlier finding in Sec-
tion 6.2. Note that, despite the different approaches in Sec-
tions 6.2 and 6.3, both arrived at the similar conclusion with
regard to the type of "check-in" and the type of neighbor.
• From the colored bars (i.e., chunks C1 and C2) in Figure 7(b),
we see that C1 is dominated by the C2. This suggests that
categories of the neighboring businesses are more important
than those of the target business (C1). Together with the
"hotspot" features in Chunks C3 to C6, this reinforces the
idea of a "local effect" whereby business benefit by being
close to more established neighbors.
• Finally, we notice a significant and faster drop in the impor-
tance scores from the 81st to 90th features (as compared from
the 1st to 80th). In this case, places or franchises that typi-
cally attract general (and larger) crowd, such as "restaurant",
"coffee", or "shopping mall"-related categories, take the first
top spots among the neighbors' categories. This suggests that
food-related categories (of the neighbors) are more important
than the non-food categories.
7. WEB APPLICATION PROTOTYPE
We implement our location analytics framework as an interac-
tive web application service, which can be accessed at: https:
//research.larc.smu.edu.sg/bizanalytics/.
Technologies. We employ the following technologies to build
our web application: (i) Python (implementing the predictive model
and feature extraction), (ii) RabbitMQ (a messaging passing sys-
tem that allows querying the predictive model), (iii) Node.js (for
processing users' queries and returning the prediction results to the
front-end), (iv) ElasticSearch (a distributed search engine for quer-
ing the database of place profiles), and (v) Google Maps (for visu-
alization at the front-end). This configuration provides an efficient
and scalable way to process a user's location query (via Node.js and
(a) Feature importance of the top 20 features descending order
of importance. The top 20 happen to consists of Chunks C3 to C6.
(b) Feature importance of the top 71st to 90th features. Besides Chunks C3 to
C6, it also contains Chunks C1 and C2, in red and blue, respectively.
Figure 7: Top features from the feature importance of the GBM111111 model.
Figure 8: Our online interactive location analytics system.
RabbitMQ), retrieve the relevant neighbors (via ElasticSearch), in-
volve feature extraction and predictive models (in the Python com-
ponent), and finally display the prediction results to the users (again
via Node.js and RabbitMQ, along with Google Maps).
User interaction. Figure 8 shows an example of how our web
application works. A user drops a pin (i.e., the blue pin in the mid-
dle of the screen) to indicate where his (hypothetical) store location
would be. Depending on the location, the interface also dynami-
cally shows the neighboring businesses on the right panel and their
respective information, such as (i) the distance from the drop-pin,
and (ii) the number of physical "check-ins" and "likes". When the
user is ready, he/she may click the "Calculate Predicted Check-ins"
button, which will then calculate the predicted "check-in" score on
the fly. After presenting the predicted "check-in" score, the user
can also open a new panel, showing a ranked list of his/her target
location relative to the nearby businesses (Figure 9). The rank-
Figure 9: After computing the predicted "check-in" score, users
can compare their target location with the surrounding businesses.
ing allows users to understand how their target location would fare
against the neighboring businesses. The panel also shows the high-
est, lowest, and the median scores of these neighbors.
Qualitative study. Figures 8 and 9 demonstrate the on-the-fly
prediction of our web application, where it is able to predict the
"check-in" score of a hypothetical, inexistent target business. For
this example, the score of 802.24 in Figure 9 represents a fairly
conservative prediction of the potential "check-ins" in the target
location (i.e., the blue pin) and the selected type of business. This
hypothetical business is ranked 160th among 213 businesses, with
the lowest "check-ins" being 106. This is a reasonable prediction.
On the one hand, because the place is near places with consistent
human traffic, such as the Hilton Hotel and several other shopping
malls, it should garner a decent amount of check-ins. On the other
hand, as there are many other businesses in the area (the area is a
renowned shopping paradise in Singapore), it may be challenging
for the hypothetical business to compete with these businesses.
8. DISCUSSION AND FUTURE WORK
In this work, we investigate whether businesses can benefit from
other (popular) businesses within its vicinity. Our results show
not only a positive correlation between the popularity of a target
0
0.002
0.004
0.006
0.008
0.01
[FOOD--‐ONLY]
[TOTAL
CHECKINS]
[100m]
[ALL]
[AVERAGE
CHECKINS]
[350m]
[ALL]
[AVERAGE
CHECKINS]
[550m]
[ALL]
[TOTAL
CHECKINS]
[100m]
[ALL]
[AVERAGE
CHECKINS]
[150m]
[FOOD--‐ONLY]
[TOTAL
CHECKINS]
[600m]
[FOOD--‐ONLY]
[TOTAL
CHECKINS]
[150m]
[FOOD--‐ONLY]
[TOTAL
CHECKINS]
[450m]
[FOOD--‐ONLY]
[AVERAGE
CHECKINS]
[50m]
[ALL]
[TOTAL
CHECKINS]
[350m]
[ALL]
[AVERAGE
CHECKINS]
[250m]
[ALL]
[TOTAL
CHECKINS]
[550m]
[FOOD--‐ONLY]
[TOTAL
CHECKINS]
[750m]
[ALL]
[AVERAGE
CHECKINS]
[50m]
[ALL]
[TOTAL
CHECKINS]
[200m]
[FOOD--‐ONLY]
[TOTAL
CHECKINS]
[550m]
[ALL]
[TOTAL
CHECKINS]
[600m]
[FOOD--‐ONLY]
[TOTAL
CHECKINS]
[200m]
[FOOD--‐ONLY]
[TOTAL
CHECKINS]
[300m]
[FOOD--‐ONLY]
[TOTAL
CHECKINS]
[250m]
20
19
18
17
16
15
14
13
12
11
10
9
8
7
6
5
4
3
2
1
Feature
Importance
Score
0
0.002
0.004
0.006
0.008
0.01
[Profile's
Neighbors]
Food
Stand
[Profile's
Neighbors]
Food
&
Grocery
[Profile's
Neighbors]
Shopping
Mall
[Profile's
Neighbors]
Bakery
[Profile]
Bakery
[Profile's
Neighbors]
Fast
Food
Restaurant
[Profile's
Neighbors]
Restaurant
[Profile's
Neighbors]
Cafe
[Profile's
Neighbors]
Food
&
Restaurant
[Profile's
Neighbors]
Coffee
Shop
[FOOD--‐ONLY]
[AVERAGE
CHECKINS]
[800m]
[ALL]
[AVERAGE
CHECKINS]
[800m]
[FOOD--‐ONLY]
[AVERAGE
CHECKINS]
[700m]
[ALL]
[AVERAGE
CHECKINS]
[750m]
[FOOD--‐ONLY]
[AVERAGE
CHECKINS]
[900m]
[FOOD--‐ONLY]
[AVERAGE
CHECKINS]
[850m]
[FOOD--‐ONLY]
[AVERAGE
CHECKINS]
[500m]
[FOOD--‐ONLY]
[AVERAGE
CHECKINS]
[1000m]
[ALL]
[TOTAL
CHECKINS]
[950m]
[ALL]
[AVERAGE
CHECKINS]
[450m]
90
89
88
87
86
85
84
83
82
81
80
79
78
77
76
75
74
73
72
71
Feature
Importance
Score
business and its neighbors, but also the critical importance of the
"hotspot" features: the nearer a target location is to a popular place
with larger "check-ins", the more successful it would be. This find-
ing conforms with our intuition. But more importantly, it demon-
strates that ubiquitous online data (such as Facebook Pages) can be
used to gauge the socioeconomical values. We also show how our
predictive model can be used to accurately estimate the "check-in"
score of a particular location, allowing us to identify the best loca-
tions that would bring popularity, and by extension, success.
Despite the promising potentials of our approach, there remains
room for improvement. For instance, our current work has not
taken into account the temporal aspects of the business popular-
ity, such as modeling the trend of the "check-in" scores over time.
Further quantitative and qualitative studies may also be needed in
the future to compare our work with other location-based services
such as Foursquare. To facilitate more comprehensive location ana-
lytics, we can extend our approach by building a two-level location
recommendation system, whereby we first (coarsely) recommend a
city district [15] and then pinpoint (multiple) promising locations
within that district. As we include more data, such as non-food cat-
egories and auxiliary data that reflect the human flow of different
areas of an urban city, we will be able to further improve on our cur-
rent model and findings. To address all these, we plan to develop a
new spatiotemporal predictive model that integrates a richer set of
residential, demographics, and other social media data.
Acknowledgements. This research is supported by the National
Research Foundation, Prime Minister's Office, Singapore under its
International Research Centres in Singapore Funding Initiative.
9. REFERENCES
[1] J. Chang and E. Sun. Location3: How users share and
respond to location-based data on social networking sites. In
Proceedings of the International AAAI Conference on
Weblogs and Social Media, pages 74–80, 2011.
[2] H. Chen, R. H. L. Chiang, and V. C. Storey. Business
intelligence and analytics: From big data to big impact. MIS
Quarterly, 36(4):1165–1188, 2012.
[3] N. Cohen. Business location decision-making and the cities:
Bringing companies back. Technical report, Brookings
Institution Center on Urban and Metropolitan Policy, 2000.
[4] ESRI. Revealing the "where" of business intelligence using
location analytics.
http://www.esri.com/library/whitepapers/pdfs/
business-intelligence-location-analytics.pdf,
2012.
[5] Facebook. Facebook platform upgrade guide. https:
//developers.facebook.com/docs/apps/upgrading,
2016.
[6] Facebook. Graph API reference. https://developers.
facebook.com/docs/graph-api/reference/page, 2016.
[7] R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J.
Lin. LIBLINEAR: A library for large linear classification.
Journal of Maching Learning Research, 9:1871–1874, 2008.
[8] J. H. Friedman. Greedy Function Approximation: A
Gradient Boosting Machine. The Annals of Statistics,
29:1189–1232, 2001.
[9] H. Gao, J. Tang, X. Hu, and H. Liu. Exploring temporal
effects for location recommendation on location-based social
networks. In Proceedings of the ACM Conference on
Recommender Systems, pages 93–100, 2013.
[10] H. Gao, J. Tang, X. Hu, and H. Liu. Modeling temporal
effects of human mobile behavior on location-based social
networks. In Proceedings of the ACM Conference on
Information and Knowledge Management, pages 1673–1678,
2013.
[11] L. Garber. Analytics goes on location with new approaches.
IEEE Computer, 46(4):14–17, 2013.
[12] P. Georgiev, A. Noulas, and C. Mascolo. Where businesses
thrive: Predicting the impact of the Olympic Games on local
retailers through location-based services data. In
Proceedings of the International AAAI Conference on
Weblogs and Social Media, pages 151–160, 2014.
[13] D. Karamshuk, A. Noulas, S. Scellato, V. Nicosia, and
C. Mascolo. Geo-spotting: Mining online location-based
services for optimal retail store placement. In Proceedings of
the ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, pages 793–801, 2013.
[14] R. Li, S. Wang, and K. C.-C. Chang. Multiple location
profiling for users and relationships from social network and
content. Proceedings of the International Conference on Very
Large Data Bases, 5(11):1603–1614, 2012.
[15] J. Lin, R. J. Oentaryo, E.-P. Lim, C. Vu, A. Vu, A. T. Kwee,
and P. K. Prasetyo. A business zone recommender system
based on Facebook and urban planning data. In Proceedings
of the European Conference on Information Retrieval, pages
1–7, 2016.
[16] A. Natekin and A. Knoll. Gradient boosting machines: A
tutorial. Frontiers in Neurorobotics, 7(21):1–21, 2013.
[17] A. Noulas, S. Scellato, N. Lathia, and C. Mascolo. Mining
user mobility features for next place prediction in
location-based services. In Proceedings of the IEEE
International Conference on Data Mining (ICDM), pages
1038–1043, 2012.
[18] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel,
B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss,
V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau,
M. Brucher, M. Perrot, and E. Duchesnay. Scikit-learn:
Machine learning in python. Journal of Machine Learning
Research, 12:2825–2830, 2011.
[19] W. H. Press, B. P. Flannery, S. A. Teukolsky, and W. T.
Vetterling. Numerical Recipes in C: The Art of Scientific
Computing. Cambridge University Press, 1988.
[20] R. W. Sinnott. Virtues of the haversine. Sky and Telescope,
68(2):159, 1984.
[21] C. Smith. 200+ amazing facebook user statistics.
http://expandedramblings.com/index.php/
by-the-numbers-17-amazing-facebook-stats/, 2016.
[22] C. Smith. By the numbers: 17 important Foursquare stats.
http://expandedramblings.com/index.php/
by-the-numbers-interesting-foursquare-user-stats/,
2016.
[23] A. J. Smola and B. Schölkopf. A tutorial on support vector
regression. Statistics and Computing, 14(3):199–222, 2004.
[24] B. Thau. How big data helps chains like starbucks pick store
locations-an (unsung) key to retail success.
http://onforb.es/1iijr2o, 2015.
[25] Y. Zhang, B. Li, and J. Hong. Understanding user economic
behavior in the city using large-scale geotagged and
crowdsourced data. In Proceedings of the International
World Wide Web Conference, 2016.
|
1710.00364 | 1 | 1710 | 2017-10-01T15:12:13 | Activating the "Breakfast Club": Modeling Influence Spread in Natural-World Social Networks | [
"cs.SI",
"cs.MA"
] | While reigning models of diffusion have privileged the structure of a given social network as the key to informational exchange, real human interactions do not appear to take place on a single graph of connections. Using data collected from a pilot study of the spread of HIV awareness in social networks of homeless youth, we show that health information did not diffuse in the field according to the processes outlined by dominant models. Since physical network diffusion scenarios often diverge from their more well-studied counterparts on digital networks, we propose an alternative Activation Jump Model (AJM) that describes information diffusion on physical networks from a multi-agent team perspective. Our model exhibits two main differentiating features from leading cascade and threshold models of influence spread: 1) The structural composition of a seed set team impacts each individual node's influencing behavior, and 2) an influencing node may spread information to non-neighbors. We show that the AJM significantly outperforms existing models in its fit to the observed node-level influence data on the youth networks. We then prove theoretical results, showing that the AJM exhibits many well-behaved properties shared by dominant models. Our results suggest that the AJM presents a flexible and more accurate model of network diffusion that may better inform influence maximization in the field. | cs.SI | cs | Activating the "Breakfast Club": Modeling Influence Spread in Natural-World
Social Networks
Lily Hu 1, Bryan Wilder 2, Amulya Yadav 2, Eric Rice 2, Milind Tambe 2
1Harvard University, Cambridge, MA, 02138, USA
{lilyhu}@g.harvard.edu
2University of Southern California, Los Angeles, CA, 90089, USA
{bwilder, amulyaya, ericr, tambe}@usc.edu
7
1
0
2
t
c
O
1
]
I
S
.
s
c
[
1
v
4
6
3
0
0
.
0
1
7
1
:
v
i
X
r
a
Abstract
While reigning models of diffusion have privileged the struc-
ture of a given social network as the key to informational ex-
change, real human interactions do not appear to take place
on a single graph of connections. Using data collected from a
pilot study of the spread of HIV awareness in social networks
of homeless youth, we show that health information did not
diffuse in the field according to the processes outlined by
dominant models. Since physical network diffusion scenarios
often diverge from their more well-studied counterparts on
digital networks, we propose an alternative Activation Jump
Model (AJM) that describes information diffusion on physi-
cal networks from a multi-agent team perspective. Our model
exhibits two main differentiating features from leading cas-
cade and threshold models of influence spread: 1) The struc-
tural composition of a seed set team impacts each individual
node's influencing behavior, and 2) an influencing node may
spread information to non-neighbors. We show that the AJM
significantly outperforms existing models in its fit to the ob-
served node-level influence data on the youth networks. We
then prove theoretical results, showing that the AJM exhibits
many well-behaved properties shared by dominant models.
Our results suggest that the AJM presents a flexible and more
accurate model of network diffusion that may better inform
influence maximization in the field.
1
Introduction
Research in influence maximization lies at the crossroads
of the who, what, and when of information diffusion. In
their seminal paper, Kempe, Kleinberg, and Tardos (2003)
formalized the problem by imagining influencing agents as
seed nodes in a network initialized to propagate informa-
tion first to neighbors and eventually throughout the net-
work as influence spreads. Along with theoretical work in
the field, the wide availability of large-scale digital data has
positioned internet networks-web link traces, email com-
munication, social media platforms-at the center of the dis-
cussion of the influence maximization problem. Even so,
empirical work that compares predictions by the dominant
Independent Cascade (ICM) and Linear Threshold (LTM)
models with realized diffusion at the node level is limited.
Prevailing methodologies for estimating diffusion model pa-
rameters often achieve low accuracy in replicating observed
Copyright c(cid:13) 2018, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
behavior even when applied to well-defined online networks
with temporal information flow data (Goyal, Bonchi, and
Lakshmanan 2011; Wang et al. 2013).
Although the ICM and LTM were originally formulated
to describe social influence in natural environments (Gra-
novetter 1978; Schelling 1978), there is a dearth of high-
quality data that support the theories on networks in these
physical settings. Moreover, multiple challenges exacerbate
these deficiencies in physical settings. First, both the ICM
and LTM assume that the topology of social ties is iden-
tical with the mesh of connective channels through which
information spreads. While on many social media platforms
a user's social network delimits her space of communica-
tion, in the natural world, an individual's total space of
social navigation dwarfs the space of those she calls her
"friends," and there exists a multiplicity of information av-
enues within the network that do not coincide with one's
social ties (Shafie 2015). Further, previous work has shown
that models with strong assumptions about a particular con-
structed graph topology are more prone to error and inaccu-
racy in their predictions of information spread (Butts 2003;
Krackhardt and Kilduff 1999).
In this paper, we analyze information diffusion data from
the first empirical study of influence maximization in the
physical world (Yadav et al. 2017), which tracked 173 indi-
viduals across 3 distinct networks over a multi-year time pe-
riod. We delved into this significant corpus of natural world
network data to investigate influence spread at an individ-
ual node level rather than a network-wide volume level. We
found that information did not diffuse from seed nodes to
the greater network according to processes suggested by
the ICM or LTM. Most strikingly, we found that across
all three networks in the study, 50 % of informed nodes
lacked any path to a seed node and moreover, a node's de-
gree of connectivity-both generally and specifically to seed
nodes-exhibited no correlation with likelihood of becom-
ing informed. These results directly contradict predictions
put forth by the ICM and LTM and call into question the
suitability of these leading models of diffusion for approxi-
mating information spread on physical networks.
These negative results against the ICM and LTM can be
generalized to apply to other graph-based models of diffu-
sion: The high proportion of informed yet isolated nodes
cannot be explained by models that rely on edge-based prop-
agation as the sole avenue for influence spread (DeGroot
1974). On the other hand, more flexible approaches such as
Hawkes contagion processes (Zhou, Zha, and Song 2013),
which allow for influence to spread over greater social dis-
tances, cannot explain the differing spread outcomes across
the networks. In general, appealing only to non-graph fea-
tures of the diffusion scenarios cannot reconcile the diver-
gences in observed information diffusion in the three differ-
ent Yadav et al. studies. In response to the shortcomings of
existing models, we develop a new model of targeted peer-
to-peer information spread on natural networks that does
not rely on strong tie assumptions and instead incorporates
an understanding of influencing as a "team" behavior.
Our model features two distinguishing characteristics that
are aligned with real-world information diffusion in phys-
ical spaces: 1) Nodes exchange information beyond their
immediate social ties, and 2) Seed nodes act as a multi-
agent team to spread information, where their overall in-
fluencing efficacy is a function of both individual and team
attributes. In the proposed Activation Jump Model (AJM),
team-based influence spread in a network is driven by acti-
vating the "Breakfast Club," where individuals from differ-
ent social contexts band together for a common cause and
form a united team for information diffusion. These features
confer a flexibility to our forecasts of information flow and
allow our model to achieve a 60% to 110% improvement
over the best ICM and LTM predictions in its predictions of
which nodes will be influenced.
We also point to a methodological pitfall of research in
influence maximization that focuses solely on achieving a
particular level of information diffusion within a network.
Namely, matching magnitude of influence spread under sim-
ulations to observed influence spread is insufficient evidence
for determining the underlying diffusion process. We show
that optimal seeding under one model achieves near-optimal
(> 90%) influence spread under another diffusion process
on three natural-world networks. In fact, any magnitude of
influence spread can be explained by varying ICM and LTM
parameters, pointing to a fundamental ambiguity in identi-
fying the true diffusion process based on this metric alone.
Even when seeding strategies achieve high levels of influ-
ence spread, leading models' failures to predict node-level
influence can limit their applicability. In domains of sus-
tainability, network interventions can generate knowledge or
promote behavioral changes within a community. These pro-
grams typically identify individuals and groups that may es-
pecially benefit from the intervention. For example, school
network-based suicide prevention programs aim to increase
general awareness about signs of suicidal behavior but espe-
cially seek to reach high-risk adolescents and their social cir-
cles (Kalafat and Elias 1994). Similarly, peer-led HIV pre-
vention programs akin the to the fieldwork by Yadav et al.
hope to reach a diverse set of individuals but especially those
who participate in risky behaviors (Broadhead et al. 1998).
As such, most social interventions have the dual purpose of
maximizing influence coverage while also targeting vulner-
able individuals. With its superior performance in predicting
node-level influence, the AJM may serve as a more desirable
framework to guide these intervention strategies in the field.
2 Network Intervention Data Analysis
Pilot Study Procedure Yadav et al.'s long-standing col-
laboration with homeless youth service providers in a large
urban area sought to improve peer-led heatlh interventions
by leveraging research in influence maximization (2017). To
this end, they conducted a series of head-to-head comparison
studies of seeding strategies to select cohorts of Peer Lead-
ers among the youth that would be trained for the task of
HIV awareness diffusion in their communities. Three stud-
ies took place on three distinct social networks of homeless
youth. Each study recruited youth and gathered social net-
work data using online contacts, field observations, and sur-
veys. A different seeding strategy was then deployed on each
of the generated networks: In two of the pilot studies, Peer
Leaders were chosen via two algorithmic agents for influ-
ence maximization, HEALER and DOSIM, which were de-
signed to optimize network-based intervention strategies for
health providers. The third network was seeded via degree
centrality (DC), the most commonly-used heuristic in net-
work interventions (Valente 2012), such that the most popu-
lar youth were chosen as Peer Leaders.
Each network's Peer Leaders underwent an intensive
training course led by pilot study staff that served to both in-
struct the youth in spreading information about HIV to their
peers as well as bind the members together in their shared
roles as health ambassadors. After Peer Leaders were sent
out into the field, youth were asked in 1-month and 3-month
follow-up surveys about whether they had received infor-
mation about HIV from a Peer Leader. These responses re-
vealed the extent to which information had spread from seed
nodes to the greater network. The post-intervention results
revealed that the HEALER and DOSIM seeding strategies
resulted in greater informational spread compared to DC,
with ∼74% and ∼72% respectively of non-Peer Leaders
reporting having received information about HIV in the 3-
month survey compared to ∼35% in the control study. Since
both HEALER and DOSIM solved the influence maximiza-
tion problem by assuming a model of information spread
based on a generalization of the Independent Cascade, the
success initially seemed to validate the model as an accurate
approximation of information spread in the physical world.
Table 1: Fraction of nodes in each network that were in-
formed, sorted by connectivity status to Peer Leaders. De-
nominator gives total number of nodes of that type; numer-
ator gives number of those that are informed. Direct nodes
have an edge to a PL; indirect nodes are connected via inter-
vening neighbor(s); isolated nodes lack a path to any PL.
Isolated Proportion
Informed
Indirect
Network
HEALER 34
DOSIM 25
26
n Direct
15/21
5/6
5/12
DC
4/7
5/10
1/4
6/6
8/9
3/10
25/34
18/25
9/26
Node-level analysis of information diffusion However,
the empirically observed node-level patterns of information
spread in the three networks wildly diverged from Inde-
pendent Cascade and Linear Threshold predictions. Table 1
gives an overview of the connectivity of nodes that reported
receiving information about HIV from a Peer Leader in the
3-month follow-up survey. In each of the three networks,
nodes lacking a path to any seed Peer Leaders-denoted as
"isolated" in the table- represented a high proportion of
all nodes that were informed. Notably, in both the HEALER
and DOSIM interventions, isolated youth were informed at
a rate higher than even those youth who were directly con-
nected to one or more Peer Leaders, with 100% (6/6 in
HEALER) and 89% (8/9 in DOSIM) informed compared to
∼71% (15/21) and ∼83% (5/6). In the DC network, the ef-
fect is less pronounced, though isolated nodes were still in-
formed at a rate comparable to the general non-Peer Leader
population (30% compared to ∼35%). Nonetheless within
the context of the ICM and LTM, such nodes have a 0 prob-
ability of receiving information. Thus, these results imme-
diately challenge the claim that existing ties are the domi-
nant avenues of informational exchange and also call into
question the premise that information radiates out from seed
nodes first to neighbors and then to the rest of the network.
In order to more finely assess the effect that a node's con-
nectivity had on its likelihood of receiving HIV information,
we calculated Pearson correlation coefficients between two
degree measures and a node's final information status. Our
results in Table 2 show that all such correlations are not sig-
nificantly different from no correlation, thus indicating that
connectivity has no bearing on likelihood of being influ-
enced. This stands in contrast to prevailing models, in which
a node's edges represent its "opportunities" to receive infor-
mation, and thus both Peer Leader degree-the number of
ties a node has to Peer Leaders-and total degree should be
strictly positively correlated with becoming informed.
Table 2: Pearson correlation coefficients r between nodes'
influence statuses and their Peer Leader (PL) and total de-
gree. PL degree counts edges to PLs; total degree counts
edges to all nodes. Positive (negative) r implies a positive
(negative) relationship between reporting hearing HIV infor-
mation and degree. 95% confidence intervals are also given.
Network
n
HEALER 34
DOSIM 25
DC
26
PL Degree
-0.0685
Total Degree
-0.1867
(-0.397, 0.276)
(-0.494, 0.162)
(-0.268, 0.508)
(-0.419, 0.370)
0.1418
0.1547
-0.0290
0.1304
(-0.247, 0.511)
(-0.271, 0.493)
The lower contact rate of directly connected nodes and
the lack of positive correlation between degree and influ-
ence status are even more dissonant with edge-based models
of propagation when considered alongside the high levels
of influence spread achieved in the studies. In the HEALER
network, information was successfully transmitted to ∼74%
of all non-Peer Leaders, corresponding to a most likely prop-
agation probability of p ≈ 0.84. Such a high propagation
probability further suggests that Peer Leader-neighboring
nodes should be even more heavily favored to receive infor-
mation, with simulations predicting that nearly all (∼99%)
would become informed, whereas in reality, only ∼71%
of these nodes received information. Simulations on the
HEALER network with this p value produce correlations of
0.489 and 0.598 between degree and likelihood of being in-
formed (PL and total respectively), indicating a moderate to
strong positive relationship compared to the actual values of
−0.0685 and −0.1867, which indicate negative to no rela-
tionship between degree and influence status. In the DOSIM
study, the graph topology itself, with 5 connected compo-
nents in addition to 7 nodes of degree 0, restricts information
spread under the ICM and LTM to maximally reach 68% of
all non-Peer Leaders. Even under perfect information propa-
gation, as long as nodes are only able to influence neighbors,
simulations under-predict the observed information spread.
While the presence of a single phenomenon such as the
activation of a small proportion of isolated nodes could rep-
resent mere aberrations of data, these multiple contradic-
tions with prevailing models indicate that the results cannot
be dismissed as simply anomalous. Given the unique chal-
lenges and complexities of information diffusion on physi-
cal networks, we must accept that the data's divergence from
predictions by models that have been largely validated only
on digital networks is one step in the uncovering and under-
standing of a qualitatively different influence process. We
thus conclude that there is no evidence that a cascade or
threshold-like process of information diffusion produced the
observed data and move toward developing a new model of
influence dynamics on real-world physical networks.
3 Proposed Model
In this section, we introduce a new model of information
spread for this class of peer-to-peer diffusion phenomena.
Activation Jump Model
Beginning with the premise that instances of social exchange
are not limited to nodes that share a tie, our model of dif-
fusion does not constrain information flow to the edges in
a network. In the Activation Jump Model (AJM), influenc-
ing agents may leave their immediate social neighborhood to
contact and propagate information to other nodes. This ac-
tion of contacting nodes beyond one's first-order ties is sig-
nified as a "jump." We recognize the heterogeneity of active
nodes' social dispositions by differentially modeling each
influencer's jump behavior. A seed node's jump activity has
two main components: 1) activation level, a measure of how
many other nodes it will attempt to influence, and 2) land-
ing distribution, a probability distribution that expresses to
which inactive nodes it will jump. Together, these two fea-
tures describe how often and to whom an influencing agent
contacts as she navigates the network to spread information.
Thus the AJM comprises two stages: First, each seed node
determines its activation level, giving the number of other
nodes to which it will jump. Second, the seed set is deployed
in the network, and the social influence process unfolds in
time. When a given seed jumps at time t, it selects from its
landing distribution a target node uninformed at time t, mod-
eling the process by which seed nodes seek nodes to inform.
Influence is then successfully propagated with probability p.
The AJM takes a multi-agent systems approach to the in-
fluence maximization problem by constructing a model of
node activation that is a function of both individual and
"team" attributes. In contrast to prior models, the seed set
is not a collection of independent influencers, rather nodes
exhibit behavioral dependencies wherein group dynamics ei-
ther contribute to or detract from aggregate activation levels.
Model Formalization
While in this paper and all our results, we use a form of the
AJM tied to the graph's structural properties, we first discuss
the general form of the model to show that it can accommo-
date a broad range of properties and then discuss our specific
form. We return to the generalization in the Discussion.
Consider a team of seed nodes, S, tasked with informa-
tion diffusion on a network G = (V, E). Each seed node
draws its activation level, giving the number of jumps it
will make, from a distribution that is a function of both the
node's individual attributes as well as the seed set's team
attributes. Formally, let ∆Z be the set of distributions over
integers Z ≥ 0. Each node v ∈ V is associated with a func-
tion fv : 2V → ∆Z that maps the set of seed nodes to a
distribution A(v, S) over discrete activation levels. A(v, S)
is a parameterized distribution (e.g., geometric) with mean
µv = h(S)[aT xv] where xv is the node's attribute vector
with coefficients aT . Together aT xv represents the partic-
ular node's maximum activation level, which is modulated
by the team activation level term given by h(S) ≤ 1, a
function of the structural positions of nodes in S that cap-
tures discomplementarities among team members. Figure 1
illustrates this dual-individual and team-composition of
a seed node's activation level distribution.
Figure 1: In the Activation Jump Model, a seed node v is
associated with an activation level distribution that is a func-
tion of individual node as well as seed set S attributes.
Each node v is also associated with a landing distribution,
Lv,T , giving the probabilities with which v jumps to a set of
potential target nodes T . The landing probability is a func-
tion of the attributes of the influencing seed v and particular
targeted node u. Based on these qualities, the node pair is as-
signed a score φ(v, u) ≥ 0, and Lv,T (u) = Γφ(v, u) where
Γ is a normalization factor such that(cid:80)
u∈T Lv,T (u) = 1.
We now instantiate the AJM in a specific form that fea-
tures the concept of "structural diversity," which highlights
groups with members who participate in multiple distinct
social contexts. The team thus acts to unite otherwise dis-
parate nodes, producing the "Breakfast Club" effect, which
has been shown to be a key determinant of diffusion in net-
works (Ugander et al. 2012). Thus we formulate the function
(cid:88)
(u,v)∈E
h(S) = 1 − 1
A
1 [u, v ∈ S]
(1)
where A > 0 is a constant equal to seed set size S. h
illustrates the negative effect of social homogeneity in the
form of between-seed-node edges on a team's effectiveness.
Each pair of connected seed nodes entails a loss of 1S of the
team's effectiveness. Barring negative influence, h(cid:48)(S) =
max(h(S), 0) without loss of generality. To reflect the corre-
lation between degree and propensity towards sociality and
thus activation, we parsimoniously set aT xv = deg(v).
1...tv
Av
The landing distribution score for seed v and target u is
given by φ(v, u) = 1
d(v,u), where d(v, u) is the path-length
distance between the two nodes. When d(v, u) = 0, we set
φ(v, u) = , where > 0 is a small constant. As in the ICM,
the propagation probability p is able to be varied.
Information diffusion thus occurs in two stages. First, dur-
ing the activation stage each node in the seed set v ∈ S is
initialized by drawing an activation level Av from its dis-
tribution A(v, S). Then, the jump stage unfolds over the
time interval [0, 1]. Each seed node v draws a series of jump
times tv
from the uniform distribution over [0, 1]. At
each jump time tv
i , v jumps to an uninfluenced target node u
drawn from Lv,T where T the set of uninfluenced nodes at
i . Finally, u is successfully influenced with probability p.
tv
Model Discussion
The Activation Jump Model's incorporation of seed set
team dynamics follows a line of multi-agent systems re-
search which demonstrates the importance of careful team
formation when agents must collaborate to achieve a goal
(Gaston and DesJardins 2003; Gaston, Simmons, and Des-
Jardins 2004; Liemhetcharat and Veloso 2012; Agmon and
Stone 2012). In particular, previous work has focused on
the importance of creating a diverse team (Balch 2000;
Hong and Page 2004; Marcolino, Jiang, and Tambe 2013).
In the AJM, we computationalize this concept by using the
group effectiveness function h to model network structural
diversity by penalizing seed sets with many within-team
edges. Thus h ∈ [0, 1] is decreasing in the level of con-
nectivity among seed nodes, and influencing nodes are more
active when they occupy distinct neighborhoods of the net-
work rather than when the team is socially homogeneous.
v∈S h(S)[aT xv] >(cid:80)
node w ∈ V such that(cid:80)
It is important to note that under this model set-up, a
node's marginal effect on the aggregate activation level of
a seed set is not guaranteed to be positive. There may exist a
v∈S∪w h(S∪
w)[aT xv], with the effect that the influence function f (·),
giving the expected number of influenced nodes, is non-
monotone. Although this is a significant departure from the
ICM and LTM, we argue that non-monotonicity is a real-
istic feature of team-based influence spread, since a new
seed node may interfere with team dynamics, resulting in a
deleterious effect that outweighs its positive individual con-
tribution. This balance between the quantity and quality of
80 77
75
61
48
44
46
34
C
O
R
U
A
60
40
20
HEALER DOSIM
Network
ICM
AJM
29
20
DC
LTM
Figure 2: Comparison of model classification performances
members in a seed set is an important consideration in team
formation in the real world. As a result, the influence max-
imization problem under the AJM requires examination of
not only a node's individual attributes but also its effect on
the group composition of nodes already in the seed set.
Model Validation on Post-Intervention Data
We evaluate the performance of the Activation Jump Model
by comparing its predictions to Yadav et al.'s dataset of HIV
awareness spread on three distinct social networks of home-
less youth. Standard experiments of diffusion models com-
pare the magnitude of total influence spread under simula-
tions to that observed empirically in order to assess model
accuracy. Here, we perform a finer-grained analysis by eval-
uating and comparing AJM, ICM, and LTM predictions of
node-level influence. We treat each model as a binary clas-
sifier that outputs the predicted probability of each node be-
coming influenced. Each model is then evaluated according
to its AUROC, a standard measure of classification accuracy.
Parameter settings: Physical networks present challenges
in data collection that limit the ability to view multiple cas-
cades, rendering standard methods of inferring diffusion pa-
rameters inoperable. We work under this constraint by fit-
ting the ICM directly to the test data by running simulations
under the propagation value that gives its best classification
performance and then forcing the AJM to also work under
this value. Thus any experimental bias favors the ICM.
For the AJM, the only parameter we set is the small con-
stant φ(v, u) = 0.1 for the landing distribution score when
d(v, u) = 0. By contrast, we present the strongest possible
version of the ICM for each network, fitting it directly to the
test data by selecting the propagation value p that maximized
the ICM's AUROC value. We then used this same probabil-
ity for the AJM. By forcing the AJM to operate under the
ICM's optimal parameterization, we ensure that our experi-
ments truly test the AJM's better suitability for modeling the
data, rather than a better ability to "memorize" the data.
Assessing classification accuracy: Using selected Peer
Leaders in the field experiments as seed nodes, we generated
diffusion instances according to the Activation Jump, Inde-
pendent Cascade, and Linear Threshold models, tracing out
Figure 3: Models' ROC curves on HEALER network
Receiver Operating Characteristic (ROC) curves for each set
of simulations. This evaluation methodology has been used
in previous node-level analyses of information diffusion
models (Wang et al. 2013; Goyal, Bonchi, and Lakshmanan
2010) and has been recognized as superior to Precision-
Recall curves for the binary classification task (Provost et
al. 1998). ROC curves plot a classifier's True Positive Rate
(TPR) against its False Positive Rate (FPR) with each point
on the curve corresponding to a predictive threshold such
that all nodes with a probability of being informed above
(below) the threshold are classified as influenced (not influ-
enced). We used the area under the ROC curve (AUROC)
to evaluate classification performance (Fawcett 2006) where
an AUROC of 1 corresponds to a perfect classifier.
Results: Each model's AUROC values for the three net-
works are shown in Figure 2; the ROC curves for all three
models' predictions on the HEALER network are shown in
Figure 3. The AJM outperforms the ICM and LTM across all
networks, with the model achieving accuracies (measured
via AUROC) of 77% and 75% on the HEALER and DOSIM
networks respectively, while the best ICM and LTM issue
predictions that, on average, perform worse than a random
classifier (20-48%). For DC, one possible explanation for
all three models' lower AUROCs is the overall poor perme-
ation of influence throughout the network, since low base-
rates cause the measure to be sensitive to small classifica-
tion changes. Even so, the AJM is far from a trivial classi-
fier, with an AUROC of 0.61 compared to the ICM and LTM
values of 0.29 and 0.20 respectively.
4 The Influence Maximization Problem
under the Activation Jump Model
given by f (S) = h(S)(cid:80)
We now consider the influencing activity of a coordinated
multi-agent team under the AJM. Since seed agents do not
target nodes that have already been informed, the influence
function is captured by the total number of expected jumps,
v∈S aT xv, where h(S) follows the
form in Equation 1. We show that under natural conditions,
f is a (potentially nonmonotone) submodular function.
Lemma 1. h is monotone-decreasing and submodular.
Proof. h is monotonically decreasing by inspection. For
submodularity, consider the marginal impact of adding a
given node v to an existing seed set S:
(cid:88)
(u,w)∈E
h(vS) = − 1
A
1 [{u, w} (cid:54)⊆ S,{u, w} ⊆ S ∪ {v}] .
Now consider some S(cid:48) ⊇ S, v (cid:54)∈ S(cid:48). The indicator
function in the above sum counts edges where one of the
two nodes is not contained in S, but both are contained in
S ∪ {v}. If S(cid:48) extends S but does not contain v, then the
summation for h(vS(cid:48)) can only include more nonzero terms
than the summation for h(vS). Since each term is nonposi-
tive, h(vS(cid:48)) ≤ h(vS).
In fact, h being monotone-decreasing and submodular is
sufficient for the objective f to also be submodular:
Proposition 1. Whenever h is a monotone-decreasing sub-
modular function, f is submodular.
Proof. Consider the marginal gain of adding a node v to a
given seed set S:
f (vS) = h(S ∪ {v})aT xv + [h(S ∪ {v}) − h(S)]
aT xu
(cid:88)
u∈S
We prove that f is submodular by showing that each cor-
responding term in f (vS(cid:48)) can only decrease for all S ⊆ S(cid:48).
The first term decreases since h is a submodular function
as shown in the lemma. The second term, corresponding to
the individual contribution of v, also decreases because h is
monotonically decreasing. Thus f (vS(cid:48)) ≤ f (vS).
Having shown that f is submodular, a natural approach
to seeding would use the greedy algorithm, giving a 1 − 1
e
approximation for the ICM and the LTM (Kempe, Klein-
berg, and Tardos 2003; Leskovec et al. 2007; Chen, Wang,
and Yang 2009). However, since f is non-monotone, this
approach does not apply. Instead, we adopt the stochastic
greedy algorithm proposed by Feldman, Harshaw, and Kar-
basi (2017). Algorithm 1 runs the normal greedy algorithm
(lines 4-6) but only selects from a limited set of nodes P .
Each node is included in P with probability 1/2. This ran-
dom removal reduces the chance that the greedy method will
prematurely commit to a node that later become problematic
due to non-monotonicity. Feldman et al. (2017) show that
4-approximation to the
this algorithm obtains a guaranteed 1
optimal value and has excellent empirical performance. Our
experiments follow their suggested strategy of running the
algorithm several times (we both use 4).
Algorithm 1 StochasticGreedyAJM (V, f, k)
1: initialize S = ∅, P = ∅
2: for v ∈ V do
3:
4: while S < k and ∃v ∈ P such that f (S ∪ v) ≥ f (S)
2 , P ← P ∪ v
with probability 1
do
5:
6:
7: return S
v = arg maxv∈P f (S ∪ v) − f (S)
S ← S ∪ v
Meta-Analysis of Influence Spread Metrics
The finding that the ICM is a poor predictor of node-level
influence is dissonant with the fact that seeding algorithms
based on the ICM have proved effective in the field (Yadav
et al. 2017). After all, how can an algorithm based on an in-
accurate model of diffusion manage to nevertheless achieve
a high level of influence spread? To address this seeming
conflict, we confront a larger question about the prevailing
methodology of the influence maximization problem. In this
section, we show that appealing solely to the magnitude of
influence spread achieved is a fundamentally inconclusive
method of determining whether a particular diffusion model
underlies an observed instance of spread. This ambiguity is
problematic when using the influence maximization frame-
work to inform the seeding strategies of network interven-
tions in sustainability domains. In many such cases, in ad-
dition to diffusing information generally, programs seek to
target particular individuals or groups, and thus a model's
ability to make node-level predictions is a valuable asset.
Magnitude of Influence Spread Previous research com-
paring information diffusion model predictions to empirical
results has tended to rely on metrics related to volume of
spread-such as minimizing RMSE as a function of actual
spread or recapitulating cascade sizes-to determine the fi-
delity of a model to ground truth processes (Goyal, Bonchi,
and Lakshmanan 2011). However, one cannot extrapolate
processes from such coarse-grain outcomes. The following
experiments use three examples of physical, meso-scale net-
works: Homeless, a network of 142 nodes gathered via in-
terviews with homeless youth, India, a household-level net-
work gathered from a rural village in India (Banerjee et al.
2013), and SBM, a synthetic network of 200 nodes gener-
ated via the Stochastic Block Model, which replicates the
community structure found in real social networks.
We evaluate how seed sets selected under one diffusion
model perform in an influence maximization task under
the other models. Figure 4a examines the consequences of
model misspecification for influence maximization. We set
the parameters equally across all networks-0.1 for propa-
gation probabilities in the ICM and AJM and edge weights
in the LTM. Each table entry shows the percentage of opti-
mal influence spread obtained when a seed set selected ac-
cording to the model on the column is assessed with the
model on the row. For example, the cell (ICM, LTM) in-
dicates that a seed set selected via the greedy algorithm for
the LTM produced influence spread that was 99.8% optimal
when diffusion actually occurred under the ICM. Given that
all entries are greater than 90%, determining model fit by
examining the magnitude of influence spread achieved un-
der its seeding strategy leads to great ambiguity. Since all
of these models result in high influence spread, any model
could account for the "true" underlying process of diffusion.
One explanation for this phenomenon points to the com-
munity structure common in social networks. Algorithms
for influence maximization under the ICM tend to distribute
seed nodes across different communities to avoid the redun-
dancy of seeding the same community multiple times. But
seeding according to the AJM results in a similar recom-
mendation to ensure diversity among seed nodes. Hence, at-
Figure 4
99.8
100
96.1
ICM LTM AJM
98.6
ICM
100
98.8
LTM 99.6
AJM 97.4
100
ICM LTM AJM
100
99.8
ICM
98.9
LTM 99.9
AJM 93.7
100
ICM LTM AJM
99.4
ICM
100
LTM 99.3
99.8
100
AJM 96.3
98.4
100
97.8
98.7
100
93.9
(a) Percentage of optimal influence spread achieved when network
is seeded according to the column model and evaluated according
to the row model. Networks top to bottom: Homeless, India, SBM.
(b) Fraction of all nodes informed under ICM and LTM with vary-
ing parameters. Networks left to right: Homeless, India, SBM.
taining high influence spread is insufficient for identifying
a model as the true diffusion mechanism. On the one hand,
achieving comparable final magnitudes of influence spread
is a handy property for influence maximization tasks, as it
suggests that high-quality results are attainable even when
the true model is uncertain. However, many important in-
fluence maximization tasks require a descriptively accurate
diffusion model, not just one that works by coincidence.
Next, in Figure 4b, we show that common diffusion mod-
els are capable of reproducing any observed level of total
influence spread. Each plot gives the fraction of the graph
influenced by a random set of 10 seed nodes under the ICM
and LTM as we vary a parameter for each model. For the
ICM, we vary the propagation probability p. For the LTM,
deg(v) and vary w. Each
we assign each edge (u, v) a weight
line is an average of 30 draws of the random seeds. Under
both models, any level of influence can be explained by a
parameter choice in either of the models. We conclude that
even if a given model exactly replicates the observed amount
of influence spread in a network, this provides no evidence
that the model truly describes the underlying diffusion pro-
cess. Hence, we must use a finer-grained assessment such as
node-level activations to produce accurate diffusion models.
Toward Node-Level Influence Spread The prevailing
methodology's blind spot to node-level information spread
also engenders severe limitations in the actual deployment
of the influence maximization problem in the real world.
Seeding networks to maximize the scalar volume of influ-
ence spread is unproblematic when one is agnostic about
who is influenced. But in many sustainability domains, in-
fluence maximization in the field is not a crude game of
w
coverage, and the individual identities or attributes of influ-
enced nodes carry import. In the Introduction, we referenced
the variety of network interventions that seek to target par-
ticular individuals or sub-populations. Here, a single metric
capturing the magnitude of influence spread achieved is in-
sufficient in determining the success of a network interven-
tion. Thus even when in cases when seeding according to
the AJM rather than the ICM or LTM would result in simi-
lar levels of influence spread, social programs would prefer
seeding according to the model that makes accurate node-
level predictions as it will also be better equipped to target
specific individuals. We have shown that in these cases, the
AJM significantly outperforms leading models.
5 Discussion
A breadth of research has investigated information diffusion
on online networks, but the problem of influence maximiza-
tion remains under-explored on natural networks. By ana-
lyzing node-level data from the first ever large-scale study
of influence maximization on physical social networkw, we
show that neither of the prevailing models of information
diffusion–the Independent Cascade and Linear Threshold–
could account for the empirical findings. Even after fitting
the best of these models to the data, they perform worse than
a random classifier in predicting a node's influence status.
We approached the shortcomings of the dominant mod-
els with an open mind to related research that may inform
our understanding of information diffusion in this domain.
Our proposed Activation Jump Model (AJM) draws from a
lineage of work in multi-agent systems and social network
theory that suggests that 1) social exchange need not only
occur along network ties and 2) an individual's influencing
behavior is affected by her surrounding community. Of par-
ticular note, we model seed set structural diversity as con-
ferring benefits to each node's influencing level.
The AJM is a more inclusive model of diffusion and supe-
rior to leading models in its predictive prowess. When val-
idated on three real-world networks with information diffu-
sion data, the AJM issues predictions of node-level influence
spread that improve upon the best ICM and LTM predictions
by 60% to 110%. Moreover, as the AJM is submodular and
non-monotone, we adopt a seeding algorithm that achieves a
4-approximation to the optimal influence spread. Thus high-
1
efficacy influence maximization under the AJM is computa-
tionally ready to be deployed in the real world.
It has long been accepted in the social sciences that the
link between individual and group social behaviors is bidi-
rectional (Mead 1934). A multi-agent team perspective is
thus particularly suited to describe peer-to-peer informa-
tion diffusion in the natural world, where a group's social
dynamic impacts how individual members will behave in
spreading information. By modeling team-formation, a cen-
tral component of many network interventions, the AJM sig-
nificantly updates the influence maximization problem for
natural world settings. Its framework, with flexible activa-
tion level and landing distribution functional forms, also
allows for contextually relevant information such as node-
specific attributes like gender and ethnicity to be incorpo-
rated when deployed in real-world network applications.
0.00.51.0p0.51.0Fraction informed0246wICMLTM0.00.51.0p0.00.51.0Fraction informed0246wICMLTM0.00.51.0p0.00.51.0Fraction informed0246wICMLTMReferences
[Agmon and Stone 2012] Agmon, N., and Stone, P. 2012.
Leading ad hoc agents in joint action settings with multi-
In Proceedings of the 11th International
ple teammates.
Conference on Autonomous Agents and Multiagent Systems-
Volume 1, 341–348.
International Foundation for Au-
tonomous Agents and Multiagent Systems.
[Balch 2000] Balch, T. 2000. Hierarchic social entropy: An
information theoretic measure of robot group diversity. Au-
tonomous robots 8(3):209–238.
[Banerjee et al. 2013] Banerjee, A.; Chandrasekhar, A. G.;
Duflo, E.; and Jackson, M. O. 2013. The diffusion of micro-
finance. Science 341(6144):1236498.
[Broadhead et al. 1998] Broadhead, R. S.; Heckathorn,
D. D.; Weakliem, D. L.; Anthony, D. L.; Madray, H.; Mills,
R. J.; and Hughes, J. 1998. Harnessing peer networks as an
instrument for aids prevention: results from a peer-driven
intervention. Public health reports 113(Suppl 1):42.
[Butts 2003] Butts, C. T. 2003. Network inference, error,
and informant (in) accuracy: a bayesian approach. social
networks 25(2):103–140.
[Chen, Wang, and Yang 2009] Chen, W.; Wang, Y.; and
Yang, S. 2009. Efficient influence maximization in social
networks. In Proceedings of the 15th ACM SIGKDD inter-
national conference on Knowledge discovery and data min-
ing, 199–208. ACM.
[DeGroot 1974] DeGroot, M. H. 1974. Reaching a con-
Journal of the American Statistical Association
sensus.
69(345):118–121.
[Fawcett 2006] Fawcett, T. 2006. An introduction to roc
analysis. Pattern recognition letters 27(8):861–874.
[Feldman, Harshaw, and Karbasi 2017] Feldman, M.; Har-
shaw, C.; and Karbasi, A. 2017. Greed is good: Near-optimal
submodular maximization via greedy optimization. arXiv
preprint arXiv:1704.01652.
[Gaston and DesJardins 2003] Gaston, M., and DesJardins,
M. 2003. Team formation in complex networks. In Pro-
ceedings of the 1st NAACSOS Conference.
[Gaston, Simmons, and DesJardins 2004] Gaston, M.; Sim-
mons, J.; and DesJardins, M. 2004. Adapting network struc-
ture for efficient team formation. In Proceedings of the AAAI
2004 fall symposium on artificial multi-agent learning.
[Goyal, Bonchi, and Lakshmanan 2010] Goyal, A.; Bonchi,
F.; and Lakshmanan, L. V. 2010. Learning influence proba-
bilities in social networks. In Proceedings of the third ACM
international conference on Web search and data mining,
241–250. ACM.
[Goyal, Bonchi, and Lakshmanan 2011] Goyal, A.; Bonchi,
F.; and Lakshmanan, L. V. 2011. A data-based approach
to social influence maximization. Proceedings of the VLDB
Endowment 5(1):73–84.
[Granovetter 1978] Granovetter, M. 1978. Threshold mod-
els of collective behavior. American journal of sociology
83(6):1420–1443.
[Hong and Page 2004] Hong, L., and Page, S. E.
2004.
Groups of diverse problem solvers can outperform groups
of high-ability problem solvers. Proceedings of the Na-
tional Academy of Sciences of the United States of America
101(46):16385–16389.
[Kalafat and Elias 1994] Kalafat, J., and Elias, M. 1994. An
evaluation of a school-based suicide awareness intervention.
Suicide and Life-Threatening Behavior 24(3):224–233.
[Kempe, Kleinberg, and Tardos 2003] Kempe, D.; Klein-
berg, J.; and Tardos, ´E.
2003. Maximizing the spread
In Proceedings
of influence through a social network.
of the ninth ACM SIGKDD international conference on
Knowledge discovery and data mining, 137–146. ACM.
[Krackhardt and Kilduff 1999] Krackhardt, D., and Kilduff,
M. 1999. Whether close or far: Social distance effects on
perceived balance in friendship networks. Journal of per-
sonality and social psychology 76(5):770.
[Leskovec et al. 2007] Leskovec, J.; Krause, A.; Guestrin,
C.; Faloutsos, C.; VanBriesen, J.; and Glance, N. 2007.
Cost-effective outbreak detection in networks. In Proceed-
ings of the 13th ACM SIGKDD international conference on
Knowledge discovery and data mining, 420–429. ACM.
[Liemhetcharat and Veloso 2012] Liemhetcharat, S.,
and
Veloso, M. 2012. Modeling and learning synergy for team
In Proceedings of
formation with heterogeneous agents.
the 11th International Conference on Autonomous Agents
and Multiagent Systems-Volume 1, 365–374.
Interna-
tional Foundation for Autonomous Agents and Multiagent
Systems.
[Marcolino, Jiang, and Tambe 2013] Marcolino, L. S.; Jiang,
A. X.; and Tambe, M. 2013. Multi-agent team formation:
diversity beats strength? In IJCAI, volume 13, 279–285.
[Mead 1934] Mead, G. H. 1934. Mind, self and society.
Chicago University of Chicago Press.
[Provost et al. 1998] Provost, F. J.; Fawcett, T.; Kohavi, R.;
et al. 1998. The case against accuracy estimation for com-
paring induction algorithms. In ICML, volume 98, 445–453.
[Schelling 1978] Schelling, T. 1978. Micromotives and mac-
robehavior. nueva york.
[Shafie 2015] Shafie, T. 2015. A multigraph approach to
social network analysis. Journal of Social Structure 16:0 1.
[Ugander et al. 2012] Ugander, J.; Backstrom, L.; Marlow,
C.; and Kleinberg, J. 2012. Structural diversity in social
contagion. Proceedings of the National Academy of Sciences
109(16):5962–5966.
[Valente 2012] Valente, T. W. 2012. Network interventions.
Science 337(6090):49–53.
[Wang et al. 2013] Wang, Y.; Shen, H.-W.; Liu, S.; and
Cheng, X.-Q. 2013. Learning user-specific latent influence
and susceptibility from information cascades. arXiv preprint
arXiv:1310.3911.
[Yadav et al. 2017] Yadav, A.; Wilder, B.; Rice, E.; Peter-
ing, R.; Craddock, J.; Yoshioka-Maxwell, A.; Hemler, M.;
Onasch-Vera, L.; Tambe, M.; and Woo, D. 2017. Influence
maximization in the field: The arduous journey from emerg-
In Proceedings of the 16th
ing to deployed application.
Conference on Autonomous Agents and MultiAgent Systems,
150–158. International Foundation for Autonomous Agents
and Multiagent Systems.
[Zhou, Zha, and Song 2013] Zhou, K.; Zha, H.; and Song,
L. 2013. Learning triggering kernels for multi-dimensional
hawkes processes. In Proceedings of the 30th International
Conference on Machine Learning (ICML-13), 1301–1309.
|
1804.08419 | 1 | 1804 | 2018-04-20T10:24:31 | A Robust Process to Identify Pivots inside Sub-communities In Social Networks | [
"cs.SI"
] | In this work, we extend a previous work where we proposed a suitable state model built from a Karhunen-Loeve Transformation to build a new decision process from which, we can extract useful knowledge and information about the identified underlying sub-communities from an initial network. The aim of the method is to build a framework for a multi-level knowledge retrieval. Besides the capacity of the methodology to reduce the high dimensionality of the data, the new detection scheme is able to extract, from the sub-communities, the dense sub-groups with the definition and formulation of new quantities related to the notions of energy and co-energy. The energy of a node is defined as the rate of its participation to the set of activities while the notion of co-energy defines the rate of interaction/link between two nodes. These two important features are used to make each link weighted and bounded, so that we are able to perform a thorough refinement of the sub-community discovery. This study allows to perform a multi-level analysis by extracting information either per-link or per-intra-subcommunity. As an improvement of this work, we define the notion of pivot to relate the node(s) with the greatest influence in the network. We propose the use of a thorough tool based on the formulation of the transformation of a suitable probabilistic model into a possibilistic model to extrac | cs.SI | cs |
A Robust Process to Identify Pivots inside
Sub-communities In Social Networks
Joseph Ndong1 and Ibrahima Gueye2
1 Department of Mathematics and Computer Science
University Cheikh Anta Diop, BP 5005 Fann Dakar, Senegal
2 Computer Engineering and Telecom, Polytechnic School, Thies, Senegal
[email protected], [email protected]
Abstract. In this work, we extend a previous work where we proposed a suitable
state model built from a Karhunen-Loeve Transformation to build a new decision
process from which, we can extract useful knowledge and information about the
identified underlying sub-communities from an initial network. The aim of the
method is to build a framework for a multi-level knowledge retrieval. Besides
the capacity of the methodology to reduce the high dimensionality of the data,
the new detection scheme is able to extract, from the sub-communities, the dense
sub-groups with the definition and formulation of new quantities related to the
notions of energy and co-energy. The energy of a node is defined as the rate of
its participation to the set of activities while the notion of co-energy defines the
rate of interaction/link between two nodes. These two important features are used
to make each link weighted and bounded, so that we are able to perform a thor-
ough refinement of the sub-community discovery. This study allows to perform
a multi-level analysis by extracting information either per-link or per-intra-sub-
community. As an improvement of this work, we define the notion of pivot to
relate the node(s) with the greatest influence in the network. We propose the use
of a thorough tool based on the formulation of the transformation of a suitable
probabilistic model into a possibilistic model to extract these pivot(s) which are
the nodes that control the evolution of the community.
Keywords: Social network analysis, community detection, Energy, Pivot, Influencer;
1
Introduction
Social networks describe web-based services that allow users (individuals) to connect
with other users, communicate, share or publish contents within the network [1], [2].
The rise of web 2.0 has come with the ease in the production and sharing of content that
allowed the social networks development. Users themselves become the producers of
web content [1], [3]. In a formal and simple description, social network can be seen as
a graph consisting of nodes (as individuals) and links (as social links) used to represent
social relations on social network sites [4] (as presented in Figure 1).
These last years, Social networks sites have become some important sources of on-
line interactions, contents sharing [6] and communication means. While giving these
opportunities, they are affordable and universally acclaimed. Social network sites are
2
Fig. 1. Social Network Showing Nodes and Links (Source: [5])
commonly known for information dissemination, personal activities posting [7], prod-
uct reviews, online pictures sharing, professional profiling, advertisements, subjectivity
[7], assessments [8], approaches [9], influences [10], observations [11], feelings [3],
opinions and sentiments expressions [12], news, remarks, reactions, or some many other
content type [13]. News alerts, breaking news, political debates and government policy
are also posted and analyzed on social network sites.
Obervations [14] show that more and more people are becoming interested and in-
volved in social networks. Sometimes, users of social networks exploit them for mak-
ing decisons. These decisions can be maked based on know or famialiar users or, in
some case, based on unfamiliar users [12]. Such a situation increases the degree of con-
fidence in the credibility of these sites. The social network has transformed the way
different entities procure and retrieve valuable information regardless of their location.
The social network has also given users the privilege of giving their opinion.
The massive data generated or produced by all the social networks users allows
for thorough analysis to efficiently extract useful knowledge such as trends, opinion
leaders, influencers, feelings, etc. Such an analysis can be done as a whole, which means
the representations of all the social network actors then proceed to the detection of
communities and/or opinion leaders. The main aim of community detection methods is
to partition the network into dense regions of the graph. Those dense regions typically
correspond to entities which are closely related. The determination of such communities
is useful in the context of a variety of applications such as customer segmentation,
recommendations, link inference and influence analysis [15].
In this work, we focus on community influencers identification. We extend our
previous work [16] in which, we derive a suitable state model from Karhunen-Loeve
Transformation [17]. From this state model we built a new decision process, which al-
lows us to extract useful knowledge and information about the identified underlying
sub-communities from an initial network.
This extension is interested in the extraction of the most "important" nodes in given
sub-communities already detected or known. Identifying sub-groups under a social net-
work is a great challenge in the area of social network analysis [18], [19], [20], but
analyzing the intrinsic behavior of each sub-group might be an important need if one
desires to focus on the quality of nodes/actors [21]. If sub-communities are identified,
3
decisions could be taken on a group of nodes regardless the underlying contents of the
group itself since it can be viewed as a single homogeneous entity in which all items
are of same behavior. One could also see the sub-community as a machine where the
dynamic structure and the evolution depend strongly on the nature and quality of its
combined pieces. If this second point-of-view is adopted, we need a tool to identify the
"most important" pieces whose actions are more influential than those of the rest of the
group. We define these pieces as "pivots" and the quality of the network is as impor-
tant as it contains influential pivots with high degree of influence. In the following, we
define pivots and how they could be important for a manager, a advertiser and so on.
Inside a sub-community, nodes share links so, identifying pivots can be helpful in
many situations:
-- (i) if in a sub-community, the pivot(s) is/are linked to a few other nodes, the man-
ager can conclude that this network is of less quality simply because the "most"
important nodes have less interactivity and thus less influence. But in the contrary,
he can pay more attention to the underlying evolution of the group;
-- (ii) the different sub-communities can be classified in an ascending order based on
their quality -- the first group is the one with the greater number of pivots, and so on;
-- (iii) in a sub-community, we can find other sub-communities in the following man-
ner: If the pivots themselves are not linked to each other, each of them can be the
center of a group/entity formed by all the nodes linked to a pivot.
The procedure for sub-communities detection/identification we built in our previ-
ous work [16] consisted in extracting a decision variable from a state-space model we
defined with a Karuhen-Loeve Transformation (KLT). This have served also to reduc-
ing the dimensionality of the dataset in order to maintain the only relevant part of the
data. Then, after defining some new quantities as "energy" of an actor/node and the "co-
energy between" actors, we apply a decision process to identify the sub-communities
and the features inside each of them. The improvement we bring in this present work
is the ability to learn more about the impact of node's energy to see if some nodes
could be selected as those with the highest degree of influence. The notion of highest
degree must be properly define to achieve this aim. We found that a suitable definition
of a probability density function (pdf) related to the defined node's energy can be done.
Then, a second definition of a possibilistic model will be able to discover the relevant
node(s) we classify as pivot(s).
Thes rest of this paper is organized as follow: In section 2 we do a thorough study
of the related work; in section 3 we detail the methodology and aogorithm for the sub-
commumity detection; in section 4 we present our use of possibility theory to identifiy
the pivots; in Section 5 we present the results of our experimental validation of our
propositions, and we conclude this paper in Seciton 6.
2 Background
Social sites have undoubtedly bestowed unimaginable privilege on their users to access
readily available never-ending uncensored information. Twitter, for example, permits its
4
users to post events in real time way ahead the broadcast of such events on traditional
news media. Also, social network allow users to express their views, be it positive or
negative [21]. Organizations are now conscious of the significance of consumers' opin-
ions posted on social network sites to the patronage of their products or services and the
overall success of their organisations. On the other hand, important personalities such
as celebrities and government officials are being conscious of how they are perceived
on social network. These entities follow the activities on social network to keep abreast
with how their audience reacts to issues that concerns them [22].
Opinion of influencers on social network is based largely on their personal views
and cannot be hold as absolute fact. However, their opinions are capable of affecting the
decisions of other users on diverse subject matters. For example, Rihanna's rant has cost
Snapchat $800 million in one Day [23]. Opinions of influential users on Social network
often count, resulting in opinion formation evolvement. Clustering technique of data
mining can be used to model opinion formation by assessing the affected nodes and
unaffected nodes. Users that depict the same opinion are linked under the same nodes
and those with opposing opinion are linked in other nodes. This concept is referred to
as homophily in social network [24]. Homophily can also be demonstrated using other
criteria such as race and gender [25].
Researchers in social network analysis are facing many other research issues and
challenges such as in Linkage-based and Structural Analysis, or in Dynamic Analysis
and Static Analysis.
Linkage-based and Structural Analysis consists of anlyzing of the linkage behaviour
of the social network so as to ascertain relevant nodes, links, communities and imminent
areas of the network - Aggarwal (2011) [21].
Static analysis, such as in bibliographic networks, is presumed to be easier to carry
out than those in streaming networks. In static analysis, it is presumed that social net-
work changes gradually over time and analysis on the entire network can be done in
batch mode. Conversely, dynamic analysis of streaming networks like Facebook and
YouTube are very difficult to carry out. Data on these networks are generated at high
speed and capacity. Dynamic analysis of these networks are often in the area of interac-
tions between entities such as in Papadopoulos et al. 2012 [26] and Sarr et al. 2014 [27].
Dynamic analysis is also covered through temporal events on social networks such as in
Adedoyin-Olowe et al (2013) [28] and Becker et al (2011) [18], and we also have such
dynalysis through the study of evolving communities - Fortunato, (2010) [19], Sarr et
al. 2014 [20].
3 Methodology and algorithm for the sub-communities detection
This methodology tracks and detects sub-communities based on the analysis of a huge
number of features corresponding to events/activities for which a group of actors/nodes
participate. First, we aim at finding the main features, to incorporate in our model,
by means of extended principal component analysis. The second relevant issue of this
methodology is related to the specification of a new detection procedure consisting
of merging all the relevant features into a single process we will label as a "Decision
Variable" (DV). By analyzing this process for the sub-community tracking operation,
5
we can discover subgroups of actors using a multi-level thresholding and the notion of
"energy dissipation" of an actor over the events.
1, . . . ,xi
K) i = 1, . . . ,R.
We consider a community of R actors Ω = (a1, . . . ,aR) which perform activities
on a set of K initial correlated events (e1, . . . ,eK). For each event ek, we have a column
vector of size R containing the amount of participation of all R actors to the correspond-
ing activity. This operation gives us the R× K matrix of correlated random variables
X = (X1, . . . ,XK). In other words, one observes these random variables through R inde-
pendent realization vectors xi = (xi
After extracting the relevant components from the Karhunen-Loeve transformation [16],
we can build our decision variable as a row vector DV = (y1, . . . ,yK). Then we can set
a certain number of concepts for our methodology. We introduce the notion of "energy
dissipation" (Ed) to quantify the degree of importance a given actor puts on a series of
events. This notion is simple and intuitive. When considering the set of events/activities,
the events for which the actor puts a high degree of importance constitutes his energy.
For example, we can consider money as energy. When someone goes to buy some prod-
ucts, we can say that he/she is dissipating a certain amount of his/her energy. In this
case, he/she should buy a "product A", and consequently buy another "product B" nec-
essary to use the product A. Here, we can see the notion of correlation between these
products/variables. When an athlete performs several disciplinary exercises in sport, we
can view his actions as the dissipation of his energy over the different events, in order
to win a medal. The energy of an actor is then quantifiable, its a measure of the strength
of his participation to the a series of activities.
If the actor participates actively to all or most of the activities with a high intensity,
then his energy increases, otherwise we say that this actor has less energy according to
the ensemble of events happening at a given period of time.
Since the DV variable contains the aggregated amount of all actors participation to
all events, the energy dissipation Ed of an actor i is the row vector defined as:
Edi =(cid:8)k, /xi
k ≥ DV[k],∀k = 1, . . . ,K(cid:9)
(1)
Edi contains all the index of events for which the energy dissipation is greater than
the reference DV. Consequently, we can calculate the total energy of the actor i as:
Ei =
Edi
DV
(2)
where . indicates the size of a vector.
We also refer to the notion of "co-energy" dissipation (CED) as the amount of en-
ergy between two actors according to their participation to the same set of activities.
This quantity is a measure of the mean energy produced simultaneously by the two
actors on the same activities:
CEDi j =
(Edi ∩ Ed j)
DV
(3)
Finally, our detection procedure boils down to fixe a threshold α and put a link
between actor i and actor j if the rate of their co-energy exceeds the limit α. This
6
means the following inequality must be held to add the link:
CEDi j ≥ α
(4)
When Eq. 4 holds, the value of CEDi j becomes the weight of the link between actor
i and actor j. And then, this link is bounded by the interval [min(Ei,E j),max(Ei,E j)].
By varying the threshold α ∈ [0;1] , one can build many different sub-communities
with the same dataset, each sub-community with a score α which measures its degree
of realization. The algorithm to achieve our aim is described as follow:
Algorithm 1: Sub-Community Discovering
Input
Output
: Ct, a community
Ω (Ct ), the sets of actors within Ct
xi = (xi
DV = (dv1, . . . ,dvK) the decision variable
α, the link detection threshold
: V, a sub-community
1, . . . ,xi
K) the vector of participation of actor i
1 /* Calculate Co-Energy dissipation between actors and apply
threshold to add link*/
foreach (k,l) ∈ Ω (Ct ), k (cid:54)= l do
/* Apply Eq. (1)*/
2 begin
3
4
Edk =(cid:8)p, /xk
Edl =(cid:8)p, /xl
p ≥ dvp,∀p = 1, . . . ,K(cid:9)
p ≥ dvp,∀p = 1, . . . ,K(cid:9)
5
6
7
8
9
10
11
12
/* Apply Eq. (3)*/
CEDkl =
(Edk∩Edl )
DV
/*Apply threshold to decide to put a link, Eq. (4)*/
if CEDkl ≥ α then
addLink(V,k,l)
return V
4 Using possibility theory to identify pivot(s)
Our pivot identification methodology relies mainly in the feature of energy we defined
for the actors/nodes. Pivots refer to nodes with "high" energy. These nodes have the
opportunity to control the dynamic evolution of the network. If the energy of a pivot
decreases or increases, the structure of the network might evolve towards a new direc-
tion allowing to suppress or add links between nodes. A simple question arises from the
perspective of pivots identification: how much energy is necessary for a node to be clas-
sified as a pivot? We believe that it is very difficult to answer this question by analyzing
only the amount of energy of each node. If someone would like to do so, he/she should
build a kind of threshold and apply the decision to put the label "pivot" on a node if
7
its energy exceeds this limit. This methodology weakens the objectivity of pivots' iden-
tification. To surround this difficulty, we propose a more robust identification scheme
based on a link between probability theory and possibility theory.
The energy property can be viewed as a continuous random variable X : Ω → V ,
where Ω is the set of actors/nodes and V the measurable function giving the real value
of the energy as defined in equation 2. X does not return a probability. But we want to
know, if it were the case, could this probability help achieving our goal.
Probability theory is a valuable quantitative tool to study randomness/uncertainty in
random phenomena. In this area, we can find the probability of occurrence of different
possible outcomes in an experiment. If a random variable returns a probability P, then
V = [0,1] and ∑
P(X = u) = 1. As we defined the energy in equation 2, the energy Ei
of actor i is always between 0 and 1. So, we can take V = [0,1], but we do not have
K
∑
Ei = 1 (K is the number of nodes).
u
i
4.1 Defining probability to characterize energy
u
For the purpose to return a probability from X, we have just to normalize the energy by
the size of E, where E = {Ei,i = 1 . . . ,Ω}. At this point, the random variable X returns
a probability since the equation ∑
P(X = u) = 1 holds. We build this probability to
characterize each energy of a node with a probability of occurrence in [0,1]. Now, using
this probability definition, our scope is to build a test to identify the potential pivots
under each sub-community. Generally, a typical test consists of applying a threshold
on the outcomes (probabilities of energy) to decide to put the label pivot on a node if
the probability distribution takes a value higher than this threshold. The task to build
this threshold is not straightforward even if, for given nodes if the probability of their
respective energy is 0.95, 0.6 and 0.3 for example, how could we decide to label a
node as pivot, based only on the not obvious notion of "high" probability. Is 0.6 a
"high" or "low" probability? By pointing out this example, we simply want to show
that it is not evident to know the "best" value of the probability threshold in order to
conclude if the node is a pivot or not. Nevertheless, one could, for simplicity, build
an heuristic decision process where the threshold is set manually. With probability, the
only evident decision we can take is, when the probability of a node is P(X = u) = 1.
If this case happens, it means that there's only one pivot in the entire sub-community,
since the other nodes have probability 0 and so this sub-community is built with only
one node. Finally, we believe that pivots might be nodes with any probability, different
to zero, "sufficient" to become member of a sub-community and to have the potential to
change the dynamic evolution of the network. To go towards the direction of extracting
the "best" level of probability measure, we think of an alternative related the area of
possibility theory, which gives as another tool to represent uncertainty in a qualitative
fashion. This tool can also helps to learn more about the incompleteness that reflects
the lack of information. We have seen above that, our defined probability doesn't give
us the information about the limit to apply to detect pivots. So, the idea behind the use
8
of this new scheme is to associate to each node, in accordance to its energy, a degree of
possibility which quantifies the level of "importance" of that node among the others.
4.2 Detecting pivot by possibility degree
∀A ⊆ Ω
P(A) ≤ Π (A)
Between probability and possibility, we can state a consistent principle is this terms:
"what is probable should be possible" [29]. This requirement can then be translated as
follow:
(5)
where P and Π are, respectively, the probability and the possibility measure on the
domain Ω. In this case, Π is said to dominate P. With Π, given nodes should have
the maximum possibility degree, i.e. the value 1. In possibility theory the equality
∑
Π (X = u) = 1 is not guaranteed. So, for any node, when its possibility degree reaches
u
the maximum, we can robustly say that this node is a pivot since it is entirely sure that
it might exist in the network. So, we see that the notion of "high" probability can be
defined properly, since it corresponds to the maximum degree of possibility.
: V → [0,1], and is defined by:
A possibility measure, [30], Π on V is characterized by a possibility distribution π
∀A ⊆ V,Π (A) = sup{π(v),v ∈ A}.
(6)
If V is a finite set, thus : ∀A ⊆ V,Π (A) = max{π(v),v ∈ A}. The key concept of a possi-
bility distribution is the preference ordering it establishes on V . Basically, π designates
what one knows about the value of a given variable X, and π(v) > π(v(cid:48)) states that
X = v is more plausible than X = v(cid:48). When π(v) = 0, thus, v is an impossible value of
the variable X while π(v) = 1 means that v is one of the most plausible values of X. For
us, identifying pivots is just a process to searching at these most plausible values.
Transforming a probability measure into a possibilistic one then amounts to choos-
ing a possibility measure in the set ℑ(P) of possibility measures dominating P. This
should be done by adding a strong order preservation constraint, which ensures the
preservation of the shape of the distribution:
pi < p j ⇔ πi < π j
∀i, j ∈ {1, . . . ,q},
(7)
where pi = P({Ei}) and πi = Π ({Ei}),∀i ∈ {1, . . . ,K}. It is possible to search for the
most specific possibility distribution verifying (5) and (7). The solution of this problem
exists, is unique and can be described as follows. One can define a strict partial order
P on Ω represented by a set of compatible linear extensions Λ (P) = {lu,u = 1,L}. To
each possible linear order lu , one can associate a permutation σu of the set {1, . . . ,q}
such that:
σu(i) < σu( j) ⇔ (ωσu(i),ωσu( j)) ∈ lu,
(8)
The most specific possibility distribution, compatible with the probability distribution
(p1, p2, . . . , pK) can then be obtained by taking the maximum over all possible permu-
tations:
(9)
πi = max
u=1,L
∑
p j
{ jσ−1
u ( j)≤σ−1
u (i)}
9
Finally, the vector (π1,π2, . . . ,πK) gives us all the possibility degrees for the K nodes,
corresponding to the (p1, p2, . . . , pK) vector of probability of their energies. And pivots
are nodes for which the possibility degree exceeds a given rate δ . For this study we set
this threshold δ = 1, it corresponds to the maximum value a possibility degree might be
set. A more flexible and non-heuristic method might be to set δ to a value less than the
maximum. But, here, we set δ to 1 in order to show that in all situations or scenario, a
pivot must be found.
For a thorough view of possibility theory, we recommend the reader to [29,30,31].
5 Validation
We validate our approach on the real world collection of data coming from Reddit.com
[32]. We use several samples of different sizes and, build four scenarios A, B, C and D
with dimension (N × K, N the number of actors and K the number of events) 10× 15,
10 × 150, 10 × 500 and 10 × 1200 respectively. In Table .1, we give an idea on the
content of the data, in each column vector, we have the total amount of submissions to
an image by the set of actors.
PPPPPPPP
Actors
1
2
3
4
5
6
7
8
9
10
events e1 e2 e3 e4 e5 e6 e7 e8 e9 e10 e11 e12 e13 e14 e15
0
0
2
0
0
0
0
0
0
0
11 0 11 4 0 2 0 4 18 2
5 0 0 0 0 0 1 0 0 0
1 0 2 0 3 1 1 0 1 0
4 1 0 0 0 1 2 0 7 0
1 0 0 0 0 0 0 0 0 0
1 0 0 0 0 0 0 0 0 0
0 2 0 0 1 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0
0
2
0
1
0
0
0
0
0
0
6 16 1
0
0
0
2
1
0
0
0
1
0
4
0
0
0
0
0
0
0
2
1
9
0
0
0
0
0
0
Table 1. Activities and amount of actor participation to submissions on events. Scenario A.
Two levels of information can be retrieved from the results. In the first level, we have
the results about the formation of the underlying sub-communities. This result corre-
sponds to the natural clustering of the different nodes according to the energy provided
by each of them. The second level of information refers to the characteristics of links
and nodes inside the given sub-groups. This refinement provides useful information
when one wants to emphasize and explore some parts of the network.
5.1
Information about the formation of sub-communities
One of the main objectives of social network analysis is related to clustering in order
to study the similarities inside the network [33,34]. So, the first result is about the for-
mation of sub-communities. The graphs in Fig. 2 show all the groups we discover with
the different scenarios. In Fig. 2(a), we see a sparse sub-community within two dense
10
Table 2. Total Energy of each actor for the different scenarios.
a1
a2
a3
a4
a5
Energy of the different actors (Eq. 2)
a8
Ei 0.80 0.66 0.53 1 0.26 0.40 0.60 0
0
Ei 0.88 0.25 0.86 0.77 0.46 0.25 0.74 0.62 0.15 0.13
Ei 0.79 0.26 0.79 0.74 0.23 0.19 0.69 0.46 0.11 0.06
Ei 0.86 0.27 0.70 0.68 0.25 0.23 0.74 0.31 0.97 0.55
a6
a7
a9 a10 Number of events
0
15
150
500
1200
sub-communities. The term 'sparse' refers to a group of nodes with different levels of
energy. When we observe a group of linked nodes with the same value for their energy,
we consider this group as an inner dense sub-community; here, we have {1,3,7} and
{2,3,7}.
In graphs of Fig. 3, we draw the co-energy participation between two nodes to em-
phasise the fact the role of the Decision Variable DV have to set a potential link. Con-
sidering all the events at the same time, a link can be put between two nodes if the
amount of participations of both two nodes, for the same set of events, exceeds by far
the reference point given by the decision variable. We use circles to identify the events
where the energy of the actors is higher than the reference point. Clearly, for most of
the given events, if the energy of each node exceeds the value of the DV for that events,
then we put a link between the two nodes.
5.2
Information about the intrinsic behavior inside sub-communities
The second level of information this technique might deliver is about the dynamics of
nodes and their relation inside the detected sub-groups. So, another result is related to
the boundary of each detected link. In Table 2, we have for each node, its total energy,
i.e. the amount of power of this node to participate to all events. By observing carefully
this table and the graphs of the sub-communities, we see that the bounds of a link is the
interval [a,b], where a and b are the respective total energy of the specified nodes. And
so, the score/weight of a link is always inside this interval, as we can observe for all links
detected. For example, in Fig. 2(d), the link between node #4 (with energy 0.68) and
node #7 (with energy 0.74)has a weight of 0.59 and its bounded interval is [0.68,0.75].
As the network evolves, whenever the energy of a node belongs out of the interval, the
link will disappear. By inspecting frequently the evolution of the bounded interval, one
can retrieve useful information about the degree of importance of the different nodes by
analyzing their energy.
Each of the other scenarios (B, C and D) give also a sparse sub-community.
5.3 Results and discussion about the pivots
We apply the detection process to identify pivots to the data samples for scenarios A,
B, C, D, E, F and G. We have arbitrarily chosen the size of the sample and the interval
where data come from. We just want to show cases where there's one pivot or more.
The table 3 resumes the data selection scheme, and in we put the results of the detection
11
sub-
(a) A sparse
community
within
two dense intra sub-
communities. Scenario
A with 15 events.
(b) A sparse
sub-
community. Scenario B
with 150 events.
(c) A sparse
sub-
community. Scenario C
with 500 events.
(d) A sparse
community.
D with 1200 events.
sub-
Scenario
Fig. 2. Results of the sub-community members identification. In scenario A 2(a), we can observe
two dense sub-communities. In the other scenarios (B, C and D), we obtain only a sparse sub-
community. The different scenarios are built with different size of the vector of events.
(a) Co-Energy between actor 1
and actor 2
(b) Co-Energy between actor 1
and actor 3
(c) Co-Energy between actor 2
and actor 7
(d) Co-Energy between actor 4
and actor 7
Fig. 3. Impact of the Co-Energy dissipation between two actors in the link detection phase. The
circles represents events where both the two actors have their co-energy higher than the refer-
ence value in the decision variable DV. These actors are linked since their co-energy dissipation
concern more than half of the events.
246810121402468101214Linkdetection:ImpactoftheCo-Energydissipationbetween:1-2EventsIDNumberofactorparticipation DVActor#1Actor#2246810121402468101214Linkdetection:ImpactoftheCo-Energydissipationbetween:1-3EventsIDNumberofactorparticipation DVActor#1Actor#3246810121400.511.522.533.544.5Linkdetection:ImpactoftheCo-Energydissipationbetween:2-7EventsIDNumberofactorparticipation DVActor#2Actor#72468101214012345678Linkdetection:ImpactoftheCo-Energydissipationbetween:4-7EventsIDNumberofactorparticipation DVActor#4Actor#712
procedure in table 4 where the variable NBE refers to the total amount of participation
on events by nodes, p is the probability of the energy and π the corresponding degree of
possibility. The results give many useful information. For the scenarios A, B, C and D,
we extract only one pivot which have the particularity to be the node with the highest
amount of activities in the network. The pivot also has the highest probability of energy
but, the value of this probability seems to be "very low" in a pure point-of-view of the
probability theory. For example, for scenario A, the pivot has a probability p = 0.30 but
its possibility degree reaches π = 1. For scenarios A, B, C and D, we find only one pivot
and it corresponds to the node with the highest probability and which have perform the
greater amount of activities in the network. But this findings are not a generality since
we see, in the scenario G, the pivot has the highest probability but it does not have the
greatest amount of activities. This discover says clearly that, learning only the amount
of activities is not a sufficient process to analyze a network in order to detect links or to
put a level of importance/quality to nodes. In scenarios E and F, we detect twos pivots
which have not the same amount of actions but they have the same probability of energy.
We think that this situation is due to the fact that the quality of node depends not only
to its level of participation on events but, it depends also to its interaction with other
nodes. So one must have two (or more) nodes with different level of actions on events
but they have the same behavior regarding to other nodes.
Scenario A
15
Size
B
150
C
500
D
1200
E
155
F
255
G
555
interval [1:15] [1:150] [1:500] [1:1200] [1100:1254] [1000:1254] [700:1254]
Table 3. Information about the selection of the different data samples
6 Conclusion
In this work, we have extent a new technique related to an extended version of principal
component analysis to build a methodology for the purpose of community detection
in a social network. The initial work built a technique more elaborated to run within
stochastic process than the classical PCA which is designed originally to solve the prob-
lem of dimensionality reduction for univariate dataset. The main innovation of the work
is manifold: (i) we define the notion of co-energy between two nodes to quantify the
intensity of their relation, (ii) we can also extract the proper energy of a given node
to know how it influences the overall community, (iii) technically, the KL-PCA tech-
nique makes possible to build a decision variable and to form a state model from which
we apply a decision process to identify each link. The introduction of the notion of
energy make possible to see potential intra sub-communities (i.e. nodes with the same
co-energy) inside a sub-community; (iv) each detected link is bounded, so we know how
much energy is necessary to maintain a link over time. In this complementary study, we
show that a possibility distribution can be properly defined from the energy to solve an
interesting feature i.e, the problem of identifying pivots which have the main impact in
Table 4. Detection of pivots when degree of possibility π = 1
13
a7
7
a8 a9 a10 scenario
a6
2
0
0 0.10 0
0 0.20 0
0
0
0
A
1
1
1
1
p
π
p
π
p
π
p
π
0 0.11 0
0 0.22 0
a2
10
a5
Nodes i a1
NBE
75
1
0.30 0.10 0.25 0.25 0
0.20 0.70 0.70 0
a3
14
a4
26
0.39 0.11 0.17 0.22 0
0.22 0.38 0.61 0
31 117 53 10
0
0 0.11 0
0 0.17 0
0
0
0
0
pivot Yes No No No No No No No No No
NBE 591 28 218 142 44
8
0
0.42 0.06 0.18 0.23 0
0.06 0.35 0.59 0
0
pivot Yes No No No No No No No No No
NBE 1638 108 668 348 120 63 348 170 27 16
0
0
pivot Yes No No No No No No No No No
NBE 3659 257 1596 773 206 164 890 425 59 40
0
0
pivot Yes No No No No No No No No No
NBE 428 34 204 95
4
0
0
pivot Yes No Yes No No No No No No No
NBE 702 50 321 140 38
8
0.32 0.07 0
0.23 0
54 122 82 13
0 0.07 0.15 0 0.07
0 0.23 0.38 0 0.23
pivot Yes No Yes No No No No No No No
NBE 1569 127 663 335 72
81 405 170 22 16
0
0
pivot No No Yes No No No No No No No
6
0 0.06 0.06 0.06 0.06 0
0 0.25 0.25 0.25 0.25 0
0 0.06 0 0.18 0.06 0
0 0.12 0 0.31 0.12 0
0.39 0.11 0.17 0.22 0
0.22 0.38 0.61 0
0 0.11 0
0 0.22 0
0.32
0.62
0
0
0
0
0
0
0
0
0
0
0.38
0.38
26
40
52
40
0.38
p
π
p
π
p
π
0.32
1
1
1
1
1
B
C
D
E
F
G
the dynamic nature of the network. From this work, we plane to learn the impact of the
number of pivots in a given sub-community and between sub-communities to face the
idea related to their impact on a network distributed in many geographic area.
References
1. Adedoyin-Olowe, M., Gaber, M.M., Stahl, F.T.: A survey of data mining techniques for social
media analysis. JDMDH 2014 (2014)
2. Chen, Z., Kalashnikov, D.V., Mehrotra, S.: Exploiting context analysis for combining multi-
ple entity resolution systems. In: ACM SIGMOD International Conference on Management
of Data. SIGMOD '09, pp. 207 -- 218 (2009)
3. Kaplan, A.M., Haenlein, M.: Users of the world, unite! the challenges and opportunities of
social media. Business Horizons 53(1), 59 -- 68 (2010)
4. Borgatti, S.P.: In: Meyers, R.A. (ed.) Social Network Analysis, Two-Mode Concepts in, pp.
2912 -- 2924. Springer, ??? (2012)
14
5. Amiri, S.E.: Node Classification in Social Networks. https://filebox.ece.
vt.edu/~s14ece6504/projects/esorour_socialnets/, visited 2017-10-22
(2014)
6. Chelmis, C., Prasanna, V.K.: Social networking analysis: A state of the art and the effect of
semantics. In: IEEE, International Conference on Social Computing, pp. 531 -- 536 (2011)
7. Asur, S., Huberman, B.A.: Predicting the future with social media. In: Proceedings of the Intl.
Conf. on Web Intelligence and Intelligent Agent Technology, pp. 492 -- 499. IEEE Computer
Society, ??? (2010)
8. Kim, Y., Hsu, S.-H., de ZÞôsiga, H.G.: Influence of social media use on discussion network
heterogeneity and civic engagement: The moderating role of personality traits. Journal of
Communication 63(3), 498 -- 516 (2013)
9. Korda, H., Itani, Z.: Harnessing social media for health promotion and behavior change.
Health Promotion Practice 14(1), 15 -- 23 (2013)
10. Bakshy, E., Hofman, J.M., Mason, W.A., Watts, D.J.: Identifying â AŸinfluencersâ A ´Z on
twitter. In: Fourth ACM International Conference on Web Seach and Data Mining (WSDM)
(2011)
11. Atkinson, N., Chou, W.-y.S., Hunt, Y.M., Beckjord, E.B., Moser, R.P., Hesse, B.W.: Social
media use in the united states: Implications for health communication. In: Journal of Medical
Internet Research (2009)
12. Pang, B., Lee, L.: Opinion mining and sentiment analysis. Found. Trends Inf. Retr. 2(1-2),
1 -- 135 (2008)
13. Liu, B.: Sentiment Analysis and Opinion Mining. Morgan & Claypool Publishers, ???
(2012)
14. Statista: Number
billions).
(in
number-of-worldwide-social-network-users/, visited 2017-10-09 (2017)
social media
2021
https://www.statista.com/statistics/278414/
users worldwide
of
from 2010
to
15. Khatoon, M., Banu, A.: A survey on community detection methods in social networks. I.J.
Education and Management Engineering (1), 8 -- 18 (2015). doi:10.5815/ijeme.2015.01.02
16. Ndong, J., Gueye, I.: A new decision technique for sub-community and multi-level knowl-
edge extraction in social networks. In: Complex Networks & Their Applications V: Pro-
ceedings of the 5th International Workshop on Complex Networks and Their Applications
(COMPLEX NETWORKS), vol. 693, p. 263. Springer, ??? (2016)
17. Gray, R.M., Davisson, L.D.: An Introduction to Statistical Signal Processing. Cambridge
University Press, ??? (2004)
18. Becker, H., Naaman, M., Gravano, L.: Beyond trending topics: Real-world event identifica-
tion on twitter. In: Proceedings of the Fifth International Conference on Weblogs and Social
Media (2011)
19. Fortunato, S.: Community detection in graphs. Physics Reports 486(3), 75 -- 174 (2010)
20. Sarr, I., Ndong, J., Missaoui, R.: Overlaying social networks of different perspectives for
inter-network community evolution. In: Social Network Analysis-Community Detection and
Evolution, pp. 45 -- 70. Springer, ??? (2014)
21. Aggarwal, C.C.: An Introduction to Social Network Data Analytics, pp. 1 -- 15 (2011)
22. Castellanos, M., Dayal, U., Hsu, M., Ghosh, R., Dekhil, M., Lu, Y., Zhang, L., Schreiman,
M.: Lci: A social channel analysis platform for live customer intelligence. In: ACM SIG-
MOD International Conference on Management of Data, pp. 1049 -- 1058. ACM, ??? (2011)
23. FR, Y.N.: Rihanna's rant has cost Snapchat $ 800 million. https://fr.news.yahoo.
com/coup-gueule-rihanna-fait-perdre-114958692.html, visited 2018-
03-19 (2018)
24. McPherson, M., Smith-Lovin, L., Cook, J.M.: Birds of a feather: Homophily in social net-
works. Annual Review of Sociology 27(1), 415 -- 444 (2001)
15
25. Jackson, M.O.: Social and Economic Networks. Princeton University Press, Princeton, NJ,
USA (2008)
26. Papadopoulos, S., Kompatsiaris, Y., Vakali, A., Spyridonos, P.: Community detection in so-
cial media. Data Min. Knowl. Discov. 24(3), 515 -- 554 (2012)
27. Sarr, I., Missaoui, R.: Temporal Analysis on Static and Dynamic Social Networks Topolo-
gies. Springer. To appear
28. Adedoyin-Olowe, M., Gaber, M.M., Stahl, F.T.: Trcm: A methodology for temporal analysis
of evolving concepts in twitter. In: Artificial Intelligence and Soft Computing, pp. 135 -- 145
(2013)
29. Zadeh, L.A.: Fuzzy sets as a basis for a theory of possibility. In: Fuzzy Sets and Systems, pp.
3 -- 28 (1978)
30. Dubois, D., Prade, H., Sandri, S.: On possibility/probability transformations. In: In Proceed-
ings of the Fourth Int. Fuzzy Systems Association World Congress (IFSA'91), Brussels,
Belgium, pp. 50 -- 53 (1991)
31. Zadeh, L.A.: Fuzzy sets. In: Information and Control 8, pp. 338 -- 353 (1965)
32. Gueye, I., Ndong, J., Sarr, I.: An accurate probabilistic model for community evolution anal-
ysis in social network. In: International Conference on Signal-Image Technology Internet-
Based Systems (SITIS), pp. 343 -- 349 (2015)
33. McGloin, J.M., Kirk, D.S.: An overview of social network analysis. Journal of Criminal
Justice Education 21(2), 169 -- 181 (2010)
34. Wasserman, S., Faust, K.: Social Network Analysis: Methods and Applications vol. 8. Cam-
bridge university press, ??? (1994)
|
1606.08084 | 1 | 1606 | 2016-06-26T20:41:52 | Cyberbullying Identification Using Participant-Vocabulary Consistency | [
"cs.SI",
"stat.ML"
] | With the rise of social media, people can now form relationships and communities easily regardless of location, race, ethnicity, or gender. However, the power of social media simultaneously enables harmful online behavior such as harassment and bullying. Cyberbullying is a serious social problem, making it an important topic in social network analysis. Machine learning methods can potentially help provide better understanding of this phenomenon, but they must address several key challenges: the rapidly changing vocabulary involved in cyber- bullying, the role of social network structure, and the scale of the data. In this study, we propose a model that simultaneously discovers instigators and victims of bullying as well as new bullying vocabulary by starting with a corpus of social interactions and a seed dictionary of bullying indicators. We formulate an objective function based on participant-vocabulary consistency. We evaluate this approach on Twitter and Ask.fm data sets and show that the proposed method can detect new bullying vocabulary as well as victims and bullies. | cs.SI | cs | Cyberbullying Identification Using Participant-Vocabulary Consistency
6
1
0
2
n
u
J
6
2
]
I
S
.
s
c
[
1
v
4
8
0
8
0
.
6
0
6
1
:
v
i
X
r
a
Elaheh Raisi
Virginia Tech, Blacksburg, VA
Bert Huang
Virginia Tech, Blacksburg, VA
Abstract
With the rise of social media, people can now
form relationships and communities easily re-
gardless of location, race, ethnicity, or gender.
However,
the power of social media simulta-
neously enables harmful online behavior such
as harassment and bullying. Cyberbullying is
a serious social problem, making it an impor-
tant topic in social network analysis. Machine
learning methods can potentially help provide
better understanding of this phenomenon, but
they must address several key challenges:
the
rapidly changing vocabulary involved in cyber-
bullying, the role of social network structure, and
the scale of the data. In this study, we propose a
model that simultaneously discovers instigators
and victims of bullying as well as new bullying
vocabulary by starting with a corpus of social
interactions and a seed dictionary of bullying
indicators. We formulate an objective function
based on participant-vocabulary consistency. We
evaluate this approach on Twitter and Ask.fm
data sets and show that the proposed method can
detect new bullying vocabulary as well as victims
and bullies.
1. Introduction
Social media has significantly changed the nature of so-
ciety. Our ability to connect with others has been mas-
sively enhanced, removing boundaries created by location,
gender, age, and race. However,
the benefits of this
hyper-connectivity also come with the enhancement of
detrimental aspects of social behavior. Cyberbullying is
an example of one such behavior that is heavily affecting
the younger generations (Boyd, 2014). The Cyberbullying
2016 ICML Workshop on #Data4Good: Machine Learning in
Social Good Applications, New York, NY, USA. Copyright by the
author(s).
[email protected]
[email protected]
Figure 1. Survey Statistics on Cyberbullying Experiences. Data
collected and visualized by the Cyberbullying Research Center
(http://cyberbullying.org/).
Research Center defines cyberbullying as "willful and
repeated harm inflicted through the use of computers, cell
phones, and other electronic devices." Like traditional
bullying, cyberbullying occurs in various forms. Examples
include name calling, rumor spreading, threats, and sharing
of private information or photographs.1,2 Even seemingly
innocuous actions such as supporting offensive comments
by "liking" them can be considered bullying (Wang et al.,
2009). As stated by the National Crime Prevention Coun-
cil, around 50% of American young people are victimized
by cyberbullying. According to the American Academy of
Child and Adolescent Psychiatry, victims of cyberbullying
have strong tendencies toward mental and psychiatric dis-
orders (American Academy of Child Adolescent Psychia-
try, 2016). In extreme cases, suicides have been linked to
cyberbullying (Goldman, 2010; Smith-Spark, 2013). The
phenomenon is widespread, as indicated in Fig. 1, which
plots survey responses collected from students. These facts
make it clear that cyberbullying is a serious health threat.
Machine learning can be useful in addressing the cyber-
bullying problem. Recently, various studies considered
supervised, text-based cyberbullying detection, classifying
1http://www.endcyberbullying.org
2http://www.ncpc.org/cyberbullying
46
Cyberbullying Identification Using Participant-Vocabulary Consistency
social media posts as 'bullying 'or 'non-bullying'. Training
data is annotated by experts or crowdsourced workers.
Since bullying often involves offensive language,
text-
based cyberbullying detection studies often use curated
swear words as features, augmenting other standard text
features. Then, supervised machine learning approaches
train classifiers from this annotated data (Yin et al., 2009;
Ptaszynski et al., 2010; Dinakar et al., 2011).
We identify three significant challenges for supervised
cyberbullying detection. First, annotation is not an easy
task.
It requires expertise about culture, examination of
the social structure of the individuals involved in each
interaction. Because of the difficulty of labeling these of-
ten subtle distinctions between bullying and non-bullying,
there is likely to be disagreement among labelers, making
costs add up quickly for a large-scale problem. Second,
reasoning about which individuals are involved in bullying
should do joint, or collective, classification. E.g., if we
believe a message from A to B is a bullying interaction,
we should also expect a message from A to C to have
an increased likelihood of also being bullying. Third,
language is rapidly changing, especially among young
populations, making the use of static text indicators prone
to becoming outdated. Some curse words have completely
faded away or are not as taboo as they once were, while new
slang is frequently introduced into the culture. These three
challenges suggest that we need a dynamic methodology to
collectively detect emerging and evolving slurs with only
weak supervision.
In this paper, we introduce an automated, data-driven
method for cyberbullying identification. The eventual goal
of such work is to detect such harmful behaviors in social
media and intervene, either by filtering or by providing
advice to those involved. Our proposed learnable model
takes advantage of the fact that the data and concepts
involve relationships. We train this relational model in a
weakly supervised manner, where human experts provide
a small seed set of phrases that are highly indicative
of bullying.
Then the algorithm finds other bullying
terms by extrapolating from these expert annotations. In
other words, our algorithm detects cyberbullying from key-
phrase indicators. We refer to our proposed method as the
participant-vocabulary consistency (PVC) model; It seeks
a consistent parameter setting for all users and key phrases
in the data that characterizes the tendency of each user to
harass or to be harassed and the tendency of a key phrase
to be indicative of harassment. The learning algorithm
optimizes the parameters to minimize their disagreement
with the training data which are highly indicative bullying
phrases in messages between specific users.
A study by ditchthelabel.org (2013) found that Facebook,
YouTube, Twitter, and Ask.fm are the platforms that have
the most frequent occurrences of cyberbullying. To evalu-
ate the participant-vocabulary consistency method, we ran
our experiments on Twitter and Ask.fm data. From a list
of highly indicative of bullying key phrases, we subsample
small seed sets to train the algorithm. We then examine the
participant-vocabulary consistency method to see how well
it recovers the remaining, held-out set of indicative phrases.
Additionally, we extract the detected most bullying phrases
and qualitatively verify that they are in fact examples of
bullying.
2. Related Work
There are two main branches of research related to our
topic. One of them is online harassment and cyberbullying
detection;
the other one is associated with automated
vocabulary discovery. Various studies have used fully
supervised learning to classify bully posts from non-bully
posts. Many of them focus on the textual features of
post to identify cyberbullying incidents (Dinakar et al.,
2011; Ptaszynski et al., 2010; Hosseinmardi et al., 2015;
Chen et al., 2012; Margono et al., 2014). Some of them
use other features than only textual features, for example
content, sentiment, and contextual features (Yin et al.,
2009),
the number, density and the value of offensive
words (Reynolds et al., 2011), or the number of friends,
network structure, and relationship centrality (Huang &
Singh, 2014). Nahar et al. (2013) used semantic and
weighted features; they also identify predators and victims
using a ranking algorithm. Many studies have been applied
machine learning techniques to better understand social-
psychological issues such as bullying. They used data sets
such as Twitter, Instagram and Ask.fm to study negative
user behavior (Bellmore et al., 2015; Hosseinmardi et al.,
2014a;b).
Various works use query expansion to extend search
queries to dynamically include additional
For
example, Massoudi et al. (2011) use temporal information
as well as co-occurrence to score the related terms to
expand the query. Mahendiran et al. propose a method
based on probabilistic soft logic to grow a vocabulary using
multiple indicators (e.g., social network, demographics,
and time).
terms.
3. Proposed Method
To model the cyberbullying problem, for each user ui,
we assign a bully score bi and a victim score vi. The
bully score measures how much a user tends to bully
others; likewise, victim score indicates how much a user
tends to be bullied by other users. For each feature wk,
we associate a feature-indicator score that represents how
much the feature is an indicator of a bullying interaction.
47
Cyberbullying Identification Using Participant-Vocabulary Consistency
Each feature represents the existence of some descriptor
in the message, such as n-grams in text data. The sum
of senders bullying score and receivers victim score (bi +
vi) specifies the message's social bullying score, which
our model aims to make consistent with the vocabulary-
based feature score. We formulate a regularized objective
function that penalizes inconsistency between the social
bullying score and each of the feature scores.
(cid:0)b2 + v2 + w2(cid:1) +
(cid:0)bs(m) + vr(m) − wk
(cid:1)2
(1)
J(b, v, w; λ) =
(cid:88)
λ
2
(cid:88)
m∈M
k:wk∈f (m)
1
2
Learning is then an optimization problem over parameter
vectors b, v, and w.
The consistency penalties are
determined by the structure of the social data. We include
information from an expert-provided initial seed of highly
indicative bully words. We require these seed features to
have a high score, adding the constraint:
J(b, v, w; λ) s.t. wk = 1.0, ∀k : xk ∈ S.
(2)
min
b,v,w
We refer to this model as the participant-vocabulary consis-
tency model because we optimize the consistency of scores
computed based on the participants of each social interac-
tion as well as the vocabulary used in each interaction. The
objective function Eq. (1) is not jointly convex; However,
if we optimize each parameter vector in isolation, we then
solve convex optimizations with closed form solutions.
The optimal value for each parameter vector given the
others can be obtained by solving for their zero-gradient
conditions. The update for bully score vector b is:
(cid:88)
(cid:88)
(cid:0)wk − f (m)vr(m)
(cid:88)
f (m)
k∈f (m)
(cid:1)
m∈Ms(m)=i
arg min
J =
bi
m∈Ms(m)=i
λ +
where {m ∈ Ms(m) = i} is the set of messages that are
sent by user i, and f (m) is the number of n-grams in the
message m. The closed-form solution for optimizing with
respect to victim score vector v is
(cid:88)
(cid:88)
(cid:88)
(wk − f (m)bi)
arg min
J =
vj
m∈Mr(m)=j
k∈f (m)
λ +
m∈Mr(m)=j
f (m)
where {m ∈ Mr(m) = j} is the set of messages sent to
user j. The word score vector w can be updated with
(cid:88)
(cid:0)br(m) + vs(m)
(cid:1)
arg min
J =
wk
m∈Mk∈f (m)
λ + {m ∈ Mk ∈ f (m)}
.
48
Figure 2. ROC curve of recovered target words for Ask.fm (top)
and Twitter (bottom).
The set {m ∈ Mk ∈ f (m)} indicates the set of messages
that contain the kth feature or n-gram. The strategy
of fixing some parameters and solving the optimization
problem for the rest of parameters known as alternating
least-squares. Our algorithm iteratively updates each of
parameter vectors b, v, and w until convergence. The
output of the algorithm is the bully and victim score of all
the users and the bully score of all the words.
4. Experiments
We ran our experiments on Twitter and Ask.fm data.
To collect our Twitter data set, we first collected tweets
using words from our curse word dictionary; then we use
snowball sampling from these profane tweets to collect
additional messages. Since we want to consider messages
between users, we are interested in @-replies, in which one
user directs a message to another or answers a post from
another user. From our full data set, we remove the tweets
which are not part of any such conversation, all retweets
and duplicate tweets. After the data collection and post-
processing, our Twitter data set contains 180,355 users and
296,308 tweets.
Ask.fm is a social question-answering service, where users
post questions on the profiles of other users. We use part
of the Ask.fm data set collected by Hosseinmardi et al.
(2014b). They used snowball sampling, collecting user
profiles and a complete list of answered questions. We
remove all the question-answer pairs where the identity of
the questioner is hidden. Our Ask.fm data set consists of
Cyberbullying Identification Using Participant-Vocabulary Consistency
Table 1. Identified bullying bigrams detected by participant-
vocabulary consistency from Twitter and Ask.fm data sets.
Data Set
Twitter
Ask.fm
c*nt
sp*nkbucket
Selected High-Scoring Words
sh*tstain arisew,
lying, w*gger,
commi
f*ggot,
lowlife,
f*cking nutter, blackowned whitetrash,
monster
dumb*ss,
*ssface mcb*ober, ignorant *sshat
total d*ck, blaky,
ilysm n*gger, fat sl*t,
pathetic waste, loose p*ssy, c*cky b*stard,
wifi b*tch,
stupid hoee,
sleep p*ssy, worthless sh*t, ilysm n*gger
que*n c*nt,
hatchling,
f*ggot
41,833 users and 286,767 question-answer pairs.
We compare our method with two baselines. The first
is co-occurrence. All words or bigrams that occur in
the same tweet as any seed word are given the score 1,
and all other words have score 0. The second baseline is
dynamic query expansion (DQE) (Ramakrishnan et al.,
2014). DQE extracts messages containing seed words, then
computes the document frequency score of each word. It
then iterates selection of the k highest-scoring keywords
and re-extraction of relevant messages until it reaches a
stable state.
We evaluate performance by considering held out words
from our full curse word dictionary as the relevant target
words. We measure the true positive rate and the false posi-
tive rate, computing the receiver order characteristic (ROC)
curve for each compared method. Fig. 2 contains the ROC
curves for both Twitter and Ask.fm. Co-occurrence only
indicates whether words co-occur or not, so it forms a
single point in the ROC space. Our PVC model and DQE
compute real-valued scores for words and generate curves.
DQE produces very high precision, but does not recover
many of the target words. However, co-occurrence detects
a high proportion of the target words, but at the cost of
also recovering a large fraction of non-target words. PVC
is able to recover a much higher proportion of the target
words comparing DQE. PVC enables a good compromise
between recall and precision.
We also compute the average score of target words, non-
target words, and all of the words.
If the algorithm
succeeds, the average target-word score should be higher
than the overall average. For both Twitter and Ask.fm,
our proposed PVC model can capture target words much
better than baselines. We measured how many standard
deviations the average target-word score is above the over-
all average. For Twitter, PVC provides a lift of around
1.5 standard deviations over the overall average, while
DQE only produces a lift of 0.242. We also observe the
same behavior for Ask.fm: PVC learns scores that have a
defined lift between the overall average word score and the
average target word score (0.825). DQE produces a small
lift (0.0099). Co-occurrence has no apparent lift.
By manually examining the 1,000 highest scoring words,
we find many seemingly valid bullying words. These de-
tected curse words include sexual, sexist, racist, and LGBT
(lesbian, gay, bisexual, and transgender) slurs. Table 1 lists
some of these high-scoring words from our experiments.
The PVC algorithm also computes bully and victim scores
for users. By studying the profiles of highly scored
victims in Ask.fm, we noticed that some of these users do
appear to be bullied. This happens in Twitter as well, in
which some detected high scoring users are often using
offensive language in their tweets. Fig. 3 shows some
bullying comments to an Ask.fm user and her responses,
all of which contain offensive language and seem highly
inflammatory.
Figure 3. Example of an Ask.fm conversation containing possible
bullying and heavy usage of offensive language.
5. Conclusion
In this paper, we proposed the participant-vocabulary con-
sistency method to simultaneously discover victims, insti-
gators, and vocabulary of words indicates bullying. Start-
ing with seed dictionary of high-precision bullying indica-
tors, we optimize an objective function that seeks consis-
tency between the scores of the participants in each interac-
tion and the scores of the language use. For evaluation, we
perform our experiments on data from Twitter and Ask.fm,
services known to contain high frequencies of bullying.
Our experiments indicate that our method can successfully
detect new bullying vocabulary. We are currently working
on creating a more formal probabilistic model for bullying
to robustly incorporate noise and uncertainty.
49
Cyberbullying Identification Using Participant-Vocabulary Consistency
References
American Academy of Child Adolescent Psychiatry.
the american academy of
URL http:
Facts for families guide.
child adolescent psychiatry.
//www.aacap.org/AACAP/Families_and_
Youth/Facts_for_Families/FFF-Guide/
FFF-Guide-Home.aspx.
2016.
Bellmore, Amy, Calvin, Angela J., Xu, Jun-Ming, and Zhu,
Xiaojin. The five w's of bullying on twitter: Who, what,
why, where, and when. Computers in Human Behavior,
44:305–314, 2015.
Boyd, Danah.
2014.
It's Complicated. Yale University Press,
Chen, Ying, Zhou, Yilu, Zhu, Sencun, and Xu, Heng.
Detecting offensive language in social media to protect
International Conference
adolescent online safety.
on Privacy, Security, Risk and Trust
(PASSAT),
and International Conference on Social Computing
(SocialCom), pp. 71–80, 2012.
Dinakar, Karthik, Reichart, Roi, and Lieberman, Henry.
Modeling the detection of
textual cyberbullying.
International Conference on Weblog and Social Media
- Social Mobile Web Workshop, 2011.
ditchthelabel.org. Ditch the label-anti-bullying charity:
The annual cyberbullying survey. 2013. URL http:
//www.ditchthelabel.org/.
Goldman, Russell. Teens indicted after allegedly taunting
2010. URL http://
girl who hanged herself.
abcnews.go.com/Technology/TheLaw/.
Hosseinmardi, Homa, Han, Richard, Lv, Qin, Mishra,
Shivakant, and Ghasemianlangroodi, Amir. Towards
in a semi-
understanding cyberbullying behavior
Advances in Social
anonymous social network.
Networks Analysis and Mining (ASONAM), 2014
IEEE/ACM International Conference on, pp. 244–252,
August 2014a.
Hosseinmardi, Homa, Li, Shaosong, Yang, Zhili, Lv, Qin,
Rafiq, Rahat Ibn, Han, Richard, and Mishra, Shivakant.
A comparison of common users across instagram and
ask.fm to better understand cyberbullying. Big Data
and Cloud Computing (BdCloud), 2014 IEEE Fourth
International Conference on, pp. 355–362, 2014b.
Hosseinmardi, Homa, Mattson, Sabrina Arredondo, Rafiq,
Ibn, Han, Richard, Lv, Qin, and Mishra,
Rahat
Shivakant. Detection of cyberbullying incidents on
Association for the
the instagram social network.
Advancement of Artificial Intelligence, 2015.
50
Huang, Qianjia and Singh, Vivek Kumar. Cyber bullying
SAM
detection using social and textual analysis.
'14 Proceedings of the 3rd International Workshop on
Socially-Aware Multimedia, pp. 3–6, 2014.
Mahendiran, Aravindan, Wang, Wei, Arredondo, Jaime,
Lira, Sanchez, Huang, Bert, Getoor, Lise, Mares,
David, and Ramakrishnan, Naren. Discovering evolving
political vocabulary in social media.
Margono, Hendro, Yi, Xun, and Raikundalia, Gitesh K.
Mining indonesian cyber bullying patterns in social
the Thirty-Seventh Aus-
networks.
tralasian Computer Science Conference (ACSC 2014),
147, January 2014.
Proceedings of
Massoudi, Kamran, Tsagkias, Manos, de Rijke, Maarten,
and Weerkamp, Wouter. Incorporating query expansion
and quality indicators in searching microblog posts.
AIR11. Springer, 15(5):362–367, November 2011.
Nahar, Vinita, Li, Xue, and Pang, Chaoyi. An effective
approach for cyberbullying detection. Communications
in Information Science and Management Engineering.,
3(5):238–247, May 2013.
Ptaszynski, Michal, Dybala, Pawel, Matsuba, Tatsuaki,
Masui, Fumito, Rzepka, Rafal, and Araki, Kenji.
Machine learning and affect analysis against cyber-
bullying. In the 36th AISB, pp. 7–16), 2010.
Ramakrishnan, Naren, Butler, Patrick, Muthiah, Sathap-
pan, Self, Nathan, Khandpur, Rupinder, and et al.
'Beating the news' with EMBERS: Forecasting civil
unrest using open source indicators. KDD, 2014.
Reynolds, Kelly, Kontostathis, April, and Edwards, Lynne.
Using machine learning to detect cyberbullying. 10th
International Conference on Machine Learning and
Applications and Workshops (ICMLA), 2:241–4, 2011.
Smith-Spark, Laura. Hanna Smith suicide fuels calls
2013. URL
for action on ask.fm cyberbullying.
http://www.cnn.com/2013/08/07/world/
europe/uk-social-media-bullying/.
Wang, Jing, Iannotti, Ronald J., and Nansel, Tonja R.
School bullying among us adolescents: Physical, verbal,
relational and cyber. Journal of Adolescent Health, 45:
368–375, 2009.
Yin, Dawei, Xue, Zhenzhen, Hong, Liangjie, Davison,
Brian D., Kontostathis, April, and Edwards, Lynne.
Detection of harassment on web 2.0. Proceedings of the
Content Analysis in the WEB 2.0, 2009.
|
1901.05149 | 2 | 1901 | 2019-12-20T20:56:38 | Beyond Uniform Reverse Sampling: A Hybrid Sampling Technique for Misinformation Prevention | [
"cs.SI",
"cs.DS"
] | Online misinformation has been considered as one of the top global risks as it may cause serious consequences such as economic damages and public panic. The misinformation prevention problem aims at generating a positive cascade with appropriate seed nodes in order to compete against the misinformation. In this paper, we study the misinformation prevention problem under the prominent independent cascade model. Due to the #P-hardness in computing influence, the core problem is to design effective sampling methods to estimate the function value. The main contribution of this paper is a novel sampling method. Different from the classic reverse sampling technique which treats all nodes equally and samples the node uniformly, the proposed method proceeds with a hybrid sampling process which is able to attach high weights to the users who are prone to be affected by the misinformation. Consequently, the new sampling method is more powerful in generating effective samples used for computing seed nodes for the positive cascade. Based on the new hybrid sample technique, we design an algorithm offering a $(1-1/e-\epsilon)$-approximation. We experimentally evaluate the proposed method on extensive datasets and show that it significantly outperforms the state-of-the-art solutions. | cs.SI | cs | Beyond Uniform Reverse Sampling: A Hybrid
Sampling Technique for Misinformation Prevention
Guangmo Tong∗ and Ding-Zhu Du†
∗Department of Computer and Information Sciences, University of Delaware, USA
†Department of Computer Science, University of Texas at Dallas, USA
Email: [email protected], [email protected]
9
1
0
2
c
e
D
0
2
]
I
S
.
s
c
[
2
v
9
4
1
5
0
.
1
0
9
1
:
v
i
X
r
a
Abstract -- Online misinformation has been considered as one
of the top global risks as it may cause serious consequences
such as economic damages and public panic. The misinformation
prevention problem aims at generating a positive cascade with
appropriate seed nodes in order to compete against the misinfor-
mation. In this paper, we study the misinformation prevention
problem under the prominent independent cascade model. Due
to the #P-hardness in computing influence, the core problem is to
design effective sampling methods to estimate the function value.
The main contribution of this paper is a novel sampling method.
Different from the classic reverse sampling technique which treats
all nodes equally and samples the node uniformly, the proposed
method proceeds with a hybrid sampling process which is able to
attach high weights to the users who are prone to be affected by
the misinformation. Consequently, the new sampling method is
more powerful in generating effective samples used for computing
seed nodes for the positive cascade. Based on the new hybrid
sample technique, we design an algorithm offering a (1−1/e−)-
approximation. We experimentally evaluate the proposed method
on extensive datasets and show that it outperforms the state-of-
the-art solutions.
Index Terms -- misinformation prevention, sampling, social net-
work
I. INTRODUCTION
According to the World Economic Forum1, misinformation
has been one of the top global risks due to its potential
for spreading fake news and malicious information. Once
misinformation is detected, one feasible method is to introduce
a positive cascade which is expected to reach the users before
they are affected by the misinformation. The misinformation
prevention (MP) problem aims at selecting effective seed
nodes for the positive cascade such that the spread of mis-
information can be maximally limited. The MP problem is
naturally formulated as a combinatorial optimization problem
and it has drawn great attention [2] -- [8]. Following this branch,
we in this paper study the MP problem and our goal is to
design solutions which are theoretically supported and highly
effective in practice.
Influence Maximization.
In the seminal work [9] of
Kempe, Kleinberg and Tardos, the well-known influence max-
imization (IM) problem was studied under two prominent
operational models, independent cascade (IC) model and linear
threshold (LT) model. The goal of the IM problem is to select
This is the online version of [1] to fix a mistake in Sec. IV-E. In particular,
a new analysis of estimating the lower bound is proposed.
1http://reports.weforum.org/
seed nodes which can maximize the influence resulted by a
single information cascade. There are two core techniques used
for solving the IM problem. One is the study on its combi-
natorial properties and the other one is sampling technique
utilized to speed up the algorithms. From the former, it has
been shown that the IM problem is monotone and submodular,
and therefore the simple greedy algorithm provides a (1−1/e)-
approximation. Unfortunately, computing the influence of the
cascade is a #P-hard problem [10]. As a result, the objective
function cannot be efficiently computed, and we wish to
estimate the function value by sampling techniques. As the
most successful framework, C. Borg et al. [11] proposed the
uniform reserve sampling technique which finds an unbiased
estimator of the objective function via two steps: (1) uniformly
select a node v from the ground set; (2) simulate the diffusion
process from v in a reverse direction until no node can be
further reached, and collect the set Sv of the traversed nodes.
After each sampling, we obtain a sample Sv which is a subset
of the users. The idea is that those in Sv are the nodes that
can influence v. Therefore, if Sv ∩ S (cid:54)= ∅, it implies that v can
be influenced by S. Thus, given a collection of the samples,
intuitively, the seed set S which covers2 the maximum number
of samples should be able to maximize the objective function
[11]. Such a framework was later improved by [12] -- [14] and it
has been widely applied to other problems regarding influence
diffusion in social networks.
Misinformation Prevention. Following the Borg's work
[11], authors in [4] designed a reverse sampling method for
the MP problem. Given the seed set of the misinformation, the
method proposed in [4] proceeds with two analogous steps: (1)
uniformly select a node v from the ground set; (2) simulate the
diffusion process from v in a reverse direction in the manner
of BFS until a seed of misinformation is reached, and collect
the set Sv of the traversed nodes. It is shown in [4] that those
in Sv are in fact the nodes that can protect v from being
affected by the misinformation. Therefore, the nodes that can
maximally cover the samples are able to best limit the spread
of misinformation.
Contribution. Our work is driven by considering the differ-
ence between the IM problem and the MP problem. In the IM
problem, all the nodes are treated equally and we cannot do
better, without any prior information, than uniformly selecting
2We say S covers a sample Sv if S ∩ Sv (cid:54)= ∅
Fig. 1: An illustrative example
a node in the first step of the sampling process. However, in
the MP problem, the ultimate goal is to protect the nodes from
being influenced by the misinformation, so intuitively it would
be better if we could pay more attention to the nodes that
are more likely to be misinformation-influenced. Consider an
illustrative example shown in Fig. 1 where there is one seed
node of the misinformation. If we uniformly select a node
and do the reverse sampling, we may select the nodes that
are far distant from the misinformation and they actually do
not require much effort to be protected (e.g., the safe nodes
in the graph). Instead, because the nodes around the seed of
misinformation are the most likely to be influenced by the
misinformation, we should focus more on the nodes in the
M-area shown in the graph. Furthermore, because a node can
be protected only if the positive cascade can reach that node
before the arrival of misinformation, to protect the nodes in
the M-area, the most effective positive seed nodes should lie
in the P-area in the graph. Motivated by this idea, we present
a hybrid sampling method consisting of two high-level steps:
1) Forward Sampling: simulate the diffusion process of
the misinformation and collect the nodes that are influ-
enced by the misinformation.
2) Reverse Sampling: for each node v collected in the first
step, do the reverse sampling process to obtain the nodes
that can protect that v.
it will be affected by the misinformation. Thus,
In this sampling method, the frequency that a node can be
collected in the first step is proportional to the probability
that
the
samples produced by the second step are more likely to be the
protectors of the nodes which are prone to be misinformation-
influenced. Note that
the pattern of the sample areas is
determined by the nodes collected in the first step. As shown
in Fig. 2, under the uniform reverse sampling the samples
are uniformly distributed to the whole graph, while under
the hybrid sampling the samples tend to be centered around
the seed node of the misinformation. As shown later, the
sample obtained by our hybrid sampling method can be used to
directly estimate the prevention effect of the positive cascade.
Based on the hybrid sampling method, we propose a new
(a) Sample pattern under the
uniform reverse sampling
(b) Sample pattern under the hybrid
reverse sampling
Fig. 2: Sample patterns
randomized approximation algorithm for the MP problem.
In order to evaluate the proposed algorithm, we design ex-
periments which compare the algorithms by evaluating their
performance under the same time constraint. The effectiveness
of our solution is supported by encouraging experimental
results.
Organization. In Sec. II, we introduce the considered
diffusion model and formally formulate the MP problem. We
present the new hybrid sampling technique in Sec. III. Our
algorithm is later given in Sec. IV in which we also provide
theoretical analysis. In Sec. V, we experimentally evaluate the
proposed solution. Sec. VI concludes this paper and proposes
some future problems. Due to space limitation, the related
works will be introduced throughout this paper and we do not
spare a separate section for them.
II. SYSTEM MODEL
We consider the classic independent cascade (IC) model
for influence diffusion. A social network is given by a directed
graph G = (V, E) where V is the set of the user and E denotes
the relationship between users. Let n and m be the number
of nodes and edges, respectively. Associated with each edge
(u, v) ∈ E, there is a real number Pr[(u, v)] ∈ (0, 1] denoting
the propagation probability from u to v. An information
cascade C starts to spread from its seed users S ⊆ V . We
say a user is C-active if they are influenced by cascade C. All
users are initialized as ∅-active, and the seed nodes of cascade
C are the first that are C-active. When a user v becomes C-
active for some cascade C, they have one chance to attempt to
activate their ∅-active neighbor v where the success probability
is Pr[(u, v)]. If the process succeeds, v becomes C-active as
well. We consider the scenario where there are two cascades,
the misinformation Cr and the positive cascade Cp. We assume
that the misinformation has a higher priority. That is, when
a user v is (a) selected as a seed node by both cascades
or (b) simultaneously activated by two neighbors which are
respectively Cr-active and Cp-active, v will be Cr-active.3
3We note that this is not a critical setting and the analysis of this paper can
be applied to the case when the positive cascade has a higher priority.
Seed of MisinformationM - areaP - areaSafe NodeddSample area from vvSample area from vvWe assume that the seed set of the misinformation, denoted
as Sr, is known to us, and we aim at introducing the positive
cascade to spread competing against the misinformation cas-
cade. In particular, our goal is to select an appropriate seed set
for the positive cascade such that the misinformation can be
prevented maximally. We say a user is Cr-active if they are
not Cr-active. We use f (S) to denote the expected number
of the Cr-active nodes under a positive seed set S ⊆ V .
The following two problems have been studied in the existing
work.
Problem 1 (Maximum Non-misinformation (MN) Prob-
lem). Given an instance of the IC model, the seed set Sr ⊆ V
of the misinformation, and a budget k ∈ Z+, find a subset
S ⊆ V with S ≤ k such that f (S) is maximized.
Problem 2 (Maximum Prevention (MP) Problem). Given
an instance of the IC model, the seed set Sr ⊆ V of the
misinformation, and a budget k ∈ Z+, find a subset S ⊆ V
with S ≤ k such that f∗(S) := f (S) − f (∅) is maximized.
The MN problem maximizes the expected number of the
nodes which are not activated by the misinformation, while the
MP problem maximizes f (S) − f (∅) where f (∅) is expected
number of the Cr-active nodes when there is no positive
cascade. Because f (S) − f (∅) denotes the exact effect of the
positive cascade in preventing the misinformation, we call the
second problem as the Maximum Prevention problem. These
two problems are equivalent to each other with respect to
the optimal solution, as their objective functions are differed
by a constant f (∅). However, with respect to optimization,
the MP problem is more challenging especially when f (∅) is
relatively large. One can see that, for each α ∈ (0, 1), each α-
approximation to the MP problem is also an α-approximation
to the MN problem. In this paper, we study the MP problem
and use Sopt to denote its optimal solution.
A. Derandomization of the diffusion process
We say an edge (u, v) is live if u can successfully activate
v. According to the IC model, the randomness of the diffusion
process comes from the states of the edges, where each edge
can be live or not live with probability Pr[e] and 1 − Pr[e],
respectively. The diffusion process is equivalent to that first
sample the states of the edges and then run the diffusion
process with the sampled states [9]. The concept of realization
is used to describe the basic event space.
Definition 1 (Realization). Given an instance of IC model,
a realization g is a two-tuple g = (g(Et), g(Ef )) where
g(Et), g(Ef ) ⊆ E and g(Et) ∩ g(Ef ) = ∅. g(Et) (resp.,
g(Ef )) denotes the set of the edges that are live (resp., not
live). In addition, we say g is a full-realization if g(Et) ∪
g(Ef ) = E. Otherwise, it is a partial-realization. For each
realization g, either full or partial, we use Pr[g] to denote
the probability that g happens. As the states of edges are
independent to each to other, we can easily check that
(cid:89)
Pr[e] · (cid:89)
e∈g(Et)
e∈g(Ef )
Pr[g] =
(1 − Pr[e]).
We use G to denote the set of the full-realizations. The
full-realizations provide a way to enumerate all the possible
outcomes, and the partial-realizations are useful to describe an
intermediate state during the diffusion process.
It is useful to interpret a full-realization g as a subgraph of G
with the edge set g(Et). For each g ∈ G, the diffusion process
in g is well-defined because the state of each edge is known
to us, and furthermore, the process is deterministic. Due to
v∈V fv(S)
where fv(S) is the probability that node v is Cr-active under
g∈G Pr[g] · fv(S, g),
the linearity of the expectation, we have f (S) =(cid:80)
S. fv(S) can be further expressed as (cid:80)
where
(cid:40)
fv(S, g) :=
1 v is Cr-active in g under S
0 otherwise
,
and finally, we have
f (S) =
Pr[g] · fv(S, g).
(cid:88)
(cid:88)
v∈V
g∈G
A natural problem is that under which condition that v can
be Cr-active in g. For each V1 ⊆ V , v ∈ V and g ∈ G,
we define disg(V1, v) := minu∈V1 disg(u, v) where disg(u, v)
is the distance4 from u to v in g. According to [2], [4], [15] and
[16], the following lemma gives the necessary and sufficient
condition for a node to be Cr-active in a full-realization.
Lemma 1. Suppose the seed set of the positive cascade is
S ⊆ V . For each v ∈ V and g ∈ G, v is Cr-active in g if and
only if disg(S, v) < disg(Sr, v) or disg(Sr, v) = +∞.
For each v ∈ V and S ⊆ V , we use
G(v, S) :={g ∈ G fv(S, v) = 1}
to denote the set of the full-realization(s) g where v is Cr-
active under S in g. Therefore,
(cid:88)
(cid:88)
Pr[g] −(cid:88)
g∈G(v,S)
v∈V
Pr[g]
(cid:88)
f (S) =
(cid:88)
(cid:88)
and
f∗(S) =
Pr[g].
v∈V
g∈G(v,S)
v∈V
g∈G(v,∅)
According to Lemma 1, it is clear that G(v,∅) ⊆ G(v, S)
and G(v,∅) consists of the realizations where there is no path
from Sr to v. Consequently, the difference between G(v,∅)
and G(v, S) is the set of the realizations g where disg(S, v) <
disg(Sr, v) and meanwhile there is a path from Sr to v. We use
G∗(v, S) to denote the set of such realizations, i.e., G∗(v, S) :=
{g ∈ G disg(S, v) < disg(Sr, v), disg(Sr, v) (cid:54)= +∞}.
Now our objective function f∗(S) can be expressed as
f∗(S) =
Pr[g],
(1)
(cid:88)
(cid:88)
v∈V
g∈G∗(v,S)
which is a useful expression for the analysis later.
4The distant from u to v is measured in terms of the length of the shortest
path from u to v. We denote it as disg(u, v) = +∞ when there is no path
from u to v.
Algorithm 1 Hybrid Sampling
1: Input: G = (V, E) and Sr;
2: Output: a collection P of subsets of V .
3: Simulate the diffusion of the misinformation from Sr. Let
Vr be the Cr-active nodes and g∗ be the realization when
the simulation terminates;
4: P ← ∅;
5: for each v ∈ Vr do
(P, g∗) ← Alg. 2 (G, g∗, Sr, v);
6:
P = P ∪{P};
7:
8: return P;
III. HYBRID SAMPLING TECHNIQUE
It has been shown in [2] that the MP problem is mono-
tone nondecreasing and submodular, and therefore the greedy
algorithm provides a good approximation [17]. However, the
greedy algorithm demands an efficient oracle of the objective
function f∗(S) which is #P-hard to compute [10]. Therefore,
it is hard to directly maximize f∗(S) and, alternatively, we can
first construct a good estimator of f∗(S) by sampling methods,
and then maximizing the obtained estimator. Towards this end,
we design a novel sampling process, shown in Alg. 1, which
includes the following two parts:
Forward Sampling (line 3). First, we ignore the positive
cascade and simulate the diffusion process of the misinforma-
tion from Sr. When the simulation terminates, we output the
immediate realization g∗ as well as the set Vr of the nodes
that are Cr-active. The g∗ produced in this step is usually a
partial realization.
Reverse Sampling (line 4-7). Let Vr and g∗ be the result
of the first step. We consider the nodes in Vr one by one
in an arbitrary order and run Alg. 2 for each v ∈ Vr. In
Alg. 2, given the node v and a realization g, we simulate
the diffusion from v in the reverse direction in the manner of
BFS until a misinformation seed is reached. When an edge e
is encountered, if the state of e is known in g (i.e., e ∈ g(Et)∪
g(Ef )), we keep its state; otherwise, we sample the state of e
and update g. During this process, we collect the nodes that are
traversed before the misinformation seed is reached. We start
with the realization g∗ obtained in the first step and any node
in Vr, and repeat this process for the rest nodes in Vr with the
updated realization. In each run of Alg. 2, a misinformation
node must be reached due to the construction of g∗ and Vr.
It is important to note that for each edge we sample its state
for at most one time during the whole process in Alg. 1.
For each V1, V2 ⊆ V , we use
(cid:40)
y(V1, V2) :=
1 V1 ∩ V2 (cid:54)= ∅
0 otherwise
S ⊆ V , define x(P, S) as x(P, S) :=(cid:80)
to denote that if the intersection of V1 and V2 is empty. Each
run of Alg. 1 gives a family P of subsets of V . For each
P∈P y(P, S). The
following lemma shows that x(P, S) is an unbiased estimator
of f∗(S).
else
if P ∗ ∩ Sr (cid:54)= ∅ then
Algorithm 2 Reverse Sampling from v
1: Input: G = (V, E), g = (g(Et), g(Ef )), Sr and v;
2: Output: P ⊆ V and an updated realization g;
3: P ∗ ← {v}, P ← ∅;
4: while true do
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
return (P , g);
P ← P ∪ P ∗;
E∗ ← {(u1, u2)u2 ∈ P ∗, u1 ∈ V \ P};
P ∗ ← ∅;
for each edge (u1, u2) ∈ E∗ do
P ∗ ← P ∗ ∪ {u2};
if (u1, u2) /∈ g(Ef ) then
if (u1, u2) ∈ g(Et) then
else
distribution
17:
18:
19:
20:
21:
(cid:46) (0,1) uniform
rand ← U(0, 1);
if rand ≤ p(u1,u2) then
P ∗ ← P ∗ ∪ {u2};
g(Et) ← g(Et) ∪ {(u1, u2)};
g(Ef ) ← g(Ef ) ∪ {(u1, u2)};
else
Lemma 2. For each S ⊆ V , E[x(P, x)] = f∗(S).
Proof. The randomness of the sampling process in Alg. 1
again comes from the random states of the edges. Although
Alg. 2 are possibly called several times during Alg. 1, we only
update the realization g∗ obtained in line 3 and no edge is
sampled more than once. Thus, it is equivalent to that we first
sample the states of all the edges to obtain a full-realization
g and then run the sampling process with g. As a result, the
basic event space is again G, and therefore we can express
g∈G Pr[g] · x(P g, S) where
P g is output of Alg. 1 when the realization is fixed as g.
r to denote the
When the realization is fixed as g, we use V g
Vr obtained in line 3 of Alg. 1, and let P g
v be subset returned
by Alg. 2 with an input v. Now we have
E[x(P, S)] as E[x(P, S)] = (cid:80)
E[x(P, S)] =
=
Pr[g] · x(P g, S)
(cid:88)
Pr[g]
y(P g
v , S)
(2)
Note that v is contained in V g
g when there is no positive cascade. That is, v ∈ V g
only if disg(Cr, v) (cid:54)= +∞. Thus, we have
g∈G
r if and only if v is Cr-active in
r if and
v∈V g
r
(cid:88)
(cid:88)
g∈G
E[x(P, S)] =
=
(cid:88)
(cid:88)
g∈G
Pr[g]
(cid:88)
(cid:88)
v∈V g
r
v∈V
g∈G(v,∅)
y(P g
v , S)
Pr[g] · y(P g
v , S)
Furthermore, in Alg. 2 we search the nodes from v in a reverse
direction in the manner of BFS, so P g
v contains exactly the
node(s) u with a distance to v shorter than disg(Sr, v). There-
v , S) = 1 if and only if disg(S, v) < disg(Sr, v),
fore, y(P g
which means g ∈ G∗(v, S). Since G∗(v, S) ⊆ G(v,∅), we
have
(cid:88)
(cid:88)
v∈V
(cid:88)
(cid:88)
g∈G(v,∅)
v∈V
g∈G∗(v,S)
{By Eq. (1)}
= f∗(S).
E[x(P, S)] =
=
Pr[g] · y(P g
v , S)
Pr[g] · 1
Thus, proved.
For convenience, we call each family P of the subsets of
V produced by Alg. 1 as an R-sample. The complexity of
generating one R-sample is given as follows.
Lemma 3. The expected running time of generating one R-
sample is O(m + m · max1) where max1 := max f∗({v}).
Proof. Let T be the expected running time of Alg. 1, Tg be
the running time when the realization is fixed as g. When the
realization is fixed as a full-realizatoin g, for each v ∈ V ,
we use T IM Eg to denote the running time of line 3, and
g to denote the running time of Alg. 2 with input v.
T IM Ev
Following the proof of Lemma 2, we have the notations V g
r
v .
and P g
According to the analysis in proof of Lemma 2, we have
T =
Pr[g] · Tg =
Pr[g] · (T IM Eg +
(cid:88)
g∈G
(cid:88)
g∈G
(cid:88)
v∈V g
r
Because T IM Eg is asymptotically bounded by the number of
the traversed edges before the simulation terminates, we have
(cid:88)
g∈G
Pr[g] · T IM Eg ≤(cid:88)
g∈G
Pr[g] · m = O(m).
g =
y(P g
(u,v)∈E
T IM Ev
v ,{u}),
Furthermore, according to Alg. 2, an edge (u, v) will be
checked in Alg. 2 if and only if u ∈ P v
v ,{u}) = 1.
Thus, we have
g , i.e., y(P g
and therefore,
(cid:88)
Pr[g] · (cid:88)
(cid:88)
(cid:88)
g∈G Pr[g]·(cid:80)
For each u ∈ V , by Eq. (2),(cid:80)
1 + max(cid:0)f∗({u})(cid:1)(cid:17)
T ≤ m ·(cid:16)
v ,{u}) is
equal to E[x(P,{u})] which is actually f∗({u}). As a result,
we have
v ,{u}).
T = O(m) +
(u,v)∈E
g∈G
v∈V g
r
v∈V g
r
y(P g
y(P g
.
Thus, proved.
IV. THE ALGORITHM
In this section, we present the algorithm designed based on
the hybrid sampling method for solving the MP problem and
provide theoretical analysis.
Algorithm 3 Greedy
1: Input: Rl, V , and k ∈ Z+;
2: S∗ ← ∅;
3: while S∗ < k do
v∗ ← arg maxv∈V x(Rl, S∗ ∪ {v});
4:
S∗ ← S∗ ∪ {v};
5:
return S∗;
A. The Idea.
According to Lemma 2, x(P, S) is an unbiased estima-
tor of f2(S). Therefore, if we generate a collection Rl =
{P 1, ...,P l} of l R-samples by running Alg. 1,
(cid:80)P∈Rl
x(P, S)
l
x(Rl, S) :=
should be an accurate estimate of f∗(S) when l is sufficiently
large. As a result, the subset S ⊆ V that can maximize
x(Rl, S) is intuitively a good solution to maximizing f∗(S).
B. Maximizing x(Rl, S)
Let us first consider that how to maximize x(Rl, S). The
following result shows that x(Rl, S) is monotone nondecreas-
ing and submodular.
Lemma 4. For each Rl, x(Rl, S) is monotone nondecreasing
and submodular.
(cid:80)P∈Rl
x(P, S)
l
=
(cid:80)P∈Rl
(cid:80)
P∈P y(P, S)
l
.
x(Rl, S) =
It is monotone nondecreasing because adding a new node
to S does not decrease y(P, S). Since the submodularity is
preserved under addition, it suffices to show that y(P, S) is
submodular with respect to S. That is, for each P ⊆ V ,
S1 ⊆ S2 ⊆ V and v /∈ S2, we have
y(P, S1 ∪ {v}) − y(P, S1) ≥ y(P, S2 ∪ {v}) − y(P, S2).
Because y is either 0 or 1 and it is monotone, it suffices to
prove that y(P, S1 ∪ {v}) − y(P, S1) is equal 1 whenever
y(P, S2 ∪ {v}) − y(P, S2) is equal to 1. When y(P, S2 ∪
{v}) − y(P, S2) is equal 1, we have y(P, S2 ∪ {v}) = 1 and
y(P, S2) = 1. That is, P ∩ (S2 ∪ {v}) (cid:54)= ∅ and P ∩ S2 = ∅,
which implies that v ∈ P . As a result, P ∩ S1 = ∅ and
P ∩ (S1 ∪ {v}) (cid:54)= ∅. Therefore, y(P, S1 ∪ {v}) − y(P, S1) is
also equal to 1.
Since x(Rl, S) is monotone and submodular, due to the
classic result in [17], the greedy algorithm given in Alg. 3
provides a (1− 1/e)-approximation for maximizing x(Rl, S).
Lemma 5. For each Rl = {P 1, ...,P l} and S ⊆ V with
S ≤ k, the S∗ produced by Alg. 3 satisfies that x(Rl, S∗) ≥
(1 − 1/e) · x(Rl, S).
T IM Ev
g ).
Proof. Recall that
Algorithm 4 Framework
1: Input: G = (V, E), Sr, k, and l;
2: Generate l R-samples Rl = {P 1, ...,P l} by Alg. 1;
3: Obtain an S∗ by Alg. 3 with Rl, V and k;
4: Return S∗;
C. The Framework
By taking Alg. 3 as a subroutine, the framework of our
algorithm is shown in Alg. 4. Given a threshold l ∈ Z+, we
first generate l R-samples and then run the greedy algorithm
to obtain a seed set S∗ of the positive cascade. Now the only
part left is to determine the number of R-samples to be used.
We will discuss this problem in the next subsection.
Proof. It can be proved by simple rearrangements. By Eq. (5),
we have
f∗(S∗) ≥ x(Rl, S∗) − 11(1 + )f∗(Sopt).
Due to Lemma 5, we have x(Rl, S∗) ≥ (1− 1/e)x(Rl, Sopt)
and therefore,
f∗(S∗) ≥ (1 − 1/e)x(Rl, Sopt) − 11(1 + )f∗(Sopt).
Finally, by Eqs. (6) and (7), we have f∗(S∗) ≥ (1− 1/e)(1−
12(1 + ))f∗(Sopt) − 11(1 + )f∗(Sopt) ≥ (1 − 1/e −
)f∗(Sopt).
We take the following setting of l to make Eqs. (5) and (6)
satisfied with probability at least 1 − 2/N.
D. Determining l
The goal is to set l sufficiently large in order to ensure
the theoretical guarantees. Since our algorithm is randomized,
given any parameters ∈ (0, 1) and N > 1, the goal is to
produce an S∗ such that
f∗(S∗) ≥ (1 − 1/e − )f∗(Sopt)
where
and
l1 :=
l∗ :=
n(ln(cid:0)n
k
max(l1, l2)
(1 + )2f∗(Sopt)
(cid:1) + ln N )(2 + 11(1 + ))
(11)2
2 · n · ln N
(12)2
.
l2 :=
Pr
Xi − l · µ ≤ −δ · l · µ
),
(4)
= exp
holds with probability at least 1 − 1/N.5 Throughout our
analysis, we assume that and N are fixed, and we aim to
achieve an arbitrary small error . We use the Chernoff bound
[18] to analyze the accuracy of the estimates.
Lemma 6 (Chernoff Bound). Let X1, ..., Xl ∈ [0, 1] be l
i.i.d random variables where E(Xi) = µ. The Chernoff bound
states that
Xi − l · µ ≥ δ · l · µ
),
(3)
Pr
(cid:104)(cid:88)
(cid:104)(cid:88)
and
(cid:105) ≤ exp(− l · µ · δ2
(cid:105) ≤ exp(− l · µ · δ2
2 + δ
2
for each δ > 0.
In particular, we need x(Rl, S) to be the accurate estimates
for the solution S∗ produced by the greedy algorithm as
well as for the optimal solution Sopt. We use 11 > 0 and
12 > 0 to control the accuracy of x(Rl, S∗) and x(Rl, Sopt),
respectively. The following conditions will be sufficient.
x(Rl, S∗) − f∗(S∗) ≤ 11(1 + )f∗(Sopt)
x(Rl, Sopt) − f∗(Sopt) ≥ −12(1 + )f∗(Sopt)
(1 − 12(1 + ))(1 − 1/e) − 11(1 + ) = 1 − 1/e −
11, 12 ∈ (0, 1)
(5)
(6)
(7)
(8)
Lemma 7. Whenever Eqs. (5)-(8) hold, we have
f∗(S∗) ≥ (1 − 1/e − )f∗(Sopt).
5As discussed in [2], 1 − 1/e is the best possible approximation ratio.
(cid:105)
Lemma 8. f∗(S∗) ≥ (1 − 1/e − )f∗(Sopt) with probability
at least 1 − 2/N provided that l ≥ l∗.
Proof. For each S ⊆ V ,
(cid:17)
11(1 + )2 · f∗(Sopt)
2 · n + n · 11(1 + )
(1 + )2 · f∗(Sopt)
}
l1
= Pr
≤ exp
n
Pr[x(Rl, S) − f∗(S) ≥ 11(1 + )f∗(Sopt)]
· 11(1 + ) · f∗(Sopt)
− f∗(S)
≥ f∗(S)
·(cid:0) 11·(1+)f∗(Sopt)
(cid:1)2
(cid:17)
{By the Chernoff bound}
l ·(cid:0)11 · (1 + )f∗(Sopt)(cid:1)2
2 + 11·(1+)f∗(Sopt)
f∗(S)
f∗(S)
f∗(S)
(cid:17)
n
2 · n · f∗(S) + n · 11 · (1 + )f∗(Sopt)
{Since f∗(S) ≤ f∗(Sopt) }
n
n
(cid:104) x(Rl, S)
(cid:16) − l · f∗(S)
(cid:16) −
(cid:16) − l · 2
(cid:1) · N
1(cid:0)n
{Since l ≥
≤ exp
≤
k
Note that S∗ = k and there are at most(cid:0)n
(cid:1) subsets of V with
k
size k. By the union bound, with probability at least 1− 1/N,
we have x(Rl, S∗)− f∗(S∗) ≤ 11(1 + )· f∗(Sopt). Here we
have to consider all the subsets with size k because the solution
produced by Alg. 3 is unknown to us before generating the
R-samples.
that when l ≥
we have x(Rl, Sopt) − f∗(Sopt) ≥ −12(1 + )f∗(Sopt).
Second, applying the Chernoff bound immediately yields
(1+)2f∗(Sopt), with probability at least 1−1/N,
l2
Since l ≥ l∗, by the union bound, f∗(S∗) ≥ (1 − 1/e −
)f∗(Sopt) with probability at least 1 − 2/N.
So far 11 > 0 and 12 > 0 are free parameters as long
as they satisfy that Eqs. (7) and (8). Note that Eqs. (7) and
(8) have at least one feasible solution. Ideally we should
minimize l, so the optimal setting can be obtained by solving
the following problem.
minimize max(l1, l2)
subject to Eqs. (7) and (8)
(9)
Now the only unknown part of l∗ is f∗(Sopt). According to
Lemma 8, for each OP TL with OP TL ≤ (1 + )2f∗(Sopt),
setting l as max(l1, l2)/OP TL will be sufficient. In the next
subsection, we will show how to obtain such a OP TL.
E. Lower Bound of f∗(Sopt)
Note that for each SL ⊆ V with SL = k, f∗(SL) is a lower
bound of f∗(Sopt), and according to Lemma 2, f∗(SL) can be
estimated by the hybrid sampling process. The following result
establishes the relationship between the number of samples
and the accuracy.
Lemma 9 (Dagum et al. [19]). For each 0 ≤ 0 ≤ 1 and
N ≥ 0, there exists an algorithm which, with probability at
least 1 − 1/N, produces a f∗
(SL) such that
(1 − 0)f∗(SL) ≤ f∗
(10)
where the number of the used simulations is asymptotically
bounded by O( 2
0+4(e−2)(1+0) ln(N/2)
(SL) ≤ (1 + 0)f∗(SL)
).
0
0
0· f∗(SL)
n
2
0
0
(cid:17)
Taking 0 as 2 + 2, such a lower bound OP TL = f∗
(cid:16) n·m(1+max1)·ln N
(SL)
(SL) ≤ (1 + 2 + 2)f∗(SL) ≤ (1 + )2f∗(Sopt),
satisfies f∗
and combining Lemma 3, the expected running time of gener-
ating such an estimate is O
for any small
. Since we would prefer a tight lower bound so that the
running time can be minimized, we could select SL through
intuitive heuristics. For example, selecting the our-neighbors
of the nodes in Sr.
F. The HMP Algorithm
2·OP TL
Now we are ready to present our algorithm. The algorithm
is formally given in Alg. 5, termed as Hybrid-sampling based
Misinformation Prevention (HMP) algorithm. As shown in
Alg. 5, we first compute a lower bound OP TL of (1 + )2 ·
f∗(Sopt) according to Sec. IV-E, then solve Eq. (9) to find the
optimal setting of 11 and 12. Finally, we use the framework
Alg. 4 to obtain the solution S∗.
Performance Guarantee. The HMP algorithm has the
following performance bounds.
Theorem 1. With probability at least 1 − 3/N, the HMP
algorithm returns a solution S∗ such that
f∗(S∗) ≥ (1 − 1/e − )f∗(Sopt).
Proof. Since OP TL ≤ (1+)2f∗(Sopt) holds with probability
at
the theorem follows immediately from
Lemma 8.
least 1 − 1/N,
Algorithm 5 HMP Algorithm
1: Input: G, , N, Sr and k;
2: Select any subset SL with SL = k and compute OP TL
by Lemma 9 with 0 = 2 + 2;
3: Compute 11 and 12 by solving Eq. (9).
4: l ← max(l1, l2)/OP TL
5: S∗ ← Alg. 4(G, Sr, k, l);
6: Return S∗;
Running Time. In Alg. 4, there are totally l R-samples
). By Lemma 3, the
generated where l = O( n·(k ln n+ln N )
expected running time of line 2 in Alg. 4 is
(cid:16) m · n(k ln n + ln N )(1 + max1)
2·OP TL
(cid:17)
.
(11)
O
2 · OP TL
Furthermore, Alg. 3 can be implemented to run in time
linear to the total size of its input [20]. Therefore, line 5
in Alg. 5 runs in the same as Eq. (11). The rest part of
Alg. 5 is dominated by line 5 so the whole algorithm runs
asymptotically in the same as line 5 does.
For the one interested in a success probability of 1 − n−l,
the running time would be
(cid:16) m · n · ln n · (k + l)(1 + max1)
(cid:17)
.
O
2 · OP TL
G. Comparing to the Existing Works.
There are three most related existing works, [2], [4], [15],
which aim at solving Problems 1 and 2 by designing ap-
proximation algorithms. C. Budak et al. [2] first proposed
the problem of limiting the spread of information and they
considered Problem 2. In [2], it is shown that Problem 2
is monotone and submodular, and the authors use Monte
Carlo simulation straightforwardly (i.e., the forward sampling
method) to overcome the difficulty in computing the objective
function. G. Tong et al. [4] applied the reverse sampling
technique invented by [11] -- [13] to solve Problem 1. Very
recently, M. Simpson et al. [15] adopted the same technique
to solve Problem 2. In the work [4] and [15], the authors
utilized the same sampling method designed based on the
uniform reverse sampling framework. As mentioned earlier,
selecting a node uniformly is not efficient for the MN or
MP problem, because it cannot attach extra importance to
the nodes that are prone to be Cr-active. Furthermore, as
discussed in [15], for the MP problem, the sample obtained
by the uniform reverse sampling method can be an empty set.
When an empty set is sampled, it corresponds to the case that
the selected node will not be affected by the misinformation
and we do not need to select any positive seed node to protect
that node. As shown in Alg. 3, the empty set cannot provide
any information for selecting effective nodes. On the other
hand, in the hybrid sampling method, every sample we obtain
by Alg. 2 is guaranteed to be non-empty, and therefore our
sampling process is more effective in generating the samples
Dataset
Wiki
HepPh
Epinions
DBLP
Youtube
Node
7K
34K
75K
317K
1.1M
Description
Edge
103K Wikipedia
421K
who-votes-on-whom
network
Arxiv High Energy Physics paper
citation network
508K Who-trusts-whom network
Epinions.com
of
1.04M DBLP collaboration network
6.0M
Youtube online social network
TABLE I: Datasets
that can help us find high-quality positive seed nodes. We have
observed the same in our experiments.
V. EXPERIMENTS
We now the present the experiments done for evaluating
the proposed solution by comparing it to the state-of-the-art
solutions, RBR [4] and RPS [15].
A. Experimental Setting
In most of the existing works,
the performance of an
algorithm is measured by either the running time or the quality
of the produced solution. However, for two algorithms namely
A and B, it happens that A produces a better solution than that
produced by B, but meanwhile, B runs much faster than A
does. Under such a scenario, one can hardly decide that which
algorithm is better. In order to fairly compare the algorithms,
we define the performance of an algorithm as the quality of
the produced solution under a specific time constraint.
Note that all the three algorithms, HMP, RBR and RPS,
follow the framework shown in Alg. 4, and the only difference
is that HMP utilizes a different method to generate samples.
The three algorithms all have the following two properties: (1)
the more samples we use, the better solution we obtain; (2) the
quality of the solution finally converges to an absolute value
upper bounded by the optimal value. Therefore, by controlling
the number of the used samples, there is a natural trade-off
between the running time and quality of the solution. In this
way, we are able to see that with the same running time which
algorithm is the best. As discussed in Sec. IV-G, the RBR
algorithm and the RPS algorithm essentially use the same
method to generate samples, so we only compare HMP with
RBR.
Experimental Setting. We adopt five datasets, from small
to large, Wiki, HepPh, Epinions, DBLP, and Youtube, bor-
rowed from SNAP [21]. A brief description of each dataset
is given in Table. I. We consider three types of propagation
probability: (1) the uniform setting where Pr[e] = 0.1; (2)
the uniform setting where Pr[e] = 0.01; (3) the weighted-
cascade model where Pr[(u, v)] = 1/dv for each (u, v) ∈ E
and dv is the in-degree of v. These settings have been widely
adopted in prior work. We set k = 10 and Sr = 15 in our
experiments, unless otherwise specified. The nodes in Sr are
selected from the nodes with the highest individual influence.
For each algorithm and dataset, we continuously increase the
number of the used samples and record the produced positive
the seed set, until the quality of the solution tends to converge.
Each solution is finally evaluated by 10,000 Monte Carlo
simulations.
B. Experimental Results
The experimental results are shown in Fig. 3. Each figure
gives two curves plotting the results of HMP and RBR
respectively. The minimum unit of the running time is 0.1
second, and it is shown as 0 when the running time is less
than 0.1 second.
Major observations. The most important observation is
that HMP consistently outperforms RBR under all considered
datasets and propagation probability settings. Under the same
time constraint, the solution of HMP is more effective than that
of RBR with respect to maximizing f∗(S). For example, in
Fig. 3d, when the running time is required to be less than one
second, HMP is able to protect more than 500 users while
RBR can only protect 220 users. Furthermore, HMP takes
much less time to reach the maximal performance. As an
extreme example, in Fig. 3f, HMP converges after 5 seconds
while RBR converges after 40 seconds. In other words, a
few samples will be sufficient for HMP to achieve a high
performance. Finally, the curves of HMP is smoother than that
of RBR, which means HMP is more robust than RBR. Such
a scenario suggests that the variance of the solution produced
by RBR is typically higher than that of the solution given by
HMP.
Minor observations. According to the figures, HMP usually
has a breakpoint after which the quality of the solution remains
unchanged. For example, (0.25, 49) in Fig. 3a and (50, 3500)
in Fig. 3i. On the other hand, curves of RBR tend to increase
gradually and there is no significant breakpoint. It would be
great if we can identify the numbers of the samples corre-
sponding to such breakpoints, because they are the minimum
number to reach the maximal performance. Unfortunately, we
find that the theoretical bound given in Sec. IV usually far
exceeds the minimum requirement of the breakpoints. One
possible reason is that the theoretical bounds are dealing with
the worst-case scenario so it is too pessimistic for the average
case. Another reason is that we assume the variance is n2 in the
Chernoff bound, which leads to an overestimate of the number
of the required samples. The variance of the distribution over
the diffusion outcomes can significantly help us to obtain an
accurate estimate. Currently, we are not aware of any existing
work which has considered this issue.
Remark 1. It should be noted that when the objective function
stops increasing, its maximal performance has been almost
reached. When the maximal performance is reached,
the
solution produced at that moment is no worse than a (1−1/e)-
approximation as 1 − 1/e is the worst-case ratio.
VI. CONCLUSION AND FUTURE WORK
In this paper, we present a hybrid sampling method which
is designed particularly for the misinformation prevention
problem. We show that the new sampling method can be used
(a) Wiki under weighted-cascade model
(b) HepPh under weighted-cascade model
(c) HepPh under uniform 0.1
(d) Epinions under weighted-cascade model
(e) Epinions under uniform 0.01
(f) DBLP under weighted-cascade model
(g) DBLP under uniform 0.1
(h) Youtube under weighted-cascade model
Fig. 3: Experimental Result.
(i) Youtube under uniform 0.01
to design an approximation algorithm which outperforms the
state-of-the-art solutions.
We propose some future works which we believe are
interesting. It has been shown that there exist O(k·m·log n/2)
algorithms for the MN and IM problem. Though the MP
problem and the MN problem merely differ by a constant, the
best algorithm for the MP problem is O(k · m · n · log n/2)
(assuming OP TL ≥ (1 + max1)), and it is open that if we
can find a O(k · m · log n/2) algorithm for the MP problem.
In addition,
the existing lower bounds on the number of
the samples used to reach the breakpoints observed in the
experiments are still pessimistic. We are looking for more
practical methods to help us find such breakpoints so that we
can achieve the best performance with the minimum running
time.
ACKNOWLEDGMENT
We thank the reviewer for pointing out the issue discussed
in Remark 1. This work is supported in part by the start-up
grant from the University of Delaware.
REFERENCES
[1] G. A. Tong and D.-Z. Du, "Beyond uniform reverse sampling: A hybrid
sampling technique for misinformation prevention," in IEEE INFOCOM
2019-IEEE Conference on Computer Communications.
IEEE, 2019, pp.
1711 -- 1719.
[2] C. Budak, D. Agrawal, and A. El Abbadi, "Limiting the spread of
misinformation in social networks," in Proc. of WWW, 2011.
[3] L. Fan, Z. Lu, W. Wu, B. Thuraisingham, H. Ma, and Y. Bi, "Least cost
rumor blocking in social networks," in Proc. of ICDCS, 2013.
[4] G. Tong, W. Wu, L. Guo, D. Li, C. Liu, B. Liu, and D.-Z. Du, "An
efficient randomized algorithm for rumor blocking in online social
networks," IEEE Transactions on Network Science and Engineering,
2017.
[5] S. Li, Y. Zhu, D. Li, D. Kim, and H. Huang, "Rumor restriction in
online social networks," in Proc. of IPCCC, 2013.
[6] X. He, G. Song, W. Chen, and Q. Jiang, "Influence blocking maximiza-
tion in social networks under the competitive linear threshold model."
in Proc. of SDM, 2012.
[7] Y. Ping, Z. Cao, and H. Zhu, "Sybil-aware least cost rumor blocking in
social networks," in Proc. of GLOBECOM, 2014.
[8] G. Tong, W. Wu, and D.-Z. Du, "On misinformation containment in
online social networks," in Proc. of NIPS, 2018.
[9] D. Kempe, J. Kleinberg, and ´E. Tardos, "Maximizing the spread of
influence through a social network," in Proc. of SIGKDD, 2003.
0246810303540455055Running time (s)Objective value HMP AlgorithmRBR Algorithm5101520600650700750800850Running time (s)Objective value HMP AlgorithmRBR Algorithm123456789009501000105011001150120012501300Running time (s)Objective value HMP AlgorithmRBR Algorithm020406080200300400500600700800900Running time (s)Objective value HMP AlgorithmRBR Algorithm050100150405060708090100110120130Running time (s)Objective value HMP AlgorithmRBR Algorithm0204060802000300040005000600070008000900010000Running time (s)Objective value HMP AlgorithmRBR Algorithm01002003004005004005006007008009001000110012001300Running time (s)Objective value HMP AlgorithmRBR Algorithm050010001500100020003000400050006000700080009000Running time (s)Objective value HMP AlgorithmRBR Algorithm02004006008001000120014005001000150020002500300035004000Running time (s)Objective value HMP AlgorithmRBR Algorithm[10] W. Chen, C. Wang, and Y. Wang, "Scalable influence maximization for
prevalent viral marketing in large-scale social networks," in Proc. of
SIGKDD, 2010.
[11] C. Borgs, M. Brautbar, J. Chayes, and B. Lucier, "Maximizing social
influence in nearly optimal time," in Proc. of SODA, 2014.
[12] Y. Tang, X. Xiao, and Y. Shi, "Influence maximization: Near-optimal
time complexity meets practical efficiency," in Proc. of SIGMOD, 2014.
[13] Y. Tang, Y. Shi, and X. Xiao, "Influence maximization in near-linear
time: a martingale approach," in Proc. of SIGMOD, 2015.
[14] H. T. Nguyen, M. T. Thai, and T. N. Dinh, "Stop-and-stare: Optimal
sampling algorithms for viral marketing in billion-scale networks," in
Proc. of SIGMOD, 2016.
[15] M. Simpson, V. Srinivasan, and A. Thomo, "Scalable misinformation
prevention in social networks," arXiv preprint arXiv:1807.01162, 2018.
[16] G. Tong, W. Wu, and D.-Z. Du, "Distributed rumor blocking with
multiple positive cascades," IEEE Transactions on Computational Social
Systems, vol. 5, no. 2, pp. 468 -- 480, 2018.
[17] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher, "An analysis of ap-
proximations for maximizing submodular set functionsi," Mathematical
Programming, vol. 14, no. 1, pp. 265 -- 294, 1978.
[18] R. Motwani and P. Raghavan, Randomized algorithms. Chapman &
[21] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network
dataset collection," http://snap.stanford.edu/data, Jun. 2014.
Hall/CRC, 2010.
[19] P. Dagum, R. Karp, M. Luby, and S. Ross, "An optimal algorithm for
monte carlo estimation," SIAM Journal on computing, vol. 29, no. 5,
pp. 1484 -- 1496, 2000.
[20] V. V. Vazirani, Approximation algorithms. Springer Science & Business
Media, 2013.
|
1809.06656 | 1 | 1809 | 2018-09-18T12:00:57 | Probing Limits of Information Spread with Sequential Seeding | [
"cs.SI",
"physics.soc-ph"
] | We consider here information spread which propagates with certain probability from nodes just activated to their not yet activated neighbors. Diffusion cascades can be triggered by activation of even a small set of nodes. Such activation is commonly performed in a single stage. A novel approach based on sequential seeding is analyzed here resulting in three fundamental contributions. First, we propose a coordinated execution of randomized choices to enable precise comparison of different algorithms in general. We apply it here when the newly activated nodes at each stage of spreading attempt to activate their neighbors. Then, we present a formal proof that sequential seeding delivers at least as large coverage as the single stage seeding does. Moreover, we also show that, under modest assumptions, sequential seeding achieves coverage provably better than the single stage based approach using the same number of seeds and node ranking. Finally, we present experimental results showing how single stage and sequential approaches on directed and undirected graphs compare to the well-known greedy approach to provide the objective measure of the sequential seeding benefits. Surprisingly, applying sequential seeding to a simple degree-based selection leads to higher coverage than achieved by the computationally expensive greedy approach currently considered to be the best heuristic. | cs.SI | cs | Probing Limits of Information Spread with Sequential Seeding
Jarosław Jankowski1∗, Boleslaw K. Szymanski2,4, Przemysław Kazienko3,
Radosław Michalski3, Piotr Bródka3
8
1
0
2
p
e
S
8
1
]
I
S
.
s
c
[
1
v
6
5
6
6
0
.
9
0
8
1
:
v
i
X
r
a
1 Faculty of Computer Science and Information Technology, West Pomeranian University of Technology,
70-310 Szczecin, Poland
2 Social and Cognitive Networks Academic Research Center and Department of Computer Science,
Rensselaer Polytechnic Institute, Troy NY 12180, USA
3 Faculty of Computer Science and Management, Wroclaw University of Science and Technology, 50-370
Wroclaw, Poland
4 Społeczna Akademia Nauk, Łódź, Poland
Abstract
We consider here information spread which propagates with certain probability from nodes just activated
to their not yet activated neighbors. Diffusion cascades can be triggered by activation of even a small set
of nodes. Such activation is commonly performed in a single stage. A novel approach based on sequential
seeding is analyzed here resulting in three fundamental contributions. First, we propose a coordinated ex-
ecution of randomized choices to enable precise comparison of different algorithms in general. We apply it
here when the newly activated nodes at each stage of spreading attempt to activate their neighbors. Then,
we present a formal proof that sequential seeding delivers at least as large coverage as the single stage seed-
ing does. Moreover, we also show that, under modest assumptions, sequential seeding achieves coverage
provably better than the single stage based approach using the same number of seeds and node ranking.
Finally, we present experimental results showing how single stage and sequential approaches on directed
and undirected graphs compare to the well-known greedy approach to provide the objective measure of the
sequential seeding benefits. Surprisingly, applying sequential seeding to a simple degree-based selection leads
to higher coverage than achieved by the computationally expensive greedy approach currently considered to
be the best heuristic.
Keywords: diffusion, social network, seed selection, influence maximization, sequential seeding
Introduction
Making decisions is often difficult; this is why it is often worth to split it into consecutive stages to reduce
potential risk. Such approach gives the decision maker an opportunity to learn the outcomes of the previous
stages and adjust accordingly the current stage. This approach applies also to influence maximization and
information spread in complex networks. One of the main challenges there is the selection for initial and
activation network nodes referred to as seeds, to maximize the spread of information within the network [1].
∗E-mail:[email protected]
1
Various factors affecting the diffusion and social influence in complex networks were analyzed including
the role of different centrality measures in selection of initial influencers [2], impact of homophily for successful
seeding [3] and others [4]. While most of the relevant research is related to marketing, the problem is more
generally defined as a target set selection in combinatorial optimization in theoretical computer science [5 -- 7].
The influence maximization problem is also explored in physics from the perspective of network structures [8].
Some other studies discuss the role of communities [9] or propose to use optimal percolation [10]. Initial
research has been carried out to identify seeds for temporal [11, 12] and multi-layered social networks [13].
Several comparative studies on seeding strategies were presented in [14,15]. Since the seed selection process
is NP-hard [1], several heuristics have been proposed. Most of them use network structural properties like
degree or eigenvector measure to rank seed candidates [14].
Seeding strategies have been applied to word-of-mouth marketing, social and political campaigns and
diffusion of information in social media. Vast majority of them are based on the assumption that all seeds
are activated at the beginning of the process or campaign and then diffusion starts and continues naturally
without any additional support [14]. Some recent research proposes to apply adaptive approaches with
two-stage stochastic model exploring the potential of neighboring nodes [16], further extended towards more
scalable approach [17]. Using some seeds after the first stage was preliminary proposed in [18, 19] and
potential of multi-period spraying for routing in delay-tolerant networks was discussed as an effective solution
for propagation in computer networks in [20].
On top of that, the concept of sequential seeding was introduced [21]. It takes the advantage of delayed
seeding by interweaving activating seeds with diffusion. Here we firm the foundations of sequential seeding
and address a number of research questions that have not been studied before [21 -- 23]. First, we prove
formally and confirm experimentally on real networks that the sequential seeding is at least as good as the
single stage method and under modest conditions, it is provably better. Then, we evaluate the realistic
benefits of this method by comparing its capabilities to both greedy and optimal (maximal) solutions to
obtain some measure of improvements provided by this approach. Finding optimal seed sets and computing
the maximal coverage for various scenarios allow us to represent gains from sequential seeding as a fraction
of the space between coverage of other algorithms and the maximal coverage. This has been investigated
empirically for directed and undirected networks using independent cascades model [1].
Strategy Description
No. of seeding stages
SN
SQ
Single Stage Seeding -- all seeds are activated in one stage at the
beginning
Sequential Seeding -- one seed activation starts the stage and re-
vives the previously stopped diffusion; each stage ends when dif-
fusion stops
1
n
Table 1: Seeding strategies with n number of seeds
In the first phase, we ran simulations on six real complex networks with sizes in the range of 1.5k-17k
nodes. The visualization of the networks and their basic properties are provided in the Supplementary
Material. The independent cascades model (IC) [1] was used with a given propagation probability P P (a, b)
that node a activates (influences or infects) node b in step t+1 under the condition that node a was activated
at time t [24]. The results for undirected networks assume that P P (a, b) = P P (b, a) for all edges. This
simplification allowed us to obtain the optimal seed set through the complete search even for largest networks
among those used for experimentation. To explore the directed networks without this assumption, another
large set of extensive experiments were performed on the smaller network, for which it was also possible to
compute optimal solutions, see the next section.
2
Figure 1: Undirected networks: (A) The averaged performance of sequential SQ and single stage seeding
SN with greedy based nodes selection as a fraction of the maximum coverage CM ax and as a function of
the network size N, probability of propagation PP across each edge, and the fraction of nodes selected as
seeds (seed selection percentage) SP; see (A1) Performance of sequential SQ and single stage seeding SN
with degree-based ranking in comparison with maximum coverage and the upper bound as a function of
the individual configurations, each defined by N, PP, SP, and the random binary choice made at simulation
initialization for each edge to propagate or not information across this edge; (B) Coverage of sequential
method SQ as percentage of CM ax placed between single stage seeding SN and Max for greedy nodes
selection; (B1), (B2) Sequential seeding performance SQ between single stage seeding SN and Max for
random and degree-based node selection, respectively; (B3) Performance of sequential SQ and single stage
seeding SN represented by percentage of activated nodes within network (coverage) for random seed selection,
degree-based ranking and greedy seed selection in comparison with maximum coverage as a function of the
individual configurations; (C) Gain for different propagation probabilities PP averaged over all cases; (D)
Gain for different seeding percentages SP; (E) Gain for node ranking strategies based on random, greedy
and degree selection; (F) Gain for networks N1 - N6.
With the independent cascades model (IC) even a single seed can induce diffusion (which is crucial for
sequential approaches), while in the linear threshold model [1] (LT), a small seed set could have no effect.
For that reason, experiments were carried out on the IC model.
Results achieved by sequential seeding (SQ) were compared with the single stage approach (SN) and the
maximum coverage (Max) for the same setup: network and parameters: the propagation probability, the
seeding percentage, and the seed ranking strategies: degree, greedy and random. The sequential coverage
CSQ was on average 7.1% better than the single stage coverage CSN. The positive gain of SQ over SN was
also confirmed by statistical tests, see Section Material and Methods.
Results for greedy based ranking for 50,000 simulations represented as percentage of maximum coverage
CM ax averaged over individual configurations and ordered by the ratio CSN / CM ax are presented in Fig. 1
(A). Additionally, the upper bound CGreedySN ∗ e/(e − 1) [1] is for many configurations up to 50% greater
than real maximum value observed, see Fig. 1 (A1). These results demonstrate that upper limit derived
from greedy approach is not tight. Sequential methods always outperform single stage ones, if we consider
averaged coverage, for any strategy as well as for every configuration. Moreover, degree SQ is able to cover
more nodes than greedy SN, especially for configurations with coverage significantly lower than CM ax, as
shown in Fig. 1 (A1).
There were 8,100,000 individual simulation cases defined during simulation initialization, each case by
its N, PP, SP, and binary random choice selected for each edge to propagate information or not across
3
this edge. These cases are ordered by coverage obtained in the single stage method. The resulting plots
demonstrate that CSQ performs better than CSN in almost every case. The greatest increase is observed for
CSN ∈ [30%, 85%]; simply the space for improvement is larger in such cases.
The global results for all networks, strategies, parameters and random binary choices for each edge to
propagate information or not across this edge made at the simulation initialization yield better values of
CSQ than of CSN in 96.7% of cases. The increase over 5% was achieved in 20.2% of cases. The results
were dependent on node ranking strategy with 96.0% better results for random rankings, 100% for degree
based rankings and 93.9% for greedy approach based ranking. The improvement over 5% was observed for
11.2% cases for random strategy and as much as 38.7% cases for degree-based selection and 10.9% for greedy
method. It should be also noted that, surprisingly, the random selection performs slightly better than the
expensive greedy selection.
Results for individual cases with respect to maximum coverage are presented in Fig. 1 (B). The sequential
results are localized above the single stage border, filling the space towards maximum (100%). The dispersion
is the highest for degree based rankings Fig. 1 (B1). The lowest dispersion of results is observed for random
based node selection, see Fig. 1 (B2). Moreover, if the single stage coverage is at least at the level of 90%, all
strategies are able to provide sequential cases very close to maximum. For lower coverage, only degree-based
rankings can improve results so much.
The results revealed an important phenomenon: sequential seeding based on degree selection in 92.2%
of cases outperforms single stage greedy approach. A similar improvement is also observed for the averaged
values. It means that sequential approach almost always is able to boost performance of the simple degree-
based ranking over computationally expensive greedy heuristic. Moreover, CdegreeSQ is greater than CgreedySQ
in 62.6% of cases but for single stage methods such superiority can be observed in only 0.01% of cases.
Hence, the main finding is that the computationally ineffective greedy strategy is suitable for single
stage approach, while degree based selection for sequential seeding is significantly better than other selection
methods.
In general, the obtained results were dependent on the network profile and parameters of the diffusion.
Space between the maximum coverage CM ax and the single stage seeding CSN is an area in which sequential
approaches deliver improvement. This area on average is (CM ax − CSN )/CSN so only 25%, of the all
simulation cases.
To evaluate the improvement, a gain measure G was defined; it is based on average coverage values:
G = ((CSQ − CSN )/(CM ax − CSN )) ∗ 100%. It shows what part of the improvement area is reachable by
sequential approach. Depending on process parameters and network, the gain varies from 30% to 83%. In
general, the greater propagation probability value, the greater coverage and gain, see Fig. 1 (C). The same
phenomenon arises for seeding percentages, as seen in Fig. 1 (D). Regarding node selection strategies, the
highest average gain 74% was observed for degree based selection, while for greedy and random strategies
it is much lower: 27% and 33% respectively, as shown in Fig. 1(E). The gain strongly depends on network
structure, see Fig. 1 (F). The highest gain (83%) was achieved for network N6, whereas the least gain (30%)
was achieved for network N3.
Results
Experimental results for directed networks
As in case of undirected networks, coordinated execution experiments for a real directed network were run
to analyze gain from sequential seeding compared to greedy approach and maximal possible coverage. Since
they requires computationally expensive search for the optimal seed sets, only a small network with 16 nodes
and 58 edges was used [25]. Following the coordinated execution principles, 10k instances of the network were
4
randomly generated to assign binary choices of propagation or not for each directed edge, i.e., independently
for a → b and b → a activation. One of these instances is presented in Fig 2. For each instance and
propagation probability PP, an optimal 4-node seed set was computed to estimate the maximum coverage
for this instance and PP. Results for all probabilities and ranking strategies (degree, greedy, random) show
that the highest increase of coverage was observed for the sequential degree based selection, see Fig. 3 (B),
(D). Moreover, the sequential approach with the degree rankings delivered better results than greedy-based
selection regardless if used in single stage or sequential mode, as shown in Fig. 3 (A), (D). It means that the
degree approach should be among the first choices considered when selecting the node ranking method.
The average performance (gain in coverage) is strongly dependent on propagation probabilities (PP) and
it increases with PP values, see Fig. 3 (C), even though higher probabilities leave less space for improvements,
since they also raise the single stage coverage. This effect is present for all selection strategies. The reason
is that although the processes with high PP reaches more than 80% of nodes for all strategies and the area
for gain is much smaller, the savings from the sequential approaches are even greater than for smaller PP's,
as shown in Fig. 3 (E), benefiting the final results.
In general, the sequential approach enables us to save seeds and allocate them to other network regions.
This gain varies for different propagation probabilities and ranking strategies, as shown in Fig. 3 (E), and it
comes from activation of seed candidates by inter-stage diffusion. The degree ranking reveals its superiority
over other ranking methods also in seed saving, which may, in fact, be the reason why the sequential degree
method outperforms the single stage greedy, as seen in Fig. 3 (A). More than 25% of seeds can be saved even
for smallest propagation probabilities and up to 48% for PP=0.25 and degree-based selection. These results
may guide future research on methods to find the minimal number of seeds used sequentially to achieve the
same coverage as in the single stage seeding.
Overall, the main findings for directed networks are similar to the ones for undirected graphs: (1)
sequential approach almost always significantly increases coverage of spreading and reaches beyond the
current limits (never makes it worse), (2) sequential degree-based selection is commonly better than the
greedy selection and (3) it is often close to the maximum, (4) usually, the greater propagation probability,
the greater gain, and (5) sequential approach enables us to replace some of the initial seeds with the additional
ones thereby increasing coverage, especially for greater PP and degree selection.
Discussion
The presented results lay firm foundation for the earlier studies related to sequential seeding and address
currently unanswered research questions
[21 -- 23]. Averaging the coverage obtained by the typical agent
based simulations delivers improvement in about 90% of the cases
[21], the formal proof relying on the
coordinated execution and corroborated by the new empirical studies shows that sequential seeding delivers
at least as large coverage as the widely used single stage seeding; under modest assumption this coverage is
provably larger. The performance of sequential seeding is compared with both greedy seed selection (which
may be treated as the current limit) and the optimal seed set providing maximal possible coverage for a
given number of seeds and the given network configuration. Experiments were performed for directed and
undirected networks by means of independent cascades model [1]. Sequential usage of seeds selected by the
simplest degree-based heuristics delivers better coverage than the greedy algorithm used in the single stage
mode. However, coverage achieved by the greedy selection can also be further improved, if seeds are used
sequentially instead of being all activated at the beginning of execution, even though the resulting coverage
still remains worse than the one that the sequential degree selection delivers.
Overall, the results confirm that sequential allocation of seeds improves the coverage of information
diffusion in both directed and undirected complex networks. The measure of improvements provided by this
approach is showed. It helps to substitute seeding nodes activated by diffusion by selecting new seeds based
5
Figure 2: One of the experimental cases for the directed network (run 4336) with the number of seeds
n = 4 and the propagation probability P P = 0.05. For clarity and high network density only edges assigned
the random choice of propagating information for them by coordinated execution are shown. Degree- and
greedy-based rankings are computed for the full initial network with all edges. (A) Single stage seeding
(SN) with degree-based ranking, the coverage CSN = 6, a diffusion cascade is visible when node 11 activates
nodes 9 and 10. (B) Diffusion with sequential seeding and degree based selection; the ranking is the same
as in (A); one seed is activated in each of four stages; in the first stage node 6 is activated according to its
highest degree. It activates node 11 which in turn activates nodes 15 and 9; finally, node 9 activates node 10
and diffusion stops. The two seeds used in (A) are already activated by diffusion in this case. In the second
stage node 16 is selected since it has the highest degree among not activated yet nodes. Its only neighbor,
node 11, is already active so the process stops. In the next stage node 1 is selected as a seed but it lacks
active edges so diffusion cannot progress. Fourth seed is node 12 and it activates node 14. Sequential seeding
avoids using nodes 11 and 15 seeds which are activated as seeds in single stage seeding. This allow sequential
seeding to activate two more seeds and three more nodes in total compared to single stage seeding. (C)
Single stage seeding with greedy-based ranking and coverage CSN = 7. (D) Single stage seeding based on
the seed set optimal for this individual case, including knowledge of which edges are active for propagation,
with the resulting coverage CSN = 11.
on node's ranking which may activate new regions, see Fig. 2 (B).
As a result, sequential seeding commonly provides better coverage than the single stage approach, no
matter which initial node selection strategy is used. In the worst case, the results remain the same but the
experimental studies show that it happens in fewer than 10% of all cases.
For single stage mode the greedy approach is commonly better than typical ranking selections based on
structural measures, e.g. degree and it can be treated as the method defining the current limit. However,
6
Figure 3: The directed network: (A) Performance of sequential SQ and single stage seeding SN with degree-
based ranking in comparison with maximum coverage; (B) The coverage achieved by sequential strategies
in comparison to coverage obtained by a single stage approach; (C) Averaged gain for all used propagation
probabilities; (D) Averaged gain for node ranking strategies based on random, greedy and degree selections;
(E) Percentage of saved seeds for degree, random and greedy based selections.
it requires extensive prior simulations, which in practice are hardly possible due to (1) high computational
complexity, and (2) feasibility of simulations for real data -- very rarely we can run thousands of diffusion
processes when the results need to be delivered in the real-time of the campaign.
Sequential seeding outperforms the greedy search method. Moreover, sequential seeding using structural
network measures like degree, for seed selection yields coverage greater than obtained by greedy, without
necessity of any prior simulations. In our experiments, it happened in over 92% of cases. It appears that
using degree-based rankings with sequential strategy is better than using the computationally expensive
greedy approach.
We observed that the main factor that defines performance of sequential seeding versus single stage
seeding is to what extent seed selection method avoids selecting nodes that will be activated through diffusion.
The gain of sequential seeding arises when the selected seed to be activated in the current stage is already
active. In such a case, this seed is removed from the seed list and replaced by a highest ranking node which is
not yet activated. It should be noted that we compare the resulting coverage with the real maximum coverage,
which very often is much lower than the theoretical upper bound for the average maximum coverage suggested
in [1, 26], see red line in Fig. 1 (A1) and 3 (A).
Presented study has several implications for practice. Instead of introducing the product to large number
of customers at the outset of commercial campaign, better strategy is seeding a small fraction of nodes
and giving the chance to natural diffusion driven by social influence mechanisms to spread the content.
Marketing budgets can be optimized if additional seeds are utilized only if campaign fails and revival is
needed. Moreover, the knowledge gain from the initial spreading may improve seed selection for revival.
Increased coverage of spreading might be crucial for campaigns with limited budgets, such as spreading
security information, or disease warnings and awareness. During massive campaigns habituation phenomenon
can arise among customers resistant to marketing messages. It can be avoided by limiting the intensity of
marketing activity. While campaigns with higher intensity can be perceived negatively as unsolicited massive
communication, sequential strategies may avoid making such negative impact on customers. Sequential
seeding is also a low risk strategy with possible high gains because, as we proved, results will never be worse
when compared to single stage seeding.
7
Figure 4: Diffusion processes for the number of seeds n = 3; the classical single stage method (SN) compared
with sequential seeding strategy (SQ).
Methods
Independent cascade model
We consider an independent cascade that is a stochastic diffusion model of information spread in the network
initiated by seeds [1]. A basic, commonly used, single stage seeding (SN) consists of only one activation stage
in which the fixed number of n seeds are activated, see Table 1. They initiate diffusion which runs until
no more nodes can be activated. In the independent cascade model each diffusion step consists of a single
attempt by all nodes activated in the previous step, to activate their direct not yet active neighbors with a
given propagation probability (PP). We measure diffusion time in the number of such steps, assuming that
each lasts a unit of execution time.
Sequential seeding
Let TSN denote the time the whole process of the single stage seeding lasts, see Fig. 4. Often, some seeds
activated at the beginning could have been naturally activated later on. The sequential seeding strategy
(SQ) uses the same number of seeds n as SN [21]. Its idea is to take the same initial ranking of nodes as
in case of single stage seeding, but activate them sequentially in n consecutive stages each with one seed
activated. After each activation, the diffusion proceeds. The next activation is suspended until the current
diffusion process stops, i.e., when the last diffusion step does not increase the coverage. In the independent
cascade model, each recently activated node has only one chance to infect its neighbors. Hence, if the
diffusion stops, the only way to continue activation is activating a seed. In the sequential method, it is the
highest ranking node not yet activated. It means that nodes already activated by diffusion are omitted. The
gain of sequential approach comes from the new areas activated by additional seeds substituting the already
activated ones. Hence, the set of seeds activated in sequential seeding often differs from the one activated
in the single stage approach. Sequential approach may be applied to any initial node ranking computed
once at the beginning of the process. Such ranking may utilize random choice, any structural measures like
commonly used degree or any other heuristic, e.g., greedy [1, 26]. Some questions arise here: what is the
increased coverage CSQ; is CSQ always greater than CSN and what is the gain achieved comparing with the
estimate of the maximum coverage CM ax for a given configuration.
8
Coordinated execution and maximal coverage
The need often arises to compare algorithms which during execution make random choices, e.g., to break
ties, simulate random outcomes according to the given distribution, or are randomized in nature. In such
cases often average values of performance are measured over many runs of each algorithm and used for
comparison between them. Here, we propose coordinated execution as the more direct alternative, in which
we compare performance of runs with the same choices made during executions with different algorithms,
providing run by run comparison of the results. This requires that all random choices are made and recorded
before each run for all compared algorithms. The subsequent runs for comparison of algorithms simply
execute preprocessing of choices with unique seeds for random number generator.
When applied to comparing various seeding methods uses, the coordinated execution requires that each
node activated in any execution makes the same edge diffusion transmission decision. To ensure that all
edges randomly select their activity status before the coordinated executions are run for all variants of single
stage and sequential strategies. It enables us to make fair comparisons between different seeding strategies.
Coordinated execution in the undirected network uses only one edge between two nodes. A propagation
probability between two nodes a → b is the same as for b → a transmission. Coordinated execution in
directed network replaces each edge with two directed edges, and then decides which directed edges will be
activated in diffusion. The edge states are sampled from the binary set {0, 1} with state 1 being chosen with
uniform probability PP.
Edges assigned value of 0 are removed, while edges with value 1 stay, creating an instance of an active
edge graph. Two instances of execution of sequential and single stage methods are coordinated if all edges
originating from node activated in both instances have the same states. Such coordinated instances are used
to compute the maximum coverage CM ax for a given network and active edge choices. Such computation
requires identification of all connected components in the active edge graph, which can be done in O(e) steps,
where e is the number of active edges. Then, the maximum coverage CM ax for a given seed size n is equal
to the total number of nodes within n largest components.
Many instances of active edge graph are then created by simply using a different random number generator
seed for each instance. The number of instances needed to collect the reliable estimate of the average coverage
of the tested seeding methods is provided in [26]. Computing the average of the maximum coverage over
these instances provides a reliable estimate of an upper bound for the maximum average coverage of any
seeding method. As shown in Fig. 1 (A1) and 3 (A), this upper bound is in most cases tighter than the one
derived from the greedy seed selection.
Formal proof of non-decreasing coverage
In a formal proof, we show that the sequential seeding always provides at least as large coverage as the
classical single stage approach does. Using coordinated execution, we also demonstrate that under modest
assumptions the former approach is provably better than the latter when both use the same number of seeds
and node ranking method. To do that, we demonstrate that there exist network configurations for which
sequential seeding coverage is larger than the coverage yielded by the single stage seeding. Configurations
are defined at simulation initialization by choosing randomly the diffusion transmission status for each edge.
Theorem: For arbitrary node ranking and number of seeds, a sequential seeding execution has at least
the same coverage CSQ as the corresponding single stage execution CSN coordinated with it. Moreover, if
there is an initial seed u which is reachable in the original graph from a seed s with rank lower than rank
of u, then there exists a configuration of the original graph for which the coverage for sequential seeding is
larger than it is for single stage seeding.
Proof: For clarity, we assume that seeds are activated in the increasing order of their ranks. We start
by observing that in sequential seeding, the seed ranked r is activated no later than in stage r. It can be
9
activated in the earlier stage either by diffusion or by having a seed with rank lower than r activated by
diffusion, thereby decreasing the ranks of all seeds ranked higher than the activated seed. If neither of these
two cases happens before stage r starts, in this stage, the seed ranked r will be the highest ranking not yet
activated seed and therefore it will be chosen for activation.
We observe also that not yet activated node will be activated by diffusion in a single stage execution of a
given configuration if and only if this node is reachable from a seed by the edges active in this configuration.
Indeed, if a node m is reachable from a seed, this seed will be activated in the first and only stage of
activation. Then, by the rules of diffusion, this seed's activation cascade will reach node m and activate it,
if it is still non-active. Conversely, the seed activated in step t of diffusion in sequential seeding activates
only not yet activated nodes that are distance t from it. The upper bound for the number of diffusion steps
before the diffusion stops is the diameter of the configuration. Hence, no node that is not reachable from any
seed in the given configuration will be activated by diffusion. Since in sequential seeding all original seeds
will be activated no later than by stage n, all nodes reachable from these seeds will also be activated by this
stage, proving the first part of the Theorem.
Regarding the second part of the Theorem, let H be a configuration in which all the edges on the
reachability path from seed s to node u defined in the Theorem are active. At the end of stage n − 1 of
sequential execution of configuration H, all seeds activated in the single stage seeding are activated. Indeed
by definition, all seeds ranked n − 1 has to be activated by then, and the seed of rank n has to be activated
either by diffusion from seed s when rank of u is n or by lowering of its rank by activation of seed u from seed
s when rank of u is less than n. Consequently, diffusion at stage n − 1 comes from all seeds, and therefore
all nodes activated in single stage seeding will be activated in sequential seeding by then. In the next stage
n, not yet activated node will be activated as a seed, making the overall coverage of the sequential seeding
larger for this configuration than the coverage of the single stage seeding; QED.
Greedy seed set search
Greedy method requires many simulations to estimate the potential of a single node, i.e., its ability to
activate other nodes via diffusion [1, 26]. Here, the greedy method is based on approach presented in [26].
Averaged results of the greedy algorithm (coverage Cgreedy - the average total number of nodes activated by
the process) are no worse than CM ax∗(1−1/e), where CM ax is the expected maximum coverage [26]. It means
that the greedy approach also defines the theoretical upper bound for maximum coverage: Cgreedy ∗ e/(e− 1).
Due to its great coverage, the greedy algorithm is currently treated as the benchmark to beat and reference
to. Since it requires prior simulations to compute the node potential, it is also very inefficient thus hardly
applicable in practice, especially for large networks.
Experimental setup: undirected networks
The experiments were carried out on six real complex networks: N1 - Condensed Matter collaboration
[27], N2 - Communication network at University of California [28], N3 - High-Energy Theory collaboration
network [29], N4 - Political blogs [30], N5 - ego-Facebook [31] and N6 - wiki-Vote [32].
The parameters used in experimental configurations define diffusion, networks and seed selection strategy
as shown in Table 2. Three commonly used strategies were exploited: the highest degree, greedy [26]
and random selection. Simulation parameters create configuration space N × P P × SP × R with 162
configurations, each were independently applied to both single stage (SN) and sequential seeding strategies
(SQ) using coordinated execution repeated 50,000 times, resulting in 162*50,000*2=16,200,000 simulation
cases; 8,100,000 cases for each single stage and sequential strategies.
For the greedy approach, finding the seed sets required another 10,000 simulations computed indepen-
dently for each configuration, as defined in [1,26]. The nodes were ranked according to their average coverage
10
Parameter
Network - N
Propagation probability - PP
Seeds percentage - SP
Seed ranking strategy - R
Values Variants
6
3
3
3
N1-N6 real networks
0.05, 0.1, 0.20
1%, 3%, 5%
random, degree, greedy
Table 2: Configuration space of the simulated diffusion processes
over all 10,000 simulations; a separate greedy ranking was computed for each of the 162 parameter combi-
nations.
Statistical tests
The positive gain of sequential approach (SQ) over single stage (SN) for experiments on undirected networks
was also confirmed by the Wilcoxon signed rank test, with p<2.2e-16 and ∆=1.9, with the Hodges-Lehmann
estimator used as a difference measure. Values ∆ > 0 demonstrate significantly larger coverage for CSQ
than CSN. Regarding seeding strategies based on node ranking methods, sequential approach increases
coverage for random ranking on average by 3.2%, with p<2.2e-16 and ∆=1.6. Sequential seeding based on
degree delivered coverage results 15.5% better than single stage seeding, with p-value<2.2e-16 and ∆=4.2.
For sequential seeding and greedy based ranking 2.5% average coverage improvement was achieved with
p-value<2.2e-16 and ∆=0.7.
Experimental setup: a directed network
As much as 10,000 instances of coordinated execution for the small real network of 16 nodes were randomly
selected, to ensure stability of the solutions; further instances would not affect results [1]. Due to a small
number of network nodes, only four seeds were used arbitrarily. Five propagation probabilities (PP) with
values 0.05, 0.1, 0.15, 0.2 and 0.25 were applied. Similarly to the undirected version, three ranking strategies
were analyzed: degree, greedy and random.
References
[1] Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network
in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data
mining. (ACM), pp. 137 -- 146.
[2] Kiss C, Bichler M (2008) Identification of influencers - measuring influence in customer networks. Decis.
Support Syst. 46(1):233 -- 253.
[3] Nejad MG, Amini M, Babakus E (2015) Success factors in product seeding: The role of homophily.
Journal of Retailing 91(1):68 -- 88.
[4] Liu-Thompkins Y (2012) Seeding viral content. Journal of Advertising Research 52(4):465 -- 478.
[5] Ackerman E, Ben-Zwi O, Wolfovitz G (2010) Combinatorial model and bounds for target set selection.
Theoretical Computer Science 411(44 -- 46):4017 -- 4022.
[6] Ben-Zwi O, Hermelin D, Lokshtanov D, Newman I (2011) Treewidth governs the complexity of target
set selection. Discret. Optim. 8(1):87 -- 96.
11
[7] Chiang CY, Huang LH, Li BJ, Wu J, Yeh HG (2013) Some results on the target set selection problem.
Journal of Combinatorial Optimization 25(4):702 -- 715.
[8] Galstyan A, Musoyan V, Cohen P (2009) Maximizing influence propagation in networks with community
structure. Phys. Rev. E 79:056102.
[9] He JL, Fu Y, Chen DB (2015) A novel top-k strategy for influence maximization in complex networks
with community structure. PloS one 10(12):e0145283.
[10] Morone F, Makse HA (2015) Influence maximization in complex networks through optimal percolation.
Nature 524(7563):65 -- 68.
[11] Michalski R, Kajdanowicz T, Bródka P, Kazienko P (2014) Seed selection for spread of influence in
social networks: Temporal vs. static approach. New Generation Computing 32(3-4):213 -- 235.
[12] Jankowski J, Michalski R, Kazienko P (2013) Compensatory seeding in networks with varying avail-
ability of nodes in Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM
International Conference on. (IEEE), pp. 1242 -- 1249.
[13] Michalski R, Kazienko P, Jankowski J (2013) Convince a dozen more and succeed -- the influence in
multi-layered social networks in Signal-Image Technology & Internet-Based Systems (SITIS), 2013 In-
ternational Conference on. (IEEE), pp. 499 -- 505.
[14] Hinz O, Skiera B, Barrot C, Becker JU (2011) Seeding strategies for viral marketing: An empirical
comparison. Journal of Marketing 75(6):55 -- 71.
[15] Libai B, Muller E, Peres R (2013) Decomposing the value of word-of-mouth seeding programs: Accel-
eration versus expansion. Journal of Marketing Research 50(2):161 -- 176.
[16] Seeman L, Singer Y (2013) Adaptive seeding in social networks in Foundations of Computer Science
(FOCS), 2013 IEEE 54th Annual Symposium on. (IEEE), pp. 459 -- 468.
[17] Horel T, Singer Y (2015) Scalable methods for adaptively seeding a social network in Proceedings of
the 24th International Conference on World Wide Web. (International World Wide Web Conferences
Steering Committee), pp. 441 -- 451.
[18] Sela A, Ben-Gal I, Pentland A, Shmueli E (2015) Improving information spread through a scheduled
seeding approach in The international conference on Advances in Social Network Analysis and Mining
2015.
[19] Zhang H, Procaccia AD, Vorobeychik Y (2015) Dynamic influence maximization under increasing re-
turns to scale in Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent
Systems. (International Foundation for Autonomous Agents and Multiagent Systems), pp. 949 -- 957.
[20] Bulut E, Wang Z, Szymanski B (2010) Cost-effective multiperiod spraying for routing in delay-tolerant
networks. Networking, IEEE/ACM Transactions on 18(5):1530 -- 1543.
[21] Jankowski J, Bródka P, Kazienko P, Szymanski BK, Michalski R, Kajdanowicz T (2017) Balancing
speed and coverage by sequential seeding in complex networks. Scientific Reports 7(1):891.
[22] Jankowski J (2017) Dynamic rankings for seed selection in complex networks: Balancing costs and
coverage. Entropy 19(4):170.
12
[23] Jankowski J, Bródka P, Michalski R, Kazienko P (2017) Seeds buffering for information spreading
processes in International Conference on Social Informatics. (Springer), pp. 628 -- 641.
[24] Wang C, Chen W, Wang Y (2012) Scalable influence maximization for independent cascade model in
large-scale social networks. Data Mining and Knowledge Discovery 25(3):545 -- 576.
[25] Read KE (1954) Cultures of the central highlands, new guinea. Southwestern Journal of Anthropology
pp. 1 -- 43.
[26] Kempe D, Kleinberg J, Tardos É (2015) Maximizing the spread of influence through a social network.
Theory of Computing 11(4):105 -- 147.
[27] Newman ME (2001) Scientific collaboration networks. i. network construction and fundamental results.
Physical review E 64(1):016131.
[28] Opsahl T, Panzarasa P (2009) Clustering in weighted networks. Social networks 31(2):155 -- 163.
[29] Newman ME (2001) The structure of scientific collaboration networks. Proceedings of the National
Academy of Sciences 98(2):404 -- 409.
[30] Adamic LA, Glance N (2005) The political blogosphere and the 2004 us election: divided they blog in
Proceedings of the 3rd international workshop on Link discovery. (ACM), pp. 36 -- 43.
[31] Leskovec J, Mcauley JJ (2012) Learning to discover social circles in ego networks in Advances in neural
information processing systems. pp. 539 -- 547.
[32] Leskovec J, Huttenlocher D, Kleinberg J (2010) Predicting positive and negative links in online social
networks in Proceedings of the 19th international conference on World wide web. (ACM), pp. 641 -- 650.
13
Acknowledgment
This work was partially supported by the National Science Centre, Poland, grant no. 2017/27/B/HS4/01216
(JJ), 2016/21/B/ST6/01463 (PK), 2015/17/D/ST6/04046 (RM), and 2016/21/D/ST6/02408 (PB), the Eu-
ropean Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant
agreement No. 691152 (RENOIR); the Polish Ministry of Science and Higher Education fund for supporting
internationally co-financed projects in 2016 -- 2019 (agreement no. 3628/H2020/2016/2); the Army Research
Laboratory under Cooperative Agreement Number W911NF-09-2-0053 (the ARL Network Science CTA);
and the Office of Naval Research Grant No. N00014-15-1-2640.
Author contributions
Author contributions: All authors contributed to the study design and manuscript preparation, BKS con-
tributed proof of sequential seeding properties and the concept of coordinated execution, both JJ and RM
conducted simulations and analyzed the data, PB prepared illustrative simulation cases.
Competing interests
Authors declare no conflict of interest.
Supplementary Information
Experimental results for undirected networks
Each from 162 combinations from configuration space N × P P × SP × R was applied as a simulation
configuration to single stage SN and sequential seeding SQ with the use of coordinated execution. Repeated
simulations resulted in 16,200,000 simulation cases. Results from individual simulation cases are presented in
Fig. 5 (A). They show that CSQ performs better than CSN for most cases with coverage CSQ ∈ [30%, 85%].
Fig. 5 (B) shows coverage for sequential approaches CSQ compared to single stage methods CSN. The
maximum coverage CM ax for optimal seed set is presented as well as the upper bound CGreedySN ∗ e/(e − 1)
for all cases. The results show that sequential seeding based on simple degree-based ranking in 92.2% of cases
outperforms single stage computationally expensive greedy heuristic, see Fig. 5 (B1). Moreover, sequential
seeding based on degree CdegreeSQ is greater than sequential greedy approach CgreedySQ in 62.6% of cases.
For all simulation cases CSQ shows better results than CSN in 96.7% of cases what as presented in Fig. 5
(C). Increase above 5% was achieved in 20.2% of simulation cases. The obtained coverage was dependent on
seed selection strategy with 96.0% better results for random selection, 100% for degree based selection and
93.9% for greedy based selection, see Fig. 5 (C1).
Fig. 5 (D) shows one of real diffusion cases with visible differences between sequential (SQ) and single
stage seeding (SN). As a result of better usage of natural diffusion processes sequential approach outperforms
the single stage approach.
Apart from user rankings the results were dependent on the network characteristics with visible differences
seen in Fig. 5 (E). Network N6 delivered the highest gain (83%) while the least gain (30%) was achieved for
network N3.
14
Figure 5: (A) Coverage for sequential approach CSQ compared with single stage CSN and maximum coverage
CM ax for all configurations and all simulation cases; ordered by CSN; (B) Coverage as percentage of all
activated network nodes for greedy and degree-based single stage and sequential strategies and their relation
to CM ax and the upper bound; ordered by CSN; (B1) Performance of sequential and single stage approaches
with degree-based selection in relation to single stage greedy ranking;(C) Performance of sequential seeding
SQ in the relation to single stage seeding SN, a vertical tick denotes percentage of cases with no gain:
CSQ = CSN; (C1) Performance of random, degree and greedy based sequential seeding compared with
single stage seeding SN; (D) Steps of one sequential and one single stage diffusion process in the coordinated
execution for one configuration; (E) Coverage values for sequential CSQ and single stage seeding CSN as
well as maximum coverage CM ax for networks N1-N6 and all simulation cases.
Experimental results for directed network
Performance of sequential seeding within directed network was analyzed for random node selection, degree
based selection and greedy approach. Detailed results for all used probabilities and strategies for single stage
and sequential seeding are presented in Table 3. The highest increase of coverage was observed for sequential
degree based selection with results better than greedy selection for both single and sequential seeding. The
highest gain for degree based selection was observed for low propagation probabilities 0.05, 0.01, 0.15. For
higher probabilities differences between strategies are smaller.
15
Coverage for random seed selection
PP Single stage % of Max Sequential
0.05
0.1
0.15
0.2
0.25
5.43
7.43
9.65
11.76
13.34
Coverage for degree based seed selection
62.2%
61.5%
67.4%
75.9%
83.9%
5.67
8.17
11.03
13.56
15.07
PP Single stage % of Max Sequential
0.05
0.1
0.15
0.2
0.25
64.0%
62.4%
66.7%
73.9%
81.5%
5.99
8.60
11.39
13.75
15.14
5.59
7.54
9.56
11.45
12.96
Coverage for greedy seed selection
PP Single stage % of Max Sequential
0.05
0.1
0.15
0.2
0.25
65.6%
65.2%
70.8%
78.9%
86.3%
5.88
8.47
11.08
13.59
15.09
5.73
7.88
10.14
12.22
13.72
Increase Gain
7.4%
16.0%
29.5%
48.3%
68.0%
1.04
1.09
1.14
1.15
1.13
Increase Gain
12.5%
23.4%
38.5%
57.0%
74.5%
1.07
1.15
1.21
1.22
1.19
Increase Gain
5.0%
14.2%
22.4%
42.0%
62.9%
1.02
1.08
1.09
1.12
1.11
Table 3: Coverage for single stage and sequential seeding for used seed selection methods and propagation
probabilities
16
No. Network name
1
2
3
4
5
6
7
- Condensed
collabora-
- Communi-
network
of
N1
Matter
tion
N2
cation
at University
California
N3 - High-Energy
Theory collabora-
tion network
N4 - Political blogs
N5 - ego-Facebook
N6 - wiki-Vote
N7 - Social network
of tribes
Ref Nodes Edges Edge type Components CC Diameter
[27]
47,594 Undirected
16,264
726
0.638
18
[28]
1,899
20,296 Undirected
4
0.109
8
[29]
7,610
15,751 Undirected
581
0.486
19
[30]
[31]
[32]
[25]
1,224
4,039
7,115
16
19,090 Undirected
88,234 Undirected
103,689 Undirected
Directed
114
2
1
24
1
0.320
0.606
0.141
0.519
8
8
7
3
Table 4: Description of networks used in the experiments
Figure 6: Degree distribution for networks N1-N6
17
|
1306.4534 | 1 | 1306 | 2013-06-19T13:22:11 | Exploiting Cellular Data for Disease Containment and Information Campaigns Strategies in Country-Wide Epidemics | [
"cs.SI",
"physics.soc-ph"
] | Human mobility is one of the key factors at the basis of the spreading of diseases in a population. Containment strategies are usually devised on movement scenarios based on coarse-grained assumptions. Mobility phone data provide a unique opportunity for building models and defining strategies based on very precise information about the movement of people in a region or in a country. Another very important aspect is the underlying social structure of a population, which might play a fundamental role in devising information campaigns to promote vaccination and preventive measures, especially in countries with a strong family (or tribal) structure.
In this paper we analyze a large-scale dataset describing the mobility and the call patterns of a large number of individuals in Ivory Coast. We present a model that describes how diseases spread across the country by exploiting mobility patterns of people extracted from the available data. Then, we simulate several epidemics scenarios and we evaluate mechanisms to contain the epidemic spreading of diseases, based on the information about people mobility and social ties, also gathered from the phone call data. More specifically, we find that restricting mobility does not delay the occurrence of an endemic state and that an information campaign based on one-to-one phone conversations among members of social groups might be an effective countermeasure. | cs.SI | cs |
Exploiting Cellular Data for Disease Containment and
Information Campaigns Strategies in Country-Wide Epidemics∗
A. Lima, M. De Domenico, V. Pejovic, and M. Musolesi
School of Computer Science, University of Birmingham, United Kingdom
Human mobility is one of the key factors at the basis of the spreading of diseases in a popula-
tion. Containment strategies are usually devised on movement scenarios based on coarse-grained
assumptions. Mobility phone data provide a unique opportunity for building models and defining
strategies based on very precise information about the movement of people in a region or in a coun-
try. Another very important aspect is the underlying social structure of a population, which might
play a fundamental role in devising information campaigns to promote vaccination and preventive
measures, especially in countries with a strong family (or tribal) structure.
In this paper we analyze a large-scale dataset describing the mobility and the call patterns of
a large number of individuals in Ivory Coast. We present a model that describes how diseases
spread across the country by exploiting mobility patterns of people extracted from the available
data. Then, we simulate several epidemics scenarios and we evaluate mechanisms to contain the
epidemic spreading of diseases, based on the information about people mobility and social ties, also
gathered from the phone call data. More specifically, we find that restricting mobility does not delay
the occurrence of an endemic state and that an information campaign based on one-to-one phone
conversations among members of social groups might be an effective countermeasure.
I.
INTRODUCTION
Health and well-being of populations are heavily in-
fluenced by their behaviour. The impact of the habits
and local customs, including patterns of interactions and
mobility at urban and regional scales, on health issues
is remarkable [1]. The diffusion of mobile technology
we are experiencing nowadays gives scholars an unprece-
dented opportunity to study massive data that describe
human behavior [2]. An increasing number of people
carries smart mobile phones, equipped with many sen-
sors and connected to the Internet, for the whole day [3].
Data coming from a large number of people can describe
trends in the macroscopic behavior of populations [4 -- 6].
The results of the analysis of these trends can be directly
applied to a number of real-world scenarios, and, more
in general, to several applications where cultural and lo-
cal differences play a central role. Analyzing this kind of
data can provide invaluable help to support the decision-
making process, especially in critical situations. For this
reason, many public and private organizations are nowa-
days increasingly adopting a data-centric approach in
their decisional process [7]. We believe that this strat-
egy can be particularly useful in developing countries,
which might have a lacking infrastructure1.
∗Appeared in Proceedings of NetMob 2013. Boston, MA, USA.
May 2013.
1 We use the term "developing" to indicate countries that are as-
signed a low Human Development Index (HDI) by United Na-
tions Statistics Division. We are aware of the limitations of this
classification. As reported by UN, the designations "developed"
and "developing" are intended for statistical convenience and do
not necessarily express a judgment about the stage reached by a
particular country or area in the development process [8].
Among the issues that developing countries are facing
today, healthcare is probably the most urgent [9].
In
these countries the effectiveness of campaigns is often re-
duced due to low availability of data, inherent limits in
the infrastructure and difficult communication with the
citizens, who might live in vast and remote rural areas.
As a result, action plans are difficult to deliver. How-
ever, we believe that a data-centric approach can be an
innovative and effective way to address these issues.
In this paper, we focus on containment of epidemics.
We use movement data extracted from the registration
patterns in a cellular network to evaluate the influence
of human mobility on the spreading of diseases in a ge-
ographic area.
In particular, we utilize this model to
investigate how infectious agents might spread to dis-
tant locations because of human movement in order to
identify optimal strategies that can be adopted to con-
trast the epidemics. We also evaluate how the collabo-
rative effort of the population can be crucial in critical
scenarios. For the reasons we mentioned before, in coun-
tries that are facing development challenges, vaccination
campaigns are often hard to advertise to the population.
Lack of communication and information is believed to be
among the main causes of failure for immunization cam-
paigns. The same applies to awareness campaigns that
try to promote prophylaxis procedures that reduce the
occurrence of contagion. However, in these cases, we ar-
gue that a collaborative effort leveraging individual social
ties can be effective in propagating effective information
(i.e., a sort of "immunizing information") to a widespread
audience. Moreover, information received by people who
are socially close can have a higher chance of leading to
an actual action.
A large body of research has been conducted on models
that describe the diffusion of diseases, with a particular
recent interest on the role that human movement plays
in spreading infections in large geographic areas [10 -- 12],
and also on the impact of human behavior on the spread-
ing itself [12, 13]. With respect to the state of the art,
the main contributions of this paper can be summarized
as follows:
• We propose an epidemic model based on a net-
work of geographic metapopulations, which de-
scribes how people move between different geo-
graphic regions and spread the disease.
• We evaluate containment techniques based on the
restriction of mobility of the most central areas.
The centrality of the areas is extracted by building
a movement network between all the geographic ar-
eas based on the mobility patterns of the individu-
als.
• We extend the model with a competing informa-
tion spreading where distance contagion might take
place. In other words, we study the dynamics of the
system considering three characterizing aspects of
the problem: the disease epidemics, human mobil-
ity and information spreading. This epidemics rep-
resents the diffusion of information related to mea-
sures to prevent or to combat the diseases, such
as information about the ongoing vaccination and
prevention campaigns in a certain area or actions
that will help to limit spread of the infection, such
as boiling water or avoiding contacts with people
that are already ill.
• We evaluate the models by using the data provided
by the Orange "Data for Development" [14]. We
discuss the effectiveness of the containment strate-
gies and, in particular, for the information dissem-
ination strategy, we identify the degree of partici-
pation that is required to make it successful.
• We observe that restricting mobility by disallowing
any movement from and to a limited set of subpre-
fectures does not delay the occurrence of the en-
demic state in the rest of the country. We also find
that a collaborative effort of prevention information
spreading can be an effective countermeasure.
2
(a)
(b)
Figure 1: Logarithmic representation of the calls matrix (a)
and the mobility matrix (b). Null values are indicated using
the white color. For both matrices highest values are mostly
concentrated along the diagonal, showing that communication
and movement between sub-prefectures is highly uncommon.
However, the calls matrix is visibly denser than the mobility
matrix, confirming that phone contacts between different sub-
prefectures are more usual than movement.
II. OVERVIEW OF THE DATASET
The data provided for the D4D challenge [14] consist
of four datasets (identified by the labels SET1, SET2,
SET3, SET4), containing information about user mobil-
ity and call patterns at various levels of granularity and
time duration. We will now discuss how these datasets
can be used to build a model which accounts for user
mobility and information spreading.
Two datasets contain information about mobility and
communication patterns at macroscopic level. More pre-
cisely:
• The SET1 dataset contains the number and the
duration of calls between pairs of cell phone tow-
ers, aggregated by hour. This dataset provides
macroscopic information about communication in
the country. We associate cell phone towers with
the sub-prefecture they are located in, by using the
supplied geographic position. Then, we evaluate
the probability of a call being established between
sub-prefectures i and j with:
cij = Cij(cid:80)
k Cik
,
(1)
This paper is organized as follows. In Sec. II we briefly
describe the four different datasets provided by Orange
and we specify how they are used in the present study.
In Sec. III we introduce our two models for epidemics
and information spreading by taking into account hu-
man mobility and call patterns observed in Ivory Coast.
In Sec. IV we present the results obtained by simulating
several epidemics scenarios and evaluating mechanisms
to contain the epidemic spreading of diseases. Finally, in
Sec. V we summarize our main findings and we propose
how the present study can be improved if more detailed
data about mobility and calls will be available.
where Cij is the number of phone calls initiated
from the sub-prefecture i and directed to the sub-
prefecture j, during the entire period of observa-
tion. The term at denominator indicates the to-
tal communication flux between every pair of sub-
prefectures and it is used to normalize the prob-
ability. Using these values we build a calls ma-
trix C, shown in Fig. 1(a). This matrix also shows
high values along the diagonal, but it is distinctly
denser, showing that calls between sub-prefectures
are more common than movement. The vertical
line at x = 60 identifies calls directed to the sub-
prefecture that contains the capital.
050100150200250050100150200250CallsmatrixC10−610−510−410−310−210−1100050100150200250050100150200250MobilitymatrixM10−810−710−610−510−410−310−210−11003
(a)
(b)
Figure 2: Geographic network obtained from call logs (a) and mobility traces (b). Color is used to indicate the community
structure: nodes within the same community are represented with the same color.
• The SET3 dataset contains the trajectories of
50,000 randomly-selected individuals, at a sub-
prefecture level resolution, for five months.2 This
dataset can be used to estimate the probability that
an individual moves from the sub-prefecture i to the
sub-prefecture j:
(cid:80)
(cid:80)
(cid:80)
u Mu
u Mu
ij
k
ik
mij =
,
(2)
where Mu
ij is the number of times user u moves
from the sub-prefecture i to j. The numerator
counts how many times users who are in i move
to j; the denominator normalizes this number by
the total number of transitions from i to any sub-
prefecture k. Using these values we build a mobility
matrix M , shown in Fig. 1(b). By using this ma-
trix, we model human mobility in the country as a
Markov process [15]. We observe that the matrix
is quite sparse and the highest values are concen-
trated along the diagonal. As the representation
is in logarithmic scale, this demonstrates that the
movement between sub-prefectures is present, but
rather uncommon.
In Fig. 2(a) and Fig. 2(b) we show the geographic net-
works of calls and mobility, respectively. Nodes are
positioned using the geographic locations of the sub-
prefecture they represent, and their color indicates the
community structure of the network based on [16].
The other two datasets provide microscopic informa-
tion about mobility and communication patterns between
individuals. Although we do not use them for the anal-
ysis in this paper, we now briefly outline how they could
be used:
• The SET2 dataset contains fine-grained individual
trajectories of 50,000 randomly sampled individu-
als over two-week periods. This dataset could be
used to estimate the number of potential connec-
tions that an individual might have in a certain
area, served by a cell phone tower.
• The SET4 dataset contains time-varying ego-
networks of 5,000 users, describing the network of
If two
communication in time-slots of 2 weeks.
users are connected by a link in a time-slot,
it
means that at least one call occurred during the
two weeks under consideration3. The ego-network
2 17 sub-prefectures do not have any cell phone towers and for this
reason do not appear in SET3. We discard these sub-prefectures
from our analysis, since their users will be considered as belong-
ing to nearby sub-prefectures.
3 We have found that 1.31% of the total number of edges in ego-
networks connect pairs of users who are neither egos nor first-
level neighbors: therefore, we do not consider such edges in our
analysis.
respectively. At each time t a person is either infected or
susceptible, therefore Ni[t] = Ii[t] + Si[t].
4
through
Simultaneously,
individuals move
the
metapopulation network according to the mobility
matrix M of dimension n× n extracted from the cellular
traces. The generic element mij of the matrix represents
the probability that a person moves from the metapop-
ulation i to j, as described by Eq. 24. This matrix
describes how the state variables Ni[t] evolve over time:
j=1 mjiNi[t]. Under the assumption that
individuals inside the classes I and S move consistently
we can write the last relation also for the state variables
Ii[t] and Si[t]5. The contagion-mobility combined system
can then be described by the following set of equations:
Ni[t + 1] =(cid:80)n
(cid:20)
(cid:20)
n(cid:88)
n(cid:88)
j=1
j=1
Ii[t + 1] =
Si[t + 1] =
(cid:21)
(cid:21)
mji
Ij[t] + λ
Sj[t]
Nj[t]
Ij[t] − γIj[t]
mji
Sj[t] − λ
Sj[t]
Nj[t]
Ij[t] + γIj[t]
,
for each sub-prefecture i = 1, 2, . . . , n, with λ being
the product of contact rate and contagion probability
and γ being the recovery rate. The formulae inside the
square brackets describe the evolution of n SIS models,
one for each metapopulation. They are multiplied for
the elements of the mobility matrix, which accounts for
individuals moving between metapopulations.
This analytical model describes the expected outcome
of a stochastic model where the following actions occur
at each time step:
1. Each infected person in the sub-prefecture j causes
individuals inside j. This
the infection of new λ Sj
Nj
step is repeated for each sub-prefecture.
2. A new position i is assigned to each individual in
the sub-prefecture j according to the probability
density function [mj1, mj2, . . . , mjn]. This step is
repeated for each sub-prefecture.
B.
Information Spreading
The model we presented in the last section tries to re-
produce the spreading of a disease in a population where
4 In general, this matrix can be time-varying, and it can be ad-
justed according to seasonal trends or real-time data at each step,
for example following estimates based on historical data. In par-
ticular, this matrix can be used to study the impact of policies
in real-time. However, in order to simplify the presentation, we
use a matrix not changing over time. The treatment can be gen-
eralized, also applying the recent theoretical results related to
time-varying networks [18, 19].
5 This assumption can also be relaxed when data about the dif-
ferent classes of individuals is available, i.e., when a matrix for
each class can be defined.
Figure 3: Distribution of friends for the ego-networks ag-
gregated over time. Error bars indicate statistical uncer-
tainty, while the shaded area represent 99% confidence in-
tervals around the observed value.
aggregated over the whole observation time, built
considering every link that is present at least once,
describes the number of people contacted by an
individual during the entire period. This dataset
could be used to estimate the number of potential
social connections that an individual might get in
touch with. The degree distribution of the aggre-
gate ego-network is shown in Fig. 3.
III. SPREADING MODELS
In this section we discuss two models: a model of dis-
ease spreading as a function of the mobility patterns of
individuals between different geographic areas inferred
from the cellular registration records and a model for in-
formation spreading among the same population, consid-
ering the social structure inferred from the call records.
In the following section, we will evaluate the models using
the data provided for the Orange Data for Development
challenge.
A. Epidemic Spreading and Mobility
We will now present a model that represents the evolu-
tion of an epidemic taking place on a network of metapop-
ulations. The aim of the model is to describe how the sys-
tem evolves under the action of two processes, contagion
and mobility. For this dataset, each metapopulation is
composed by the individuals located in a particular sub-
prefecture. Hence, the population is distributed in n dif-
ferent metapopulations, each having Ni[t] individuals at
time t. We make the simplifying assumption that there
are no deaths and births in the considered time window,
i.e., at each time t = 1, 2, . . . T the total population is
constant(cid:80)n
i=1 Ni[t] = N .
We assume that contagion happens
inside each
metapopulation following a standard SIS model [17]. We
indicate the number of infected and susceptible individ-
uals at time t in a sub-prefecture i with Ii[t] and Si[t],
R
ω
ξ
start
S
γ
λ
I
start
U
A
ψ
Figure 4: State machines describing the state transitions of
a person with respect to the disease contagion (R=Resistant,
S=Susceptible and I=Infected) and with respect to the in-
formation spreading (U=unaware, A=aware), respectively. A
person starts in the susceptible and unaware states. We as-
sume that aware individuals spread the information and can-
not go back to the unaware state.
Ri[t + 1] =
Ai[t + 1] =
individuals change locations over time. The aim of this
work is to analyze some scenarios and study the effec-
tiveness of some containment techniques. In particular,
as anticipated, we would like to investigate if a collabora-
tive effort of the population is able, in theory, to reduce
considerably the spread of the disease and what propor-
tions should it have to be effective. More precisely, the
population can disseminate information through personal
social ties immunizing, such as information about pre-
vention techniques, hygiene practises, advertisement of
nearby vaccination campaigns and in general any infor-
mation that can lead to a reduction of the number of
contagion events.
In order to take into consideration these aspects, we
now use a SIR model for each metapopulation, so that
each person either belongs to the susceptible (S), in-
fected (I) or resistant (R) category. At the same time,
another simultaneous epidemic happens on the network
of metapopulations, disseminating information that can
make individuals resistant to the disease.
In fact, a
person also belongs to the category of unaware (U) or
aware (A) individuals, with respect to the immuniz-
ing information. More formally, we have that Ni[t] =
Ii[t] + Si[t] + Ri[t] = Ai[t] + Ui[t].
It is worth noting that this "immunizing epidemic"
goes beyond the boundaries of metapopulations (sub-
prefectures):
in other words, it is a distance contagion.
It is also important to remark that the states "aware"
and "resistant" are substantially different. An unaware
person that receives the information (i.e. has an "infor-
mation contact") becomes aware with rate ψ; since the
person is aware, he or she will start spreading the in-
formation as well. An infected person that receives the
information becomes immune with rate ω. Additionally,
individuals who have acquired immunity through infor-
mation can lose it with rate ξ. The transition rates be-
tween states are summarized in Fig. 4. The model can
be described by the following set of equations, specifying
how state vectors evolve over time:
(cid:20)
(cid:20)
Ij[t] + λ
mji
mji
Sj[t] − λ
n(cid:88)
n(cid:88)
j=1
j=1
Ii[t + 1] =
Si[t + 1] =
5
(cid:21)
Ij[t] − γIj[t]
Sj[t]
Nj[t]
Ij[t] + γIj[t] + ξRj[t]+
(cid:21)
Rj[t] − ξRj[t] + ωSj[t]
k=1 ckjAk[t]
k=1 ckjNk[t]
Aj[t] + ψUj[t]
(cid:20)
(cid:20)
(cid:20)
mji
mji
j=1
n(cid:88)
n(cid:88)
n(cid:88)
j=1
Sj[t]
Nj[t]
− ωSj[t]
(cid:80)n
(cid:80)n
(cid:80)n
(cid:80)n
(cid:80)n
(cid:80)n
k=1 ckjAk[t]
k=1 ckjNk[t]
(cid:80)n
(cid:80)n
k=1 ckjAk[t]
k=1 ckjNk[t]
k=1 ckjAk[t]
k=1 ckjNk[t]
(cid:21)
(cid:21)
(cid:21)
(3)
Ui[t + 1] =
mji
Uj[t] − ψUj[t]
j=1
for every i = 1, 2, . . . , n. The fraction
(cid:80)n
(cid:80)n
k=1 ckj Ak[t]
k=1 ckj Nk[t] rep-
resents the probability that a call from an aware person
occurs in the metapopulation j. It models the distance-
contagion, and it is possible to verify that if the matrix
is identical (absence of contacts between populations) it
reduces to Ak[t]/Nk[t], falling back to a model where con-
tagion occurs only inside metapopulations.
This analytical model describes the expected value of
a stochastic model where the following actions occur at
each time step t:
1. Each infected person in the sub-prefecture j causes
new individuals to get infected, inside j. This
λ Sj
Nj
step is repeated for each sub-prefecture.
(cid:80)n
(cid:80)n
2. Each unaware person in the sub-prefecture j be-
k=1 ckj Ak[t]
k=1 ckj Nk[t] . This
comes aware with probability ψ
step is repeated for each sub-prefecture.
3. Each person in the sub-prefecture j who is
(cid:80)n
(cid:80)n
susceptible, becomes resistant with probability
k=1 ckj Ak[t]
ω
k=1 ckj Nk[t] . This step is reapeated for each sub-
prefecture.
4. A new position i is assigned to each person in the
sub-prefecture j according to the probability den-
sity function [mj1, mj2, . . . , mjn]. This step is re-
peated for each sub-prefecture.
IV. ANALYSIS
We initialize each scenario by allocating 22 mil-
lion individuals (the estimated population size of Ivory
Coast for July 2012 is 21,952,093 [20]) to different sub-
prefectures across the country, according to the data in
SET3. In each scenario we bootstrap the spreading pro-
cess by infecting a fraction of the population (0.1%) dis-
tributed across metapopulations according to different
criteria:
6
Figure 5: Fraction of infected population at the stationary
state (left panel) and time required to reach the stationary
state (right panel), for different values of r0 and for different
initial conditions. Missing values in the curves mean that,
for the corresponding values, no stationary state is reached
during the period of observation.
Figure 6: Fraction of infected population at the stationary
state (left panel) and time required to reach the stationary
state (right panel), for different values of r0 when the epi-
demic starts from a random sub-prefecture, and different lev-
els of geographic quarantine are applied. Missing values in the
curves mean that, for the corresponding values, no stationary
state is reached during the period of observation.
• Uniform distribution: every sub-prefecture gets a
number of infected proportional to their popula-
tion, i.e., every sub-prefecture has the same fraction
of infected population.
• Random: a single sub-prefecture, chosen randomly,
is the origin of the infection.
• Centrality based: the sub-prefectures are ordered
by decreasing centrality values, then the first 1, 5
or 10 highest ranked sub-prefectures are chosen, as
shown in Table I.
We study the evolution of the epidemics for a period
of 6 months. We investigate multiple scenarios using the
analytical model considering a large set of ranges for the
key parameters. We conducted a series of Monte-Carlo
simulations for multiple sets of parameters, confirming
the validity of the analytical models presented in the pre-
vious section. In the following, we present results based
on these models.
A. No Countermeasures
We will firstly explore the evolution of the epidemics
in the case where no countermeasures are taken. In order
Betweeness Closeness Degree Eigenvalue
60
39
89
58
75
144
138
165
212
168
60
58
39
69
138
250
64
144
182
122
60
58
39
69
138
64
144
250
122
182
60
58
39
69
250
138
64
144
122
182
Table I: Highest ranked sub-prefectures, according to different
definitions of centrality. We observe that the sets of the top
10 sub-prefectures ordered by centrality are very similar.
to analyze the evolution of the system more clearly, we
investigate two measures: the fraction of infected popu-
lation i∞ at the stationary state and the time required to
reach the stationary state τ . In Fig. 5 we plot their val-
ues versus r0 = λ
γ , which is the basic reproductive ratio
of a classic SIS model [17]. As a future work, we plan to
derive the analytical form of the basic reproductive ra-
tio of our models, which take into account mobility and
information spreading. We observe that for r0 = λ
γ < 1
there is no endemic state (i.e., the final fraction of in-
fected population is zero), whereas for r0 > 1 a non-null
fraction of population is infected. Values for r0 = 1 are
missing since no stationary state is reached within our
observation window. In other words, for this particular
scenario, experimental results show that the basic repro-
ductive ratio of our model is very close to r0; we expect
this to be a consequence of the low inter-subprefectures
mobility. We can also notice that the initial conditions
do not affect i∞ at all. Before the critical point (i.e.,
r0 = 1) the choice of the initial conditions has also no
impact on the delay time, whereas for r0 > 1 it slightly
affects the delay: epidemics that initially involves more
sub-prefectures are slightly faster than the others.
B. Geographic Quarantine
We now analyze the effects of curbing on the mobility
between sub-prefectures, i.e., forbidding all the incoming
and outgoing movement of a group of sub-prefectures.
In order to do so, we calculate the centrality values of
each sub-prefecture in the mobility matrix. We present
the results for eigenvalues centrality. As it is possible to
observe in Tab. I, the ranking based on other centralities
is very similar. Then, for the quarantine operations, we
select those with the highest centrality values. From a
practical point of view, this is achieved by simply chang-
ing the i−th row and column in the mobility matrix, so
that all the elements mij and mji are null, except for
the elements mii = 1. For these scenarios, we randomly
012345r00.00.10.20.30.40.50.60.70.80.9i∞uniformtop10top5top1random0.00.51.01.52.02.5r00100200300400500600τuniformtop10top5top1random012345r00.00.10.20.30.40.50.60.70.80.9i∞notcurbedcurbedtop10curbedtop5curbedtop10.00.51.01.52.02.5r00100200300400500600τnotcurbedcurbedtop10curbedtop5curbedtop17
Figure 7: Fraction of infected population at the stationary state (top row) and time required to reach the stationary state
(bottom row), for different values of r0 = λ
γ (from left to right 1, 2, 4, 10, respectively). White spaces show that no stationary
state is reached during the period of observation.
choose a single sub-prefecture where the initial individu-
als are infected, and then we average i∞ and τ over all
runs. As shown in Fig. 6, the fraction of the infected
population is sensibly affected by this measure, as the
population inside the quarantined areas is protected from
contagion. However, contrary to the intuition, the delay
is not affected by the quarantine, even when the coun-
termeasures involves 10 sub-prefectures, which account
for almost half population. This suggests that such an
invasive, expensive and hard to enforce measure reduces
considerably the endemic size, but does not slow down
the disease spreading in the rest of the country. For this
reason, we now investigate a radically different approach
to protect the population.
C.
Information Campaign (Social Immunization)
We now show how a collaborative information cam-
paign could help in contrasting the spread of the disease,
following the model we presented in the last section. We
initialize the scenario by distributing the immunizing in-
formation to 1% of the population, randomly chosen re-
gardless of their location. These people will be informed
and will be instructed to spread the information. In other
words, we assume that they will contact their social con-
nections, according to the call matrix.
In Fig. 7 we show the density plots describing i∞ and τ
for various values of r0 (, for a subset of scenarios where
ω = ψ, i.e., when the information that spreads among
the population has the same chance to immunize a per-
son and to involve the person in the spreading process.
This is consistent with a scenario where the same set of
people who become aware also become immunized by the
information they have received. Blank squares show that
a stationary state was not reached for the correspond-
ing set of parameters. The figure shows how contagious
(ω=ψ) the immunizing information has to be with re-
spect to how often people "forget" (ξ) in order to slow
down the disease considerably and to reduce the endemic
cases. When ω = ψ = 0 we fall back to the model with-
out information spreading, and the value of ξ does not
affect i∞ and τ . For ω = ψ > 0 and ξ = 0 the fraction
of infected population goes to zero in all cases, because
the number of people aware of the information does not
decrease, thus increasing the number of new immunized
individuals at each step. We can notice that even for low
values of participation ω and for information that gives
temporary immunization (ψ > 0), the final fraction of in-
fected individuals is considerably lower than in the case
where no countermeasures are taken.
In Figs. 8 and 9 we show the density plots for ω and ψ
when ξ is constant. In particular, we analyze the scenario
for ξ = 0 (Fig. 8), which represents for example a scenario
where the immunizing information is about vaccination
campaigns (individuals who have been administered vac-
cination do not lose immunity). For every combination of
parameters we have absence of endemic state even with
the highest considered value of r0. The two parameters
that represent how individuals are likely to get involved
both in the immunization and in the information spread-
ing (ω and ψ) seem to have the same impact on the delay
of the infection.
The value ξ = 0.5 (Fig. 9) describes the scenario when
the information is about a good practice (e.g., boiling
water, using mosquito nets, etc.), which loses its effec-
0.00.20.40.60.81.0ξ0.00.20.40.60.81.0ω=ψfractionofinfectedpopulation(λ=0.5,γ=0.5)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ξ0.00.20.40.60.81.0ω=ψfractionofinfectedpopulation(λ=0.8,γ=0.4)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ξ0.00.20.40.60.81.0ω=ψfractionofinfectedpopulation(λ=0.8,γ=0.2)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ξ0.00.20.40.60.81.0ω=ψfractionofinfectedpopulation(λ=1.0,γ=0.1)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ξ0.00.20.40.60.81.0ω=ψtimetoreachthestationarystate(λ=0.5,γ=0.5)0306090120150180210240270>3000.00.20.40.60.81.0ξ0.00.20.40.60.81.0ω=ψtimetoreachthestationarystate(λ=0.8,γ=0.4)0306090120150180210240270>3000.00.20.40.60.81.0ξ0.00.20.40.60.81.0ω=ψtimetoreachthestationarystate(λ=0.8,γ=0.2)0306090120150180210240270>3000.00.20.40.60.81.0ξ0.00.20.40.60.81.0ω=ψtimetoreachthestationarystate(λ=1.0,γ=0.1)0306090120150180210240270>3008
Figure 8: Fraction of infected population at the stationary state (top row) and time required to reach the stationary state
(bottom row), for different combinations of λ
γ (from left to right 1, 2, 4, 10, respectively) and ξ = 0. White spaces show that
no stationary state is reached during the period of observation.
Figure 9: Fraction of infected population at the stationary state (top row) and time required to reach the stationary state
(bottom row), for different combinations of λ
γ (from left to right 1, 2, 4, 10, respectively) and ξ = 0.5. White spaces show that
no stationary state is reached during the period of observation.
tiveness or it is stopped being used by a person with rate
ξ. For this case we can notice that the fraction of in-
fected population is independent from ψ, as rows in the
density plot are of the same color. This suggests that,
for this scenario, the rate at which people lose immunity
does not affect the size of the endemic state.
V. CONCLUSIONS
In this paper we have presented a model that describes
the spreading of disease in a population where individuals
move between geographic areas, extracted from cellular
network records. We have showed the evolution of the
disease and we have evaluated two types of countermea-
sures, namely the quarantine of central geographic areas
and a collaborative "viral" information campaign among
0.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωfractionofinfectedpopulation(λ=0.5,γ=0.5)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωfractionofinfectedpopulation(λ=0.8,γ=0.4)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωfractionofinfectedpopulation(λ=0.8,γ=0.2)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωfractionofinfectedpopulation(λ=1.0,γ=0.1)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωtimetoreachthestationarystate(λ=0.5,γ=0.5)0306090120150180210240270>3000.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωtimetoreachthestationarystate(λ=0.8,γ=0.4)0306090120150180210240270>3000.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωtimetoreachthestationarystate(λ=0.8,γ=0.2)0306090120150180210240270>3000.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωtimetoreachthestationarystate(λ=1.0,γ=0.1)0306090120150180210240270>3000.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωfractionofinfectedpopulation(λ=0.5,γ=0.5)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωfractionofinfectedpopulation(λ=0.8,γ=0.4)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωfractionofinfectedpopulation(λ=0.8,γ=0.2)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωfractionofinfectedpopulation(λ=1.0,γ=0.1)0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωtimetoreachthestationarystate(λ=0.5,γ=0.5)0306090120150180210240270>3000.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωtimetoreachthestationarystate(λ=0.8,γ=0.4)0306090120150180210240270>3000.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωtimetoreachthestationarystate(λ=0.8,γ=0.2)0306090120150180210240270>3000.00.20.40.60.81.0ψ0.00.20.40.60.81.0ωtimetoreachthestationarystate(λ=1.0,γ=0.1)0306090120150180210240270>3009
the population, by inferring the underlying social struc-
ture from the call records.
Our future research agenda includes the investigation
of analytical aspects of the model, such as the derivation
of the critical reproductive ratio R0, i.e., the value that
corresponds to the transition between an endemic and an
endemic-free infection. Currently, the model is based on
the assumption of a static mobility matrix: our goal is
to refine the model by introducing time-dependent ma-
trices, also exploring the application of the recent the-
oretical results related to temporal networks. We also
plan to refine the model introducing specific contact rates
for each metapopulation, potentially based on more fine-
grained information about the number of encounters and
the number of calls of each individual, if available. Fi-
nally, we plan to explore hybrid countermeasures, such as
concurrent partial restrictions of mobility and targeted
information campaigns.
Acknowledgments
The authors thank Charlotte Sophie Mayer for use-
ful and fruitful discussions. This work was supported
through the EPSRC Grant "The Uncertainty of Iden-
tity: Linking Spatiotemporal Information Between Vir-
tual and Real Worlds" (EP/J005266/1).
[1] C.G. Helman et al., Culture, health and illness. (Arnold,
Hodder Headline Group, London, United Kingdom,
2001), No. Ed. 4.
[2] D. Lazer, A.S. Pentland, L. Adamic, S. Aral, A.L.
Barabasi, D. Brewer, N. Christakis, N. Contractor,
J. Fowler, M. Gutmann, et al., Life in the network: the
coming age of computational social science Science 323,
721 (2009).
[3] A. T. Campbell, S. B. Eisenman, N. D. Lane, E. Miluzzo,
R. Peterson, H. Lu, X. Zheng, M. Musolesi, K. Fodor,
and G.-S. Ahn, The Rise of People-Centric Sensing IEEE
Internet Computing Special Issue on Mesh Networks
(2008).
[4] J.-P. Onnela, J. Saramaki, J. Hyvonen, G. Szab´o,
D. Lazer, K. Kaski, J. Kert´esz, and A.-L. Barab´asi,
Structure and tie strengths in mobile communication net-
works Proceedings of the National Academy of Sciences
104, 7332 (2007).
[5] M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, Un-
derstanding individual human mobility patterns Nature
453, 779 (2008).
[6] N. Eagle and A. Pentland, Eigenbehaviors: Identifying
structure in routine Behavioral Ecology and Sociobiology
63, 1057 (2009).
[7] J. Manyika, M. Chui, B. Brown, J. Bughin, R. Dobbs,
C. Roxburgh, and A. H. Byers, Big data: The next fron-
tier for innovation, competition, and productivity McK-
insey Global Institute (2011).
[8] United Nations Statistics Division, Standard Country
and Area Codes for Statistical Use.
[9] The health of the people the African regional health report
(World Health Organization, Regional Office for Africa,
Brazzaville, Republic of Congo, 2013).
[10] V. Colizza, A. Barrat, M. Barthelemy, A.-J. Valleron,
and A. Vespignani, Modeling the Worldwide Spread of
Pandemic Influenza: Baseline Case and Containment
Interventions PLoS Med 4, e13 (2007).
[11] J. M. Epstein, D. M. Goedecke, F. Yu, R. J. Morris, D. K.
Wagener, and G. V. Bobashev, in Controlling Pandemic
Flu: The Value of International Air Travel Restrictions,
PLoS ONE 2, e401 (2007).
[12] S. Meloni, N. Perra, A. Arenas, S. G´omez, Y. Moreno,
and A. Vespignani, Modeling human mobility responses to
the large-scale spreading of infectious diseases Scientific
Reports 1, (2011).
[13] S. Funk, M. Salath´e, and V. A. A. Jansen, Modelling the
influence of human behaviour on the spread of infectious
diseases: a review Journal of The Royal Society Interface
7, 1257 (2010).
[14] V.D. Blondel, M. Esch, C. Chan, F. Clerot, P. Deville,
E. Huens, F. Morlot, Z. Smoreda, and C. Ziemlicki, Data
for Development: the D4D Challenge on Mobile Phone
Data arXiv preprint arXiv:1210.0137 (2012).
[15] J. R. Norris, Markov Chains (Cambridge University
Press, Cambridge, United Kingdom, 1998).
[16] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and
E. Lefebvre, Fast unfolding of communities in large net-
works Journal of Statistical Mechanics: Theory and Ex-
periment 2008, P10008 (2008).
[17] M. J. Keeling and P. Rohani, Modeling infectious diseases
in humans and animals (Princeton University Press,
Princeton, NJ, 2011).
[18] J. Tang, S. Scellato, M. Musolesi, C. Mascolo, and
V. Latora, Small-world Behavior in Time-varying Graphs
Physical Review E 81, (2010), 055101(R).
[19] P. Holme and J. Saramaki, Temporal networks Physics
Reports 519, (2012).
[20] CIA, The World Factbook, 2012.
|
1309.3908 | 1 | 1309 | 2013-09-16T11:35:19 | Exploring Image Virality in Google Plus | [
"cs.SI",
"cs.CY",
"cs.MM",
"physics.soc-ph"
] | Reactions to posts in an online social network show different dynamics depending on several textual features of the corresponding content. Do similar dynamics exist when images are posted? Exploiting a novel dataset of posts, gathered from the most popular Google+ users, we try to give an answer to such a question. We describe several virality phenomena that emerge when taking into account visual characteristics of images (such as orientation, mean saturation, etc.). We also provide hypotheses and potential explanations for the dynamics behind them, and include cases for which common-sense expectations do not hold true in our experiments. | cs.SI | cs | Exploring Image Virality in Google Plus
Marco Guerini
Trento RISE
Trento - Italy
Jacopo Staiano
University of Trento
Trento - Italy
Email: [email protected]
Email: [email protected]
Davide Albanese
Fondazione Edmund Mach, CRI-CBC
San Michele allAdige (TN) - Italy
Email: [email protected]
3
1
0
2
p
e
S
6
1
]
I
S
.
s
c
[
1
v
8
0
9
3
.
9
0
3
1
:
v
i
X
r
a
Abstract—Reactions to posts in an online social network show
different dynamics depending on several textual features of the
corresponding content. Do similar dynamics exist when images
are posted? Exploiting a novel dataset of posts, gathered from
the most popular Google+ users, we try to give an answer to such
a question. We describe several virality phenomena that emerge
when taking into account visual characteristics of images (such as
orientation, mean saturation, etc.). We also provide hypotheses
and potential explanations for the dynamics behind them, and
include cases for which common-sense expectations do not hold
true in our experiments.
I.
INTRODUCTION
How do things become ‘viral’ on the Internet? And what
exactly do we mean by ‘influence’? Since marketing and
industry people want their messages to spread in the most
effective and efficient way possible,
these questions have
received a great deal of attention, particularly in recent years,
as we have seen a dramatic growth of social networking on
the Web. Generally speaking, virality refers to the tendency of
a content either to spread quickly within a community or to
receive a great deal of attention by it. In studying the spreading
process we will focus on the content and its characteristics,
rather than on the structure of the network through which
the information is moving. In particular, we will investigate
the relationships between visual characteristics – of images
enclosed in Google+ posts – and virality phenomena. We will
use three virality metrics: plusoners, replies and resharers.
This exploratory work stems from the use people make of
social networking websites such as Google+, Facebook and
similar: we hypothesized that perceptual characteristics of an
image could indeed affect the virality of the post embedding it,
and that – for example – cartoons, panorama or self-portraits
picture affect users’ reactions in different ways. The aim of
this paper is to investigate whether signs of such “common-
sense” intuition emerge from large-scale data made available
on popular social networking websites like Google+ and, in
such case, to open discussion on the associated phenomena.
The paper is structured as follows: first, we review previous
works addressing the topic of virality in social networks,
and particularly some focusing on content impact. Then, after
describing the dataset collected and used for this work, we
proceed with the study of virality of Google+ posts and the
characteristics of their content. We also discuss the behavior of
virality indexes in terms of their alternative use, arguing that
plusones and comments fulfill a similar purpose of followers’
“appreciation” while reshares have a different role of “self-
representation”. Finally, we investigate possible interactions
between image characteristics and users’ typology, in order to
understand to what extent results are generalizable or typical
of a community, gathered around a common interest.
II. RELATED WORKS
Several researchers studied information flow, community
building and similar processes using Social Networking sites
as a reference [1], [2], [3], [4]. However, the great majority
concentrates on network-related features without taking into
account the actual content spreading within the network [5].
A hybrid approach focusing on both product characteristics
and network related features is presented in [6]: the authors
study the effect of passive-broadcast and active-personalized
notifications embedded in an application to foster word of
mouth.
Recently, the correlation between content characteristics
and virality has begun to be investigated, especially with
regard to textual content; in [7], for example, features derived
from sentiment analysis of comments are used to predict the
popularity of stories. The work presented in [8] uses New York
Times’ articles to examine the relationship between emotions
evoked by the content and virality, using semi-automated
sentiment analysis to quantify the affectivity and emotionality
of each article. Results suggest a strong relationship between
affect and virality; still,
the virality metric considered is
interesting but very limited: it only consists of how many
people emailed the article. The relevant work in [9] measures
a different form of content spreading by analyzing which are
the features of a movie quote that make it “memorable” online.
Another approach to content virality, somehow complementary
to the previous one, is presented in [10], trying to understand
which modification dynamics make a meme spread from
one person to another (while movie quotes spread remaining
exactly the same).
More recently, some works tried to investigate how dif-
ferent textual contents give rise to different reactions in the
audience: the work presented in [11] correlates several viral
phenomena with the wording of a post, while [12] show that
specific content features variations (like the readability level
of an abstract) differentiate among virality level of downloads,
bookmarking, and citations. Still, to our knowledge, no attempt
has been made yet to investigate the relation between visual
content characteristics and virality.
III. DATA DESCRIPTION
the Google+ API1, we
Using
public
posts
from the
979
top
followed
users
harvested
the
in
1https://developers.google.com/+/api/
Google+ (plus.google.com),
the
socialstatistics.com website on March 2nd 20122.
The time span for the harvesting is one year, from June 28th
2011 (Google+ date of launch) to June 29th 2012.
reported
by
as
We decided to focus on the most popular users for several
reasons: (i) the dataset is uniform from the point of view of
sample role, i.e. VIPs, (ii) the behavior of the followers is
consistent – e.g. no friendship dynamics – and (iii) extraneous
effects due to followers network is minimized, since top
followed users’ network is vast enough to grant that, if a
content is viral, a certain amount of reactions will be obtained.
We defined 3 subsets of our dataset, comprising respec-
tively: (i) posts containing a static image, (ii) posts containing
an animated image (usually, gif), (iii) posts without attach-
ments (text-only). All other posts (containing as attachment
videos, photo albums, links to external sources) were dis-
carded. Statistics for our dataset are reported in Table I. For
each post, we considered three virality metrics3:
• Plusoners: the number of people who +1’d;
• Replies: the number of comments;
• Resharers: the number of people who reshared.
TABLE I.
AN OVERVIEW OF THE GOOGLE+ DATASET.
Global
actors
posts
published interval
979
289434
6/28/11–6/29/12
Posts with static images
actors
posts
min/max/median posts per actor
min/max/median plusoners per post
min/max/median replies per posta
min/max/median resharers per post
950
173860
1/3685/ 65.5
0/9703/33.0
0/571/12.0
0/6564/4.0
actors
posts:
min/max/median posts per actor
min/max/median plusoners per post
min/max/median replies per post
min/max/median resharers per post
Posts with animated images
344
12577
1/2262/3.0
0/5145/17.0
0/500/7.0
0/6778/10.0
Posts without attachments, text-only
actors
posts
min/max/median posts per actor
min/max/median plusoners per post
min/max/median replies per post
min/max/median resharers per post
aReplies count is cut around 500 by the API service.
939
102997
1/1744/41.0
0/20299 /16.0
0/538/17.0
0/13566/1.0
In Figures 1 and 2 we display the evolution over time of
the network underlying our dataset (using a week as temporal
unit), and of the reactions to posts given by users, respectively.
We notice that:
1) the average number of reactions per user shows quite
different trends depending on the metric considered: while
replies tend not to be affected by the growth of the
network, reshares and, to a lesser degree plusones, show
an ever-growing trend.
2) The temporal plot of the average number of followers per
user (Figure 1) in our dataset (in Google+ terminology,
2The dataset presented and used in this work will be made available to the
community for research purposes.
3Since the API provide only an aggregate number, we cannot make any
temporal analysis of how reactions to a post were accumulated over time.
the number of people who circled them) shows a gra-
dient increase around weeks 28/29. Interestingly, this is
reflected in the plot of reactions over time (Figure 2): the
gradient increases around the same weeks, for reshares
and plusones; these effects are most probably due to
Google+ transitioning from beta to public in late Septem-
ber 2011 (a similar phenomenon is reported also in [13]).
3) Finally, the orders of magnitude of such growths are very
different: we notice that while reactions increase of a
factor of 7 over the time period we took into account,
the total number of followers increased of a factor of 25.
600000
500000
400000
300000
200000
100000
s
r
e
w
o
l
l
o
f
f
o
r
e
b
m
u
n
.
g
v
A
0
0
10
20
30
Week
40
50
60
Fig. 1. Average number of followers per user, at 1-week temporal granularity.
Plusoners
Resharers
Replies
250
200
150
100
50
s
n
o
i
t
c
a
e
r
f
o
r
e
b
m
u
n
.
g
v
A
0
0
10
20
30
Week
40
50
60
Fig. 2. Average number of reactions per user, at 1-week temporal granularity.
This value represents the average number of reactions elicited by each user’s
posts over 1-week time-slices.
The relative amount of followers’ reactions does not sig-
nificantly increase as the network grows4. As detailed in the
next section, our analyses are based on comparing probability
distributions: e.g. we evaluate if grayscale images have a
significantly higher or smaller probability of reaching a certain
virality score than colored ones. In the following analyses,
for the sake of clarity, our discussion will not
take into
account the normalization factor (i.e. the size of the audience
when a content is posted). Indeed, we have run the same
analyses normalizing the virality indexes of a given post
against its potential audience: i) the effects are still visible,
ii) the effects are consistent both in significance and sign
with the not-normalized distributions, but iii) differences have
lower magnitude (explained by the fact that virality indexes
should be normalized using the actual audience – e.g. the
4It has been noted how (see, for instance, http://on.wsj.com/zjRr06), espe-
cially in the time frame we consider, users’ activity did not increase much in
front of the exploding network size.
followers exposed to the content). Thus, since we are interested
in comparing the virality of different image categories and
our preliminary experiments showed that by normalizing the
indexes their comparisons, their sign, and the derived inter-
pretations still hold, we choose to report the non-normalized
version of the results that are more intuitively readable.
In the following sections, after the analyses of text-only
posts and of posts containing an animated image, we will
consider the subset of static images as the reference dataset.
Exemplar pictures taken from the dataset are shown in Figure
3, depicting some image categories that we will take into
account in the following sections.
Fig. 3. Exemplar pictures from the dataset.
IV. DATA ANALYSIS
Virality metrics in our dataset follow a power-law-like
distribution thickening toward low virality score. In order to
evaluate the “virality power” of the features taken into account,
we compare the virality indexes in terms of empirical Comple-
mentary Cumulative Distribution Functions (CCDFs). These
functions are commonly used to analyse online social networks
in terms of growth in size and activity (see for example
[14], [15], or the discussion presented in [16]) and also for
measuring content diffusion, e.g. the number of retweets of a
given content [17]. Basically, these functions account for the
probability p that a virality index will be greater than n and
are defined as follows:
F (n) =
number of posts with virality index > n
total number of posts
(1)
For example,
the probability of having a post with
more than 75 plusoners is indicated with Fplus(75) =
P(#plusoners > 75). In the following sections we use CCDFs
to understand the relation between image characteristics and
post virality; in order to assess whether the CCDFs of the
several types of posts we take into account show signifi-
cant differences, we will use the Kolmogorov-Smirnov (K–
S) goodness-of-fit test, which specifically targets cumulative
distribution functions.
A. Image vs. text-only
First of all, we aim to understand what is the impact
of “adding an image to a post” in Google+. Some studies
[18] already show that posts containing an image are much
more viral
than simple plain-text posts, and that various
characteristics of image based banners affect viewer’s recall
and clicks [19]. This finding can be explained in light of a
“rapid cognition” model [20], [21]. In this model, the user
has to decide in a limited amount of time, and within a
vast information flow of posts, whether to take an action on
a particular post (e.g. to reply, reshare, give it a plusone).
Thus, pictures, and the characteristics thereof analyzed in the
following sections, might play a role of paramount importance
in her decision-making process as she exploits visual cues
that grab her attention. In some respects, the rapid cognition
model is reminiscent of the mechanisms by which humans
routinely make judgments about strangers’ personality and
behavior from very short behavioral sequences and non-verbal
cues [22], [23].
In order to investigate the general impact of images we
compared posts containing a picture with posts containing
only text. While our findings overall coincide with [18],
some interesting phenomena emerged. First, we see that the
probability for a post with an image to have a high number of
resharers is almost three times greater ( Fresh(10) = 0.28 vs.
0.10, K–S test p < 0.001), see Figure 4.c. Still, the CCDFs
for the other virality indexes show different trends:
• Posts containing images have lower probability of being
viral when it comes to number of comments ( Frepl(50)
= 0.33 vs. 0.22, K–S test p < 0.001), see Figure 4.b.
This can be explained by the fact that text-only posts
elicit more “linguistic-elaboration” than images (we also
expect that the average length of comments is higher for
text-only posts but we do not investigate this issue here).
• Also, if we focus on simple appreciation (plusoners in
Figure 4.a), results are very intriguing: while up to about
75 plusoners the probability of having posts containing
images is higher, after this threshold the situation cap-
sizes. This finding can be of support to the hypothesis
that, while it is easier to impress with images in the
information flow — as argued with the aforementioned
“rapid cognition” model — high quality textual content
can impress more.
B. Static vs. Animated
Animated images add a further dimension to pictures
expressivity. Having been around since the beginning of the
Internet (the gif format was introduced in late 80’s), animated
images have had alternate fortune, especially after the wide
spread of services like youtube and the availability of broad-
band. Nonetheless, they are still extensively used to produce
simple animations and short clips. Noticeably, the value of
simple and short animations has been acknowledged by Twitter
with the recently released Vine service.
)
n
(
F
)
n
(
F
)
n
(
F
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
a
with image
without attachments
0
50
100
150
200
250
300
350
400
number of plusoners (n)
b
0
50
100
150
200
250
300
350
400
number of replies (n)
c
0
10
20
40
30
70
number of resharers (n)
50
60
80
90 100
)
n
(
F
)
n
(
F
)
n
(
F
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
a
static image
animated image
0
50
100
150
200
250
300
350
400
number of plusoners (n)
b
0
50
100
150
200
250
300
350
400
number of replies (n)
c
0
10
20
40
30
70
number of resharers (n)
50
60
80
90 100
Fig. 4. Virality CCDFs for posts with image vs. text-only posts.
Fig. 5. Virality CCDFs for static vs. animated images.
Whether a post contains a static or animated image has a
strong discriminative impact on all virality indexes, see Figure
5. With respect to plusoners and replies, static images tend to
show higher CCDFs (respectively two and three times more,
Fplus(75) = 0.30 vs. 0.17, Frepl(50) = 0.22 vs. 0.08, K–S test
p < 0.001), while on resharers the opposite holds.
The fact
that Fresh(n) is two times higher for posts
containing animated images ( Fresh(10) = 0.48 vs. 0.27, K–
S test p < .001) can be potentially explained by the fact that
animated images are usually built to convey a small “memetic”
clip - i.e. funny, cute or quirky situations as suggested in [24].
In order to verify this hypothesis we have annotated a small
random subsample of 200 images. 81% of these animated
images were found to be “memetic” (two annotators were
used, positive example if the image score 1 at least on one of
the aforementioned dimensions, annotator agreement is very
high — Cohen’s kappa 0.78). These findings indicate that
animated images are mainly a vehicle for amusement, at least
on Google+.
C. Image Orientation
We then focused on the question whether image orientation
(landscape, portrait and squared) has any impact on virality
indexes. We included squared images in our analysis since they
are typical of popular services a la Instagram. These services
enable users to apply digital filters to the pictures they take and
confine photos to a squared shape, similar to Kodak Instamatic
and Polaroids, providing a so-called “vintage effect”.
We have annotated a small random subsample of 200 im-
ages. 55% of these images were found to be “Instagrammed”
(two annotators were used, positive example if the image
)
n
(
F
)
n
(
F
)
n
(
F
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
a
vertical
square
horizontal
0
50
100
150
200
250
300
350
400
number of plusoners (n)
b
0
50
100
150
200
250
300
350
400
number of replies (n)
c
0
10
20
40
30
70
number of resharers (n)
50
60
80
90 100
Fig. 6. Virality CCDFs for image orientation.
is clearly recognized as modified with a filter; annotator
agreement is high – Cohen’s kappa 0.68). Note that, if we
include also black and white squared pictures without any
other particular filter applied (b/w is one of the ”basic” filter
provided by Instagram) the amount of Instagrammed pictures
rises to 65%. Obviously, the ratio of pictures modified with this
and similar services could be higher; here, we rather wanted to
identify those pictures that were clearly recognized as seeking
for the aforementioned “vintage effect”.
While the orientation seems not to have strong impact
on resharers, with a mild prevalence of horizontal pictures
(see Figure 6.c), plusoners and replies tend to well discrimi-
nate among various image orientations. In particular, portrait
images show higher probability of being viral than squared
images than, in turn, landscapes (see Figure 6.a and 6.b).
Furthermore, CCDFs indicate that vertical images tend to
be more viral than horizontal ones ( Fplus(75) = 0.38 vs. 0.26,
Frepl(50) = 0.38 vs. 0.17, K–S test p < 0.001). Hence, while
squared images place themselves in the middle in any metric,
landscape images have lower viral probability for plusones and
replies but slightly higher probability for reshares.
This can be partially explained by the fact that we are
analyzing “celebrities” posts. If the vertically-orientated image
contains the portrait of a celebrity this is more likely to be
appreciated rather that reshared, since the act of resharing can
also be seen as a form of “self-representation” of the follower
(we will analyze the impact of pictures containing faces in the
following section). The opposite holds for landscapes, i.e. they
are more likely to be reshared and used for self-representation.
D. Images containing one face
In traditional mono-directional media (e.g. tv, billboards,
etc.) a widely used promotion strategy is the use of testimo-
nials, especially celebrities endorsing a product. Is the same
strategy applicable to Social Media? Understanding the effect
of posting images with faces by most popular Google+ users
(and hypothesizing that those are their faces) is a first step in
the direction of finding an answer.
We computed how many faces are found in the images,
along with the ratio of the area that include faces and the
whole image area, using the Viola-Jones [25] face detection
algorithm. We considered images containing one face vs.
images containing no faces. We did not consider the surface of
image occupied by the face (i.e. if it is a close-up portrait, or
just a small face within a bigger picture). The discriminative
effect of containing a face on virality is statistically significant
but small. Still, the pictures containing faces tend to have mild
effect on resharers (slightly higher replies and plusoners but
lower resharers as compared to images with no faces).
In order to verify the hypothesis mentioned earlier, i.e.
that self-portraits tend to be reshared less, we also focused
on a subsample of images containing faces that cover at least
10% of the image surface (about 6400 instances). In this
case, the differences among indexes polarize a little more
(higher plusoners and comments, lower resharers), as we were
expecting. Unfortunately, images with even higher face/surface
ratio are too few to further verify the hypotheses.
E. Grayscale vs. Colored
The impact and meaning of black-and-white (i.e. grayscale)
photographic images has been studied from different perspec-
tives (e.g. semiotics and psychology) and with reference to
different fields (from documentary to arts and advertising).
)
n
(
F
)
n
(
F
)
n
(
F
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
a
mean bright. ≤ 0.85
mean bright. > 0.85
0
50
100
150
200
250
300
350
400
number of plusoners (n)
b
0
50
100
150
200
250
300
350
400
number of replies (n)
c
0
10
20
40
60
30
70
number of resharers (n)
50
80
90 100
Fig. 7. Virality CCDFs for image Brightness.
Rudolf Arnheim, for example, argues that color produces
essentially emotional experience, whereas shape corresponds
to intellectual pleasure [26]. Hence, black-and-white photog-
raphy, because of its absence of expressive colors, focuses on
shapes that require intellectual reflection and brings to explore
aesthetic possibilities. We want to understand if such functions
and effects can be spotted in our virality indexes.
In order to have a “perceptual” grayscale (some images
may contain highly desaturated colors and so perceived as
shades of gray) we dichotomized the dataset according to the
mean-saturation index of the images, using a very conservative
threshold of 0.05 (on a 0-1 scale).
As can be seen in Figure 8.a and 8.b, colored images
(with saturation higher than 0.05) have a higher probability of
collecting more plusoners and replies as compared to images
with lower saturation (grayscale). In particular the probability
functions for replies is more than two times higher ( Frepl(50)
values are 0.26 vs. 0.10, K–S test p < 0.001). Instead, image
saturation has no relevant impact on resharers.
F. Very Bright Images
After converting each image in our dataset to the HSB
color space, we extracted its mean Saturation and Brightness.
the HSB (Hue/Saturation/Brightness) color
More in detail,
space describes each pixel
in an image as a point on a
cylinder: the Hue dimension representing its color within the
set of primary-secondary ones, while Saturation and Brightness
describe respectively how close to the pure color (i.e. its Hue),
and how bright it is.We split the dataset according to images
mean brightness using a threshold of 0.85 (in a scale included
between 0 and 1). Usually images with such an high mean
brightness tend to be cartoon-like images rather than pictures.
)
n
(
F
)
n
(
F
)
n
(
F
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
1.0
0.8
0.6
0.4
0.2
0.0
a
mean sat. ≤ 0.05
mean sat. > 0.05
0
50
100
150
200
250
300
350
400
number of plusoners (n)
b
0
50
100
150
200
250
300
350
400
number of replies (n)
c
0
10
20
40
30
70
number of resharers (n)
50
60
80
90 100
Fig. 8. Virality CCDFs for Grayscale vs. Colored images.
Previous research
[27] has shown that pixel brightness is
expected to be higher in cartoon-like (or significantly “pho-
toshopped’) than in natural images.
Image brightness level has a strong impact on plusoners and
replies, and a milder one on resharers. Brighter images have a
lower probability of being viral on the first two indexes (Figure
7.a and 7.b) and a higher probability on the latter (Figure
7.c). In particular, lower brightness images have a plusone
and reshare probability almost two times higher ( Fplus(75) =
0.31 vs. 0.18, Frepl(50) = 0.23 vs. 0.12, K–S test p < 0.001),
while for resharers it is 27% higher in favor of high brightness
images ( Fresh(10) = 0.33 vs. 0.26). Surprisingly, analyzing
a small random subsample of 200 very bright images, we
found that while 88% of these images contained some text,
as we would have expected, only 13% were cartoon/comics
and only 13% contained the real picture of an object as
subject, even if highly ”photoshopped”. Above all, only a
small amount of these images (21%) was considered funny or
memetic5. The great majority comprised pictures containing
infographics, screenshots of software programs, screenshots
of social-networks posts and similar. In this respect we are
analyzing a content that is meant to be mainly informative,
and is somehow complementary to the content of animated
pictures (mainly intended for amusement, see IV-B).
G. Vertical and Horizontal edges
Finally, we want to report on an explorative investigation
we made. We focused on the impact of edges intensity on posts
virality. The intensity of vertical/horizontal/diagonal edges was
5Two annotators were used, four binary categories were provided (contain-
text/comics/real-picture-obj/funny). The overall inter-annotator agreement on
these categories is high, Cohen’s kappa 0.74.
computed using Gaussian filters, based on code used in [28]
in the context of real-time visual concept classification. The
probability density of the average edges intensity follows a
gaussian-like distribution, with mean of about 0.08 (both for
horizontal and vertical edges). We divided images into two
groups: those having an average edge intensity below the
sample mean, and those having an average edge intensity
above the mean. Results showed that images with horizontal
edge intensity below the sample mean are far more viral
on the plusoners and replies indexes, while vertical are less
discriminative. Results for horizontal hedges are as follows:
Fplus(75) = 0.36 vs. 0.22, Frepl(50) = 0.27 vs. 0.14, Fresh(10)
= 0.25 vs. 0.29, K–S test p < 0.001. While these results do
not have an intuitive explanation, they clearly show that there
is room for further investigating the impact of edges.
H. Virality Indexes Correlation
From the analyses above, virality indexes seem to “move
together” (in particular plusoners and replies) while resharers
appear to indicate a different phenomenon. We hypothesize
that plusoners and replies can be considered as a form of
endorsement, while reshares are a form of self-representation.
This explains why, for example, pictures containing faces
are endorsed but not used for self-representation by VIPs’
followers. On the contrary, animated images that usually
contain funny material are more likely to provoke reshares for
followers’ self-representation. In fact, people usually tend to
represent themselves with positive feelings rather than negative
ones (especially popular users, see [29]), and positive moods
appear to be associated with social interactions [30], [31].
TABLE II.
VIRALITY INDEXES CORRELATION ON THE DATASETS
Pearson
MIC
Static images
plusoners vs. replies
plusoners vs. resharers
replies vs. resharers
0.723
0.550
0.220
Animated Images
plusoners vs. replies
plusoners vs. resharers
replies vs. resharers
Text Only
plusoners vs. replies
plusoners vs. resharers
replies vs. resharers
0.702
0.787
0.554
0.802
0.285
0.172
0.433
0.217
0.126
0.304
0.396
0.205
0.529
0.273
0.185
This is supported also by the correlation analysis of the
three virality indexes, reported in Table II, made on the
various datasets we exploited. In this analysis we used both
the Pearson coefficient and the recent Maximal Information
Coefficient (MIC), considering plusoners ≤ 1200, replies ≤
400 e resharers ≤ 400. MIC is a measure of dependence
introduced in [32] and it is part of the Maximal Information-
based Nonparametric Exploration (MINE) family of statistics.
MIC is able to capture variable relationships of different
nature, penalizing similar levels of noise in the same way. In
this study we use the Python package minepy [33].
In particular, from Table II we see that: plusones and replies
always have a high correlation while replies and resharers
always correlate low. Plusoners and reshares, that have a mild
correlation in most cases, correlate highly when it comes to
funny pictures, i.e. animated ones. This can be explained by
a specific “procedural” effect: the follower expresses his/her
appreciation for the funny picture and, after that, he/she
reshares the content. Since resharing implies also writing a
comment in the new post, the reply is likely not to be added
to the original VIP’s post.
In Table III we sum up the main findings of the paper, com-
paring the various CCDFs: animated images and infographics
have much higher probability of being reshared, while colored
images or images containing faces have higher probability
of being appreciated or commented. Finally, black and white
pictures (grayscale) turn out to be the least “viral” on Google+.
TABLE III.
SUMMARY OF MAIN FINDINGS OF THE ANALYSIS.
very bright
grayscale
color
animated
one-face > 10% area
Fplus(75)
0.18
0.21
0.31
0.17
0.35
Frepl(50)
0.12
0.11
0.24
0.08
0.30
Fresh(10)
0.33
0.28
0.27
0.48
0.23
V. USER ANALYSIS
Finally, we investigate if there is any relevant interaction
between images characteristics and VIP’s typology. In Table IV
we report demographic details6 on the Google+ dataset, as
provided by the users in their profile pages.
TABLE IV.
USER DEMOGRAPHICS IN THE GOOGLE+ DATASET.
User-category
Technology
Photography
Music
Writing
Actor
Entrepreneur
Sport
Artist
TV
Company
Website
Politician
No Category
Organization
Not Available
Other
Total
35 (19%)
41 (24%)
96 (59%)
26 (21%)
21 (36%)
12 (29%)
Female (%) Male (%)
110 (61%)
130 (76%)
48 (29%)
76 (63%)
34 (59%)
29 (71%)
22 (55%)
21 (60%)
11 (33%)
-
11 (31%)
8 (24%)
-
-
-
6 (43%)
-
-
-
-
19 (86%)
8 (57%)
-
-
1 (33%)
257 (27%)
2 (67%)
510 (54%)
Neutral (%)
36 (20%)
1 (1%)
19 (12%)
19 (16%)
3 (5%)
-
18 (45%)
3 (9%)
14 (42%)
28 (100%)
23 (100%)
3 (14%)
-
9 (100%)
7 (100%)
-
Total (%)
181 (19%)
172 (18%)
163 (17%)
121 (13%)
58 (6%)
41 (4%)
40 (4%)
35 (4%)
33 (3%)
28 (3%)
23 (2%)
22 (2%)
14 (1%)
9 (1%)
7 (1%)
3 (0%)
183 (19%)
950 (100%)
In order to investigate possible user category effects in our
dataset — that is, if our analyses are also influenced by the
type of user posting images rather than by the actual content
solely, we evaluated the entropy for each image category over
the 16 user categories (as defined in Table IV). In Table V
we report the contingency table of image-category entropy
distributions over user-categories. Looking at the Kullback-
Leibler (KL) divergence of specific image categories with
respect to the reference distribution (i.e., taken as the total
number of images posted by each user-category), we observe
very few but interesting effects due to specific user-categories.
In particular, while all the KL divergences are very small,
two of them (for Grayscale and High Brightness, reported in
6No Category denotes users that do not provide any personal information
and for which it was not possible to trace back their category; Not Available
denotes seven accounts that were no more publicly accessible when we
gathered demographic info; Other denotes very rare and unusual category
definitions. The Neutral gender refers to pages afferent to ”non-humans” like
products, brands, websites, firms, etc.
Bold) are an order of magnitude greater than other classes.
Interestingly the divergence is explained mainly by the distri-
bution gap in only two User’s categories. For High Brightness
the gap is mainly given by Technology user category that dou-
bles its probability distribution (from 22% to 40%) and Music
and Photography that reduce their probability distribution to
one third. This divergence from the reference distribution
is consistent with the analysis of the content we made in
section IV-F: these images where mainly infographics and
screenshots of software programs and social networks (so
mainly connected to technology). For Grayscale the gap is
mainly given by Photography users category that rises by 50%
its probability distribution and Music, that reduces it to one
third. This gap is consistent with the idea, expressed in Section
IV-E, that black-and-white photography is a particular form of
art expressivity mainly used by professionals.
VI. CONCLUSIONS
We have presented a study, based on a novel dataset of
Google+ posts, showing that perceptual characteristics of an
image can strongly affect the virality of the post embedding it.
Considering various kinds of images (e.g. cartoons, panorama
or self-portraits) and related features (e.g. orientation, anima-
tions) we saw that users’ reactions are affected in different
ways. We provided a series of analyses to explain the underly-
ing phenomena, using three virality metrics (namely plusoners,
replies and resharers). Results suggest
that plusoners and
replies “move together” while reshares indicate a distinct users’
reaction. In particular, funny and informative images have
much higher probability of being reshared but are associated
to different
image features (animation and high-brightness
respectively), while colored images or images containing faces
have higher probability of being appreciated and commented.
Future work will dig deeper into the assessment of relations
between visual content and virality indexes, adopting multi-
variate analysis that includes user’s categories (e.g. which is the
viral effect of b/w pictures taken by professional photographer
as compared to those taken by non professional users). We
will also extend our experimental setup in the following
ways: (a) taking into account compositional features of the
images, i.e. resembling concepts such as the well-known ”rule
of thirds”; (b) extracting and exploiting descriptors such as
color histograms, oriented-edges histograms; (c) building upon
the vast
literature available in the context of scene/object
recognition, dividing our dataset into specific categories in
order to analyse relations between categories, such as natural
images or sport images, and their virality.
ACKNOWLEDGMENT
The work of J. Staiano and M. Guerini has been partially
supported by the FIRB project S-PATTERNS and the Trento
RISE PerTe project, respectively.
REFERENCES
[1] K. Lerman and R. Ghosh, “Information contagion: an empirical study of
the spread of news on digg and twitter social networks,” in Proceedings
of ICWSM-10, Mar 2010.
[2] S. Jamali and H. Rangwala, “Digging digg : Comment mining, pop-
ularity prediction, and social network analysis,” in Proceedings of
International Conference on Web Information Systems and Mining,
2009.
TABLE V.
CONTINGENCY TABLE OF IMAGE-CATEGORY DISTRIBUTIONS OVER USER-CATEGORIES.
Grayscale
Colored
High Brightness
Low Brightness
Containing Face
Containing No Face
Squared
Vertical
Horizontal
7%
4%
5%
0%
8%
3%
0%
0%
0%
31%
0%
0%
27%
1%
1%
11%
0.173
6%
6%
6%
1%
7%
16%
0%
0%
0%
19%
0%
3%
22%
2%
2%
10%
0.002
9%
5%
7%
1%
6%
3%
0%
0%
0%
9%
0%
1%
40%
1%
2%
17%
0.259
6%
5%
6%
1%
7%
16%
0%
0%
0%
22%
0%
3%
20%
2%
2%
10%
0.003
5%
8%
6%
1%
7%
19%
0%
0%
0%
15%
0%
4%
19%
3%
2%
11%
0.027
7%
5%
6%
1%
7%
12%
0%
0%
0%
23%
0%
2%
24%
1%
2%
10%
0.006
4%
5%
5%
1%
8%
15%
0%
0%
2%
23%
0%
2%
16%
5%
1%
11%
0.047
5%
6%
7%
1%
5%
29%
0%
0%
0%
14%
0%
2%
18%
1%
1%
10%
0.076
7%
5%
6%
1%
8%
8%
0%
0%
0%
23%
0%
3%
25%
2%
2%
11%
0.029
Total
6%
5%
6%
1%
7%
14%
0%
0%
0%
20%
0%
2%
22%
2%
2%
11%
User-category
No Category
Actor
Artist
Company
Entrepreneur
Music
Not Available
Organization
Other
Photography
Politician
Sport
Technology
TV
Website
Writing
KL-divergence
[3] E. Khabiri, C.-F. Hsu, and J. Caverlee, “Analyzing and predicting
community preference of socially generated metadata: A case study
on comments in the digg community,” in Proceedings of ICWSM-09,
2009.
J. Z. Aaditeshwar Seth and R. Cohen, “A multi-disciplinary approach
for recommending weblog messages,” in The AAAI 2008 Workshop on
Enhanced Messaging, 2008.
[4]
[5] K. Lerman and A. Galstyan, “Analysis of social voting patterns on
digg,” in Proceedings of the first workshop on Online social networks,
ser. WOSP ’08. New York, NY, USA: ACM, 2008, pp. 7–12.
[Online]. Available: http://doi.acm.org/10.1145/1397735.1397738
[6] S. Aral and D. Walker, “Creating social contagion through viral product
design: A randomized trial of peer influence in networks,” Management
Science, vol. 57, no. 9, pp. 1623–1639, 2011.
[7] S. Jamali, “Comment mining, popularity prediction, and social network
analysis,” Master’s thesis, George Mason University, Fairfax, VA, 2009.
J. A. Berger and K. L. Milkman, “Social Transmission, Emotion, and the
Virality of Online Content,” Social Science Research Network Working
Paper Series, December 2009.
[8]
[9] C. Danescu-Niculescu-Mizil, J. Cheng, J. Kleinberg, and L. Lee, “You
had me at hello: How phrasing affects memorability,” in Proceedings
of the ACL, 2012.
[10] M. Simmons, L. A. Adamic, and E. Adar, “Memes online: Extracted,
subtracted, injected, and recollected,” Proceedings of ICWSM-11, 2011.
[11] M. Guerini, C. Strapparava, and G. Ozbal, “Exploring text virality in
social networks,” in Proceedings of ICWSM-11, Barcelona, Spain, July
2011.
[12] M. Guerini, A. Pepe, and B. Lepri, “Do linguistic style and readability
of scientific abstracts affect their virality,” Proceedings of ICWSM-12,
2012.
[13] D. Schioberg, S. Schmid, F. Schneider, S. Uhlig, H. Schioberg,
and A. Feldmann, “Tracing the birth of an osn: social graph
and profile
the 3rd
Annual ACM Web Science Conference, ser. WebSci
’12. New
York, NY, USA: ACM, 2012, pp. 265–274.
[Online]. Available:
http://doi.acm.org/10.1145/2380718.2380753
in Proceedings of
in google+,”
analysis
[15]
[14] Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, “Analysis of
topological characteristics of huge online social networking services,”
in Proceedings of the 16th international conference on World Wide Web.
ACM, 2007, pp. 835–844.
J. Jiang, C. Wilson, X. Wang, P. Huang, W. Sha, Y. Dai, and B. Y.
Zhao, “Understanding latent interactions in online social networks,”
in Proceedings of the 10th ACM SIGCOMM conference on Internet
measurement. ACM, 2010, pp. 369–382.
J. Leskovec, Dynamics of large networks. ProQuest, 2008.
[16]
[17] H. Kwak, C. Lee, H. Park, and S. Moon, “What is twitter, a social
network or a news media?” in Proceedings of the 19th international
conference on World wide web. ACM, 2010, pp. 591–600.
[18] TrackSocial, “Optimizing Facebook Engagement, whitepaper,” 2012.
[19] H. Li and J. L. Bukovac, “Cognitive impact of banner ad characteristics:
An experimental study,” Journalism & Mass Communication Quarterly,
vol. 76, no. 2, pp. 341–353, 1999.
[20] N. Ambady and R. Rosenthal, “Thin slices of expressive behavior as
predictors of interpersonal consequences: A meta-analysis.” Psycholog-
ical bulletin, vol. 111, no. 2, p. 256, 1992.
[21] D. Kenny, Interpersonal perception: A social relations analysis. The
Guilford Press, 1994.
[22] B. Lepri, R. Subramanian, K. Kalimeri, J. Staiano, F. Pianesi,
and N. Sebe, “Employing social gaze and speaking activity for
automatic determination of the extraversion trait,” in International
Conference on Multimodal Interfaces and the Workshop on Machine
Learning for Multimodal Interaction, ser. ICMI-MLMI ’10. New
York, NY, USA: ACM, 2010, pp. 7:1–7:8.
[Online]. Available:
http://doi.acm.org/10.1145/1891903.1891913
J. R. Curhan and A. Pentland, “Thin slices of negotiation: predicting
outcomes from conversational dynamics within the first 5 minutes.”
Journal of Applied Psychology, vol. 92, no. 3, p. 802, 2007.
[23]
[24] C. Dufour, “An investigation into the use of viral marketing for the
companies and the key success factors of a good viral campaign,” Ph.D.
dissertation, Dublin Business School, 2011.
[25] P. Viola and M. J. Jones, “Robust real-time face detection,” Int. J.
Comput. Vision, vol. 57, no. 2, pp. 137–154, May 2004. [Online].
Available: http://dx.doi.org/10.1023/B:VISI.0000013087.49260.fb
I.
and H. Rohrig,
Ianeva, A. P. de Vries,
[26] R. Arnheim, Art and visual perception. Stockholms Universitet, 1987.
“Detecting
[27] T.
cartoons: a case study in automatic video-genre classification,”
in Proceedings of the 2003 International Conference on Multimedia
and Expo - Volume 2, ser. ICME ’03. Washington, DC, USA:
IEEE Computer Society, 2003, pp. 449–452.
[Online]. Available:
http://dl.acm.org/citation.cfm?id=1170745.1171531
J. Uijlings, A. Smeulders, and R. Scha, “Real-time visual concept
classification,” Multimedia, IEEE Transactions on, vol. 12, no. 7, pp.
665 –681, nov. 2010.
[28]
[29] D. Quercia, J. Ellis, L. Capra, and J. Crowcroft, “In the mood for being
[30]
influential on twitter,” Proceedings of IEEE SocialCom’11, 2011.
J. R. Vittengl and C. S. Holt, “A time-series diary study of mood and
social interaction,” Motivation and Emotion, vol. 22, no. 3, pp. 255–275,
1998.
[31] M. De Choudhury, S. Counts, and M. Gamon, “Not all moods are
created equal! exploring human emotional states in social media,” in
Proceedings of ICWSM-12, 2012.
[32] D. N. Reshef, Y. A. Reshef, H. K. Finucane, S. R. Grossman,
G. McVean, P. J. Turnbaugh, E. S. Lander, M. Mitzenmacher, and P. C.
Sabeti, “Detecting novel associations in large data sets,” science, vol.
334, no. 6062, pp. 1518–1524, 2011.
[33] D. Albanese, M. Filosi, R. Visintainer, S. Riccadonna, G. Jurman, and
C. Furlanello, “minerva and minepy: a c engine for the mine suite and
its r, python and matlab wrappers,” Bioinformatics, vol. 29, no. 3, pp.
407–408, 2013.
|
1102.0257 | 1 | 1102 | 2011-02-01T19:44:09 | Emergence through Selection: The Evolution of a Scientific Challenge | [
"cs.SI",
"cs.AI",
"math.DS",
"physics.soc-ph"
] | One of the most interesting scientific challenges nowadays deals with the analysis and the understanding of complex networks' dynamics and how their processes lead to emergence according to the interactions among their components. In this paper we approach the definition of new methodologies for the visualization and the exploration of the dynamics at play in real dynamic social networks. We present a recently introduced formalism called TVG (for time-varying graphs), which was initially developed to model and analyze highly-dynamic and infrastructure-less communication networks such as mobile ad-hoc networks, wireless sensor networks, or vehicular networks. We discuss its applicability to complex networks in general, and social networks in particular, by showing how it enables the specification and analysis of complex dynamic phenomena in terms of temporal interactions, and allows to easily switch the perspective between local and global dynamics. As an example, we chose the case of scientific communities by analyzing portion of the ArXiv repository (ten years of publications in physics) focusing on the social determinants (e.g. goals and potential interactions among individuals) behind the emergence and the resilience of scientific communities. We consider that scientific communities are at the same time communities of practice (through co-authorship) and that they exist also as representations in the scientists' mind, since references to other scientists' works is not merely an objective link to a relevant work, but it reveals social objects that one manipulates, select and refers to. In the paper we show the emergence/selection of a community as a goal-driven preferential attachment toward a set of authors among which there are some key scientists (Nobel prizes). | cs.SI | cs |
Emergence through Selection: The Evolution of
a Scientific Challenge
Walter Quattrociocchi1 and Frederic Amblard2
1 University of Siena Pian Dei Mantellini 44, 53100, Siena, Italy
Tel: +39 0577 233 710
[email protected]
2 IRIT - Universit Toulouse 1 Capitole, 2, rue du Doyen Gabriel Marty
31042 Toulouse Cedex 9
Tel: +33 (0) 561 128 795
[email protected]
Summary. One of the most interesting scientific challenges nowadays deals with
the analysis and the understanding of complex networks' dynamics and how their
processes lead to emergence according to the interactions among their components.
In this paper we approach the definition of new methodologies for the visualiza-
tion and the exploration of the dynamics at play in real dynamic social networks. We
present a recently introduced formalism called TVG (for time-varying graphs), which
was initially developed to model and analyze highly-dynamic and infrastructure-less
communication networks. As an application context, we chose the case of scientific
communities by analyzing a portion of the ArXiv repository (ten years of publica-
tions in physics). The analysis presented in the paper passes through different data
transformations aimed at providing different perspectives on the scientific commu-
nity and its evolutions.
On a first level we discuss the dataset by means of both a static and temporal
analysis of citations and co-authorships networks. Afterward, as we consider that
scientific communities are at the same time communities of practice (through co-
authorship) and that a citation represents a deliberative selection pointing out the
relevance of a work in its scientific domain, we introduce a new transformation aimed
at capturing the interdependencies between collaborations' patterns and citations'
effects and how they make evolve a goal oriented systems as Science.
Finally, we show how through the TVG formalism and derived indicators, it is
possible to capture the interactions patterns behind the emergence (selection) of
a sub-community among others, as a goal-driven preferential attachment toward a
set of authors among which there are some key scientists (Nobel prizes) acting as
attractors on the community.
Key words: social networks analysis, evolving structures, scientific commu-
nities, emergence, time-varying graphs, temporal metrics, social selection.
2
Walter Quattrociocchi and Frederic Amblard
1 Introduction
One of the most interesting scientific challenges nowadays deals with the
analysis and the understanding of social networks' dynamics and how their
processes lead to emergence according to the interactions at play among
their components. The research efforts in this area strive to understand
what are the driving forces behind the evolution of social networks and
how they are articulated together with social dynamics, e.g., opinion dy-
namics, the epidemic or innovation diffusion, the teams formation and so
on ([7, 22, 15, 3, 28, 9, 31, 5, 30]). In this paper we approach the definition
of new methodologies for the visualization and the exploration of the dynam-
ics within real dynamic social networks. As an example, we chose the case
of scientific communities by analyzing a portion of the ArXiv repository (ten
years of publications in physics) focusing on the social determinants (e.g. goals
and potential interactions among individuals) behind the emergence and the
resilience of scientific communities. In particular, the analysis addresses the
co-existence of co-authorships' and citations' behaviors of scientists by focus-
ing on the most proficient and cited authors interactions' patterns and, in
turn, on how they are affected by the selection process of citations. Such a
social selection a) produces self-organization because it is played by a group of
individuals which act, compete and collaborate in a common environment in
order to advance Science and b) determines the success (emergence) of both
topics and scientists working on them.
On the one hand, the studies on scientific network dynamics deal with the
understanding of the factors that play a significant role in their evolution, not
all of them being neither objective nor rational e.g., the existence of a star
system [38], [24], [25], [1] the blind imitation concerning the citations [20], the
reputation and community affiliation bias [8]. On the other hand, having some
elements to understand such dynamics could enable for a better detection of
the hot topics and of the vivid subfields and how the scientific production is
advanced with respect to selection process inside the community itself. Among
the available data to analyze such a system, a subset of the publications in
a given field is the most frequently used such as in [29], [23], [26], and [33].
The scientific publications correspond to the production of such a system and
clearly identify who are the producers (the authors), which institution they
belong to (the affiliation), which funded project they are working on (the ac-
knowledgement) and what are the related publications (the citations), having
most of the time a public access to these data explain also a part of its frequent
use in the analyses of the scientific field. Classical analyses concern either the
co-authorships network ([1, 24]) or the citation network ([11, 34]), more rarely
the institutional network ([28]). Moreover, such networks are often considered
as static and their structure is rarely analyzed overtime (an exception is the
one performed by [33] on Physical Review).
The illustrative analysis presented in the paper passes through different
data transformations aimed at providing different perspectives on the scien-
Emergence through Selection: The Evolution of a Scientific Challenge
3
tific network and its evolutions. On a first level we discuss the dataset by
means of both static and temporal analysis of citations and co-authorships
networks. A second level of analysis consists in transforming the data in order
to explicit the interdependencies between the co-authorships and citations by
analyzing the scientists' representations of the collaboration structure within
the scientific field. Such a representation is captured through the network of
cited collaborations ([32]), i.e. from a publication we have several references to
other papers, each one corresponds to a promotion of the scientists authoring
the work.
One of the problem when trying to characterize such a dynamic structure
is that classical indicators from either graph theory or social network analysis
cannot be applied directly. Therefore, we used an algebra, the Time-Varying
Graphs (TVG) ([4]) that enables to take into account the dynamical aspects
of networks and allows for the definition of temporal indicators ([35]) to char-
acterize patterns in evolving structures.
Through our approach, we capture the attractiveness played by famous
authors on co-authorship behaviors and on the sub-communities structural
evolution.
2 Context
In [24] the network of scientific collaborations, explored upon several databases,
shows a clustered and small world structure. Moreover, several differences be-
tween the collaborations' patterns of the different fields studied are captured.
Such differences have been deepened in [25] with respect to the number of pa-
pers produced by a given group of authors, the number of collaborations and
the topological distances between scientists. Peltomaki and Alava in [27] pro-
pose a new emulative model aimed at approximating the growth of scientific
networks, by incorporating bipartition and sub-linear preferential attachment.
A model for the self-assembly of creative teams based on three parameters (e.g.
team size, the rate of newcomers in the scientific production and the tendency
of authors to collaborate with the same group) has been outlined in [9]. Con-
nectivity patterns in a citations network have been studied in relation to the
development of the DNA theory [11]. The work of Klemm and Eguiluz ( [12])
observed that real networks (e.g. movie actors, co-authorship in science, and
word synonyms) growing patterns are characterized by a clustering trend that
reaches an asymptotic value larger than regular lattices of the same average
connectivity.
In the field of social network analysis several works have approached the
problem of temporal metrics [10, 14, 13]. Actually, the focus is on the definition
of instruments able to capture the intrinsic properties of complex systems'
evolution, that is, characterizing the interdependencies and the co-existence
between local behaviors (interactions) and their global effects (emergence)
[6, 21, 40, 7, 30]. The research approach to characterize the evolution patterns
4
Walter Quattrociocchi and Frederic Amblard
of social networks, at the very beginning was mainly based upon simulations,
while in the past few years, due to the large availability of real datasets,
either the methodology of analysis and the object of research have changed
([37, 19, 13, 5, 17]). In particular, in the latter paper Leskovec states as central
problem, for the social networks in general and for the scientific communities
networks analysis in particular, the definition of mathematical models able
to deal and to reproduce all the properties of dynamical real world networks
such as the shrinking diameter ([18]), or the "small world" effect [39]. Actually
instruments and paradigms affording this challenge are mainly based upon
stochastic definitions ([16]) or conceptualized as a sequence of snapshots of
the network at different times [36].
3 Preliminaries
3.1 Time-Varying Graphs
The time-varying graph (TVG) formalism, recently introduced in [4], is a
graph formalisms based on an interaction-centric point of view and offers
concise and elegant formulation of temporal concepts and properties [35].
Let us consider a set of entities V (or nodes), a set of relations E among
entities (edges), and an alphabet L labeling any property of a relation (label);
that is, E ⊆ V ×V ×L. The set E enables multiple relations between any given
pair of entities, as long as these relations have different properties, that is, for
any e1 = (x1, y1, λ1) ∈ E, e2 = (x2, y2, λ2) ∈ E, (x1 = x2 ∧ y1 = y2 ∧ λ1 =
λ2) =⇒ e1 = e2.
Relationships between entities are assumed to occur over a time span T ⊆
T, namely the lifetime of the system. The temporal domain T is assumed to
be N for discrete-time systems or R for continuous-time systems. The time-
varying graph structure is denoted by the set G = (V, E, T, ρ, ζ), where ρ :
E × T → {0, 1}, called presence function, indicates whether a given edge is
present at a given time, and ζ : E × T → T, called latency function, indicates
the time it takes to cross a given edge if starting at a given date. As in this
paper the focus is on the temporal and structural analysis of a social network,
we will deliberately omit the latency function and consider TVGs described
as G = (V, E, T, ρ).
TVGs as a sequence of footprints.
Given a TVG G = (V, E, T, ρ), one can define the footprint of this graph
from t1 to t2 as the static graph G[t1,t2) = (V, E[t1,t2)) such that ∀e ∈ E, e ∈
E[t1,t2) ⇐⇒ ∃t ∈ [t1, t2), ρ(e, t) = 1. In other words, the footprint aggregates
interactions over a given time window into static graphs. Let the lifetime
T of the time-varying graph be partitioned in consecutive sub-intervals τ =
[t0, t1), [t1, t2) . . . [ti, ti+1), . . .; where each [tk, tk+1) can be noted τk. We call
sequence of footprints of G according to τ the sequence SF(τ ) = Gτ0, Gτ1, . . ..
Emergence through Selection: The Evolution of a Scientific Challenge
5
Expressing other Temporal Concepts
A sequence of couples J = {(e1, t1), (e2, t2) . . . , (ek, tk)}, such that {e1, e2, ..., ek}
is a walk in G is a journey in G if and only if ∀i, 1 ≤ i < k, ρ(ei, ti) = 1 and
ti+1 ≥ ti. The departure(J ) and arrival(J ) are respectively the starting date
t1 and the last date tk of a journey J .
Journeys can be thought of as paths over time from a source to a des-
tination and therefore have both a topological and a temporal length. The
length of J is the number J = k of couples in J (i.e., the
topological
J =
number of hops);
arrival(J ) − departure(J ).
length is its end-to-end duration:
its temporal
4 Exploring the Dataset
4.1 The Dataset
As mentioned in the introduction, the scientific community analyzed in this
work has been extracted from the hep-th (High Energy Physics Theory) por-
tion of the arXiv website, an on-line repository available at http://arxiv.org/.
The dataset is composed by a collection of papers and therefore their
related citations over the period within January 1992 to May 2003. For each
paper the set of authors, the dates of the on-line publications on arXiv.org,
and the references are provided. There are 352 807 citations within the total
amount of 29 555 papers written by 59 439 authors. The broadness of the
time window covered allows us to explore the dataset in order to extract,
capture and characterize the evolution of the interactions patterns within the
community by means of different data transformations.
4.2 The Networks Description
From the dataset, we can easily derive two graphs. The first, namely the
co-authorships network, having authors as nodes and the undirected links
standing for the relation of co-authoring a paper. The second, the citations
network, where nodes are the papers and the links (directed) are the references
among papers. More formally, the derived graphs can be defined as:
•
•
the co-authorship network as Ga : (Va, E) where nodes in Va are the
authors and links e ∈ E connect nodes co-authoring a paper.
the citations network as Gc : (Vc, E) where the nodes in Vc are the
papers and each edge e ∈ E corresponds to a reference to another paper.
In Table 1 we provide measures about the citations and collaborations
networks.
The diameters - e.g., the longest shortest path between to pairs of nodes
(respectively authors and papers) - of both networks have high values. The
6
Walter Quattrociocchi and Frederic Amblard
Network Indicators
Network Diameter
Network Modularity
Ga
26
Gc
37
0,706 0.617
Network Average Clustering Coefficient 0.5006 0.156
Table 1. Co-authorships and Citations Graph Measures
modularity, measuring how a network can be partitioned into modules or
subparts, has high values on both graphs. Whereas the average clustering
coefficient of the collaborations graph is higher than in the citations graph.
The networks are composed by several connected islands with few inter-
connections within them, and the co-authorships network is more clustered of
the citations graph.
5 Temporalizing the Dataset
In this section we are going to explicit the temporal aspects, (i.e. the structural
evolution) of the citations and co-authorships networks. The transformation is
performed through the time-varying graphs formalism defined in the previous
section.
We derive two time-varying graphs: the temporal co-authorships network,
with undirected edges and authors as nodes where a link stands for the re-
lations of co-authoring a paper; and the temporal citations network having
papers as nodes and the links (directed) representing the citations from a pa-
per to another one. The temporal dimension of both networks is derived by
the paper's submission date. The temporal co-authorship network has edges
labeled with the date of submission, while the temporal citations network has
the nodes labeled with the publication date of papers citing other papers.
More formally, we can define
•
•
a : (V, E, T, ρ)
the temporal co-authorships network as a quadruplet Gt
where the nodes in v ∈ V are the authors and links e ∈ E connect a couple
of scientists co-authoring a paper. The temporal domain T = [ta, tb) of the
function ρ, is the lifetime of each node v that in this context is assumed
as ta to be the submission date of the paper and tb = ∞.
c : (V, E, T, ρ) where
the temporal citations network as a quadruplet Gt
the nodes in the set V are the papers and each edge e ∈ E corresponds to a
citation to another paper. As for the co-authorships network, the temporal
dimension T = [ta, tb) of the presence function ρ of Gt
c is defined within
the submission date of papers and ∞.
Emergence through Selection: The Evolution of a Scientific Challenge
7
5.1 Citations Network Evolution
In this section we show the evolution of the temporal citations network Gt
c by
using the sequence of footprints as defined in section 3.1. The values are com-
puted by aggregating the interactions occurring at each sub-interval SF (τ )
having τ fixed to one year. Figure 1(a) shows the evolution of the cluster-
ing coefficient the curve is characterized by a stable trend attesting on low
values. The density evolution, which is shown in Figure 1(b), presents the
same low and decreasing behavior, meaning that both the distances and in-
terconnections among nodes (citations within papers) are stable for all the
time windows observed. Also the modularity, shown in Figure 1(c), has a
decreasing but stable trend.
(a) Average Clustering Coefficient
(b) Density
(c) Modularity
Fig. 1. Citations Graph Evolution
5.2 Co-authorships Network Evolution
The temporal co-authorships graphs presents a different structural evolution
with respect to the temporal graph of citations analyzed in the previous sec-
tion. As before, here the values are computed by aggregating the interactions
8
Walter Quattrociocchi and Frederic Amblard
at each sub-interval SF (τ ) where τ is fixed to one year. The average cluster-
ing coefficient evolution in the time interval observed, that is shown in Figure
2(a), has an oscillating trend with higher values than the ones reached by
the temporal citations graph. In addition, Gt
a has a more modular and denser
structure, as shown in Figure 2(c) and Figure 2(b). The captured trends are
characterized by a decreasing (and not stable) trend.
(a) Average Clustering Coefficient
(b) Density
(c) Modularity
Fig. 2. Co-authorships Graph Evolution
6 Expliciting Interactions
In this section we provide an additional data transformation in order to cap-
ture more details about the evolution of our scientific network. The dynam-
ics in scientific communities are based upon competitions and collaborations
among authors and groups of scientists. In the analysis we want to capture a)
the resulting emerging effects caused by these two opposite motivations and b)
how they are expressed in terms of collaborations and citations patterns. The
dataset analyzed in the current paper presents two explicit interactions: the
Emergence through Selection: The Evolution of a Scientific Challenge
9
papers' co-authorships and the citations between papers. In addition, there
is an implicit level of interaction that depends upon the goals behind any re-
search paper: the quality and, at the same time, the necessity to be highly cited
(competition). Hence, often both the collaborations' and citations' strategies
are optimized in order to have the highest impact with respect to the problem
addressed and to collect the highest number of citations. How such processes
affect the scientific production and the scientific communities structural evo-
lution?
6.1 Deriving the Interactions Graph
We approach the data transformation in order to explicit the co-authorships
and cited collaboration patterns and their interdependencies. The dataset is
transformed in an undirected graph, that we call the interaction network,
having as nodes the authors, weighted links representing the co-authorship
on a paper, and when a paper is cited by another work, the links' weights,
connecting the authors of the referenced paper, are incremented.
More formally, the graph of the cited co-authorships is defined as quadru-
pled Gcc : (V, E, T, ρ) on a discrete time. The nodes v ∈ V are the authors,
the set of edges E represents the collaborations on a paper's production.
The nodes appear on the graph the first time a paper they wrote has been
published, and the interaction L is weighted with a variable wi, namely the
strength value of a collaboration, that is incremented at each citation received
by a paper produced by a given couple of nodes (u, v).
In the following section we analyze the behaviors and the interaction's
strategies within the most cited authors' network, such a graph, namely
Gi, is a subset of the global interaction network Gcc : (V, E, T, ρ).
In particular the nodes considered in the analysis are only the authors
having links' strength values wi ≥ 150, that is, all the groups having more
than 150 citations on a work. Such a network in its maximum expansion,
during the 10 years temporal window observed, is composed by 12 583 nodes
and 84 512 edges.
6.2 The Phase Transition
Figure 3(b) shows the density values for each element of the temporal sequence
of footprints SF (τ ) of the interactions network of the most proficient scientists
Gi. The time interval τ is fixed to one year.
The density trend starts with very low values and then an increase of the
graph's sparsity occurs during its evolution with a very low counter-trend
during the period between 1999 and 2000.
The growing rate of the modularity, computed on SF (τ ) is shown in 3(c).
It is characterized by an increasing rate until 1993, then it reaches its highest
values during the period between 1999 and 2000, but through a smoothed
rate. As far as we can see by the modularity evolution, the interconnections
10
Walter Quattrociocchi and Frederic Amblard
(a) Average Clustering Coefficient
(b) Density
(c) Modularity
Fig. 3. Collaborations Graph Evolution
among separated groups of authors starts in 1993, then their interconnection
continues, but with a more stable rate. Looking at the curve of the average
clustering coefficient shown in (Figure 3(a)), we can see a phase transition
occurring between 1999 and 2000 and separating a monotone trend from a
decreasing one.
We can interpret the modularity trend as showing that nodes during the
first phase are divided in several and separated groups, while after the phase
transition of the clustering coefficient, the connections among these groups
start to become denser causing a network structure with a smaller number
of larger communities (modules) - e.g. the network tends toward a structural
homogeneity.
6.3 Zooming on Interconnections
In order characterize the phenomena behind the phase transition outlined
in the previous section, in Figure 4 we show the trend of the average ratio
between nodes and edges in both the whole interaction network (in black)
and the network of the most proficient scientists (in red). As we can see, the
phase transition, evinced in the clustering coefficient evolution in Figure 3(a),
is not caused by an increase of the number of authors in the period between
1999 and 2000, neither it is a pattern related to the whole dataset.
Emergence through Selection: The Evolution of a Scientific Challenge
11
Fig. 4. The average number of edges per node for the entire network of the cited
co-authorships (in black) and for the network of the most proficient authors (in red)
In Table 6.3 we present the evolution of the average degree, the average
path length and of the degree power law within the temporal window observed.
As for the previous indicators these values are computed on the sequence of
footprints SF (τ ) with τ fixed to one year of Gi.
Year Average Degree Average Path Length Power Law
1992
1993
1994
1995
1996
1997
1998
1999
2000
2001
0,0095
0,0176
0,012
0,0135
0,132
0,0118
0,106
0,066
0,64
0,6
1,16
1,13
1,12
1,12
3,92
3,79
3,82
1
1
1
0
-1,386
-1,79
-2,16
-2,27
-2,5
-2,5
-5,08
-5,27
-5,25
Table 2. Other interaction network's measurements
In bold the values when the phase transition occurs. Neither the average
path length, indicating the average distances among nodes, the power law
degree, measuring how closely the degree distribution of a network follows
a power-law scale and the evolution of average degree, counting the average
number of connections at each node, are immune to the phase transition.
12
Walter Quattrociocchi and Frederic Amblard
7 Goals and Preferential Attachment
As the Time-Varying graphs is an interaction-centric formalism. In this section
we will show how such a modeling approach is compliant with one of the
widely diffused platforms for network analysis and how it is possible to show
the punctual evolution as in a movie of the temporal networks.
The most interesting emerging phenomenon from the previous section is
a phase transition in the evolution of the structure of the most proficient
authors' network occurring between 1999 and 2000. According to the tem-
poral analysis, such changes in the network are caused by a particular trend
regarding the interconnections among nodes (authors) of the most cited co-
authorships graph Gi.
In this section we outline the network evolution by showing the formation
of the biggest community at the beginning of the phase transition (1998) until
its maximum expansion (2002). In Figure 5 we provide a sequence of screen-
shots showing the nodes' aggregation patterns. The pictures are obtained
through the Gephi platform ([2]). At the beginning (Figure 5(a)) there are
several separated components, that start to connect (Figure 5(b)).
(a) Several separated connected
components
(b) that start to connect with each
other
Fig. 5. Connections within the islands
Notice that the edges are emphasized with respect to the strength value
wi counting the number of citations of each couple of nodes. The component
(group of authors) in the center is highly cited and it is playing as an attractor
on the neighboring nodes as it is shown in Figure 6(a) until the maximum level
of connections in the group is reached, as shown in Figure 6(b).
7.1 Zooming on the Attractors
In this section we provide a more detailed vision on such a process of aggre-
gation toward the attractors. Let starts by introducing Figure 7 showing the
Emergence through Selection: The Evolution of a Scientific Challenge
13
(a) The number
connections
within authors continues to increase.
of
(b) The maximum level of con-
nectivity is reached.
Fig. 6. The growing phase of interaction among authors
number of citations received at each semester by the most cited paper in our
dataset.
Fig. 7. the citations trend of the most cited paper for each semester
The citations rate has a strong increase after two semesters. The third
semester coincides with the interval (1999-2000) of the phase transition cap-
tured in the previous section.
Hence, in order to understand the effect of this paper, in the following we
will show a sequence of snapshots of the network structure in the neighbor of
the authors of the most cited paper when it appears in our database. Notice
that in the following pictures, the nodes' diameters are proportional to the
total amount of citations received by their papers.
14
Walter Quattrociocchi and Frederic Amblard
At the beginning there are only separated components as shown in Figure
8(a). Then a large node appears (Figure 8(b)), and near appears a node with
a smaller diameter but with a higher number of links. The biggest node is one
of the authors of the most cited paper and as we can see, the node has a very
low number of connections (collaborations) in that time interval.
(a) Before
(b) one of the authors (the biggest
node) of the most cited paper and a
smaller node with an higher degree
appear
Fig. 8. The appearence of one of the most cited authors
(a) The group of authors of the
most cited papers appears. The au-
thors are the two big nodes and the
smaller hub
(b) The portion of the graph be-
comes denser
Fig. 9. Densification through the hub node
In Figure 9(a) the fat node (a Nobel prize) and the hub node are connected,
they publish a paper together with another node with a large diameter. Several
islands start to link the clique formed and as we can see in Figure 9(b) the
process of diffusion continues by means of new hubs.
The sequence of snapshots shows the interactions patterns behind the for-
mulation of the "String Theory" and of its consequent developments.
Emergence through Selection: The Evolution of a Scientific Challenge
15
Authors in the same community start to migrate toward the island of
the authors of the most cited paper. The increasing community densification
causes the formation of a giant component around the group authoring the
most cited paper that in turns makes the network become denser and homo-
geneous as emerged in the analysis in the previous sections.
It is a goal-driven preferential attachment e.g., the mechanism used to
explain the power law degree distributions in social networks - due to the
number of citations (representing the emergence through selection) to a given
group. Authors tend to join highly cited groups to satisfy both the quality and
the possibility to be highly cited requirements. Moreover, considering that at
the beginning there are several separated groups, the phenomenon can be in-
terpreted as a three-fold process with a first phase as the exploration of ideas
by means of separated works afforded by separated groups, a second one when
a part of the ideas explored starts to be cited more than the others, and a
third one when authors tend to join groups that have produced highly cited
works. The process tripartition resembles the phases of the natural selection,
e.g. the exploration, the selection and migration. In this context such a (social)
selection a) produces self-organization because it is played by a group of in-
dividuals which act, compete and collaborate in order to advance science and
b) determines the success (emergence) of a topic and of the scientists working
on it.
7.2 Characterizing the Community Evolution
Table 7.2 summarizes the network evolution by means of a) basic indicators,
e.g. the number of nodes, the number of edges and the community's diameter)
and b) aggregated indicators, e.g. the cyclomatic number, the alpha, beta,
and gamma index. The cyclomatic number counts the number of cycles on the
graph, its magnitude characterizes the development of the nodes' accessibility.
The alpha index is the ratio between the number of cycles in the graph and
their possible maximum value. The range of the alpha index spread within
0 to 1, that are from no cycles to a completely interconnected network. The
beta index, is a simple measure of connectivity. It relates the total number
of edges to the total number of nodes. The higher the value, the greater the
connectivity is. The gamma index measures the ratio between the number
of edges on the network and the maximum number of possible edges among
nodes. The gamma index spreads within 0 and 100, respectively indicating
the minimum and the maximum number of edges between nodes.
As we can see from the evolution of these parameters, the aggregation
pattern among separated components is evident for each one of the metric
proposed. In terms of nodes that join the community and their mutual con-
nections, the diameter over time passes through a phase of expansion and
then tends to stabilize.
16
Walter Quattrociocchi and Frederic Amblard
Measures April 00 October 00 April 01 October 01 April 02 October 02 April 03
Vertices:
Edges:
67
106
70
110
72
114
65
99
10
35
66
100
10
35
0,017
1,52
52,38
0,016
1,51
52,08
8
40
0,018
1,58
54,3
8
41
0,017
1,57
53,92
8
43
0,017
1,58
54,28
23
29
6
17
0,73
1,69
61,9
51
75
10
25
0,02
1,47
51,02
Diameter:
Cyclomatic:
Alpha:
Beta:
Gamma:
Table 3. network measurement of the biggest community
8 Conclusions
In this paper we characterize the evolution of a scientific community extracted
by the ArXiv's hep-th (High Energy Physics Theory) repository. The analysis
starts with a static vision on the dataset by showing the structure of the cita-
tions and co-authorships graphs derived by the dataset. Then by adding the
temporal dimension on both networks we characterize the structural changes
of the co-authorships and citations graphs. The temporal dimension and the
metrics used for the analysis were formalized using Time-Varying Graphs
(TVG), a mathematical framework designed to represent the interactions and
their evolution in dynamically changing environments.
Since we are interested in the relationships between collaborations and
citations behaviors of scientists, we focus on the network of most cited authors
and on its structural evolution where several interesting aspects emerge. The
network evolves toward a denser structure, a phase transition occurs in the
1999-2000 time interval causing the homogenization of communities.
Through our approach, we capture the role played by famous authors
on co-authorship behaviors. They act as attractors on the community. The
driving force is a sort of preferential attachment driven by the number of
citations received by a given group, that in terms of the goal of any scientific
community indicates a strategy oriented to the community belonging.
Furthermore, the evolution of the network from a sparse and modular
structure to a denser and homogeneous one, can be interpreted as a three-fold
process reflecting the natural selection. The first phase is the exploration of
ideas by means of separated works, once some ideas start to be cited (selected)
more than others, then authors tend to join groups that have produced highly
cited works. The selection is performed by individuals in a goal oriented envi-
ronment and such a (social) selection produces self-organization because it is
played by a group of individuals which act, compete and collaborate in order
to advance Science. In fact, the driving force is an emergent effect of the inter-
dependencies between citations and the goal of the scientific production since
the social selection determines the emergence of a topic and of the scientists
working on it by determining the so called preferential attachment toward
groups and topics having high potential of citations. Finally, we show that
Emergence through Selection: The Evolution of a Scientific Challenge
17
the migration of authors toward the most cited authors (attractors) expresses
through a hub node, - e.g. a node with few citations and several co-authorships.
In the next future we are going to outline the behavior of the most profi-
cient scientist in terms of their aggregation patterns, and on how their works
are diffused within the community, that is, characterizing the reasons behind
the selection process causing the network structural evolution. Such aspects
will be addressed both with new analyses on different datasets and by means
multi-agent simulations. The former stream will be devoted to the definition
of new patterns, the latter will be used for the understanding of how changing
some parameters of the network influences the evolution, and consequently
the quality, of the scientific production.
9 Acknowledgments
This work was partially supported by the Future and Emerging Technolo-
gies programme FP7-COSI-ICT of the European Commission through project
QLectives (grant no.: 231200).
References
1. Jeong H. Neda Z. Ravasz E. Schubert A. Barabasi, A.L. and T. Vicsek. Evolution
of the social network of scientific collaborations. Physica A, vol.311, pages 590 --
614, 2002.
2. M. Bastian, S. Heymann, and M. Jacomy. Gephi: An open source software for
In International AAAI Conference on
exploring and manipulating networks.
Weblogs and Social Media, 2009.
3. C.T Butts and K.M. Carley. Structural change and homeostasis in organizations:
A decision-theoretic approach, 2002.
4. A. Casteigts, P. Flocchini, W. Quattrociocchi, and N. Santoro. Time-varying
graphs and dynamic networks. Technical Report University of Carleton, Canada,
2010.
5. C. Castellano, S. Fortunato, and V. Loreto. Statistical physics of social dynam-
ics. 2007.
6. Jorn Davidsen, Holger Ebel, and Stefan Bornholdt. Emergence of a small world
from local interactions: Modeling acquaintance networks. Phys. Rev. Lett.,
88(12):128701, Mar 2002.
7. G. Deffuant, D. Neau, F. Amblard, and Gerard Weisbuch. Mixing beliefs among
interacting agents. Advances in Complex Systems, 3:87 -- 98, 2001.
8. N. Gilbert. Referencing as persuasion. Social Studies of Science, vol.7, pages
113 -- 22, 1977.
9. R. Guimera, B. Uzzi, J. Spiro, and L.A. Amaral. Team Assembly Mechanisms
Determine Collaboration Network Structure and Team Performance. Science,
308(5722):697 -- 702, 2005.
10. P. Holme. Network reachability of real-world contact sequences. Physical Review
E, 71(4):46119, 2005.
18
Walter Quattrociocchi and Frederic Amblard
11. Norman P. Hummon and Patrick Doreian. Connectivity in a citation network:
The development of dna theory, 1989.
12. Konstantin Klemm and V´ıctor M. Egu´ıluz. Highly clustered scale-free networks.
Physical Review E, 65(3):036123+, Feb 2002.
13. G. Kossinets, J. Kleinberg, and D. Watts. The structure of information pathways
in a social communication network. In Proc. of the 14th ACM SIGKDD Intl.
Conf. on Knowledge Discovery and Data Mining (KDD 2008), pages 435 -- 443,
2008.
14. V. Kostakos. Temporal graphs. Physica A: Statistical Mechanics and its Appli-
cations, 388(6):1007 -- 1023, 2009.
15. M. Lelarge. Diffusion of innovations on random networks: Understanding the
chasm, 2009.
16. Jure Leskovec, Deepayan Chakrabarti, Jon Kleinberg, and Christos Faloutsos.
17. Jure Leskovec, Deepayan Chakrabarti, Jon M. Kleinberg, Christos Faloutsos,
and Zoubin Ghahramani. Kronecker graphs: An approach to modeling networks.
Journal of Machine Learning Research, 11:985 -- 1042, 2010.
18. Jure Leskovec, Jon Kleinberg, and Christos Faloutsos.
19. Jure Leskovec, Jon M. Kleinberg, and Christos Faloutsos. Graph evolution:
Densification and shrinking diameters. TKDD, 1(1), 2007.
20. M.H. MacRoberts and B.R. MacRoberts. Problems of citation analysis. Scien-
tometrics, vol.36, no.3, pages 435 -- 444, 1996.
21. M. Mataric. Designing emergent behaviors: From local interactions to collective
intelligence. In In Proceedings of the International Conference on Simulation of
Adaptive Behavior: From Animals to Animats, volume 2, pages 432 -- 441, 1992.
22. C. Moore and M.E.J. Newman. Epidemics and percolation in small-world net-
works. Phys. Rev. E, 61:5678 -- 5682, 2000.
23. M. E. J. Newman. Clustering and preferential attachment in growing networks.
In Physical Review E, vol.64, 2001.
24. M. E. J. Newman. The structure of scientific collaboration networks. 98(2):404 --
409, January 2001.
25. M. E. J. Newman. Coauthorship networks and patterns of scientific collabo-
ration. In Proceedings of the National Academy of Sciences, pages 5200 -- 5205,
2004.
26. M. E. J. Newman. Who is the best connected scientist? a study of scientific
coauthorship networks. In Complex Networks, lecture notes in Physics, 2004.
27. Matti Peltomaki and Mikko Alava. Correlations in bipartite collaboration net-
works. J.STAT.MECH., page P01010, 2006.
28. W.W Powell, D.R. White, and K.W. Koput. Network dynamics and field evolu-
tion: The growth of interorganizational collaboration in the life sciences. Amer-
ican Journal of Sociology, vol.110, no.4, pages 1132 -- 1205, 2005.
29. D.J. De Solla Price. Networks of scientific papers. Science, vol.149, no.3683,
pages 510 -- 515, 1965.
30. W. Quattrociocchi, R. Conte, and E. Lodi. Simulating opinion dynamics in
heterogeneous communication systems. ECCS 2010 - Lisbon Portugal, 2010.
31. W. Quattrociocchi, M. Paolucci, and R. Conte. On the effects of informational
cheating on social evaluations: image and reputation through gossip. Interna-
tional Journal of Knowledge and Learning, 5(5/6):457 -- 471, 2009.
32. Walter Quattrociocchi and Frederic Amblard. Selection in scientific networks.
arxiv:1012.4396, 2010.
Emergence through Selection: The Evolution of a Scientific Challenge
19
33. F .Radicchi, S. Fortunato, B. Markiness, and A. Vespignani. Diffusion of scien-
tific credits and the ranking of scientists. Physical Review E, vol.80, 2009.
34. S. Redner. Citation statistics from 110 years of physical review. Physical Review,
Physics Today, vol.58, pages 49 -- 54, 2005.
35. N. Santoro, W. Quattrociocchi, P. Flocchini, A. Casteigts, and F. Amblard.
Time varying graphs and social network analysis: Temporal indicators and met-
rics. Technical Report University of Carleton, Canada, 2010.
36. J. Tang, S. Scellato, M. Musolesi, C. Mascolo, and V. Latora. Small-world
behavior in time-varying graphs. Arxiv preprint arXiv:0909.1712, 2009.
37. Carla Taramasco, Jean-Philippe Cointet, and Camille Roth. Academic team
formation as evolving hypergraphs. Scientometrics, April 2010.
38. C.S Wagner and K. Leydesdorff. Network structure, self-organization, and the
growth of international collaboration in science. Research Policy vol 34 n10,
pages 1608 -- 1618, 2005.
39. Duncan J. Watts. Networks, dynamics and the small world phenomenon. AJS,
1999.
40. David R. Woolley. PLATO: The Emergence of Online Community, 1994.
|
1905.10348 | 1 | 1905 | 2019-04-20T15:55:13 | Predicting Brazilian court decisions | [
"cs.SI",
"cs.CL"
] | Predicting case outcomes is useful but still an extremely hard task for attorneys and other Law professionals. It is not easy to search case information to extract valuable information as this requires dealing with huge data sets and their complexity. For instance, the complexity of Brazil legal system along with the high litigation rates makes this problem even harder. This paper introduces an approach for predicting Brazilian court decisions which is also able to predict whether the decision will be unanimous. We developed a working prototype which performs 79% of accuracy (F1-score) on a data set composed of 4,043 cases from a Brazilian court. To our knowledge, this is the first study to forecast judge decisions in Brazil. | cs.SI | cs | Predicting Brazilian court decisions
Andr´e Lage-Freitas, H´ector Allende-Cid, Orivaldo Santana, and L´ıvia de Oliveira-Lage
[email protected], [email protected], [email protected], [email protected]
1
Abstract -- Predicting case outcomes is useful but still an
extremely hard task for attorneys and other Law professionals.
It is not easy to search case information to extract valuable
information as this requires dealing with huge data sets and
their complexity. For instance, the complexity of Brazil legal
system along with the high litigation rates makes this problem
even harder.
This paper introduces an approach for predicting Brazilian
court decisions which is also able to predict whether the decision
will be unanimous. We developed a working prototype which
performs 79% of accuracy (F1-score) on a data set composed of
4, 043 cases from a Brazilian court. To our knowledge, this is the
first study to forecast judge decisions in Brazil.
Index Terms -- jurimetrics, legal outcome forecast, predictive
algorithms
I. INTRODUCTION
Since Code of Hammurabi1, we have been trying to improve
legal certainty in human relationships by making public the
law and the rulings of courts. In addition to publicizing the
laws, legal systems usually provide further support to legal
certainty through judicial decisions. These decisions are useful
not only for judging specific situations, but also to influence
society behavior by exposing the legal consequences of our
actions. Thereby, predicting legal decisions is fundamental to
understand the legal consequences of our actions as well as
for supporting law professionals to improve the quality of their
work.
In Brazil for example, lower court judges decisions might be
appealed to Brazilian courts (Tribiunais de Justic¸a) to be re-
viewed by second instance court judges. In an appellate court,
judges decide together upon a case and their decisions are
compiled in Agreement reports named Ac´ordaos. Similar to
lower court decisions, Ac´ordaos include Report, Fundamentos,
Votes2, and further metadata such as judgment date, attorneys,
judges, etc. These Agreements documents are very useful for
understanding jurisprudence thus guiding lawyers and court
members about the decisions. For instance, attorneys often
use these documents to prepare cases while judges should take
9
1
0
2
r
p
A
0
2
]
I
S
.
s
c
[
1
v
8
4
3
0
1
.
5
0
9
1
:
v
i
X
r
a
Andr´e Lage-Freitas is with Universidade Federal de Alagoas.
H´ector Allende-Cid is with Pontificia Universidad Catlica de Valparaso.
Orivaldo Santana is with Universidade Federal do Rio Grande do Norte.
L´ıvia de Oliveira-Lage is a Prosecutor at States Attorneys Office at
Procuradoria Geral do Estado de Alagoas.
April 20th, 2019. Authorship: A.L.F. proposed the research problem,
supervised this work, and executed the experiments. H.A.C. proposed and
developed NLP and machine learning algorithms. O.S. verified the method-
ology. L.O.L. supervised and reviewed the Law aspects of this work. All
authors discussed the results and contributed to the final manuscript. The
authors declare that have no competing interests and that received no funding
for this study.
1https://en.wikipedia.org/wiki/Code of Hammurabi
2C.f. Brazilian Law: Art. 489, Lei 13105/15.
them into account -- or even use them as guidelines -- for next
decisions.
In order to understand Ac´ordao decisions, one has to read
the subject at the summary, read the decision Report, how each
judge voted in this case (Votes), and the final decision which
can be unanimous or not. Moreover, each Ac´ordao might have
more than one decision -- regarding one or more appealed case
claims -- which can increase the Ac´ordao complexity. This
problem becomes harder as there usually are hundreds -- and
sometimes thousands -- of Ac´ordaos related to the case on
which a Law professional is working.
A very common and extremely important task for Law
professionals is to speculate how a specific court would decide
given the ideas and the facts which compose the case. For
example, this is useful for preparing and tuning a case to
have a favourable decision. Hence, attorneys can rely on
substantial assumptions on how judges will decide based on
their arguments. Although this information can be found in
public Ac´ordaos, the myriads of available documents make
this task very complex and error prone, even for experiment
lawyers.
In addition to Brazil, several other legal systems in the world
share the very same problem of predicting legal decisions.
The challenge is hence generalized as how to predict legal
decisions with a satisfactory level of accuracy to support the
work of attorneys, judges, and other professionals such as
counters and real state offices. By satisfactory, we mean that
the quality of the prediction in terms of accuracy should be
better -- or even higher -- than Law experts.
it still
Nevertheless,
is very hard to perform any legal
decision prediction with satisfactory accuracy, even though
computers have been used for such challenge for decades [7].
For instance, Ashley and Bruninghaus [2] propose a method
for classifying and predicting cases which is able to meet
91.8% of accuracy, however the evaluation takes only into
account a small data set (146 cases). Katz et al. [6] uses
historical data for predicting USA Supreme Court decisions
by classifying decisions in two and three classes and by
presenting judge profiles. That approach reaches 70.2% of
accuracy for predicting case decisions and is assessed by on
a data set with 28, 000 cases. Also using data from the USA
Supreme Court, Ruger et al. [11] exposes how the prediction
of Law experts performs in comparison to a trained statistical
model for different Law fields by using less than 200 cases.
In [1], Aletras et al. uses Support-vector Machine (SVM) for
predicting if cases violate Articles 3, 6, and 8 of European
Convention on Human Rights of Human Rights. Their results
acheived 78% of accuracy performed on 584 European Court
cases separated by subjects.
Other related work takes advantage of machine learning
techniques to support further legal tasks. In [8], the authors
propose a framework for automatically judging legal decisions
by using Attention neural network models. They applied the
approach for divorce decisions in China. In [13], Shulayeva
et al. separates legal principles from case facts on legal docu-
ments by using a Naive Bayseian Multimodal classifier. In [4],
the authors proposes to use transfer learning to recognize
the same words which have different meanings in different
contexts, i. e., name-entity linking task. In [3], the authors uses
Bayesian networks to classify legal decisions from a Brazilian
Labor court and conclude that both employees and employers
are roughly successful in their litigation. Last, Ruhl et al. [12]
overviews some perspectives on how complex systems are
useful for supporting policy-makers on legal-related topics
such as appellate jurisprudence and tax policy analysis.
We are also motivated by recent results that show that
intelligent systems can perform better than Law experts3. Our
hypothesis is that by taking advantage of Natural Language
Processing (NLP) and Machine Learning techniques it
is
able to build a system that meets high quality legal decision
predictions. Different from the closest related works of this
paper [1], [2], [6] which address United States and European
courts, we propose an approach for legal decision prediction
for Brazilian courts which also predicts whether the court
decision will be unanimous. Moreover, in contrast to [1], [2],
we trained a model at thousand-scale data set with 4, 043
cases. Moreover, in contrast to [1], our approach does not
rely on a binary classification problem -- since it uses three
possible prediction results -- nor require that case data set
should be separated by specific Law articles, hence being a
more generic approach.
The reminder of this paper is structured as follows. In
Section II, we present details on the aforementioned prob-
lem such as the case study and the methodology employed.
Section III exposes the results while Section IV concludes our
investigation and proposes future directions on this subject.
II. MATERIAL AND METHODS
The research question which guides our study is how to
predict legal decisions with a satisfactory level of accuracy
for Brazilian courts by including the prediction of the court
unanimous behavior. Next sections provide further informa-
tion about our assumptions and the proposed methodology.
A. A generic approach
We focus on Brazilian courts as Brazil legal system is not
trivial. We believe that if we are able to solve this problem
for such complex legal system, our approach would also fit
other simpler or it could be straightforwardly adapted for more
complex legal systems which share similarities. Nevertheless,
it
is worth to state that other legal systems also rely on
similar documents. For instance, in Indiana Court of Appeal
(United States), the Appellate Court decisions are composed
by a group of three judges whose decisions (opinions) are
divided in Case Summary, Facts, Procedural History, and the
3https://www.bbc.com/news/technology-41829534
2
court conclusion at the end of that document. In France, the
Appellate Court (Cour d'appel) also renders decisions coming
from the agreement of three judges. That decision is called an
Arret whose structure is also composed of legal basis for the
appeal, case history, and the final decision.
Further, we share the same assumption of Aletras et. al [1]:
"there is enough similarity between (at least) certain chunks of
the text of published judgments and applications lodged with
the Court and/or briefs submitted by parties with respect to
pending cases".
B. Decision labels and data set
Regarding the flow process of a Brazilian appeal, when
lawyers lodge appeals at a court it is analyzed by a group
composed of three judges to check whether the appeal is able
to be judged by the court. If the appeal does not meet the
formal requirements, the appeal is identified as not cognized
(recurso nao conhecido) hence not
judged by the court.
Otherwise, the appeal is therefore judged and classified in
various categories. We therefore assumed that court decisions
can be classified by using the following labels:
• not-cognized, when the appeal was not accepted to
be judged by the court;
• yes, for full favourable decisions;
• partial, for partially favourable decisions;
• no, when the appeal was denied;
• prejudicada,
to mean that
the case could not be
judged for any impediment such as the appealer died or
gave up on the case for instance;
• administrative, when the decision refers to a court
administrative subject as conflict of competence between
lower court judges.
In addition to the decision labels, an orthogonal concern of
Brazilian court decisions -- as well as for other legal systems
-- refers to its unanimity aspect, being labeled as:
• unanimity which means that the decision was unani-
mous among the three judges that voted in the case; and
• not-unanimity by meaning that one of the judges
disagreed on the decision.
With respect to the data set, we relied on 4, 762 decisions
(Ac´ordaos) from a State higher court (appellate court), the
Tribunal de Justic¸a de Alagoas. From this data set, we re-
moved the decisions that had repeated descriptions to not bias
the sample thus resulting 4, 332 examples. Repeated decision
descriptions occur owing to very similar cases which share
the same description. Moreover, for the sake of predictability,
we removed all the decisions classified as prejudicada,
not-cognized and admnistrative as these labels refer
to very peculiar situations which are not useful for prediction
purposes addressed by this paper. Finally, the total amount of
examples were 4, 043 cases.
C. Methodology
Figure 1 depicts an overview of our methodology. From
the legal decision data set, we extracted and separated the
texts which hold information about the case description, the
decision, and their unanimity aspect. This Natural Language
Pre-processing task includes removing stop-words and word
suffixes for improving the capacity of word representation.
Then, we took advantage of Term Frequency-inverse Docu-
ment Frequency (tdf-df) statistics to increase the importance
of relevant words while decreasing the importance of general
repetitive words not relevant to the addressed problem. As
follows, we used texts which refers to decisions and unanimity
to classify them to one of the possible labels (c.f. Section II-B).
As a result, we built a structured training data set depicted by
Table I.
Next, we used 80% of the data set to train a Machine
Learning model which was then assessed by using the latter
20% of the data set (c.f. Figure 1). To train a model means to
automatically find out which parameters are the most suitable
for predicting decisions based on the training data set. Because
we address decision and unanimous predictions, it requires to
train two models to address both predictions. Once trained, the
models can be used to predict decision and unanimity given
a case description. Last, to evaluate our approach, we used
the F1-score metrics and performed 5-fold cross-validation to
improve the practicability of our approach. Results are thus
exposed as success accuracy rate in percentage.
3
label. The accuracy of case outcome prediction in this situation
was 74.07% (σ2 = 0.00029) for the F1-score metrics. This
result is very interesting as it does not validate our previous
assumption that the not regularly distributed data set would
strongly bias the model.
With respect to predicting the unanimous behaviour of the
Tribunal de Justic¸a de Alagoas Brazilian court, our approach
scored 98.46% (σ2 = 0.000031) for the F1-score metrics.
This assessment was performed in a data set with 2, 274
cases. From the 4, 332 data set -- which had no repeated
decision descriptions -- , we removed the samples that either
our classifier did not managed to label or the decision itself
did not had any information about unanimity. The resulting
data set had 2, 289 samples. As follows, we removed from
this data set the decision whose labels were prejudicada,
not-cognized and admnistrative -- as these labels
are not relevant for the predictive addressed problem -- re-
sulting in a data set with 2, 274 examples. The distribution of
unanimity and not-unanimity labels are depicted by
Table IV.
The very-high unanimous predictive accuracy of 98.46% is
explained by the fact that most of decisions are unanimous,
therefore the model was biased to this label. We indeed
expected that most decisions were unanimous since this is well
known by law experts. However, the great difference between
unanimous and non unanimous decision is a surprising result.
In order to understand how our approach would perform when
predicting unanimity by using a more uniformly distributed
data set, we therefore performed another evaluation by ran-
domly removing decisions whose label was unanimity to
meet the same number of not-unanimity decisions. The
resulting data set had 90 examples, half of them labeled as
unanimity and the other half not-unanimity. With this
configuration, our prototype reached 76.94% (σ2 = 0.015)
F1-score accuracy.
Fig. 1. Methodology. Specific data from case outcomes are extracted then
classified to different labels. A machine learning model is hence trained and
assessed by using 5-fold cross-validation.
Furthermore, in order to assess the exposed methodology,
we developed a working prototype in Python. We used the
NLTK framework [9] for Natural Language Processing in such
a way that our prototype is easily configurable for various lan-
guages in addition to Portuguese. The prototype also provides
a graphical user interface which can be accessible from any
Web browser.
III. RESULTS
Our approach was able to score 78,99% F1-score (σ2 =
0.000017) when predicting legal decision for the Tribunal
de Justic¸a de Alagoas Brazilian court by using 4, 043 judge
decisions. The number of samples for each label is exposed
in Table II.
In order to analyze our prediction over a more uniformly
distributed data set, we randomly removed 1, 549 no-labeled
decisions to have the same number of partial-labeled
decisions. Table III depicts the distributions of each decision
IV. CONCLUSION
This paper proposes a methodology for predicting Brazilian
court legal decisions which is able to reach 79% of accuracy
when employed for a Brazilian court data set with 4, 043
cases. Our approach is able to predict case outcomes by using
three different labels: yes, no, partial. Moreover, the proposed
method also predicts whether the decision will be unanimous,
which fits not only Brazil legal system, but also several others
whose decisions are judged by more than one judge. The
unanimity prediction performance of our approach is 77% of
accuracy. To our knowledge, this is the first study to predict
Brazil legal decisions.
Moreover, our approach is easy to use as it only requires that
users provide the description of their litigation and the output
will be one of the aforementioned case outcome predictive
label along with its predictive unanimity label. These infor-
mation are very useful for attorneys, judges, and other Law
professionals as they provide practical support for their work.
Moreover, our contribution also includes a working prototype
which can be configured to further languages as well as for
different data sets.
Data
Sample 1
Sample 2
Sample 3
Decision description
Direito Processual Civil...
Apelac¸ao criminal...
Apelac¸ao C´ıvel em Ac¸ao Ordin´aria...
Decision
Recurso conhecido e provido
Recurso conhecido e parcialmente provido
Recurso conhecido e nao provido
Unanimity
Unanimidade
Decisao unnime
Decisao unanime
Label
yes
patial
no
Unanimity label
unanimity
unanimity
unanimity
4
TRAINING DATA SET INCLUDES DECISION TEXTS AND LABELS WHICH WERE CLASSIFIED ACCORDING TO RESPECTIVE DECISION TEXTS. E.G., IN
SAMPLE 1, provido WAS CLASSIFIED AS A FAVORABLE ( Y E S) DECISION AND Unanimidade WAS CLASSIFIED AS U N A N I M I T Y.
TABLE I
[6] D. M. Katz, M. J. Bommarito, and J. Blackman. A general approach
for predicting the behavior of the Supreme Court of the United States.
PLOS ONE, 12(4):e0174698, apr 2017.
[7] L. Loevinger. Jurimetrics: The Methodology of Legal Inquiry. Law and
Contemporary Problems, 28(1):5, 1963.
[8] S. Long, C. Tu, Z. Liu, and M. Sun. Automatic Judgment Prediction via
Legal Reading Comprehension. Technical report, Tsinghua University,
Beijing, sep 2018.
[9] E. Loper and S. Bird. NLTK. In Proceedings of the ACL-02 Workshop
on Effective tools and methodologies for teaching natural language
processing and computational linguistics -, volume 1, pages 63 -- 70,
Morristown, NJ, USA, 2002. Association for Computational Linguistics.
[10] P. H. Luz de Araujo, T. E. de Campos, R. R. R. de Oliveira, M. Stauffer,
S. Couto, and P. Bermejo. LeNER-Br: A Dataset for Named Entity
Recognition in Brazilian Legal Text. In Proceedings of the International
Conference on the Computational Processing of Portuguese, pages 313 --
323, Canela, 2018.
[11] T. W. Ruger, P. T. Kim, A. D. Martin, and K. M. Quinn. The Supreme
Court Forecasting Project: Legal and Political Science Approaches to
Predicting Supreme Court Decisionmaking. Columbia Law Review,
104(4):1150, may 2004.
[12] J. B. Ruhl, D. M. Katz, and M. J. Bommarito. Harnessing legal
complexity. Science, 355(6332):1377 -- 1378, mar 2017.
[13] O. Shulayeva, A. Siddharthan, and A. Wyner. Recognizing cited facts
and principles in legal judgements. Artificial Intelligence and Law,
25(1):107 -- 126, mar 2017.
Labels
N. of decisions
partial
866
yes
762
no
2,415
TABLE II
DISTRIBUTION OF DECISIONS ACCORDING TO THEIR LABELS.
Labels
N. of decisions
no
866
partial
866
yes
762
TABLE III
DISTRIBUTION OF DECISIONS ACCORDING TO THEIR LABELS WHEN
RANDOMLY REMOVING N O-LABELED DECISION SAMPLES TO CREATE A
REGULAR DISTRIBUTED DATA SET.
Labels
N. of decisions
not-unanimity
45
unanimity
2,229
DISTRIBUTION OF DECISIONS ACCORDING TO JUDGE UNANIMOUS
TABLE IV
BEHAVIOR.
Although we believe that our contribution is quite satisfac-
tory given the accuracy rate aforementioned, future investiga-
tions might consider comparing our results with Law experts,
as performed in [11] and by current Lawtech products such
as Case Crunch and LawGeex4. Other future work includes
to investigate whether taking advantage of existent Named-
entity recognition data sets for Brazilian law documents [10]
improve the prediction quality. Furthermore, the assessment
of the proposed method can be performed on larger and/or
different data sets, such as the European Court of Human
Rights for instance. Ultimately, despite the various directions
one might take to leverage our work, we believe that Mireille
Hildebrandt's viewpoint on "agnostic machine learning" and
its consequences to the Rule of Law [5] should be taken into
account when designing and using a legal predictive system.
REFERENCES
[1] N. Aletras, D. Tsarapatsanis, D. Preoiuc-Pietro, and V. Lampos. Predict-
ing judicial decisions of the European Court of Human Rights: a Natural
Language Processing perspective. PeerJ Computer Science, 2:e93, oct
2016.
[2] K. D. Ashley and S. Bruninghaus. Automatically classifying case texts
and predicting outcomes. Artificial Intelligence and Law, 17(2):125 --
165, jun 2009.
[3] R. Barros, F. Lorenzi, and L. K. Wives. Recent Trends and Future
Technology in Applied Intelligence, volume 10868 of Lecture Notes in
Computer Science. Springer International Publishing, Cham, 2018.
[4] A. Elnaggar, R. Otto, and F. Matthes. Named-Entity Linking Using
Deep Learning For Legal Documents: A Transfer Learning Approach.
Technical report, Technische Universitat, Munchen, 2018.
[5] M. Hildebrandt. Algorithmic regulation and the rule of law. Philosoph-
ical Transactions of the Royal Society A: Mathematical, Physical and
Engineering Sciences, 376(2128):20170355, sep 2018.
4https://www.artificiallawyer.com/2018/02/26/lawgeex-hits-94-accuracy-in-
nda-review-vs-85-for-human-lawyers/
|
1811.08366 | 1 | 1811 | 2018-11-20T17:01:16 | Temporal Graph Offset Reconstruction: Towards Temporally Robust Graph Representation Learning | [
"cs.SI",
"cs.LG"
] | Graphs are a commonly used construct for representing relationships between elements in complex high dimensional datasets. Many real-world phenomenon are dynamic in nature, meaning that any graph used to represent them is inherently temporal. However, many of the machine learning models designed to capture knowledge about the structure of these graphs ignore this rich temporal information when creating representations of the graph. This results in models which do not perform well when used to make predictions about the future state of the graph -- especially when the delta between time stamps is not small. In this work, we explore a novel training procedure and an associated unsupervised model which creates graph representations optimised to predict the future state of the graph. We make use of graph convolutional neural networks to encode the graph into a latent representation, which we then use to train our temporal offset reconstruction method, inspired by auto-encoders, to predict a later time point -- multiple time steps into the future. Using our method, we demonstrate superior performance for the task of future link prediction compared with none-temporal state-of-the-art baselines. We show our approach to be capable of outperforming non-temporal baselines by 38% on a real world dataset. | cs.SI | cs |
Temporal Graph Offset Reconstruction: Towards Temporally Robust Graph
Representation Learning
Stephen Bonner †, John Brennan †, Ibad Kureshi ¶, Georgios Theodoropoulos §,
Andrew Stephen McGough ‡ and Boguslaw Obara †
†Department of Computer Science, Durham University, Durham, UK
{s.a.r.bonner, j.d.brennan, ibad.kureshi, boguslaw.obara}@durham.ac.uk
‡ School of Computing, Newcastle University, Newcastle, UK [email protected]
§ School of Computer Science and Engineering, SUSTech, Shenzhen, China [email protected]
¶ InlecomSystems, Brussels, Belgium [email protected]
Abstract -- Graphs are a commonly used construct for rep-
resenting relationships between elements in complex high di-
mensional datasets. Many real-world phenomenon are dynamic
in nature, meaning that any graph used to represent them is
inherently temporal. However, many of the machine learning
models designed to capture knowledge about the structure
of these graphs ignore this rich temporal information when
creating representations of the graph. This results in models
which do not perform well when used to make predictions
about the future state of the graph -- especially when the delta
between time stamps is not small. In this work, we explore
a novel training procedure and an associated unsupervised
model which creates graph representations optimised to predict
the future state of the graph. We make use of graph convo-
lutional neural networks to encode the graph into a latent
representation, which we then use to train our temporal offset
reconstruction method, inspired by auto-encoders, to predict
a later time point -- multiple time steps into the future. Using
our method, we demonstrate superior performance for the task
of future link prediction compared with none-temporal state-
of-the-art baselines. We show our approach to be capable of
outperforming non-temporal baselines by 38% on a real world
dataset.
Keywords-graph representation learning; dynamic graphs;
I. INTRODUCTION
Graphs have become a common metaphor in numerous
scientific domains for representing high-dimensional com-
plex data which is loosely topologically related, common
examples being social media networks or citation networks.
As such they provide a useful abstraction for how data is
related. Graphs allow for complex analysis to be performed
such as identifying the missing link within a graph (a
person whom you might know or that paper you must
read), however, to date almost all of the prediction work
which has been performed on graphs has been focused
on analysis in the topological domain as opposed to the
temporal domain. This is strange as almost all graphs change
with time (making new fiends or publishing new papers).
We formally define a graph G = (V, E) as a finite set of
vertices V , with a corresponding set of of edges E. Elements
of E are unordered tuples {u, v} where u, v ∈ V . Elements
in V and E may have a label or some associated features,
although these are not needed for this work. In order to
perform analysis on graphs we need a mechanism which
converts the formal graph representation into a format which
is amenable for machine learning -- graph representation
learning, sometimes referred to as graph embeddings.
Recently, the field of graph representation learning has
received a lot of interest as a way of analysing high-
dimensional graphs via the use of machine learning. Graph
representation learning, comprises a set of techniques which
learn latent representations of a graph, which can then be
used as input to machine learning models for downstream
prediction tasks [1]. The majority of graph representation
learning techniques have focused upon learning vertex em-
beddings [2] and reconstructing missing edges [1]. As such,
the goal of graph representation learning is to learn some
function f : V → Rd which maps from the set of vertices V
to a set of embeddings of the vertices, where d is the required
dimensionality. Resulting in f being a matrix of dimensions
V by d, i.e. an embedding of size d for each vertex in
the graph. However, the majority of graph representation
learning approaches to date ignore the temporal aspect of
dynamic graphs, resulting in models which have no concept
of how the graph will change in the future.
There are many cases in the real-world where a machine
learning model will be trained using historical data and
then used for inference at a later point in time. A primary
example of this being the recommender systems literature,
where graphs can be used to model the relationship between
users and items [3]. Here a model is trained to recommend
items to users based on historically collected data, and
then used to make predictions about newly arriving data.
However, the underlying graph structure is dynamic and
could undergo large changes between time points, leading
to the existing model suffering from degraded predictive
performance, forcing the model to be retrained.
This paper introduces a new training procedure and as-
sociated model which can be used to create vertex level
representations which encode information about how the
graph will evolve into the future,
leading to a model
which is more robust to temporal change. To achieve this,
we introduce the temporal offset reconstruction method to
create graph representations which are explicitly designed
to predict the next time point for a dynamic graph. We
show that this offset method results in vertex representations
which perform better when used to make predictions on later
time points. Further, we make use of graph convolutional
neural networks [4], combined with our temporal offset
reconstruction method to show that graph convolutions can
be used to capture the dynamics of an evolving graph dataset.
To the best of our knowledge, this is the first time this has
been done. In summary, we make the following contributions
during this paper:
• Temporal Offset Reconstruction - We introduce the
temporal offset reconstruction method to create vertex
representations which contain temporal, in addition to
structural, information about the vertex. Achieved by
explicitly training a model to predict the future rather
than the current state of the graph.
• Graph Convolution-based Model - We explore the
use of unsupervised graph convolutional networks to
capture graph dynamics.
• Detailed Experimentation - We perform detailed ex-
perimentation on the task of future link prediction
using benchmark graph datasets, containing synthetic
and empirical evolutionary graphs.
To aid the reproducibility of our work, we open-source
all of our PyTorch [5] based source-code1 and experimen-
tation scripts, as well as presenting results upon benchmark
datasets.
The remainder of this paper is structured as follows: In
Section II we review the relevant literature, Section III we
discuss our methodology and introduce our temporal offset
approach, Section IV details the experimental setup, Section
V presents the results and Section VI draws conclusions.
II. RELATED WORKS
A. Graph Representation Learning
Traditionally graph representations were created via tech-
niques based on matrix factorization, where a mapping to
a lower dimensional space is found such that pair-wise
relationships in the original graph are preserved. Examples
of such approaches include Laplican eigenmaps [6], Graph
Factorization [7], GraGrep [8] and HOPE [9]. More recently,
models originally designed for Natural Language Processing
(NLP) have been adapted to create graph embeddings. Such
approaches use random walks to create 'sentences' which
can be used as input to language inspired models such as
Word2Vec [10]. NLP inspired graph embedding approaches
include DeepWalk [11], Node2Vec [1] and Hyperbolic em-
beddings [12].
1https://github.com/sbonner0/temporal-offset-reconstruction
Recently graph specific neural network based models
have been created which are inspired by Convolutional
Neural Networks (CNNs) from the field of computer vision.
Such approaches attempt to create a differential model for
learning directly from graph structures. Many Graph CNN
approaches operate in the spectral domain of the graph, using
eigenvectors derived from the Laplacian matrix of a graph
[4]. Early approaches to define convolution operators on
graphs often had large memory and computation complexi-
ties and were thus unsuited to many real world graphs [13].
Later more efficient spectral methods were proposed
which reduced the complexity of the filtering operations
whilst still operating on the entire adjacency matrix [4],
[14]. The Graph Convolutional Network (GCN) approach
has proven to be particularly effective [4]. The GCN ap-
proaches uses a layer-wise propagation rule to aggregate
information from a vertices 1-hop neighbourhood to create
it's representation, this layer-wise rule can be stacked k
times to aggregate information from k-hops away from a
given vertex. The requirement to have the whole adjacency
matrix available in memory means that the GCN approach
struggles to scale to massive graphs. To tackle this problem,
Graph-Sage [15] learns to aggregate features from a fixed
size sample of a vertices neighbourhood and as such can
be applied to new vertices which have joined the graph.
However, the approach mandates that all vertices in the
graph have features available and the performance can vary
depending upon the neighbourhood sampling strategy [16].
Thus far, all the graph specific models discussed have
been supervised approaches, requiring the graph's to have
labels. There have been a modest selection of unsuper-
vised graph specific neural models, many are based on
auto-encoders - a type of neural network whose task is
to reconstruct the input data after being projected into a
lower-dimension [17]. Structural Deep Network Embedding
(SDNE) uses an auto-encoder to reconstruct each row in a
graph's adjacency matrix [18]. A more recent auto-encoder
employs a generative model to adversarially regularise the
embeddings to help improve performance [19]. Work has
also explored the use of GCNs as the basis of a convolutional
auto-encoder model [20], producing state-of-the-art results
for link-prediction in citation graphs.
B. Temporal Embeddings
1) Natural Language Temporal Embeddings: Some ap-
proaches from temporal language based models are created
to model how word use evolves over time. For example,
work has been performed to use cosine similarity to au-
tomatically measure how a word changes, relative to it's
neighbours, over time and identify anomalies [21]. To over-
come this non-convex problem, work has been performed in
creating diachronic word embedding by aligning different
embedding snapshots using orthogonal Procrustes, making
the learning not end to end [22]. In later work, a dynamic
Word2Vec model for word embedding is created which
attempts to solve the non-convex problem common to em-
beddings via Bayesian variational black-box inference [23].
The approach creates embeddings which change smoothly
over time and are better able to predict the change in context
for a given word than previous methods.
2) Graph Specific Temporal Embeddings: To date, there
have been few attempts to consider the temporal change
of a graph when creating its embedding. However the
existing approaches can broadly be split into two categories:
Temporal Walk and Adjacency Matrix Factorisation based.
Nguyen et al. [26], propose a model
to incorporate
temporal information when creating graph embeddings via
random walks by capturing individual changes (edge ad-
dition/deletion for example) within a graph. The authors
propose a temporal random walk to create the input data,
however their approach creates more complex and rich
Temporal Walk-Based Approaches -
Many of the temporal graph embedding approaches which
exist are based on data created via temporal walks, which are
random walks over dynamic graphs. Perhaps the first such
approach is that of STWalk [24]. In this work, the authors
aim to learn node trajectories via the use of random walks
which learn representations that considers all the previous
time-steps of a temporal graph. In the best performing
approach presented, the authors learn two representations
for a given vertex simultaneously which are concatenated
to create the final embedding. The first representation is a
normal DeepWalk embedding designed to capture the spatial
information for a vertex. Wile the second representation is
learned across a specially constructed graph structure, where
each vertex is connected to it's 1-hop neighbourhood from
each previous time-step. However the approach is not end-
to-end and requires the user to manually chose how many
time steps to consider.
Yu et al. [25], propose NetWalk, a vertex-level dynamic
graph embedding model using random walks designed to
facilitate anomaly detection in streaming graphs. The ap-
proach captures a collection of short random walks from
the graph which are then passed into an auto-encoder based
model to create the vertex representations. In addition to
the usual reconstruction based loss term, an additional term
is added to minimise the pair-wise distance between the
representations of vertices occurring within the same walk.
To apply this approach to the domain of streaming graphs,
where changes to graph are being made online, the approach
maintains for each vertex a list of neighbouring vertices
which is updated as the graph changes. If changes in a
vertices neighbour list occur, new random walks will be gen-
erated and the representations updated. The final anomaly
detection is performed via a dynamic clustering model on
the vertex representations. However, the created embeddings
are not capable of capturing temporal dynamics or reliably
predicting the future state of a graph.
temporal walks via a biasing process. The approach can be
used to add temporal information into any embedding model
which relies on random walks as input data, however the
paper explicitly explores a model based on the Skip-Gram
architecture and shows the predictive performance increases
over non-temporal baselines.
Adjacency Matrix Factorisation Approaches -
Goyal et al. [27], propose a model for creating dynamic
graph embeddings, entitled DynGEM. In this approach
they extend the auto-encoder graph embedding model of
SDNE [18] to consider dynamic graphs. To do this, they
use a method similar to Net2net [28], which is designed to
transfer the learned knowledge from one neural network to
a second model. This technique allows them to add more
neurons to the auto-encoder, appropriate to the increasing
graph size, via a heuristic approach entitled PropSize. The
use of the Net2net technique means that the model can be ex-
panded while ensuring the learned function is approximately
preserved. The process for training the model is as follows,
at the fist time snapshot of the graph, a complete graph auto-
encoder is trained as described in the SDNE paper [18]. For
the next time step of the model, a new auto encoder is trained
reusing the weights from the previous step, with any new
neurons being added according to the PropSize heuristic.
However the approach does not explicitly predict the future
state of the graph, rather, it transfers knowledge from the
previous timestamp to help the current auto-encoder better
reconstruct the current time-step.
Additionally there have been attempts to incorporate tem-
poral aspects into GCNs [29], [30], however both approaches
focus upon supervised learning and do not explicitly use the
models to predict the future graph state.
III. METHOD
A. Motivation
Many empirical graph datasets comprise a stream of con-
tinually evolving changes, as connections within the graph
are formed and broken. One can consider the graph then as
a series of snapshots, with each snapshot contains the graph
as it is at that point in time. More formally, we can redefine
a graph G to be a temporal graph G(cid:48) = {G0, G1, ..., Gt},
where each graph snapshot Gi (I ∈ [0, t]) contains a
corresponding vertex set Vi and edge set Ei.
In many real-world use cases of machine learning, a
model is trained on historical data and then used to make
predictions about new events at a future point
in time.
An example of where this practice is common is in the
recommender systems industry where recent state-of-the-art
systems, for recommending items to users, are based on
graph convolutions [3], [31]. However, to date, the majority
of models for creating graph representations do not consider
how the graph evolves over time. This could potentially re-
sult in models which have good initial predictive capability,
but whose performance will degrade as the graph continues
to change over time.
B. Temporal Graph Offset Reconstruction
We propose to tackle the challenging problem of creating
temporal robust graph embeddings by training a model to
explicitly recreate a future time step of the graph. We name
this approach temporal offset reconstruction as the input and
target graph are offset by at least one time point. More
concretely, a graph Gi is used as input to model θ(Gi)
which learns a representation for each vertex in Gi such that
it's output can accurately predict the graph Gi+δ. Ideally,
we want to create a model θ(Gi) which can perform this
temporal offset reconstruction using the graphs Gi and Gi+δ
alone, Gi+δ = θ(Gi), requiring no pre-processing steps
which could affect the models performance (e.g. random
walk procedures), no pre-computed vertex features and no
labels required or used.
In the remainder of this section, we will detail the graph
convolutions used to create the vertex representations, the
models we explore to perform the temporal offset recon-
struction and the training procedure.
C. Graph Convolutions
To perform the graph encoding to create the initial vertex
representations, we propose to utilise the spectral graph
convolution networks introduced by Kipf [4]. GCNs are fully
differential end-to-end models for learning from graphs,
meaning that no pre-processing step is required.
One can consider a GCN to be a differentiable func-
tion for aggregating information from a vertices immediate
neighbourhood [15], [16]. The GCN framework introduced
by Kipf produces a representation Z for each vertex in a
graph, provided in the form of it's adjacency matrix2 A
with a set of vertex level features X, taking the form of
Z = GCN (A, X). When no vertex features are present the
identity matrix I of A can be used such that X = I. As with
any deep neural network, a GCN can contain many layers
which aggregate the data. The operation performed at each
layer by the GCN is as follows [4]:
GCN (l)(H (l), A) = σ( AH (l)W (l)) ,
(1)
where l is the current layer number, W (l) is the weight
matrix of that layer, H are the features computed at the
previous layer or is equal to X at l = 0, and σ is a non-linear
activation function like the rectified linear unit (ReLU). To
help with feature scaling, A is the matrix A normalised by
it's degree matrix D and it's identity matrix I such that
A = (D− 1
2 (A + I)D− 1
2 ) [4].
Essentially, we can consider this GCN function to be ag-
gregating a weighted average of the neighbourhood features
for each vertex in the graph. Stacking multiple GCN layers
2The adjacency matrix A = (ai,j ) for a graph is symmetric matrix of
size V by V , where (ai,j ) is 1 if an edge is present and 0 otherwise.
has the effect of increasing the number of hops from which
a vertex-level representation can aggregate information - for
example, a three layer GCN will aggregate information from
three-hops within the graph to create each representation.
The original methods presented in the literature required
GCN based models to be trained via supervised learning,
where the final vertex representation is tuned via provided la-
bels for a specific task -- classification as a common example
[4], [15]. This is a key difference between GCNs and other
graph embedding approaches, as these commonly require
no labels and thus are applicable on a broader selection of
graphs. Recently, extensions to the GCN framework have
been made which allows for convolutional auto-encoders
for graph datasets [20]. Auto-encoders are a type of un-
supervised neural network model which attempt to compress
input data to a low-dimensional space, and then reconstruct
the original data directly from the learned representation. We
will explore similar concepts but using them for temporal
reconstruction in the following section.
D. Model Overview
For creating our temporally offset graph embeddings, we
will explore the use of both non-probabilistic and variational
encoder models. These are related to the convolutional graph
auto-encoders of Kipf [20], however, we are exploring the
creation of two models explicitly to reconstruct a future state
of the graph, rather than just to capture the current graph.
Below we detail the specifics of both the non-probabilistic
(TO-GAE) and variational (TO-GVAE) models used for
temporal offset reconstruction.
TO-GAE: TO-GAE is the non-probabilistic interpretation
of the temporally offset graph auto-encoder concept, where
the goal is to learn a low-dimensional representation of Ai
from Gi, via an encoding from a GCN Zi = GCN (Ai, Xi),
such that it can be used to predict accurately the structure of
some future time step δ of the graph via a product between
Zi and it's transpose passed through a logistic sigmoid unit
σ:
Ai+δ = σ(ZiZ T
i ).
(2)
For all the work presented in the paper, the GCN model
used to learn Zi is a two layer model.
TO-GVAE: TO-GVAE is a variational interpretation of
the temporally offset graph auto-encoder concept. Again the
goal is to learn a vertex level representation for future graph
reconstruction but using ideas from Bayesian learning [32].
This variational method differs from the non-probabilistic
version outlined above as instead of directly learning the
mapping Z, we instead learn a distribution from which Z
is sampled. Using a variational approach to create the latent
space has been shown to create more robust and meaningful
embeddings, resulting in better performing models [20],
[32].
V (cid:89)
As TO-GVAE is a Bayesian style model, we must define
a model with which to perform inference. This again makes
use of the GCN layers outlined in Section III-C to learn
a mean µ and a variance γ vector used to parametrise the
Gaussian distribution N from which Zi is finally sampled:
q(ZiXi, Ai) =
N (zvµv, diag(γ2
v ))
(3)
v=1
where q is our approximation of the of the true distribution
we are interesting in capturing -- p(Ai+δZi). Here both
µ and γ are separate individual GCN layers GCN (µ) and
GCN (γ) respectively. These layers however take their input
from a common first layer GCN (0).
Once the inference model specified in Equation 3 has
created the various required parameters, a generative model
is created to predict the next time step in the graph. The
generative model we use is again based on the inner-product
between the latent representations, given as follows:
p(Ai+δZi) =
p(Axy = 1σ(zxzT
y )),
(4)
V (cid:89)
V (cid:89)
x=1
y=1
(cid:104)
(cid:105)−
where Axy are the elements from Ai and z are the rows for
each vertex taken from Zi.
To train the model, common for variational methods [20],
[32], we directly optimise the lower bound L with regards
to the model parameters:
L = Eq(ZiXi,Ai)
logp(Ai+δZi)
KL(q(ZiAi, Xi)p(Zi)),
(5)
where KL is the Kullback-Leibler distance between p and q.
For this model we use a Gaussian prior as the distribution
for p(Zi).
E. Model Parameters and Training Procedure
After initial experimentation we found two layers of con-
volution to give the optimal performance for both models,
with the first layer comprising 32 filters, whilst the second
having 16 filters. For training both the models we use full-
batch gradient descent via the ADAM algorithm with a
learning rate of 0.001 for a total of 50 epochs. We also
found the use of an additional term in the loss functions
which penalises the model parameters for getting too large
via L2 to help model performance. All of our models, as
well as the comparative baselines, have been implemented
in the PyTorch library [5].
IV. EXPERIMENTAL SETUP
A. Evaluation Overview and Methodology
As the primary goal of our approach is to create vertex
representations which are better able to encode information
about how the graph will evolve into the future, we will be
using the important task of link prediction as our primary
task. Formally the task of link prediction in the context of
machine learning can be defined as follows: given a subset
of edges Etrain ⊂ E from graph G = (V, E), learn a
model which can accurately predict the remaining edges
Etest = E − Etrain [33]. Many recent methods attempt
to solve this problem via vertex embedding similarity -- i.e.
vertices with more similar embeddings, according to some
metric, are more likely to be connected via an edge [1], [11],
[20].
During the evaluation, we will be investigating two ways
a model trained on temporal graph data could be used for
inference:
• Evolution Pattern Prediction -- For this inference ap-
proach, the original input graph G0 is kept constant,
whilst the rest of the time series G1, ..., Gt is used as
the targets for prediction to measure the models ability
to predict the future graph changes.
• Future Link Prediction -- For this inference approach,
the trained model is kept constant whilst each graph
snapshot Gi is passed in. The model is then evaluated
by making predictions on hold out edges from the same
snapshot to test how well the model can predict edges
in future snapshots of the graph.
Graph edges are predicted as follows: Given the learned
vertex embeddings, the adjacency matrix is reconstructed
via a dot-product of the embedding matrix A(cid:48) = σ(ZZ T).
This reconstructed adjacency matrix is compared with the
true graph to assess how well the embedding is able to
reconstruct the future graph. For the future link prediction
task, edges from the graph are randomly removed before the
graph is fed into the model. The embeddings are then used
to predict the hold-out set of edges.
B. Performance Metrics
As one can consider the task of link prediction to be
that of a binary classification problem (an edge can only
be present or not), we make use of two standard binary
classification metrics:
• Area Under the Receiver Operating Characteristic
Curve (AUC) -- The ratio between the True Positive
Rate (TPR) and False Positive Rate (FPR) measured at
various classification thresholds.
• Mean Average Precision (AP) -- The mean average pre-
cision across the set of test edges: P recision(AP ) =
T P +F P , where T P denotes the number of true posi-
tives the model predicts, and F P denotes the number
of false positives.
T P
In both cases large values are better.
C. Datasets
We make use of the following empirical graph datasets
presented in Table I when performing our experimental
(a) AUC score
(b) AUC score on new edges
(c) AP score
(d) AP score on new edges
Figure 1: AUC and AP scores on the Cora dataset evolved via the configuration method with a 25% chance of edges being
rewired per time step. Values are presented for the whole graph and only on new edges which have been altered since the
graph used for training.
(a) AUC score
(b) AUC score on new edges
(c) AP score
(d) AP score on new edges
Figure 2: AUC and AP scores on the Citeseer dataset evolved via the configuration method with a 25% chance of edges
being rewired per time step. Values are presented for the whole graph and only on new edges which have been altered since
the graph used for training.
Table I: Empirical Graph Datasets
Dataset
V
E
Temporal
Reference
cit-HepPh
cora
citeseer
34,546
2,708
3,327
421,578
5,429
3,327
Snapshots
Synthetic
Synthetic
[34]
[20]
[20]
evaluation. For the two datasets which contain no inherent
temporal information, we generate a synthetic evolutionary
trajectory for the graph using one of the rewire processes
detailed in section IV-D. For the empirical cit-HepPh dataset,
we create six snapshots based on a linear partitioning of the
graph's timeline.
D. Random Rewire Process
In order to have large amounts of temporal graph data
which has been evolved via a controllable process, we make
use of the random rewire methodology [35], [36]. The rewire
process alters a given source graph's degree distribution by
randomly altering the source and target of a set number of
edges. During this re-wire process, it is not guaranteed that
the source or target of the edge will be altered, indeed it is
not always possible due to the graphs topology. Also, the
rewiring process does not change the total number of edges
or vertices within the graph. We employ two types of random
rewire in this work:
• Erdos - The edges are rewired such that the resulting
topology of the graph begins to resemble a Erdos-R´enyi
graph, were edges are uniformly distributed between
vertices.
• Configuration - The edges are rewired in such a way
that each vertex approximately preserves it's associated
number of edges, creating graphs with a similar degree
distribution to the original.
E. Baseline Approaches
Graph convolutional auto-encoders have been shown to
have state-of-the-art performance in the link-prediction task
for high-dimensional graphs [20]. As such, we compare
our approach to both non-probabilistic and variational ver-
sions of the convolutional graph auto-encoder, these will be
denoted as GAE and GVAE in the results section. These
approaches are trained as originally detailed by the authors
[20], meaning that temporal information is not utilised.
V. RESULTS
This section will present the results of the experimental
evaluation. As outlined in Section IV-A, we are testing two
01234Temporal Graph Snapshot ID0.550.600.650.700.750.800.85AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.500.550.600.650.70AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.600.650.700.750.800.85AP ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.400.450.500.550.600.65AP ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.550.600.650.700.750.800.85AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.550.600.650.700.75AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.650.700.750.800.85AP ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.40.50.60.7AP ScoreGAEGVAETO_GAETO_GVAE(a) AUC score
(b) AUC score on new edges
(c) AP score
(d) AP score on new edges
Figure 3: AUC and AP scores on the Cora dataset evolved via the configuration method with a 50% chance of edges being
rewired per time step. Values are presented for the whole graph and only on new edges which have been altered since the
graph used for training.
(a) AUC score
(b) AUC score on new edges
(c) AP score
(d) AP score on new edges
Figure 4: AUC and AP scores on the Citeseer dataset evolved via the configuration method with a 50% chance of edges
being rewired per time step. Values are presented for the whole graph and only on new edges which have been altered since
the graph used for training.
ways to evaluate the models: evolution pattern prediction and
future link prediction. We present results on the datasets in-
troduced in Section IV-C, which contain both simulated and
empirical evolving graph datasets. All the results presented
are the mean, with the standard deviation, of ten repeats of
the evaluation procedure, using a random train/test split for
each repetition.
A. Simulated Graph Evolution
We first present results using time series simulated via the
random rewire processes introduced in Section IV-D on both
the cora and citeseer datasets. For this experiment, we train
using the original unaltered graph to reconstruct the next
graph in the time series. We then measure the performance
of the resulting embeddings at predicting edges in future
graph snapshots using the two inference approaches outlined
in Section IV-A.
1) Evolution Pattern Prediction: Figure 1 shows how
well the models perform upon the Cora dataset with smaller
possible perturbations introduced by the rewire process. The
figure shows how both the temporally offset methods we
introduce generally demonstrate greater performance than
the baseline approaches. When considering the AUC score
on new edges, we can see a large increase in performance.
Our methods also show performance above the baselines
when reconstructing the full graph, demonstrating that the
temporal offset process does not harm the abilty to predict
edges which have not changed.
Figure 2 contains the results for the Citeseer dataset,
again using the smaller rewire probability. This figure con-
tinues the trends established in the previous figure, with
the temporally offset methods beating the baseline methods.
However, this time it is the variational approach which often
demonstrates the greater performance, especially when only
new edges are considered.
The next two sets of figures show results for when a large
possible perturbation is made in-between each graph time
step. Figure 3 demonstrates that, as was expected, when even
large steps are made between graphs, the gap between our
approaches and the baselines also increases. The temporally
offset methods show a clear increase in performance, even
when using the model to make predictions about graphs
later in the time series, which will have a quite different
topological structure to the graph used to train the model.
Figure 4 shows the results for the Citeseer dataset us-
ing the higher level of possible perturbation. The figure
continues the trend of the previous results by showing the
temporally offset models to be better at predicting future
01234Temporal Graph Snapshot ID0.500.550.600.650.700.750.80AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.500.550.600.650.700.75AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.550.600.650.700.750.80AP ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.500.550.600.650.70AP ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.550.600.650.700.750.80AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.500.550.600.650.700.75AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.600.650.700.750.80AP ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.450.500.550.600.650.700.75AP ScoreGAEGVAETO_GAETO_GVAE(a) AUC score on Cora
(b) AP score on Cora
(c) AUC score on Citeseer
(d) AP score on Citeseer
Figure 5: AUC and AP sscoes for the future link prediction task on both the Cora and Citeseer datasets evolved using the
Erdos rewire method with E/2 edges having the chance of being rewired. The results presented are scores for predicting
only new edges which have appeared after the original graph used for training the model.
(a) AUC score on Cora
(b) AP score on Cora
(c) AUC score on Citeseer
(d) AP score on Citeseer
Figure 6: AUC and AP scores for the future link prediction task on both the Cora and Citeseer datasets evolved using the
Erdos rewire method with the complete set of E having the chance of being rewired. The results presented are scores for
predicting only new edges which have appeared after the original graph used for training the model.
changes in the graph, even when considering both the
unchanged and new edges.
2) Future Link Prediction: For assessing the ability of the
various models to continue to make accurate link predictions
as the graph undergoes heavy topological change, we make
use of the Erdos-based random rewire method. Figure 5
shows the results for only new edges on both the cora and
citeseer datasets when 50% of the edges have the chance of
being rewired in-between each graph snapshot. The figure
shows that our temporally offset training method is more
robust to the Erdos rewired edges, as it displays a higher
level of predictive performance particularly when regarding
the AUC metric. Interesting, of the two temporally offset
models, it is the non-probabilistic approach which displays
greater performance across both datasets.
Figure 6 highlights the performance on new edges when
all the edges have the chance to be rewired between graph
snapshots. The results show that the temporal offset ap-
proaches are generally more robust to the large change in
graph topology between graph snapshots. With both demon-
strating greater performance, especially at earlier points in
the time series. Continuing the trend established in the
previous experiment, the non-probabilistic temporally offset
model out performs the variational approach. We hypoth-
esise that as the variational approach is a more complex
model, it is over fitting more strongly to the non-rewired
original graph edges, making it less able to learn the Erdos
pattern of rewiring.
B. Empirical Time-Series
1) Evolution Pattern Prediction: Table II displays the
results for the task of evolution pattern prediction for all
models for the cit-HepPh dataset. The table shows that both
the temporally offset methods significantly outperform the
baseline approaches on both whole graph and new edges
metrics at
this particular task. The gap in performance
between the temporally offset and normal approaches for
this empirical dataset is larger than on the previous synthetic
results, indicating that our approach is much better able to
learn the temporal dynamics of real datasets. We can also
see that the variational temporally offset approach is often
the best performing of the two approaches, particularly at
later time-points.
2) Future Link Prediction: Table III highlights the results
for all models at the task of future link prediction on the cit-
HepPh dataset. We can see that compared with the previous
task, all models are more closely matched. The results
show all approaches to have a good predictive performance,
even at later time points, however, the temporally offset ap-
proaches still outperform the baselines. Here it is interesting
to note that the non-probabilistic model almost always out
performs the variational one.
01234Temporal Graph Snapshot ID0.500.550.600.650.70AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.350.400.450.50AP ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.450.500.550.600.650.700.75AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.350.400.450.50AP ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.500.550.600.65AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.4250.4500.4750.5000.525AP ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.500.550.600.650.70AUC ScoreGAEGVAETO_GAETO_GVAE01234Temporal Graph Snapshot ID0.450.500.550.60AP ScoreGAEGVAETO_GAETO_GVAEModel
Metric
G1
G2
G3
G4
G5
GVAE
GAE
TO-GVAE
TO-GAE
AUC
AP
NE-AUC
NE-AP
AUC
AP
NE-AUC
NE-AP
AUC
AP
NE-AUC
NE-AP
AUC
AP
NE-AUC
NE-AP
0.699(±0.0133)
0.8023(±0.0089)
0.5358(±0.0103)
0.5875(±0.0071)
0.653(±0.0159)
0.7817(±0.0103)
0.4665(±0.0172)
0.5541(±0.0131)
0.9943(±0.0004)
0.9925(±0.0011)
0.995(±0.001)
0.989(±0.003)
0.9944(±0.0012)
0.9915(±0.0028)
0.9955(±0.0009)
0.9882(±0.0043)
0.6327(±0.0036)
0.7459(±0.0056)
0.513(±0.0036)
0.5698(±0.0055)
0.5939(±0.0062)
0.7293(±0.0069)
0.4512(±0.0033)
0.5416(±0.0055)
0.873(±0.0022)
0.9197(±0.0015)
0.8203(±0.0042)
0.8615(±0.0043)
0.8702(±0.0029)
0.9176(±0.0022)
0.8159(±0.0029)
0.8588(±0.0025)
0.5913(±0.0022)
0.7036(±0.001)
0.5012(±0.0098)
0.5663(±0.0067)
0.5546(±0.0034)
0.6875(±0.0023)
0.4526(±0.0041)
0.5434(±0.0031)
0.7728(±0.0031)
0.8515(±0.0027)
0.7076(±0.0016)
0.776(±0.0023)
0.7629(±0.0062)
0.8461(±0.002)
0.6972(±0.0087)
0.7711(±0.0035)
0.5821(±0.0049)
0.6853(±0.0035)
0.5034(±0.0067)
0.5598(±0.0079)
0.5343(±0.0043)
0.6643(±0.006)
0.4436(±0.0031)
0.5286(±0.0077)
0.726(±0.0084)
0.8158(±0.0056)
0.6641(±0.0089)
0.7396(±0.0055)
0.711(±0.0095)
0.8077(±0.0062)
0.6449(±0.0084)
0.7285(±0.005)
0.5771(±0.0122)
0.685(±0.0095)
0.4979(±0.0112)
0.552(±0.0111)
0.5343(±0.0043)
0.6643(±0.006)
0.4436(±0.0031)
0.5286(±0.0077)
0.7281(±0.0045)
0.8177(±0.0034)
0.6591(±0.008)
0.7367(±0.0044)
0.711(±0.0095)
0.8077(±0.0062)
0.6449(±0.0084)
0.7285(±0.005)
Table II: Evolution pattern prediction results presented as mean values with standard deviation for both the whole graph and
new edges on the cit-HepPh dataset across all models trained using G0. A bold value indicates the highest score for that
metric for the given graph snapshot.
Model
Metric
G1
G2
G3
G4
G5
GVAE
GAE
TO-GVAE
TO-GAE
AUC
AP
NE-AUC
NE-AP
AUC
AP
NE-AUC
NE-AP
AUC
AP
NE-AUC
NE-AP
AUC
AP
NE-AUC
NE-AP
0.9702(±0.0009)
0.9759(±0.0006)
0.9586(±0.002)
0.9521(±0.0016)
0.9885(±0.0006)
0.9902(±0.0004)
0.9837(±0.0008)
0.9803(±0.0008)
0.9957(±0.0004)
0.9944(±0.0007)
0.9964(±0.0003)
0.9921(±0.0008)
0.9961(±0.0001)
0.9943(±0.0003)
0.997(±0.0001)
0.9922(±0.0006)
0.9336(±0.0026)
0.9461(±0.0021)
0.9149(±0.0005)
0.9103(±0.0012)
0.9794(±0.0018)
0.9815(±0.0014)
0.9732(±0.0022)
0.9685(±0.002)
0.9871(±0.0006)
0.9869(±0.0005)
0.9841(±0.0005)
0.979(±0.0006)
0.99(±0.0001)
0.9887(±0.0001)
0.9882(±0.0002)
0.9825(±0.0)
0.8796(±0.0018)
0.9016(±0.0012)
0.8552(±0.0029)
0.8581(±0.0028)
0.9545(±0.0011)
0.9616(±0.0011)
0.9447(±0.0015)
0.9442(±0.002)
0.9651(±0.0014)
0.9693(±0.0009)
0.9578(±0.0022)
0.9549(±0.0021)
0.9751(±0.0009)
0.9757(±0.0008)
0.9701(±0.0011)
0.9646(±0.0014)
0.8503(±0.0018)
0.8762(±0.0013)
0.8232(±0.002)
0.8289(±0.0023)
0.9412(±0.0007)
0.9518(±0.0007)
0.9303(±0.0007)
0.9332(±0.0012)
0.9534(±0.0009)
0.9596(±0.0008)
0.9439(±0.0011)
0.9427(±0.0017)
0.9645(±0.0003)
0.967(±0.0008)
0.9579(±0.0003)
0.9536(±0.0013)
0.8499(±0.0009)
0.8761(±0.0007)
0.8231(±0.0039)
0.8289(±0.0034)
0.9412(±0.0007)
0.9518(±0.0007)
0.9303(±0.0007)
0.9332(±0.0012)
0.9524(±0.001)
0.9591(±0.0011)
0.9427(±0.0003)
0.9419(±0.0015)
0.9645(±0.0003)
0.967(±0.0008)
0.9579(±0.0003)
0.9536(±0.0013)
Table III: Future link prediction results presented as mean values with standard deviation for both the whole graph and new
edges on the cit-HepPh dataset across all models trained using G0. A bold value indicates the highest score for that metric
for the given graph snapshot.
VI. CONCLUSION
Whilst a lot of focus has recently been placed on finding
methods for learning graph representations which are accu-
rately able to make predictions about the current state of
the graph, few works have investigated how these models
perform for temporal graphs. This paper has explored the
use of graph specific neural networks to learn vertex level
representations which are accurately able to make predic-
tions about future time points of evolving graphs. This is
achieved by explicitly training the models to predict future
time steps via the temporal offset reconstruction method. To
assess our approach, we perform extensive experimentation
on both real-world and synthetic evolving graph datasets.
There is large scope for future continuation of this re-
search. We plan to investigate if the use of topological vertex
properties can be used as input to the model to improve
performance, instead of relying upon the identity matrix of
the graph. We also plan to investigate if an inductive style
model [15] could be used to replace the GCN as this would
allow us to vary the number of vertices between time steps
and allow for batch-based training.
ACKNOWLEDGEMENTS
We gratefully acknowledge the support of NVIDIA Cor-
poration with the donation of the GPU used for this re-
search. Additionally we thank the Engineering and Physical
Sciences Research Council UK (EPSRC) for funding.
REFERENCES
[1] A. Grover and J. Leskovec, "node2vec : scalable feature learn-
ing for networks," International Conference on Knowledge
Discovery and Data Mining, 2016.
[2] P. Goyal and E. Ferrara, "Graph embedding techniques,
applications, and performance: a survey," arXiv preprint
arXiv:1705.02801, 2017.
[3] R. v. d. Berg, T. N. Kipf, and M. Welling, "Graph convolu-
tional matrix completion," arXiv preprint arXiv:1706.02263,
2017.
[4] T. N. Kipf and M. Welling, "Semi-supervised classifica-
tion with graph convolutional networks," arXiv preprint
arXiv:1609.02907, 2016.
[5] A. Paszke, S. Gross, S. Chintala, G. Chanan, E. Yang,
Z. DeVito, Z. Lin, A. Desmaison, L. Antiga, and A. Lerer,
"Automatic differentiation in pytorch," 2017.
[6] M. Belkin and P. Niyogi, "Laplacian eigenmaps and spectral
techniques for embedding and clustering," Advances in neural
information processing systems, pp. 585 -- 591, 2002.
[7] A. Ahmed, N. Shervashidze, S. Narayanamurthy, V. Josi-
fovski, and A. J. Smola, "Distributed large-scale natural graph
factorization," International conference on World Wide Web,
pp. 37 -- 48, 2013.
[8] S. Cao, W. Lu, and Q. Xu, "Grarep: Learning graph represen-
tations with global structural information," ACM International
on Conference on Information and Knowledge Management,
pp. 891 -- 900, 2015.
[9] M. Ou, P. Cui, J. Pei, Z. Zhang, and W. Zhu, "Asymmetric
transitivity preserving graph embedding," International Con-
ference on Knowledge Discovery and Data Mining, pp. 1105 --
1114, 2016.
[10] T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and
J. Dean, "Distributed representations of words and phrases
and their compositionality," in Advances in neural information
processing systems, 2013, pp. 3111 -- 3119.
[11] B. Perozzi, R. Al-Rfou, and S. Skiena, "DeepWalk: online
learning of social representations," International Conference
on Knowledge Discovery and Data Mining, 2014.
[12] B. Chamberlain, M. D. Clough, and James, "Neural embed-
dings of graphs in hyperbolic space," KDD Workshop on
Mining and Learning with Graphs (MLG), 2017.
[13] J. Bruna, W. Zaremba, A. Szlam, and Y. LeCun, "Spectral
networks and locally connected networks on graphs," arXiv
preprint arXiv:1312.6203, 2013.
[14] M. Defferrard, X. Bresson, and P. Vandergheynst, "Convolu-
tional neural networks on graphs with fast localized spectral
filtering," in Advances in Neural Information Processing
Systems, 2016, pp. 3844 -- 3852.
[15] W. Hamilton, Z. Ying, and J. Leskovec, "Inductive repre-
sentation learning on large graphs," in Advances in Neural
Information Processing Systems, 2017, pp. 1024 -- 1034.
[16] J. Chen, T. Ma, and C. Xiao, "Fastgcn: fast learning with
graph convolutional networks via importance sampling,"
arXiv preprint arXiv:1801.10247, 2018.
[17] P. Baldi, "Autoencoders, unsupervised learning, and deep
architectures," in Proceedings of ICML workshop on Unsu-
pervised and Transfer Learning, 2012, pp. 37 -- 49.
[18] D. Wang, P. Cui, and W. Zhu, "Structural deep network
embedding," in International Conference on Knowledge Dis-
covery and Data Mining. ACM, 2016, pp. 1225 -- 1234.
[19] W. Yu, C. Zheng, W. Cheng, C. C. Aggarwal, D. Song,
B. Zong, H. Chen, and W. Wang, "Learning deep network
representations with adversarially regularized autoencoders,"
in International Conference on Knowledge Discovery & Data
Mining. ACM, 2018, pp. 2663 -- 2671.
[20] T. N. Kipf and M. Welling, "Variational graph auto-encoders,"
arXiv preprint arXiv:1611.07308, 2016.
[21] Y. Kim, Y.-I. Chiu, K. Hanaki, D. Hegde, and S. Petrov,
language
"Temporal analysis of language through neural
models," arXiv preprint arXiv:1405.3515, 2014.
[22] W. L. Hamilton, J. Leskovec, and D. Jurafsky, "Diachronic
word embeddings reveal statistical laws of semantic change,"
arXiv preprint arXiv:1605.09096, 2016.
[23] R. Bamler and S. Mandt, "Dynamic word embeddings," arXiv
preprint arXiv:1702.08359, 2017.
[24] S. Pandhre, H. Mittal, M. Gupta, and V. N. Balasubrama-
nian, "Stwalk: learning trajectory representations in temporal
graphs," in Proceedings of the ACM India Joint International
Conference on Data Science and Management of Data.
ACM, 2018, pp. 210 -- 219.
[25] W. Yu, W. Cheng, C. C. Aggarwal, K. Zhang, H. Chen, and
W. Wang, "Netwalk: A flexible deep embedding approach
for anomaly detection in dynamic networks," in Iternational
Conference on Knowledge Discovery & Data Mining. ACM,
2018, pp. 2672 -- 2681.
[26] G. H. Nguyen, J. B. Lee, R. A. Rossi, N. K. Ahmed,
E. Koh, and S. Kim, "Continuous-time dynamic network
embeddings," in 3rd International Workshop on Learning
Representations for Big Networks (WWW BigNet), 2018.
[27] P. Goyal, N. Kamra, X. He, and Y. Liu, "Dyngem: Deep
embedding method for dynamic graphs," arXiv preprint
arXiv:1805.11273, 2018.
[28] T. Chen, I. Goodfellow, and J. Shlens, "Net2net: Accel-
erating learning via knowledge transfer," arXiv preprint
arXiv:1511.05641, 2015.
[29] F. Manessi, A. Rozza, and M. Manzo, "Dynamic graph
convolutional networks," arXiv preprint arXiv:1704.06199,
2017.
[30] Y. Seo, M. Defferrard, P. Vandergheynst, and X. Bresson,
"Structured sequence modeling with graph convolutional re-
current networks," arXiv preprint arXiv:1612.07659, 2016.
[31] R. Ying, R. He, K. Chen, P. Eksombatchai, W. L. Hamil-
ton, and J. Leskovec, "Graph convolutional neural net-
works for web-scale recommender systems," arXiv preprint
arXiv:1806.01973, 2018.
[32] D. P. Kingma and M. Welling, "Auto-encoding variational
bayes," arXiv preprint arXiv:1312.6114, 2013.
[33] V. Mart´ınez, F. Berzal, and J.-C. Cubero, "A survey of link
prediction in complex networks," ACM Computing Surveys,
vol. 49, no. 4, p. 69, 2017.
[34] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large
network dataset collection," http://snap.stanford.edu/data, Jun.
2014.
[35] S. Bonner, J. Brennan, G. Theodoropoulos, I. Kureshi, and
A. S. McGough, "Deep topology classification: A new ap-
proach for massive graph classification," in International
Conference on Big Data.
J. Brennan,
IEEE, 2016, pp. 3290 -- 3297.
I. Kureshi, M. Stephen, and
G. Theodoropoulos, "Efficient comparison of massive graphs
through the use of graph fingerprints," in KDD Workshop on
Mining and Learning with Graphs (MLG), 2016.
[36] S. Bonner,
|
Subsets and Splits